basic steps are listed below:
• Determine that the Peer Router "supports NSF ".
• Send/receive restart bits so that the Peer router knows that recovery is in progress.
• Temporarily Save the adjacent information so that the Group can continue to use the last known route to continue forwarding.
• Exchange New Route database information after recovery is complete
HoweverProtocolDifferent mechanisms are used to establish the peer or peer relationship of the router and exchange route information.As
OSPF; only display OSPF routesShow ip ospf process-ID; displays information related to a specific process IDShow ip ospf; displays OSPF InformationShow ip ospf border-routers; display VBRShow ip ospf database; display OSPF inductive DatabaseShow ip ospf interface; displays OSPF information on the specified InterfaceShow ip ospf neighbor; displays OSPF adjacent InformationShow ip ospf request-list; display the link status request listShow ip ospf Summary-address; displays the republishing inform
NSF, Some Cisco routers can use the common Router Protocol-including Border Gateway Protocol BGP), IS-IS, and Open Shortest Path-first OSPF) to implement new stable restart expansion. These extensions can continue forwarding groups and maintain network connection stability while determining whether the primary RP can be quickly restored.
To enable most Cisco NSF/stable restart deployment, the peer-to-peer Router Protocol for restarting a router must
discovery rules, AB1 overhead COST) will be lower than AB2, And the router will also use the AB1 circuit first.
An example of changing the control mode is to use a routing filter policy to perform some operations on a route that complies with a certain rule, for example, deny is deny and Permit is allowed ), the second is to adjust some routing parameters, such as the COST value, based on the allowable conditions. The common policy is ACLAcess Control List Access Control List), ip-prefix, AS-PA
, which is based on the OSPF route generation and discovery rules, the cost of Ab1 (cost) is lower than that of AB2, And the router also takes the Ab1 circuit first.An example of changing the control mode is to use a routing filter policy to perform some operations on a route that complies with a certain rule. For example, deny is the most common operation) and allow (Permit). Second, adjust the parameters of these routes based on the allowed conditions, such as the cost value. Generally, the us
BGP is a path vector routing protocol. Its job is to exchange route information between autonomous systems to find the most effective path for accessing data somewhere on the Internet. How do I select the optimal route? Cisco borderless networks reveal 14 BGP routing principles:
BGP routing principle: premise (the next hop of a route can be reached, synchronizati
to connect other lower-layer areas
Non-trunk zone:
The vro inside the vro only knows the complete network topology of the local region, but does not know the network topology of other regions.
At least one regional border router is required
Five grouping types:
Greeting (Hello) Group
Database description Group
Link State request Group
Link State update group, which uses the flooding method to update the link status of the entire netwo
direction.You can use the following command to reallocate route updates. This example is for OSPF ):Router (config-router) # redistribute protocol [process-id] [metric-value] [metric-type-value] [subnets]In this command:◎ Protocol: Specifies the source route protocol for Route redistribution on the vro.The main values are bgp, eqp, igrp, isis, ospf, static [ip], connected, and rip.◎ Process-id: indicates the OSPF process ID.◎ Metric: it is an optiona
. OSPF routing principle; Factors Affecting OSPF neighbor formation and solutions.1) The minimum network overhead of the target is selected.2) by path type
26. Differences between Class 1 and Class 2 external routes of OSPF1) overhead of type 1 = overhead + overhead2) overhead of Type 2 = overhead3) routes of type 1 are better than those of type 2
27. What project experiences are there and how the problems occurred during the project are solved? specific technologies include OSPF, VRRP, and VL
increasing cost or using technology to remedy, some IDC providers put forward "dual line", intelligent domain name DNS and CDN scheme respectively. The "dual-line" solution also includes dual-line single-IP routing solutions and dual-line dual-IP solutions. The DNS scheme is based on the domain name of the network resolution (mainly by the Internet users use the DNS server to judge), CDN (Content Delivery Network) solution, that is, "contents publishing and Courier Networks", this is a comprehe
-BGP: The ordinary IGP protocol can only carry IPV4 messages, obviously it is not enough, because we already know that need a protocol to host the VPN message, perhaps in other areas also need to host the IPV6 message, MP-BGP message was born to solve this problem. It is used to host the VPN message that is transmitted in the carrier network and carry some necessary extended attributes, such as Rt.
Introdu
Prefval: Huawei Private, only locally meaningful, will not be updated to the neighbor, not for export direction. The value of Prefval is 0 by default, and the larger the higher the priority. Its purpose is to influence its outbound traffic, and it needs to make a policy for the neighbor that routes the injection direction. There are two ways to make a strategy:A. 针对一个邻居完全的修改,从该邻居更新来的,都更改,此时不需要方向,该邻居通告的路由,都会应用这个首选值。B.明细的修改,调用route-policy,些时需要方向,只能是import方向。Experiment one: Use Pref-val to affect t
formats of broadcast and P2P Hello packets in ISIS are different;L1 and L2 layers are independent;The LSP for normal router multicast. When DIS receives the LSP, it summarizes and broadcasts it to the group;DIS sends brief information with CSNP. The following vro receives a list of items that are missing after comparison, sends a connection details to DIS through PSNP, And Then DIS responds with PSNP;PSNP can also respond to LSP as ACK;Circuit ID is used to identify each port in one byte;The la
, etc ). multiple tags are shown in. the MTU is extended due to the introduction of tags. the label length is 4 bytes. According to CISCO's suggestion, the system MTU is set to 1524. If the label is encapsulated over Ethernet, the 24-byte label can carry the insertion of 6 labels, generally, the six labels are suitable for almost all applications. A topological environment composed of the following six routers is an experimental diagram of this part.R1 (IPS1) and R2 (Border1) are EBGP neighbors,
The use of routes greatly expands the performance of the network. Next, we will analyze some characteristics of the IBGP routing protocol. Through the introduction of this article, we can understand the routing features in this regard. With the development of the network, ISP needs to connect to the INTERNET through multiple lines through different network providers to ensure network reliability. At this time, BGP is truly useful. In this case, the ne
For the router protocol this term, probably many people have been familiar with, especially the current network development quickly, Internet Router Protocol is also constantly improving, but also appeared a lot of new features. The wide application of information technology in various fields has promoted the rapid development of information exchange network, in which the Internet is the biggest beneficiary. The main node equipment of the Internet network is the router, which determines the fo
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.