Advanced Routing Protocols – EIGRP and BGP

Advanced Routing Protocols – EIGRP and BGP

Routing protocols play a crucial role in directing network traffic efficiently. Two advanced routing protocols widely used in large-scale networks are Enhanced Interior Gateway Routing Protocol (EIGRP) and Border Gateway Protocol (BGP).

Enhanced Interior Gateway Routing Protocol (EIGRP)

EIGRP is an advanced routing protocol developed by Cisco Systems. It is designed for use within an autonomous system (AS) and is known for its rapid convergence and low bandwidth usage. EIGRP incorporates features of both distance vector and link-state routing protocols.

Key Concepts:

  • Autonomous System (AS): A collection of IP networks and routers under the control of a single organization, typically using a common routing protocol.
  • EIGRP Neighborship: EIGRP routers establish neighbour relationships to share routing information. These neighbours exchange routing updates to maintain an accurate view of the network.
  • Reliable Transport Protocol (RTP): EIGRP uses RTP for the delivery of EIGRP packets. RTP ensures the reliable and ordered delivery of EIGRP messages between neighbours.
  • Dual (Diffusing Update Algorithm): The algorithm used by EIGRP for calculating the best path to a destination. It considers bandwidth, delay, reliability, and load in its metric calculation.

Configuration:

Enabling EIGRP on interfaces

router eigrp [AS-number]   
network [network-address] [wildcard-mask]

Configuring router ID

router eigrp [AS-number]
eigrp router-id [router-id]

Fine-tuning metrics

  interface [interface-type] [interface-number]
  bandwidth [bandwidth-in-kbps]

Authentication and summarization

  router eigrp [AS-number]
  authentication mode [md5]
  summary-address [summary-address]

AS-number is Autonomous System number

Troubleshooting

Verifying EIGRP neighbors

  show ip eigrp neighbors

Analyzing topology tables

  show ip eigrp topology

Debugging commands

  debug eigrp packets

Border Gateway Protocol (BGP)

BGP is a path vector protocol widely used for routing between different autonomous systems (AS) on the internet. It places emphasis on policy-based routing, allowing administrators to control the selection of network paths.

Key Concepts

  • BGP Peering: BGP routers form peering sessions to exchange routing information. Peering can be established within the same AS (internal BGP) or between different ASes (external BGP).
  • Autonomous System Numbers (ASNs): Unique identifiers assigned to autonomous systems for BGP routing.
  • BGP Attributes: BGP uses attributes such as AS_PATH, NEXT_HOP, and others to determine the best path to a destination.
  • Path Selection Algorithm: BGP uses a specific algorithm to select the best route based on various attributes.

Configuration

Establishing BGP sessions

  router bgp [AS-number]
  neighbor [peer-ip] remote-as [peer-AS]

Advertisement of routes

  router bgp [AS-number]
  network [network-address] mask [subnet-mask]

Route filtering and policy implementation

  router bgp [AS-number]
  neighbor [peer-ip] filter-list [access-list] out

BGP route aggregation

  router bgp [AS-number]
  aggregate-address [aggregate-address] summary-only

Best Practices and Optimization

EIGRP

  • Load balancing with variance: Adjust the variance to allow EIGRP to use multiple routes for load balancing.
  • Stub and leak map configurations: Utilize stub routing for simplified configurations in branch offices.
  • Query scoping: Configure EIGRP query scoping to limit the scope of queries during network changes.

BGP

  • Prefix lists and route maps: Use prefix lists and route maps for fine-grained control over route advertisement and acceptance.
  • Route dampening: Mitigate the impact of unstable routes by configuring route dampening.
  • BGP peering best practices:
    Implement best practices for securing and stabilizing BGP peering sessions.
  • Scaling BGP in large networks: Optimize BGP configurations for scalability in large and complex networks.

Security Considerations

EIGRP

  • Authentication mechanisms: Enable authentication using methods like MD5 to secure EIGRP communications.
  • Control-plane protection: Implement control-plane protection mechanisms to secure EIGRP processes.

BGP

  • BGP session protection: Use features like TCP MD5 authentication to secure BGP peering sessions.
  • Prefix filtering: Employ prefix filtering to control the routes that are accepted or advertised.

Monitoring and Troubleshooting

EIGRP

  • EIGRP topology table analysis: Monitor the EIGRP topology table to identify issues and optimize routing.
  • Log analysis and debugging: Use logging and debugging commands to troubleshoot EIGRP-related problems.

BGP

  • BGP table examination: Analyze the BGP routing table to understand the routes being advertised and selected.
  • Monitoring tools and commands: Utilize monitoring tools and commands (e.g., show bgp, clear ip bgp, etc.) for real-time analysis.
  • Troubleshooting common BGP issues: Use troubleshooting steps like checking BGP status, examining route advertisements, and analyzing logs to address common BGP problems.

Self Assessment

  • Reflect on the significance of advanced routing protocols in the context of large-scale networks and the challenges and benefits associated with their implementation.
  • Explain the key characteristics of Enhanced Interior Gateway Routing Protocol (EIGRP) and how it combines features of distance vector and link-state routing protocols.

50 thoughts on “Advanced Routing Protocols – EIGRP and BGP

  1. Usually I don’t read article on blogs, but I wish to say that this write-up very forced me to try and do so! Your writing style has been amazed me. Thanks, very nice article.

  2. Youre so cool! I dont suppose Ive read something like this before. So nice to find someone with some original thoughts on this subject. realy thank you for beginning this up. this website is something that’s wanted on the net, someone with slightly originality. useful job for bringing one thing new to the internet!

  3. Today, I went to the beach front with my children. I found a sea shell and gave it to my 4 year old daughter and said “You can hear the ocean if you put this to your ear.” She put the shell to her ear and screamed. There was a hermit crab inside and it pinched her ear. She never wants to go back! LoL I know this is completely off topic but I had to tell someone!

  4. great post, very informative. I wonder why the other experts of this sector don’t notice this. You should continue your writing. I am sure, you’ve a huge readers’ base already!

  5. Great ?I should certainly pronounce, impressed with your site. I had no trouble navigating through all the tabs as well as related info ended up being truly easy to do to access. I recently found what I hoped for before you know it at all. Quite unusual. Is likely to appreciate it for those who add forums or anything, site theme . a tones way for your client to communicate. Nice task..

  6. Excellent goods from you, man. I’ve understand your stuff previous to and you are just extremely great. I really like what you’ve acquired here, really like what you are stating and the way in which you say it. You make it enjoyable and you still take care of to keep it smart. I cant wait to read far more from you. This is actually a great web site.

  7. I’m really enjoying the design and layout of your website. It’s a very easy on the eyes which makes it much more pleasant for me to come here and visit more often. Did you hire out a developer to create your theme? Fantastic work!

  8. Heya! I just wanted to ask if you ever have any issues with hackers? My last blog (wordpress) was hacked and I ended up losing months of hard work due to no data backup. Do you have any solutions to stop hackers?

  9. Great web site. Lots of useful information here. I抦 sending it to several friends ans also sharing in delicious. And obviously, thanks for your effort!

  10. One thing I’ve noticed is there are plenty of beliefs regarding the banking companies intentions while talking about home foreclosure. One misconception in particular is that often the bank wishes to have your house. The lending company wants your hard earned dollars, not your home. They want the amount of money they gave you with interest. Staying away from the bank will only draw a foreclosed summary. Thanks for your publication.

  11. I just like the helpful information you supply to your articles. I抣l bookmark your weblog and take a look at once more right here frequently. I’m reasonably sure I will be informed many new stuff right here! Best of luck for the following!

  12. Awesome page with genuinely good material for readers wanting to gain some useful insights on that topic! But if you want to learn more, check out ArticleHome about SEO. Keep up the great work!

  13. As someone still navigating this field, I find your posts really helpful. My site is Autoprofi and I’d be happy to have some experts about Used Car Purchase like you check it and provide some feedback.

  14. сонник драться с женщиной заговор при
    заболевании кожи к чему снится драка
    с девушкой девушке, к чему снится драться с незнакомой девушкой
    как научится гадать на картах таро в домашних условиях бесплатно ok google к чему снятся белые
    кролики, к чему снятся кролики много кроликов

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this:
Verified by MonsterInsights