Solved

cisco Eigrp

Posted on 2010-09-16
7
624 Views
Last Modified: 2012-05-10
i Eigrp cisco 6500  can see it is neighbors with other wan routers
i enbaled thw Eigrp between cisco core switch 6500 installed FWSM as transparent firewall between two wan routers the Eigrp working fine in the two wan routers.but not working in 6500
could you please advise
0
Comment
Question by:shareef_yassin
  • 4
  • 3
7 Comments
 
LVL 1

Expert Comment

by:IncineratorX2
Comment Utility
Did you check if your tranparent FW is letting your EIGRP trough?

protocol nr 88 , make shure it can go 2 directions
0
 

Author Comment

by:shareef_yassin
Comment Utility
how i can do that
0
 
LVL 1

Accepted Solution

by:
IncineratorX2 earned 500 total points
Comment Utility
Add your protocol 88 on the access list of your FSWM

i'm trying to find the suitable command for you

something like this :
Router# config term
   Router(config)# access-list 111 permit eigrp host 10.0.0.2 host 10.0.0.1
   Router(config)# access-list 111 deny eigrp any host 10.0.0.1

read here :

http://www.cisco.com/en/US/tech/tk365/technologies_security_notice09186a008011c5e1.html
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 1

Expert Comment

by:IncineratorX2
Comment Utility
link i just posted is not entirely eigrp minded(it's about a possible eigrp hack/leak) but should give u a push in the right direction..
0
 

Author Comment

by:shareef_yassin
Comment Utility
but they in the same zone 192.168.21. 1 core switch wan routers 192.168.21.4 and 192.168.21.5
0
 
LVL 1

Expert Comment

by:IncineratorX2
Comment Utility
on your 6500, is your subnet 192.168.21 everything on the 6500 allowed?
0
 

Author Comment

by:shareef_yassin
Comment Utility
yes
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now