In the IGP era, we all know, for example, OSPF, link state protocol, in the routing of the time, than the cost of the link, which link consumption will be more priority, if two of the same link consumption, then do load balancing.
In fact, the 2 principles to achieve the OSPF---shortest path first work principle.
What if, in BGP, there are multiple routes to achieve the goal, how should the choice be made? Which path is the preferred one?
Take a lo
In the network structure, we have been paying attention to their deployment and optimization. As the network pressure increases, we have put forward higher requirements for some hardware and protocols. Now, we will focus on the deployment of BGP routing protocols. In general, the BGP routing protocol deployed in the domain should consider the following:
1. Actual network topology;
2. Whether the device pe
Local-preferenceLocal Priority PropertyOnly exchanged between IBGP peers and not advertised to other asThe greater the priority, the higher the priority, the default is 100For multiple exits of the same as, go out of the waybelongs to any recognized attributeNote: The source route delivery direction + specified peer+ the direction (Import/export) that you want to pass in order to correctly apply the routing policy.650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M02/84/89/wKioL1eTYB3DW2H_A
In the IGP era, we all know, for example, OSPF, link state protocol, in the routing of the time, than the cost of the link, which link consumption will be more priority, if two of the same link consumption, then do load balancing.
In fact, the 2 principles to achieve the OSPF---shortest path first work principle.
What if, in BGP, there are multiple routes to achieve the goal, how should the choice be made? Which path is the preferred one?
Take a lo
instability is controlled locally to reduce the impact on the entire network and save CPU resources.
Therefore, Internal/External BGP architecture is a better solution.
3.2 network logical hierarchy
The core layer provides transmission functions to transmit route information and user traffic in each region.
Divide management domains by region and connect them to the core layer
650) this. width = 650; "src =" http://img1.51cto.com/attachment/201309/15
The BGP protocol is a strategic Routing Protocol. Its complexity is not due to the complexity of routing algorithms. The most important thing is to use BGP to control the routing flow.
Any routing protocol must first solve the loop problem. OSPFISIS uses the SPF algorithm to solve the problem. The OSPF algorithm is novel and a Diffusion algorithm, therefore, BGP
Bgp mpls/VPN Network Technology BGP protocol has been well known for a long time. Its powerful routing policy tool capabilities and its storage and routing performance go beyond any internal gateway protocol of the image model, therefore, it exists as a "bridge" between autonomous systems. before that, there was an EGP protocol, and few people knew it, because it was not widely used, and it is not used by t
1. Route Selection Protocol
The core of routing protocol is routing algorithm, the router uses routing protocol to generate routing table, which can realize the "best" path of the network packets.
2. Classification of routing protocols
Routing protocol is divided into internal Gateway Protocol IGP and External Gateway protocol EGP two kinds. The internal gateway protocol is used in the autonomous system's internal routing, the external gateway protocol is used in the autonomous system routi
In the IGP era, we all know, for example, OSPF, link state protocol, in the routing of the time, than the cost of the link, which link consumption will be more priority, if two of the same link consumption, then do load balancing.
In fact, the 2 principles to achieve the OSPF---shortest path first work principle.
What if, in BGP, there are multiple routes to achieve the goal, how should the choice be made? Which path is the preferred one?
Take a lo
Cisco ios xr bgp Packet Processing Denial of Service Vulnerability
Release date: 2010-08-30Updated on: 2010-08-31
Affected Systems:Cisco ios xr 3.4.0-3.9.1Description:--------------------------------------------------------------------------------Cve id: CVE-2010-3035
Cisco ios xr is an operating system with self-protection and self-repair functions used in Cisco network devices.
The BGP feature of Cisc
BGP Route update timer analysis defines the BGP Route update timer on RFC4271 of BGP. This timer can only work for routes with the same prefix of the same address family, its main function is to prevent a route in the network from fluctuating too frequently, and it is also a protection for the CPU. It may be too obscure to describe this feature in text, so we wil
Creating an IP tunnel using GRE on Linux
Contents [Hide]· 1 IP tunelling· 2 Starting Configuration· 3 tunnelling ObjectiveO 3.1 Create TunnelsO 3.2 Additional RoutesO 3.3 Delete Tunnels· 4 Network DiagramO 4.1 Debian Configuration· 5 References
IP tunelling We'll do IPv4 tunneling using GRE. GRE is a tunneling protocol this was originally developed by Cisco, and it can do a few more things than Ip-in-ip Tunnelin G. For exa
I've heard of this technology, and I'm interested in it.
I want to visit my machine in the company at home (write programs, check data, next movie).
Company in order to prevent us with the XX software blocked its port or server address.
Companies do not let us on the XX website, limited the URL or even IP.
Companies do not let us see the information about XX, and even spend the money to buy XX equipment, to filter the content. A look at the contents of XX, the link is interrupted.
My father is
BGP protocol-neighbor PMTU checks that the BGP protocol runs on TCP, so the TCP parameter settings will affect the performance of BGP. When the number of routes is small, the adjustment of TCP Parameters may not affect the BGP performance. However, when the number of routes is large, the adjustment of TCP Parameters ca
Scheme of an fmbroadcast coverage system for a submarine tunnel
(Beijing hengxingketong Technology Development Co., http://www.bjhxkt.com 010-82565576)
Necessity of constructing an fmbroadcast coverage system for Submarine Tunnel
As of 2017, China's total highway mileage reached nearly 0.14 million kilometers, and there were a large number of Highway Bridge tunnels in mountainous areas in the central and w
First, the experimental topology:Second, the experimental requirements:1, R4, R1, R3, R2 respectively in the BGP process deployment neighbor Send Community attribute command;2, R4 deployment ACL crawl 4.4.4.4 traffic, Route-map named as, call ACL, set community Local-as, and call Route-map as out in the BGP process;3, verify: R1, R3 have 4.4.4.4, but R2 have no 4.4.4.0 route entry?Third, command deployment:
1. Characteristics
Use the Tcp179 port to build a neighbor, not to use multicast or broadcast, so you can only set up a neighbor by hand unicast
2. Four kinds of packages
Open package: For building a neighbor relationship, use only when building a neighbor, when the neighbor is established, no longer send
KeepAlive package: Used to keep a neighbor relationship, it plus open is equivalent to the IGP Hello package. Send once every 60 seconds, holdtime 180 seconds
Update package: Contains the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.