Cisco Systems ME 3400 Switch User Manual


  Open as PDF
of 1086
 
35-41
Cisco ME 3400 Ethernet Access Switch Software Configuration Guide
OL-9639-06
Chapter 35 Configuring IP Unicast Routing
Configuring EIGRP
Use the no forms of these commands to disable the feature or to return the setting to the default value.
Configuring EIGRP Stub Routing
The EIGRP stub routing feature reduces resource utilization by moving routed traffic closer to the end
user.
Note EIGRP stub routing only advertises connected or summary routes from the routing tables to other
switches in the network. The switch uses EIGRP stub routing at the access layer to eliminate the need
for other types of routing advertisements. if you try to configure multi-VRF-CE and EIGRP stub routing
at the same time, the configuration is not allowed.
In a network using EIGRP stub routing, the only allowable route for IP traffic to the user is through a
switch that is configured with EIGRP stub routing. The switch sends the routed traffic to interfaces that
are configured as user interfaces or are connected to other devices.
When using EIGRP stub routing, you need to configure the distribution and remote routers to use EIGRP
and to configure only the switch as a stub. Only specified routes are propagated from the switch. The
switch responds to all queries for summaries, connected routes, and routing updates.
Any neighbor that receives a packet informing it of the stub status does not query the stub router for any
routes, and a router that has a stub peer does not query that peer. The stub router depends on the
distribution router to send the proper updates to all peers.
In Figure 35-4, switch B is configured as an EIGRP stub router. Switches A and C are connected to the
rest of the WAN. Switch B advertises connected, static, redistribution, and summary routes to switch A
and C. Switch B does not advertise any routes learned from switch A (and the reverse).
Step 9
key-string text In key-chain key configuration mode, identify the key
string.
Step 10
accept-lifetime start-time {infinite | end-time | duration
seconds}
(Optional) Specify the time period during which the key
can be received.
The start-time and end-time syntax can be either
hh:mm:ss Month date year or hh:mm:ss date Month
year. The default is forever with the default start-time
and the earliest acceptable date as January 1, 1993. The
default end-time and duration is infinite.
Step 11
send-lifetime start-time {infinite | end-time | duration
seconds}
(Optional) Specify the time period during which the key
can be sent.
The start-time and end-time syntax can be either
hh:mm:ss Month date year or hh:mm:ss date Month
year. The default is forever with the default start-time
and the earliest acceptable date as January 1, 1993. The
default end-time and duration is infinite.
Step 12
end Return to privileged EXEC mode.
Step 13
show key chain Display authentication key information.
Step 14
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose