Internet capacity has increased significantly over the past two years, and the explosive growth of Internet data streams has resulted in bottlenecks, especially in the "middle kilometer" Location Based on Internet networks. These bottlenecks are caused by different causes, which may degrade application performance or even cause service failure. Intelligent Route control ensures that companies control Internet routes while reducing network fees and effectively eliminating congestion in the middle
These days have been looking at BGP, I think the attribute of BGP is a difficult point, sometimes look at to their own are confused, especially the difference between LOCAL-PREF and MED in BGP. after finding some information on the Internet, I can understand a lot.
Med is used to affect the inbound traffic. It is an announcement to the ebgp peer.The local-pref i
C through the BGP learning, will generate a routing table based on the shortest path algorithm to select the path of a more optimal service-side address assume a more excellent New route Table 10.0.0.1--192.168.1.3. In the process of use, the BGP network will continue to send each other keeplive packets if C to send a packet result of failure is a down, then C will delete the route table 10.0.0.1--192.168.
To allow OSPF routing features to pass through the mpls vpn backbone network, some BGP extended group attributes need to be defined. OSPF attributes that can be passed through mp bgp include:
650) this. width = 650; "border =" 0 "alt =" "src =" http://www.bkjia.com/uploads/allimg/131227/0201221933-0.jpg "/>
The extended attribute of mp bgp allows OSPF routes to b
BGPIs the routing protocol used to connect to an independent system on the Internet. It is an enhanced, comprehensive, and scalable protocol developed by the Internet Engineering Task Group. BGP4 supports the CIDR addressing scheme, which increases the number of available IP addresses on the Internet. BGP was designed to replace the original external gateway protocol EGP and is also considered a path vector protocol. The reflector configuration proces
, especially access network devices, it is foreseeable that IPv4 and IPv6 will coexist for a long period of time. During the coexistence of the two, how to quickly transition the entire network to IPv6, especially the access network, has become the key to restricting the development of the next generation Internet.
For IPv6 transition, many international technical solutions have been proposed [3]. These solutions are classified by technical ideology and can be divided into tunneling and translat
Https://www.sdnlab.com/5365.html
1. Vxlan Introduction
VXLAN is the acronym for Virtual Extensible LANs, an extension of the VLAN, a very new tunnel technology, and a lot of applications in open vswitch. The Linux kernel upstream has just joined the Vxlan implementation. It has a good scalability compared to the GRE tunnel and solves many other problems.
In quantitative terms, it extends the bit's VLAN tag
BGP attribute experiment * network boundary summary Router (config-router) # no auto-summary -- default: BGP, r1_1 and r1_2, and OSPF are all automatically summarized on the network boundary -- BGP, r1_2, auto-summary can be disabled by and VPC-auto-summary is enabled by default before 12.2 (8)-after 12.2 (8, automatic summary is disabled by default * atomic Aggr
In the previous article, we introduced MPLS technology. Many protocols have been applied in this Multi-Protocol Label technology. Today we will introduce the BGP protocol. Let's see how BGP works in MPLS. The specific application of the BGP protocol in MPLS technology. Let's take a look at the following article. all problems can be solved. When LSR assigns tags B
Principles and configurations of the BGP protocol for HCNP learning notes 3-route AggregationThe BGP protocol can use commands to aggregate specific routes into an aggregation route. The Routing aggregation principle adopts the longest matching method with the same mask. Route aggregation can reduce the size of the route table. No Route details can be used to reduce the number of route changes. It does not
First, the experimental topology:Second, the experimental requirements:1, increase R5:as 5, and R2 through the Direct Connect route to establish BGP neighbor relationship;2, R2 deployed in BGP under Send-conmmunity to R5;3, R4 deployment ACL crawl 4.4.4.4 traffic, Route-map named Shuchu, call ACL, set community no-export, and invoke Route-map Shuchu out in the BGP
650) this.width=650; "title=" 1.jpg "src=" Http://s2.51cto.com/wyfs02/M02/7D/68/wKiom1bnqi6AS7ZEAACL5nzpsow254.jpg " alt= "Wkiom1bnqi6as7zeaacl5nzpsow254.jpg"/>This experiment is derived from the HCNP routing experiment GuideExperimental requirements: 1. AS200 cannot receive routes from other branch offices2. Branch Office 2 (AS300) cannot advertise its own routing information to other branch offices3. Branch Office 4 (AS500) cannot receive routing for branch Office 3 (AS400)Experimental address
How to Configure IPSec Tunneling in Windows 2000
The information in this article applies:
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Server
SUMMARY
You can use IP Security (IPSec) in tunnel mode to encapsulate Internet Protocol (IP) packets and optionally encrypt them. the primary reason for using IPSec tunnel mode (sometimes referred to
Forward TunnelThe topology is as follows:650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M00/7F/A8/wKiom1coD96CeuYIAAAnPHayOLU217.png "title=" 1.png " alt= "Wkiom1cod96ceuyiaaanphayolu217.png"/>DescriptionThe client cannot access the Web server directly, and the agent can access the Web server;By creating an SSH forward tunnel on the agent, the client can access the Web server indirectly through the agent;The agent requires an SSH client and a
IPv6 tunnel Communication TechnologyIPv6 is a new generation of Internet communication protocol with many features: new Header Format, large address space, effective and hierarchical address and routing architecture, built-in security, new communication Protocol Neighbor Discovery Protocol for IPv6 that interacts with neighboring nodes, scalability. As a network manager, it is necessary to enhance understanding of IPv6 and prepare for the full upgrade
The WebLogic Web application is deployed under the Windows Server 2008 R2 operating system and tested after deployment, finding that the address of the test page is using the address of the tunnel adapter, not the static IP address, and that the network is not in the IPv6 access, Therefore, the decision to disable the IPv6 and tunnel adapters is as follows:
Disabling IPv6 is simple, go to Control Panel \ N
To disable IPV6 tunnel in Windows 7, IPv6 tunnel encapsulates IPv6 packets in IPv4 packets so that IPv6 packets can communicate through IPv4 networks. For devices using tunnel technology, IPv6 datagram is encapsulated into IPv4 at the entrance of the tunnel. The source and destination addresses of IPv4 packets are the
Today, we gave a client a test report based on Route-map to filter through different routes to different end-to-end Cross-domain neighbors.
The function point is very small, but for the junior students want to help.
BGP is actually a very powerful routing protocol for routing filtering. CCIE is also the focus of the exam, in fact, there is a very good book to recommend to everyone:
Hope to be useful to the beginner
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.