How can change k-value in EIGRP configuration.



How can change k-value in EIGRP configuration...

Answer / shahin

R1(config)#router eigrp 100
R(config-router)#metric weights 0 1 0 1 0 0


Where

0 - TOS (Type of Service)

1 = K1

0 = K2

1 = K3

0 = K4

0 = K5

Note: 100 is AS Number

Is This Answer Correct ?    12 Yes 0 No

Post New Answer

More CCDA Interview Questions

What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR

1 Answers  


Our company order a cisco ws-c3750x-48t-s(here i bought from http://www.3anetwork.com/cisco-ws-c3750x-48t-s-price_p104.html), As for the switch, in addition to the port module and optical module can be extended, what else module can also be extended?

0 Answers   Aptron,


SNMP agents are: A. Management devices B. NMS (Network Management Stations) C. network devices such as routers, switches, or hubs D. PDUs

1 Answers  


A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?

2 Answers   Pari Networks,


What device initiates a session in an X.25 network? A. DTE B. DCE C. PSE D. PAD

1 Answers  






A device has 2 synchronous ports, 16 asynchronous ports, and one ethernet port. What is this device most likely to be? A. CSU/DSU B. Access Server C. Multiplexer D. ISDN Terminal Adapter

2 Answers  


Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200

1 Answers  


Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0

1 Answers  


What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted form B. CHAP sends passwords unencrypted to save connection time C. CHAP does not attempt to verify whether the user is authorized to access the requested resource D. ID?s and passwords are automatically stored in cache

1 Answers  


How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS

3 Answers   HCL,


Regarding a full-mesh network and a partial-mesh network, what is the most accurate statement? A. Split Horizon will not work on a full-mesh network B. A full-mesh network is more expensive because more routers are used C. A partial-mesh network is less expensive because less virtual circuits are used D. Broadcasts are more plentiful on a partial-mesh network

1 Answers  


What is not a function of the distribution layer? A. Routing between VLANs B. Implement tools such as access lists, packet filtering, and queuing C. Implement security and network policies D. Provide workgroup/user access to the network

1 Answers  


Categories