I have a pair of cisco nexus 9500 spine switches but not in ACI mode - just straight EIGRP L3 ECMP links to leaf switches. The spines are cross connected with a dot1Q trunk and so each sees the other as an EIGRP neighbor/peer over a common trunked vlan.
The leaf switches are also trunked east-west so we can do HSRP facing the end devices, so a dot1Q trunk makes sense there and the leaf switches are also using a common vlan to see each other as EIGRP neighbors/peers. Although above each leaf is show
So is the trunk and common vlans really needed for the spine switches, or is it a best practice of some kind, or is there any advantage to that ease-west peering for EIGRP?
In a standard leaf-spine architecture, the spines are pure L3 and there is no need to have any direct spine-to-spine connectivity. Obviously, in specific architectures there may be deviations that change this.
ECMP works across the available paths. In your case, assuming all links are equal, it will be two hops for any leaf to leaf traffic. Using a spine-to-spine link would mean three hops and the EIGRP computed metric should reject the path unless you have UCMP turned on with a relevant variance set.
To optimize the database description (DBD) packet exchange between two OSPF neighbors, use the compatible rfc5243 in router configuration mode or address family configuration mode for OSPFv3 AF. To disable RFC5243 optimization, use the no form of this com...
We said always that OSPF is a link-state routing protocol.For most engineer stuying CCNA or CCNP, OSPF is misunsdertanding.In reality, OSPF is a link-state routing protocol only within an area (intra-area); but almost a distance-vector routing protocol be...
A brief difference between ISIS and OSPF link state protocolsISIS and OSPF belongs to the same routing protocol family Link State, but if you study the two routing protocols, you will find several differences, in this article you will get the answer about...
The OSPF Type-2 LSA is one of the misunderstanding LSA among all the popular LSAs in OSPF , most people learns that this kind of LSA (Type-2) is generated by DR the Designated Router in a broadcast segment, for example when two or more than two routers ar...
Table of Contents
RADIUS has been the de-facto protocol for Remote Access Authentication for decades. RADIUS/UDP as defined by RFC 2865 has traditionally used MD5 for authentication and integrity. Unfortunately, successful attacks ...