The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was initially designed to be used as a cryptographic hash function, it…
Distribute-lists are used to filter routing updates, either inbound or outbound. Routes must first be matched using an access-list or prefix-list, and then applied using…
VRFs, or VPN Routing and Forwarding instances, are most commonly associated with MPLS service providers. In such networks, MPLS encapsulation is used to isolate individual customers’ traffic…
Designated & Backup Designated Router Based on the network type, OSPF router can elect one router to be a Designated Ruter (DR) and one router to be…
6in4 is an Internet transition mechanism for migrating from Internet Protocol version 4 (IPv4) to IPv6. 6in4 uses tunneling to encapsulate IPv6 traffic over explicitly-configured IPv4 links as defined in RFC 4213 (obsoletes RFC 2893 and RFC 1933).…
The EIGRP is inherently the multicast routing protocol because it will support for the non IP protocols. The mechanisms and configuration techniques will slightly vary…
The EIGRP stub routing feature improves network stability, reduces resource utilization, and simplifies the stub device configuration. Stub routing is commonly used in hub-and-spoke network…
EIGRP’s solution to the problem As you remember, EIGRP only uses an alternate path if it satisfies the feasibility condition: AD < FD, where AD…
If we configure the branch routers as stub routers they will not receive queries from our HQ routers. This is a very good technique to stop query…
EIGRP authentication EIGRP authentication is used to prevent an attacker from forming the EIGRP neighbor relationship with your router and advertising incorrect routing information. By…