08-05-2019 12:40 PM
08-05-2019 12:51 PM
Hello hy3rid,
if R1 in your network diagram represents a spoke site and R2,R3 the datacenter site.
I suppose R3 IP address on VPLS is 10.10.10.3
on R1 you can use an inbound extended ACL.
access-list 110 remark deny EIGRP neighbor R3 10.10.10.3
access-list 110 deny eigrp host 10.10.10.3 any
access-list 110 permit ip any any
int e1/0
ip access-group 110 in
After hold time expires R3 disappears from the list of EIGRP neighbors on R1.
R1 and R3 are not EIGRP neighbors anymore. R3 can listen to R1 EIGRP hellos but they are not going to build a neighborship.
Hope to help
Giuseppe
08-05-2019 01:17 PM
08-05-2019 01:42 PM
I believe that this is the expected behavior. At the spoke you have denied EIGRP from the datacenter. But the spoke is still sending EIGRP hello packets to the data center. So the data center receives an EIGRP hello from the spoke and brings up a neighbor, but it receives no responses to its hello packets and then tears down the neighbor relationship. Then the datacenter receives another hello message and the cycle starts over again.
I do not believe that you should be concerned about these messages. Theses messages are admittedly unusual. But they are the response to something unusual that you have configured.
HTH
Rick
08-05-2019 01:46 PM
Sorry about the formatting. Not sure whats going on.
Unfortunately we already have eigrp authentication turned on. Also i dont want to impact the other spoke sites by changing that.
Trying to figure out a way to use a distribute-list on R1 to filter the routes outbound. As it would have the same effect.
08-05-2019 01:38 PM
Hello,
I guess you could also work with EIGRP authentication: if you configure the below on all interface except E1/0 on R3, R1 and R3 will not become neighbors:
R1(config)#key chain key-chain-name
R1(config)#key number
R1(config)#key-string key-string
R1(config)# int E1/0
R1(config-if)# ip authentication mode eigrp 1 md5
R1(config-if)# ip authentication key-chain eigrp 1 key_chain_name
08-05-2019 02:51 PM - edited 08-05-2019 02:53 PM
Hello
You also could use a distribute -list it wont negate forming a peering but it should negate all advertising routes from the eigrp rtr.
example:
access-list 110 deny ip host (advertising eigrp rtr) host 0.0.0.0
access-list 110 permit ip any any
router eigrp xxx
distribute-list 100 in e1/0
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide