To Cisco Routers, This Concept Is Number One!

Home > Blogs > Cisco > To Cisco Routers, This Concept Is Number One!

To Cisco Routers, This Concept Is Number One!

Like This Blog 0 Mark Jacob
Added by June 27, 2013

If you were to ask a number of networking professionals how routers make forwarding decisions, you might hear one answer far more than any other – Administrative Distance. In simplest terms, Administrative Distance (AD) is a ranking of believability. That is, if I am a router with more than one routing protocol running, to whom do I listen if each protocol is telling me about some particular destination? Well that is not a bad answer, but let’s blow one common misconception out of the water.

I have built the following scenario:

001-RIP-EIGRIP-Cisco-Routers

As you can see from the diagram, R3 is running both RIP and EIGRP. RIP is announcing the network 192.168.50.0 as a classful Class C network. R3 has also been configured with a summary for EIGRP which is 192.168.0.0 /16. This means that R4, which is also running RIP and EIGRP, is hearing about the destination of 192.168.50.0 from RIP with a 24 bit mask, and it has an EIGRP entry with a 16 bit mask. Let’s take a look at the routing table for R4:

R4#sh ip route

002-R4sh-ip-route-Cisco-Routers

Gateway of last resort is not set

003-Gateway-of-last-resort-is-not-set-Cisco-Routers

I have highlighted the relevant portions of the output above. Here is where the common misconception rears its ugly head. Many networking people, if they were asked how R4 would select a path, would respond that since EIGRP has a better AD than RIP (EIGRP is 90, RIP is 120), R4 will select the path from R4 to R2 to R3. How to verify our choice? How about a traceroute from R4 to the target destination?

004-traceroute-from-R4-to-the-target-destination-Cisco-Routers

As you can readily observe from the results of the traceroute, the inclination to select best AD above all else can lead one astray. It turns out that there is another facet of router path selection which holds sway even above AD. What is it? Longest prefix match. In the diagrammed topology presented above, R4 knows about the destination address from RIP, and it matches to 24 bits. R4 also knows about the destination as 192.168.0.0, but it matches to only 16 bits. So R4 listens to RIP in this instance.

As mentioned, it is surprising to learn how many people go through the entire CCNA instructor-led training path and believe that the number one factor in path selection is AD. Let it not be said that anyone reading this blog would make the same mistake!

Until next time, happy path selecting…

Mark Jacob
Cisco Instructor – Interface Technical Training
Phoenix, AZ

Videos You May Like

Agile Methodology in Project Management

0 156 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 675 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 630 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.