From: Sean C (Upp_and_Upp@hotmail.com)
Date: Mon Apr 25 2005 - 15:04:05 GMT-3
Hi Brian,
It's in the free audio titled: "CCIE Lab Strategy: A Structured Approach".
Brian mentions it around one hour, 44 minute and 20 seconds into the
program. Maybe we were just overanalyzing the program, but myself and
another study partner both thought we heard the same thing.
Appreciate your help, thanks
Sean
----- Original Message -----
From: "Brian McGahan" <bmcgahan@internetworkexpert.com>
To: "Sean C" <Upp_and_Upp@hotmail.com>; "Cisco certification"
<ccielab@groupstudy.com>
Sent: Monday, April 25, 2005 1:58 PM
Subject: RE: InternetExpert Audio - EIGRP Neig w/ Auth
Sean,
Which recording is this in, the CCIE lab strategy one?
Brian McGahan, CCIE #8593
bmcgahan@internetworkexpert.com
Internetwork Expert, Inc.
http://www.InternetworkExpert.com
Toll Free: 877-224-8987 x 705
Outside US: 775-826-4344 x 705
24/7 Support: http://forum.internetworkexpert.com
Live Chat: http://www.internetworkexpert.com/chat/
> -----Original Message-----
> From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf
Of
> Sean C
> Sent: Monday, April 25, 2005 12:18 PM
> To: Group Study
> Subject: InternetExpert Audio - EIGRP Neig w/ Auth
>
> Hello,
>
> First, I want to thank InternetworkExpert for their excellent audio
> program on
> preparing for the CCIE lab.
> http://www.internetworkexpert.com/onlineclassroom.htm
>
> One item mentioned in the audio program caught my attention and I have
not
> been able to duplicate it, nor have I found any supporting
documentation
> on
> Cisco, through Googling and the Groupstudy archives. During the Audio
> program
> at about time mark @ 1:44:40, Brian Dennis mentions that a caveat of
using
> EIGRP key-chain is "... you can't use a neighbor statement". I'm at a
> loss
> understanding this. I labbed up 2 routers, applied EIGRP, applied
key-
> chains,
> and then applied neighbor statements - from what I could see, the
routers
> were
> able to see each others as EIGRP neighbors and pass EIGRP prefixes.
Did I
> misunderstand something? Also, the audio mentions there is a specific
> order
> of operations when applying EIGRP key-chain statements - does anyone
have
> the
> correct order? Perhaps I just got lucky with the order of operations
when
> configuring the routers.
>
> Thanks in advance,
> Sean
>
> ================================
> R2:
> key chain TEST
> key 1
> key-string CISCO
> !
> interface Loopback102
> ip address 172.16.102.1 255.255.255.0
> !
> interface Ethernet0
> ip address 23.23.23.2 255.255.255.0
> ip authentication mode eigrp 1 md5
> ip authentication key-chain eigrp 1 TEST
> !
> router eigrp 1
> network 23.23.23.0 0.0.0.255
> network 172.16.102.0 0.0.0.255
> neighbor 23.23.23.3 Ethernet0
> ======================================
> R3:
> key chain TEST
> key 1
> key-string CISCO
> !
> interface Loopback103
> ip address 172.16.103.1 255.255.255.0
> !
> interface FastEthernet0/0
> ip address 23.23.23.3 255.255.255.0
> ip authentication mode eigrp 1 md5
> ip authentication key-chain eigrp 1 TEST
> !
> router eigrp 1
> network 23.23.23.0 0.0.0.255
> network 172.16.103.0 0.0.0.255
> neighbor 23.23.23.2 FastEthernet0/0
> no auto-summary
>
> ======================================
> r2#sh ip route eig
> 172.16.0.0/16 is variably subnetted, 7 subnets, 3 masks
> D 172.16.103.0/24 [90/409600] via 23.23.23.3, 00:01:27,
Ethernet0
>
> r2#sh ip eig neig
> IP-EIGRP neighbors for process 1
> H Address Interface Hold Uptime SRTT RTO Q
Seq
> Type
> 0 23.23.23.3 Et0 13 00:01:34 20 200 0
39
> S
>
> R3#sh ip rout eig
> 172.16.0.0/16 is variably subnetted, 7 subnets, 3 masks
> D 172.16.102.0/24 [90/156160] via 23.23.23.2, 00:03:31,
> FastEthernet0/0
>
> R3#sh ip eig neig
> IP-EIGRP neighbors for process 1
> H Address Interface Hold Uptime SRTT RTO Q
Seq
> Type
> 0 23.23.23.2 Fa0/0 14 00:03:37 12 200 0
44
> S
>
>
This archive was generated by hypermail 2.1.4 : Tue May 03 2005 - 07:55:08 GMT-3