Compare cert salaries and plan your next career move
A successor route is the best route to a remote network. A successor route is used by EIGRP to fwd traffic to a destination and is stored in the rounting table. It is backed up by a feasible successor route that is stored in the topology table (if available).
ed_the_lad wrote: .The key thing to remember is every route to every destination is in the topology table.
Yankee wrote: ed_the_lad wrote: .The key thing to remember is every route to every destination is in the topology table. Not true. This is a common misconception. Every mathmatically loop free destination is in the topology table, not every destination. You can lab this up and mess with BW statements to make a route that is actually loop free appear questionable so it does not appear in the topology table of its neighbor. Yankee
Yankee wrote: Ed says "I'll have to disagree a little with this...." I'm sorry you disagree, but I deal with a large EIGRP network daily (have for years) and have done the lab testing I asked you to try. I did not make that post lightly and I assure you I am correct, but lab it up as I suggested and see for yourself. DUAL proves mathmatically a route is loop free and therefore safe. It does not prove a route is a loop, so it may exclude unattractive routes to be safe. This not a flaw in the design, it is intentional and safe. Yankee
Compare salaries for top cybersecurity certifications. Free download for TechExams community.