in your complex network scenario the need to use multiple EIGRP AS numbers may come if primary links are MPLS L3 VPN links using BGP as PE-CE protocol.
If so the risk is to see the desired backup routes, those via VPN/IPSec tunnels, to be considered the primary routes for the fact that using a single EIGRP AS domain would make those routes internal routes and could be preferred over the external routes derived from redistribution of BGP into EIGRP.
Under this hyphotesis, the use of a second EIGRP AS extending over VPN connections to make them the secondary routes.
I would not see the need for more then two EIGRP AS numbers unless you have two different backup networks.
note: if you are using EIGRP on primary backbone links you may want to consider the use of EIGRP tools and to use only one AS.
That is, playing with delay or offset-lists or also with ip eigrp summary-addess can be a way to deal with this.
Most specific routes are used first, so a way to make secondary paths to be backup is to advertise over them less specific routes.
This may be feasible or not depending on your address plan (if it allows for route summarization at remote site).
To optimize the database description (DBD) packet exchange between two OSPF neighbors, use the compatible rfc5243 in router configuration mode or address family configuration mode for OSPFv3 AF. To disable RFC5243 optimization, use the no form of this com...
We said always that OSPF is a link-state routing protocol.For most engineer stuying CCNA or CCNP, OSPF is misunsdertanding.In reality, OSPF is a link-state routing protocol only within an area (intra-area); but almost a distance-vector routing protocol be...
A brief difference between ISIS and OSPF link state protocolsISIS and OSPF belongs to the same routing protocol family Link State, but if you study the two routing protocols, you will find several differences, in this article you will get the answer about...
The OSPF Type-2 LSA is one of the misunderstanding LSA among all the popular LSAs in OSPF , most people learns that this kind of LSA (Type-2) is generated by DR the Designated Router in a broadcast segment, for example when two or more than two routers ar...
Table of Contents
RADIUS has been the de-facto protocol for Remote Access Authentication for decades. RADIUS/UDP as defined by RFC 2865 has traditionally used MD5 for authentication and integrity. Unfortunately, successful attacks ...