38-43
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
Chapter38 Configuring IP Unicast Routing Configuring EIGRP
Use the no forms of these commands to disable the feature or to return the setting to the default value.
EIGRP Stub Routing
The EIGRP stub routing feature, available in all feature sets, reduces resource utilization by moving
routed traffic closer to the end user.
Note The IP base feature set contains EIGRP stub routing capability, which only advertises connected or
summary routes from the routing tables to other switches in the network. The switch uses EIGRP stub
routing at the access layer to eliminate the need fo r other types of routing advertisements. Fo r en hanced
capability and complete EIGRP routing, the switch must be running the IP services feature set.
On a switch running the IP base feature set, if you try to configure multi-VRF-CE and EIGRP stub
routing at the same time, the configuration is not allowed.
In a network using EIGRP stub routing, the only allowable route for IP tra ffic to the user is t hro ugh a
switch that is configured with EIGRP stub routing. The switch sends the routed traffic to interfaces that
are configured as user interfaces or are connec ted t o othe r devices.
When using EIGRP stub routing, you need to configure the distribution and remote routers to use EIGRP
and to configure only the switch as a stub. Only specified routes are propagated from the switch. The
switch responds to all queries for summaries, connected routes , a nd rou ting u pda tes .
Any neighbor that receives a packet informing it of the stub status does not query the stub router for any
routes, and a router that has a stub peer does not query that peer. The stub router depends on the di stribution
router to send the proper updates to all peers.
In Figure38-4, switch B is configured as an EIGRP stub router. Switches A and C are connected to the rest
of the WAN. Switch B advertises connected, static, redistribution, and summary routes to switch A and C.
Switch B does not advertise any routes learned from switch A (and the reverse).
Step9 accept-lifetime start-time {infinite | end-time | duration
seconds}(Optional) Specify the time period during which the key
can be received.
The start-time and end-time syntax can be either
hh:mm:ss Month date year or hh:mm:ss date Month
year. The default is forever with the default start-time
and the earliest acceptable date as January 1, 1993. The
default end-time and duration is infinite.
Step10 send-lifetime start-time {infinite | end-time | duration
seconds}(Optional) Specify the time period during which the key
can be sent.
The start-time and end-time syntax can be either
hh:mm:ss Month date year or hh:mm:ss date Month
year. The default is forever with the default start-time
and the earliest acceptable date as January 1, 1993. The
default end-time and duration is infinite.
Step11 end Return to privileged EXEC mode.
Step12 show key chain Display authentication key information.
Step13 copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose