42-42
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
Chapter 42 Configuring IP Unicast Routing
Configuring EIGRP
Use the no forms of these commands to disable the feature or to return the setting to the default value.
EIGRP Stub Routing
The EIGRP stub routing feature, available in all feature sets, reduces resource utilization by moving
routed traffic closer to the end user.
Note The IP base feature set contains EIGRP stub routing capability, which only advertises connected or
summary routes from the routing tables to other switches in the network. The switch uses EIGRP stub
routing at the access layer to eliminate the need for other types of routing advertisements. For enhanced
capability and complete EIGRP routing, the switch must be running the IP services feature set.
On a switch running the IP base feature set, if you try to configure multi-VRF-CE and EIGRP stub
routing at the same time, the configuration is not allowed.
In a network using EIGRP stub routing, the only allowable route for IP traffic to the user is through a
switch that is configured with EIGRP stub routing. The switch sends the routed traffic to interfaces that
are configured as user interfaces or are connected to other devices.
When using EIGRP stub routing, you need to configure the distribution and remote routers to use EIGRP
and to configure only the switch as a stub. Only specified routes are propagated from the switch. The
switch responds to all queries for summaries, connected routes, and routing updates.
Any neighbor that receives a packet informing it of the stub status does not query the stub router for any
routes, and a router that has a stub peer does not query that peer. The stub router depends on the distribution
router to send the proper updates to all peers.
In Figure 42-4, switch B is configured as an EIGRP stub router. Switches A and C are connected to the rest
of the WAN. Switch B advertises connected, static, redistribution, and summary routes to switch A and C.
Switch B does not advertise any routes learned from switch A (and the reverse).
Step 9 accept-lifetime start-time {infinite | end-time | duration
seconds}
(Optional) Specify the time period during which the key
can be received.
The start-time and end-time syntax can be either
hh:mm:ss Month date year or hh:mm:ss date Month
year. The default is forever with the default start-time
and the earliest acceptable date as January 1, 1993. The
default end-time and duration is infinite.
Step 10 send-lifetime start-time {infinite | end-time | duration
seconds}
(Optional) Specify the time period during which the key
can be sent.
The start-time and end-time syntax can be either
hh:mm:ss Month date year or hh:mm:ss date Month
year. The default is forever with the default start-time
and the earliest acceptable date as January 1, 1993. The
default end-time and duration is infinite.
Step 11 end Return to privileged EXEC mode.
Step 12 show key chain Display authentication key information.
Step 13 copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose