EIGRP Offset-list is usually used to increase the metric of routes being advertised over a link, but can it be used to filter EIGRP prefixes?
I thought about using offset-list in RIP to filter specific routes and thought how about doing the same thing in EIGRP? I haven’t run into any examples or blog posts of using Offset-list in EIGRP to filter routes so I thought about labing it out to see if that’s possible.
To test it, I went to the handy GNS3 with the following topology.
Three routes R1, R2 and R3. R1 advertises a Loopback0 subnet 10.1.1.1/32 which I will use to test filtering using offset-list. As you can see in the diagram, I changed the Delay for each interface to 1 just to make things easier for metric calculation (including loop0 interface). I also set the EIGRP metric weight to only consider delay and not to look at bandwidth for metric calculation, again to make things easier.
My goal is to set an offset-list on R2 to filter routes to R3 using Delay and offset-list commands only. Theoretically, if I know the max metric of EIGRP routes and I apply an offset-list with Continue reading
“…I’d love to share how certifications have propelled me into a mid-level networking position. I can share my own personality, thoughts, and views on the subject… as long as I’m doing self-study. I don’t like having a teacher and same goes with a job, I personally really enjoy being my own technical lead, which I […]
The post Vendor Certifications: A Career Jump Starter appeared first on Packet Pushers Podcast and was written by Joey Lucero.
This past January, Anuta Networks came out of stealth at Cisco Live in London, showing off their nCloudX platform, an SDN controller aimed at multitenant cloud providers. Anuta’s nCloudX controller can manage hardware common to many networks. As such, Anuta isn’t forcing providers to install OpenFlow switches, build a tunnel fabric, or otherwise disrupt their production environments […]
The post Webinar – Anuta Networks Demonstrates nCloudX – Register Now appeared first on Packet Pushers Podcast and was written by Ethan Banks.
Is there a way to provide internet service over a dot1q tunnel using VLAN tunneling? Yes, there is a way, it is not the most intuitive method but works nicely. Basically it has to do with what does the switch do with untagged frames when they arrive on a tunnel port. In this configuration, the untagged frames (native VLAN 200) are not tunneled but go to the routed interface for processing. As long as the provider’s switches has a routed interface for the customer ID VLAN and a default route, traffic should reach the Internet.
To explain this, I’ll use a basic topology with 4 switches and one router. SW1 and SW2 are service provider switches, with their interfaces Fa0/21 configured as dot1q-tunnels using access VLAN 100. SW3 and SW4 are customer switches and R1 is acting as the service-providers internet edge router.
Service provider’s switches SW1 and SW2 relevant configuration:
interface FastEthernet0/21 switchport access vlan 100 switchport trunk encapsulation dot1q switchport mode dot1q-tunnel no cdp enable
Customer ID is VLAN 100 and the port fa0/21 is set to mode dot1q-tunnel.
Customer Site A’s SW3 relevant configuration:
interface FastEthernet0/21 switchport trunk encapsulation dot1q switchport trunk native vlan 200 switchport Continue reading
As many of you know my background isn’t in enterprise, but I currently fill that role in my $job. In order to succeed I’ve had to develop many new skills including learning Cisco Wireless, UCS, a little Fibre Channel, and of course Cisco ASA. While I have been using firewalls for many years, I’ve never used the ASA for anything more than a user firewall, or for supporting a small branch. So yes, my skills are lacking in the ASA market compared to other technologies, and when you get deep into the grind with any product you’re going to need some new tricks to aid in your troubleshooting. This is where ASA paacket captures come into place.
As with any packet capture, or even log viewing the amount of noise involved generally dwarfs the data you actually want to find. In order to ease your pain Cisco has allowed us filter out packet capture using an ACL.
FW# access-list FOO line 1 extended permit ip any host 10.2.1.5 FW# access-list FOO line 2 extended permit ip host 10.2.1.5 any
Once you have your traffic defined, you need to setup your capture. Continue reading
How does the internet work - We know what is networking
As you will see here there are two kinds of IPv6 address autoconfiguration. One of them is the old well know way to automatically configure IP address from IPv4 world, DHCP. The other way to make the autoconfiguration in IPv6 world in new and really interesting as it leaves the host the ability to make the autoconfiguration by […]
Packet Design will be exhibiting at Cisco Live 2013, June 23-27 in Orlando, Florida. We'll be showcasing Route-Flow Fusion℠ from booth #1612 near the Cisco Live Lounge where you can pick up one of our new 'Now I know everything' T-shirts.
Plus, wear the shirt at the conference to enter a raffle to win a Beats-by-Dre Wireless Speaker.
Register to attend the event here:
www.ciscolive.com/us/registration-packages
Regular hosts Greg Ferro & Ethan Banks are joined by Brandon Carroll, Josh O’Brien, and Tom Hollingsworth in Packet Pushers Weekly Show 139. We translate all the SDN hype into a more practical conversation about what network engineers should be doing to update their skills. This is a mostly raw podcast with little editing – just […]
The post Show 139 – Making Your Way Down The Path To Nirvana appeared first on Packet Pushers Podcast and was written by Ethan Banks.
Vendors love nothing more than getting in front of their customers and talking about their products. You’ll always learn something from a presentation, but mostly they are an exercise in death-by-powerpoint. In this post, I’ll provide some some tips on getting the most from your time in these presentations. Vendor presentations can be really informative […]
The post Extracting The Most Value From Network Vendor Presentations appeared first on Packet Pushers Podcast and was written by John Harrington.
I’m in San Jose, California as a member of the Network Field Day 5 delegation this week. NFD is under the Tech Field Day umbrella of events, and is not a Packet Pushers event as such – although we’ve been a part of them, and Greg in particular has helped to organize some of them. […]
The post Why Would A Vendor Care About Network Field Day Events? appeared first on Packet Pushers Podcast and was written by Ethan Banks.
Whats the big deal about Data centers and why do they need special routers and switches anyway? Why cant they use the existing switches that folks use in their back offices or service providers in their networks. What’s so special, really, about a bunch of servers that need Internet connectivity, huh?
Working in the metro Ethernet space all my life I wasn’t sure if I really understood the hype and the reason why Data centers required specialized HW.
It’s only once I started reading about Data centers and how they work and what they’re supposed to do that I was able to appreciate their need for specialized HW – and why the existing products may not be cut for them.
In the world of Wall Street, milliseconds can mean billions of dollars. Really, am not kidding here. Packets carrying Wall Street transactions get delivered to the switch and are then forwarded to the server in the Data Center. There they ride up the protocol stack to the application that executes the trade. The commit message then has to go back down the stack and then be sent over the wire to the switch. The switch does a lookup in its Continue reading