Floating route experiment ConfigurationI. Experiment Principles1. Floating routing is used in the backup link. We need to use the primary link normally. When the primary link fails, the backup link is automatically enabled!2. According to the topology below, if Static Routing is used, we can change the Management Distance of Static Routing to achieve floating
Linux kernel 2.2 starts to support multiple routing tables.Routing policy Database (RPDB).Traditional routing table, based on the destination address to do routing. With multiple routing tables, kernel supports policy routing so t
Reload shut down and perform cold boot; reboot the operating system
Rlogin Open an active network connection
Router the IP routing protocol defined by the first item as a routing process, for example: Router rip selection RIP as a routing protocol
Router IGRP initiates a IGRP route selection process
Router RIP selection rip as route selection protocol
Rsh
Note: There is no source code analysis in this article. However, I think it is more useful to understand the essence than to understand the source code, because after understanding the essence, you may not need to look at the source code again, you can even write the source code. This is why the Linux kernel and Cisco websites contain a large number of documents.
Introduction: routing is a core concept of t
The route command for the Linux system is used to display and manipulate the IP routing table (show/manipulate the IP routing table). To achieve communication between two different subnets, you need a router that connects two networks, or a gateway that is located in two net
Some relevant data of Linux routing table
===============================================================================
Linux Routing Table maintenance view Linux kernel routing table
Use the following route
according to the "instructions". Similar to the address information table of the vswitch, the place where the "indication" is stored on the vro is called a forwarding table. 3. Relationship between two tables 3. 1. Contact
The forwarding table directly acts on data packets, while the route table is the basis for gene
different gateways.Route Delete 0.0.0.0Route add 172.0.0.0 Mask 255.0.0.0 172.31.50.254Route add 0.0.0.0 Mask 0.0.0.0 172.31.50.1Route add 192.168.10.0 Mask 255.255.255.0 172.31.50.254This is probably the case, if you have two network cards, or two lines, you can use this commandRouteDisplays and modifies entries in the local IP routing table.GrammarRoute [-F] [-P] [Command [Destination] [Mask Netmask] [Ga
routing platforms (in global configuration mode)No license boot moduleLicense Call-home Install pak:to install a license by using a Product authorization Key (PAK) and the Cisco license call Home feature (in privileged EXEC mode)License Call-home resend:to Request a license be re-sent by using the Cisco License Call Home feature (in privileged EXE C mode)License
first, the principle of explanation1, the Routing table (table) numbering from 0 to 255, each number can correspond to an alias, the corresponding relationship between the number and alias in Linux/etc/iproute2/rt_tables this file, General 0 numbered table corresponding aliases for the upspec,255 number corresponding t
and status of an interfaceShow IP interface lists the state and global parameters of the interfaceShow IP protocols displays the parameters and current status of the active routing protocol processShow IP route displays the current status of the routing tableShow ip router displays IP routing table informationShow IPX
routers (if you have not touched cisco/Huawei's router, please bypass), the routing subsystem is generally used as a control plane alone, and the core of the data plane is fast switching. Routing tables are generated through static configuration, dynamic routing protocols, route redirection, Link layer discovery, and
} {customer network mask} anyAccess-list 190 deny ip any [log]This function checks the source address of each router packet. If the ACL is not met, the router discards the packet.Loose mode:Interface pos 1/0Ip ver unicast source reachable-via anyThis function checks Each router packet. If the router does not have a route entry for the source IP address of the packet in the router's route table, the router will discard the packet. 3. authentication of
A major part of enterprise security policy is to implement and maintain firewalls, so firewalls play an important role in the implementation of network security. Firewalls are typically located on the edge of the corporate network, which isolates the internal network from the Internet, or with other external networks, and restricts network visits to protect the internal network of the enterprise. The purpose of setting up a firewall is to establish a unique channel between the intranet and the e
The thought standard IP routing lookup process provides us with an excellent "match-action" routine.That is matched to a route item. The packet is then sent to the next hop indicated by the route entry.Assuming that we abstract the above process of IP routing lookup up one level, we will find that in fact it can be used for other purposes. The abstract expression is: The source address of the packet or the
At the cmd command line, enter: Netstat-r or route print to view the local routing information.Each route item in the routing table has five properties, where I divide them into four parts:1, network address (network Destination), Netmask (Netmask): The result of the network address and netmask is used to define the ra
Linux routing table function parsing
This article, briefly describes the role of routing. In short, the router is a bus station, bus station there are many road bus. Each bus has a lot of platform (router), you will choose the most recent bus travel plan, of course, the route above the bus stop will be constantly updated, updated things, There is a local departm
{pool-name | interface-id} [overload] no ip nat inside source list access-list-number enable internal source address conversion dynamic NAT. Use the no option to disable the dynamic NAT. Parameter: access-list-number: The table number of the access control list. It specifies the access control list to define the source address rules. Pool-name: IP address pool name. This address pool defines the internal Global Address used for NAT translation. Inter
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.