Nilesh,
While it may look like you are forming a neighbor relationship from the
perspective of the router in question, I don't think you actually are. For
example (using my 3rd router scenario) I just brought FA0/0 up on R4 and at
first it looks like I'm forming neighborships with R1 and R2
*Mar 4 02:21:15.821: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 150.100.12.2
(FastEthernet0/0) is up: new adjacency
*Mar 4 02:21:19.177: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 150.100.12.1
(FastEthernet0/0) is up: new adjacency
However give this a little time and you will see the following
*Mar 4 02:22:35.333: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 150.100.12.2
(FastEthernet0/0) is down: retry limit exceeded
*Mar 4 02:22:38.689: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 150.100.12.1
(FastEthernet0/0) is down: retry limit exceeded
But even when the peer seems to come back (according to R4) we have some other
issues...
*Mar 4 02:24:01.269: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 150.100.12.1
(FastEthernet0/0) is up: new adjacency
*Mar 4 02:24:01.545: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 150.100.12.2
(FastEthernet0/0) is up: new adjacency
At this point I verified R4's EIGRP neighbor table (notice the neighbors are
there with SEQ of 0)
R4(config-if)#do sh ip ei ne
IP-EIGRP neighbors for process 1
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num
1 150.100.12.1 Fa0/0 13 00:00:33 1 5000 1 0 <--
R4 says R1 is our neighbor
0 150.100.12.2 Fa0/0 12 00:00:39 1 5000 1 0 <--
R4 says R2 is our neighbor
What do we see on R1 and R2?
R1(config-if)#do sh ip ei ne
IP-EIGRP neighbors for process 1
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num
0 150.100.12.2 Fa0/0 12 00:29:20 2 200 0 53 <--
R1 doesn't see R4 as a neighbor
R2#sh ip ei ne
IP-EIGRP neighbors for process 1
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num
0 150.100.12.1 Fa0/0 13 00:29:06 332 1992 0 54 <--
R2 doesn't see R4 as a neighbor
If we run a debug on R1 and R2 for EIGRP packets we will see the following over
and over again
*May 18 03:35:21.237: EIGRP: Sending HELLO on FastEthernet0/0
*May 18 03:35:21.237: AS 1, Flags 0x0, Seq 0/0 idbQ 0/0 iidbQ un/rely 0/0
*May 18 03:35:21.245: EIGRP: Received UPDATE on FastEthernet0/0 nbr 150.100.12.4
*May 18 03:35:21.245: AS 1, Flags 0x9, Seq 75/0 idbQ 0/0
*May 18 03:35:21.245: EIGRP: Neighbor(150.100.12.4) not yet found
*May 18 03:35:22.245: EIGRP: Received HELLO on FastEthernet0/0 nbr 150.100.12.1
*May 18 03:35:22.245: AS 1, Flags 0x0, Seq 0/0 idbQ 0/0 iidbQ un/rely 0/0
peerQ un/rely 0/0
*May 18 03:35:23.245: EIGRP: Received UPDATE on FastEthernet0/0 nbr 150.100.12.4
*May 18 03:35:23.245: AS 1, Flags 0x9, Seq 75/0 idbQ 0/0
*May 18 03:35:23.245: EIGRP: Neighbor(150.100.12.4) not yet found
What you are seeing here is that when R1 and R2 send their HELLO packets to
224.0.0.10 R4 sees it and tries to respond, however since R4 can't send to
224.0.0.10 it never makes it over to R1 and R2 and hence only R4 see's R1 and
R2 as neighbors, and not vice versa. Since R4 can't seem to say HELLO they
don't show ip in the neighbor table.
So as you can see the VACL is blocking the neighbor relationship form forming
because the only two nodes that can send multicast packets to 224.0.0.10 are
150.100.12.1 and 150.100.12.2. Sometimes the VACL's can be a little confusing
because when they use reverse logic (e.g. permit to deny), but If you look at
ACL 101 and the VACL NOEGIRP you will see what I mean.
access-list 101 deny eigrp host 150.100.12.1 host 224.0.0.10 (this deny will be
permitted through the VACL)
access-list 101 deny eigrp host 150.100.12.2 host 224.0.0.10 (this deny will be
permitted through the VACL)
access-list 101 permit eigrp any host 224.0.0.10 (this permit will be denied in
the VACL)
vlan access-map NOEIGRP 10
match ip address 101 (matches ACL 101 and denies the first two statements from
being filtered)
action drop (Drops all of the traffic in the last statement (any to 224.0.0.10)
vlan access-map NOEIGRP 20
action forward (Forwards everything else)
!
vlan filter NOEIGRP vlan-list 12 (ties it to the vlan)
Sorry for babbling!
HTH
Steve Di Bias
From: Nilesh Mehta [mailto:[email protected]]
Sent: Thursday, October 21, 2010 10:11 AM
To: Di Bias, Steve
Cc: Winston Lee; CCIE
Subject: Re: [OSL | CCIE_RS] Vol 1 Lab 9 Task 9.19
Other simple way to test this--
instead of creating vlan 12 interface on R4 just shut down the fa0/0 on R1 and
change the ip address to 150.100.12.4 and bring it back. you neighbor relation
ship will be formed with R2 with your access-list as you have only denied
150.100.12.1 in you access-list. That is why DSG solution is corrrect to add
the neighbot command . other wise other router will be able to form neighbor
relation ship.
On Wed, Oct 20, 2010 at 8:52 PM, Di Bias, Steve
<[email protected]<mailto:[email protected]>> wrote:
Hey Winston,
You were thinking outside the box on this one however I think you would have
lost points.
The task specifically states that we need to "Secure VLAN 12 so that any router
added in the future will not be able to "see" EIGRP multicast packets "or" form
neighbor relationships with existing routers"
The key words here are "see" and "or" and your configs only satisfy half of
this requirement. I just labbed this one up using your configuration and then
added R4's interface to VLAN 12 (150.100.12.4/24<http://150.100.12.4/24>) Since
you are still allowing 150.100.12.1 and 150.100.12.2 to send multicasts to
224.0.0.10 new routers coming online will be able to see these.
So bringing R4 online and running "debug ip packet" clearly shows that R1 and
R2 are sending multicast packets to 224.0.0.10
*Mar 3 12:17:20.089: IP: s=150.100.12.1 (FastEthernet0/0), d=224.0.0.10, len
60, rcvd 2
*Mar 3 12:17:21.261: IP: s=150.100.12.2 (FastEthernet0/0), d=224.0.0.10, len
60, rcvd 2
*Mar 3 12:17:25.069: IP: s=150.100.12.1 (FastEthernet0/0), d=224.0.0.10, len
60, rcvd 2
*Mar 3 12:17:26.029: IP: s=150.100.12.2 (FastEthernet0/0), d=224.0.0.10, len
60, rcvd 2
So while you may be able to stop neighbors from properly forming with your
configs, anyone on VLAN 12 will still be able to see the multicast traffic
destined to 224.0.0.10
HTH
Steve Di Bias
From:
[email protected]<mailto:[email protected]>
[mailto:[email protected]<mailto:[email protected]>]
On Behalf Of Winston Lee
Sent: Wednesday, October 20, 2010 7:05 PM
To: CCIE
Subject: [OSL | CCIE_RS] Vol 1 Lab 9 Task 9.19
Hello All,
9.19 Secure VLAN 12 so that any router added in the future will not be able to
see EIGRP multicast packets or form neighbor relationships with existing
routers.
The DSG proposes putting a VACL and use the neighbor command between R1 and R2
to accomplish this. I used a different method through a VACL alone and was
wondering if the way I did it was valid (would I have got points for this on
the lab)?
Cat3550-1#sh ip access-lists 101
Extended IP access list 101
10 deny eigrp host 150.100.12.1 host 224.0.0.10 (68 matches)
20 deny eigrp host 150.100.12.2 host 224.0.0.10 (31 matches)
30 permit eigrp any host 224.0.0.10
Cat3550-1#sh vlan access-map NOEIGRP
Vlan access-map "NOEIGRP" 10
Match clauses:
ip address: 101
Action:
drop
Vlan access-map "NOEIGRP" 20
Match clauses:
Action:
forward
Cat3550-1#sh run | i filter
vlan filter NOEIGRP vlan-list 12
UHS Confidentiality Notice: This e-mail message, including any attachments, is
for the sole use of the intended recipient(s) and may contain confidential and
privileged information. Any unauthorized review, use, disclosure or
distribution of this information is prohibited, and may be punishable by law.
If this was sent to you in error, please notify the sender by reply e-mail and
destroy all copies of the original message.
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com<http://www.ipexpert.com/>
UHS Confidentiality Notice: This e-mail message, including any attachments, is
for the sole use of the intended recipient (s) and may contain confidential and
privileged information. Any unauthorized review, use, disclosure or
distribution of this information is prohibited. If this was sent to you in
error, please notify the sender by reply e-mail and destroy all copies of the
original message._______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com