Solved

MIgrate from EIGRP to OSPF

Posted on 2010-09-24
4
594 Views
Last Modified: 2012-05-10
Most of our network is set to OSPF routing... A small portion is still set to EIGRP... We would like to complete the process. Curently our core switch/router is running both protocols... Should I put both on the remaining routers and then take eigrp off???
0
Comment
Question by:axl13
4 Comments
 
LVL 24

Accepted Solution

by:
rfc1180 earned 250 total points
ID: 33755260
>Curently our core switch/router is running both protocols... Should I put both on the remaining routers and then take eigrp off???

Personally, I would deploy OSPF and EIGRP in parallel. Once you have the routing protocols deployed on all routers, the next logical step would be to then compare OSPF database and EIGRP database. If the contents of the two database match and you are satisfied with the contents of the database you can start remove the EIGRP process on one router at a time. Also, take note of any manual redistribution that you might have as you might have to tag the routes depending on how complex the topology is.

Billy
0
 
LVL 50

Expert Comment

by:Don Johnston
ID: 33755269
>Should I put both on the remaining routers and then take eigrp off???

If you want a no interruption migration, that's what I would do.
0
 
LVL 28

Assisted Solution

by:mikebernhardt
mikebernhardt earned 250 total points
ID: 33756683
What I would do instead of trying to compare databases, which will be very confusing and difficult: Change the administrative distance of EIGRP to 130
router eigrp 1
 distance 130

What this will do is make OSPF (distance 120) more preferable than EIGRP (normally 90). When you type "show ip route" all of your routes should end up being in OSPF. If you still see some in EIGRP, that means that you missed something in OSPF.

Once you've cleaned up what's missing you can safely remove EIGRP.
0
 

Author Closing Comment

by:axl13
ID: 33769776
THanks for all your help
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This past year has been one of great growth and performance for OnPage. We have added many features and integrations to the product, making 2016 an awesome year. We see these steps forward as the basis for future growth.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question