I. Definition of redistribution
Route redistribution refers to the ability of border routers linked to different routing selection domains to exchange and advertise route selection information between different Autonomous Systems.
650) this. width = 650; "border =" 0 "alt =" "src =" http://www.bkjia.com/uploads/allimg/131227/025T54b2-0.gif "/>
II. We must understand the principles of redistribution. Otherwi
First, why the need for routing priority
We all know that we have no priority in registering routes in the ASP.net MVC project or Webapi project, when the project is larger, has multiple zones, or multiple Web projects, or is developed with a plug-in framework, our route registration is probably not written in one file, Instead, they are scattered across a number of different projects, so that the priority of the routing problem is highlighted.
For
Key Issues
1) How does an ACL match route entries with the same subnet and different masks? How do I match entries with the same mask and different subnets?
2) Why does a summary route cause a tumble of BGP peers?
3) Why does the acl fail to match the route entry when attribite-map is used?
4) How to Use advertise-map, suppress-map, unsuppress-map, attribute-map,
Route aggregation combines multiple routes and a route is usually implemented on the ABR. Although route aggregation can be performed between any two regions, it is recommended to do so in the direction of the backbone area. In this way, the backbone area will receive all the aggregated routes and then introduce the aggregated routes to other regions in turn. The
are numbered Rn and n is the subnet number. We provide vrouters connecting to these subnets, and also include nine systems in the figure above the hosts page. In the figure, Ethernet is represented by a crude line and point-to-point link is represented by a dotted line. We did not plot all hosts in different subnets. For example, in subnet 14 0. 2 5 2. 3, there are more than 5 0 hosts, and in subnet 1 4 0. 2 5 2. 1. The number of hosts exceeds 1 0.Compared with 3 0 class C addresses, the advant
In order to allow China Unicom and telecom users to quickly access the website, the company's server is hosted in a dual-line dual-ip data center. When the server uses dual-line dual-ip addresses, you need to configure the route table. the solution provided by the IDC is to enter the static route table. The method is to use the China Telecom gateway as the default route
Ngroute$routeProviderUsed when configuring the route.Method :When (Path,route);Add a new route to the $route service.Path: The route of the routing.Route: Route map information.Controller: A string or function that specifies the director.Controlleras: An identifier name for
The company uses a wide range of servers, FreeBSD8.1-64bit, windows2003_R2-64bit and cetnos5.5-64bit, and many planned network segments, there are 192.168.4.0, 192.168.10.0, 192.168.20.0, 192.168.21.0, and 10.1.0.0, 192.168.4.0 belongs to the office network, 192.168.20.0 and 192.168.21.0 belong to the development environment, and 192.168.10.0 and 10.1.0.0 belong to the online environment (providing external services ), but in many cases, the routers and firewalls are strictly controlled (The rul
Http://blog.csdn.net/onil_chen/article/details/51758696?appinstall=0Today, let's talk about Ionic's routing configuration.Ask a lot of friends, because this content is more, so I always want to wait for me to learn more about the route of the tutorial.But some very simple also have friends do not understand, so I went ahead of this tutorial.Hope to be a little help to everyone, about my missing part, back to the tutorial supplement it.But the basic co
* Note: This article is intended for the majority of users to learn. Some of them will mention some professional Internet terms or abbreviations. If you do not understand the network, you can learn and explore it together. If you have any questions, you can add QQ or YY. (QQ: 914560310, YY: 283755973) "//" is not a command output or description.RIP Protocol Introduction: Dynamic Routing Protocols include distance vector routing protocol and link state routing protocol, and RIP is the most widely
for each hop. If the data packet cannot be transmitted to the target, the tracert command displays the last vro that successfully forwarded the data packet. When a datagram is transmitted from our computer through multiple gateways to the destination, the Tracert command can be used to track the route (PATH) used by the datagram ). The path tracked by this utility is a path from the source computer to the destination. It cannot be guaranteed or consi
first, Polar Route 3 installation
The Pole Route 3 installation is no different from a normal router. If you are a dial-up user with a cat, plug the External network cable into the cat port, use a network cable, connect the other end of the cat to the 3 Wan port, and the other 2 polar Route 3 LAN ports are used to connect to the computer, as shown in the followi
Can massive route tables be stored in HASH tables?-HASH search and TRIE tree searchNever! Many people say this, including me.The Linux kernel has long removed the HASH route table, and now only TRIE is left. However, I still want to discuss these two types of data structures in a metaphysical manner.1. hash and trie/radixhash and tire can actually be unified. Multiple items with the same hash value share on
Static route _ RIP_IGP_EGP_BGP several major routes are summarized by the Protocol (static and dynamic) 1 routing selection policies (static and dynamic) the most typical routing policies include Static Routing and dynamic routing. The so-called static state means that the router does not dynamically exchange route information between each other to establish and update the
operation is a task or process that connects production to a material. It contains the details required for a valid production schedule. Before configuring an operation, you should know:
Know which task or activity must be completed
Know the number of resources required to perform the operation, and each resource must be sufficient. You should also create resources and resource groups before you configure operations, because operations are closely related to resources.
Operation relations
Note: PBR was previously a major tool used by Cisco to discard messages. For example, set interface null 0, which, according to Cisco, would save a bit more overhead than the ACL's deny. Here I remind:
Interface NULL 0No IP unreachable//Join this commandThis avoids the return of many ICMP unreachable messages because of the large number of packets discarded.
When a three-tier device forwards a packet based on the destination address of the packet (the destination network), what are the charact
Method 1 for adding a soft route in Linux:
routeadd-net172.16.6.0netmask255.255.255.0gw172.16.2.254deveth0/*
Add a network 172.16.6.0/24 to go through 172.16.2.254 eth0 * // *-net to add network-host to add host, netmask subnet mask, gw gateway, dev device, and device, here is your Nic name */route del gw 172.16.2.254/* delete default gateway 172.16.2.254 */route
This learning route must be published to the first page candidate area. This learning route must be published to the first page candidate area. This learning route must be published to the first page candidate area. This learning route must be published to the first page candidate area. This learning
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.