Propagating EIGRP EX routes marked with FD inaccessible in the topology table

Posted on 2009-12-17
Last Modified: 2012-05-08
Hello everyone,

This is my scenario: one router is receiving the same external route (also the same metric) on AS 1 and AS 2. It chooses one of them to put in the routing table, and the other (in the other AS) is marked with FD inaccessible in the topology table. This is normal behavior (AFAIK).

The problem is that this router has adjacencies with other two routers, one in AS 1 and one in AS 2 and the route marked with FD inaccessible doesn't get propagated in one of those routers. Which is, again, kind of normal (why propagate the route if it has the FD messed up).

Now, is there a way I could propagate the route with FD inaccessible ?

Thank you
Question by:amarculet
    LVL 28

    Accepted Solution

    I had similar problems with the same route coming through multiple AS's.  My solution was to eliminate the overlapping AS's, and to redistribute routes from one AS to another.  (No interface was set to be in more than one AS zone.)

    Setting the AS's for mutual redistribution was tricky.  I had to use route maps to tag the routes as coming from each AS, and deny redistributing back any incorrectly tagged routes.

    It was a rough afternoon when I made all of the changes, but definitely worth it in the long run.

    Author Comment

    A redesign will definitely be done in the future. What I was looking for was a fix until the redesign is done.
    LVL 28

    Expert Comment

    I wasn't able to find a solution that didn't include a redesign.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Suggested Solutions

    Problem Description:   Couple of months ago we upgraded the ADSL line at our branch office from Home to Business line. The purpose of transforming the service to have static public IP’s. We were in need for public IP’s to publish our web resour…
    We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
    Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now