In this case you have to apply the logic of leack-map feature of eigrp on R4 for the two networks of R1's Loopback 1.1.1.1 and R2's
loopback 2.1.1.1 so after that it will take the path via R3 for that two loopbacks.
I hope you understand.
- Answer
- Total 2 answers
- 1263
- Answer
- Total 1 answer
- 1472
Dear Yogesh,
In case of ISL Encapsulation all traffic is tagged. All control plane traffic is also tagged because if we use ISL then on both end of trunk ISL is
defined so all control plane traffic is go via vlan 1 tag by default.
Hope i addressed all your queries.
Have a nice day.
- Answer
- Total 1 answer
- 1438
Dear Yogesh,
In case of ISL Encapsulation all traffic is tagged. All control plane traffic is also tagged because if we use ISL then on both end of trunk ISL is
defined so all control plane traffic is go via vlan 1 tag by default.
Hope i addressed all your queries.
Have a nice day.
- Answer
- Total 1 answer
- 1472