01-08-2011 11:02 AM - edited 03-06-2019 02:53 PM
So, I'm still learning eigrp and routing, so go easy on me!
This morning, I woke up to a bunch of emails that some remote systems were down. After looking deeper into it, it appears that some routes aren't being exchanged between my core switch and my edge switch.
Topology: two 6506 cores running vss, which connect to a 3750 edge switch, and run eigrp between them. The 6506 is connected with a 3650 with hsrp for failover to the internet.
ED01-3750#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 10.201.1.2 to network 0.0.0.0
172.16.0.0/24 is subnetted, 1 subnets
S 172.16.75.0 [1/0] via 10.74.193.1
10.0.0.0/8 is variably subnetted, 52 subnets, 6 masks
D 10.13.5.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.3.10.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.200.199.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.13.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.3.15.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.13.15.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.3.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.200.1.201/32 [90/1536] via 10.200.253.2, 3w0d, Port-channel1
D EX 10.0.0.0/8 [170/145800448] via 10.200.253.2, 03:44:21, Port-channel1
D 10.200.1.200/32 [90/1536] via 10.200.253.2, 3w0d, Port-channel1
D 10.1.0.0/16 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.3.5.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.13.10.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.5.2.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.5.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.21.15.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.20.15.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.22.15.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.19.10.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.31.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.20.10.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.21.10.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.22.10.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.19.15.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.19.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.22.5.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.31.15.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.21.5.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.20.5.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.19.5.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.22.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.21.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.31.10.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.20.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D EX 10.32.0.0/16
[170/256256] via 10.200.253.66, 03:45:24, GigabitEthernet2/0/14
C 10.200.253.0/30 is directly connected, Port-channel1
S 10.75.0.0/16 [1/0] via 10.200.253.74
D 10.100.10.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.100.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
C 10.200.253.72/29 is directly connected, GigabitEthernet2/0/21
C 10.200.253.64/29 is directly connected, GigabitEthernet2/0/14
S 10.74.193.0/24 [1/0] via 10.200.253.74
S 10.150.10.0/24 [1/0] via 10.201.1.2
D 10.200.2.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.202.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.200.3.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
C 10.201.1.0/24 is directly connected, Vlan511
D 10.200.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.205.1.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.200.10.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
D 10.200.1.9/32 [90/1536] via 10.200.253.2, 3w0d, Port-channel1
D 10.200.20.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
198.xx.xx.0/30 is subnetted, 2 subnets
D 198.xx.xx.x [90/429312] via 10.200.253.66, 3w0d, GigabitEthernet2/0/14
D EX 198.xx.xx.x
[170/256256] via 10.200.253.66, 3w0d, GigabitEthernet2/0/14
D 192.168.100.0/24 [90/3072] via 10.200.253.2, 3w0d, Port-channel1
S* 0.0.0.0/0 [1/0] via 10.201.1.2
VCORE-6506#sh ip route eigrp
10.0.0.0/8 is variably subnetted, 51 subnets, 6 masks
D EX 10.32.0.0/16 [170/256512] via 10.200.253.1, 03:43:06, Port-channel100
D EX 10.0.0.0/8 [170/145800192] via 10.200.199.3, 03:43:12, Vlan999
D 10.200.253.72/29 [90/28416] via 10.200.253.1, 3d20h, Port-channel100
198.18.35.0/30 is subnetted, 2 subnets
D 198.18.35.4 [90/429568] via 10.200.253.1, 3w0d, Port-channel100
D EX 198.18.35.8 [170/256512] via 10.200.253.1, 3w0d, Port-channel100
D*EX 0.0.0.0/0 [170/256256] via 10.200.253.1, 7w0d, Port-channel100
01-09-2011 07:52 AM
ok, so I think that's correct with what happened, because when I sh ip route, all the networks are there, including the network to the remote site, 10.32.0.0. So, then what I don't understand is, how is this 3650 switch picking up that external eigrp route (10.32.0.0) from the edge switch but it's not picking up the static routes for the 10.75.0.0 and 10.74.193.0 networks? sh ip eigrp topology on the 3650 shows 10.32.0.0 coming from the core switch (10.200.199.2 -- 10.200.199.1 is the vip for hsrp) And, since it's not getting it, how do I get the 3650 to pick those networks up with eigrp?
Also, is there a way to see HSRP events to see what happened, and what caused the failover to happen? Thanks for the continued help!
DR13-3560#sh ip eigrp topology
EIGRP-IPv4 Topology Table for AS(100)/ID(10.200.199.3)
Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply,
r - reply Status, s - sia Status
P 10.22.5.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.13.15.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.200.1.9/32, 1 successors, FD is 2816
via 10.200.199.2 (2816/256), Vlan999
P 10.202.1.0/24, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.19.1.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.3.10.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.32.0.0/16, 1 successors, FD is 256768, tag is 4323
via 10.200.199.2 (256768/256512), Vlan999
P 10.20.5.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.13.10.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.5.2.0/24, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.200.10.0/24, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.1.0.0/16, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.19.15.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 198.18.35.8/30, 1 successors, FD is 256768
via 10.200.199.2 (256768/256512), Vlan999
P 192.168.100.0/24, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.200.253.0/30, 1 successors, FD is 3072
via 10.200.199.2 (3072/1536), Vlan999
P 10.0.0.0/8, 1 successors, FD is 256768
via 10.200.199.2 (256768/256512), Vlan999
P 10.31.1.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.31.10.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.21.10.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.200.2.0/24, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.205.1.0/24, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.3.15.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.5.1.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.100.10.0/24, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.200.1.0/24, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.3.5.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.20.1.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 0.0.0.0/0, 0 successors, FD is Inaccessible
via 10.200.199.2 (256512/256256), Vlan999
via 10.13.253.4 (145799936/132999936), GigabitEthernet0/1
P 10.22.15.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.13.5.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.21.1.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.19.10.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.200.1.201/32, 1 successors, FD is 2816
via 10.200.199.2 (2816/256), Vlan999
P 10.21.15.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.20.10.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.13.253.0/29, 1 successors, FD is 12825600
via Connected, GigabitEthernet0/1
P 10.31.15.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.21.5.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 198.18.35.4/30, 1 successors, FD is 429824
via 10.200.199.2 (429824/429568), Vlan999
P 10.100.1.0/24, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.19.5.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.200.199.0/24, 1 successors, FD is 2816
via Connected, Vlan999
P 10.200.3.0/24, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.22.10.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.200.253.72/29, 1 successors, FD is 28672
via 10.200.199.2 (28672/28416), Vlan999
P 10.13.1.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.200.20.0/24, 1 successors, FD is 3072
via 10.200.199.2 (3072/2816), Vlan999
P 10.20.15.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.200.1.200/32, 1 successors, FD is 2816
via 10.200.199.2 (2816/256), Vlan999
P 10.22.1.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
P 10.3.1.0/24, 0 successors, FD is Inaccessible
via 10.200.199.2 (3072/2816), Vlan999
01-09-2011 02:27 PM
Ryan
There are still some things about your network topology and operating environment that are not clear to me. But the answer about 10.32 is clear and what to do about the missing networks is fairly clear (though there are several alternatives and you need to choose which is the best fit for your environment).
So first - about 10.32 - the edge switch has learned that route dynamically from another EIGRP neighbor (one of the ones that I do not know about) as shown in this from your original post:
D EX 10.32.0.0/16
[170/256256] via 10.200.253.66, 03:45:24, GigabitEthernet2/0/14
As a dynamically learned route on the edge switch it is then advertised to the core switch via normal EIGRP processing. Since the core switch has learned this route dynamically then the core switch advertises it to the 3650. So now the 3650 knows 10.32 with the core as the next hop, and the core knows 10.32 with the edge as the next hop, and the edge knows 10.32 with 10.200.253.66 as the next hop.
So then - about the missing networks 10.75.0.0 and 10.74.193. This explanation is pretty simple. The edge switch knows these networks via static route. The edge switch redistributes static routes into EIGRP and the redistribution is controlled by the route map. The route map does permit redistribution of a default route and one other route. But it does not permit redistribution of 10.75.0.0 and 10.74.193. Since these routes are not redistributed they are not advertised to the core. And the core can not advertise them to the 3650.
So now that we understand (I think) the problem, then what are the possible solutions. There are multiple ways that you can solve this problem. I will list several of the alternatives, with my preferred alternative at the top of the list:
- you can add commands in the prefix list on the edge switch to permit 10.75.0.0 and 10.74.193.0. If they are permitted in the prefix list then they will be advertised to the core, and from the core advertised to the 3650. This is a very simple and effective solution and allows the network to dynamically react to changes in the network, which is one of the main reasons that we run dynamic routing protocols.
- you could configure a static route on the core for 10.75.0.0 and 10.74.193.0.
- if you use the static route alternative on the core then you might want to consider doing redistribution of static routes into EIGRP so that the core can advertise the networks to the 3650.
- you could configure a static rotue on the 3650 for 10.75.0.0 and 10.74.193..
HTH
Rick
01-09-2011 03:04 PM
Yes, very true. I bet the 10.32 network is getting learned from the router to the remote site, 10.200.253.66, which is probably where that static route is. So, what my topology is basically right now, is:
6500 core --> 3705 edge --> 2901 router (10.200.253.66/29) --> MPLS --> remote site (10.32.0.0)
--> 2811 router (10.200.253.74/29) --> DR site (10.75.0.0, 10.74.193.0)
Right now I still have the DR network onsite as I am still building it out before I ship. So basically I have a routed interface on the edge switch (10.200.253.73) to my DR router (fa0/0 10.200.253.74 fa0/1 10.74.193.2) to my dr network switch (10.74.193.1).
So, I think what I can do for now until I move it is put the commands prefix list on the edge switch to permit those routes to be advertised. Then, once I move the DR network out to its coLo, I'll add those static routes to the 2901 router (because we have an MPLS network) and those routes will then be advertised the same way as the 10.32 routes. I think that sounds like a good plan.
Thanks a lot for sticking this out with me and helping me out. I feel I've really learned a lot from dealing with this issue this weekend, and your (and everyone else that provided input) helped me out a lot, so thanks!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide