© 2006 Cisco Systems, Inc. All rights reserved. BSCI v Module Summary EIGRP starts by building a table of adjacent neighbors. Route exchanges with these neighbors result in an EIGRP topology table. The best EIGRP routes are moved into the IP routing table. The configuration commands for basic EIGRP include these: –router eigrp autonomous-system –network network-number [wildcard-mask] Use the no auto-summary command to disable automatic summarization. Use the ip summary-address eigrp command to create a summary address. Use the variance command to configure unequal-cost load balancing.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v Module Summary (Cont.) To configure EIGRP MD5 authentication, use the ip authentication mode eigrp and ip authentication key-chain interface commands. The key chain must also be configured, starting with the key chain command. Features such as stub routing, active process enhancement, and graceful shutdown help improve network stability and performance.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v3.02-3