protocol used in the autonomous region is called the internal gateway protocol, which is commonly used with RIP and OSPF. The external gateway protocol is mainly used for routing selection between multiple autonomous regions, common are BGP and BGP-4. The following is a brief introduction.
RIP route protocol
The RIP Protocol was originally designed for the Xerox parc common protocol of the Xerox network sy
external gateway protocol EGP based on whether they are used in an autonomous domain ). The Autonomous Region refers to a network with a unified management organization and a unified routing policy. The routing protocol used in the autonomous region is called the internal gateway protocol, which is commonly used with RIP and OSPF. The external gateway protocol is mainly used for routing selection between multiple autonomous regions, common are BGP an
network topologies. Of course, various dynamic routing protocols occupy network bandwidth and CPU resources to varying degrees.Static Routing and dynamic routing have their own characteristics and applicability. Therefore, dynamic routing is usually used as a supplement to Static Routing in the network. When a group is used to find the route in the vro, The vro first searches for the static route. If yes, the vro。 forwards the route according to the corresponding static route forwarding group.
IP address of the end user. This IP packet is removed from the packet when it reaches the target service provider.
LISP can be shared with the Border Gateway Protocol (BGP), which is the main communication channel between the edge and the core router.
Cisco researcher Dino Farinacci believes that the problem we face is that IP addresses are allocated to hosts and they are not allocated in topology mode. This means that the core router of the ISP netw
The importance of vro configuration is self-evident. Here we mainly analyze the Cisco router configuration statements in detail, and share them with you here, hoping to help you.
Introduction to Cisco router configuration
Cisco ios operating environment.
ROM monitor> Failure of password recovery
BootROM router (boot)> Flash image upgrade
Cisco IOS router> Normal operation
Command Modes Command mode.
User EXEC Router> user access
Privileged EXEC Router # System adminstration
(1) features of Route Maps:
Route Maps is similar to access lists. The difference is that Route Maps can change some attributes of Packets/Routes.
Purpose:
Route Maps is mainly used for Redistribution, Policy Routing, and BGP implementation.
Implementation:
Policy Routing sends Packets to Route Maps to implement Policy Route forwarding.
Redistribution sends Routes to Route Maps to filter Route entries.
Configuration instructions:
If the Action and Seq
protocol is at the core and which is at the boundary.
4) determines the route redistribution direction.
You can use the following command to reallocate route updates. This example is for OSPF ):
Router (config-router) # redistribute protocol [process-id] [metric-value] [metric-type-value] [subnets]
In this command:
◎ Protocol: Specifies the source route protocol for Route redistribution on the vro.
The main values are bgp, eqp, igrp, isis, ospf, stat
Original address: http://www.cnblogs.com/xitang/p/3575255.htmlBelieve that a lot of friends will be some of these nouns around some of the head, many friends think that smart DNS with two-line acceleration, CDN acceleration is similar technology. In fact, although their purpose is one: to allow users to access the site faster. But the principles of their application are vastly different.It must be clear to everyone that these are more common ways to host acceleration. So the text mainly introduc
1. The router is also called the IP gateway, and the Gateway Protocol is the protocol for exchanging routing information between gateways.2. Autonomous systems:(1) Autonomous system is connected by the homogeneous gateway of the Internet, autonomous system within the gateway to perform internal Gateway Protocol (IGP), mutual exchange of routing information(2) The IGP is dedicated within the autonomous system, serves for a particular application, is not valid outside the autonomous system;(3) An
manage the address of the route, just configured on the switch two metric values different default routes, so that can not meet the problem Please.
My understanding:
① two static routes on the switch
IP Route 10.50.13.80 255.255.255.240 10.10.45.4
IP Route 10.50.13.128 255.255.255.240 10.10.45.5
② also configures two static routes on R1, metric values are different, and configuration track
Track 1 interface ETHERNET0/2 Line-protocol
Track 2 interface ETHERNET0/3 Line-protocol
IP Route 1
.
Bridges Bridge: Network devices that connect two peer-to-peer networks, but in today's context, Linux Bridge is the famous Docker0.
BGP: Backbone network routing protocol, today with the Internet, the Internet is composed of many small autonomous networks, the three-tier routing between autonomous networks is implemented by BGP.
SDN, Openflow: Software defines a term within a network, such as the flow
Data Packets transmitted in the MPLS network can have multiple labels. Generally, there is only one label for data transmission in the MPLS network, and there are two labels in the mpls vpn. This is the label stack, they are called the top label and the bottom stack label respectively. The inner layer label should be the bottom stack label, and the outer layer label is the top label. In any case, when packets are transmitted in the MPLS network, A vro forwards data only by looking at one label,
, the container above will assign it a globally unique IP address, which involves the topic of ipam.
Overlay: Build an independent network on top of an existing two-or three-layer network, which usually has its own independent IP address space, exchange, or routing implementation.
Ipsesc: A point-to-point encrypted communication protocol, typically used in the data channel of the overlay network.
VXLAN: This solution, proposed by a consortium of VMware, Cisco, Redhat, and so on, is the mos
with a unified management organization and a unified routing policy. The Routing Protocol adopted in the autonomous region is called the internal gateway protocol, which is commonly used by RIP and OSPF; the external gateway protocol is mainly used for routing selection between multiple autonomous domains, commonly used BGP and BGP-4 。
1. RIP Network Routing Protocol
The RIP Protocol was originally designe
When the export router is upgraded, the troubleshooting steps for the export traffic anomaly caused by routing turbulence are as follows:Network environmentAn operator of the export router ne40e version upgrade, after the upgrade, the route learning normal, but from the network management shows that the flow of exports is much lower than the usual period of traffic, and traffic growth is slow, after a long time to reach peacetime flow.Fault analysisAs a result of the NE40E upgrade process to hav
difference is the syntax-the content and the target location are different.
Before append () is the object to be inserted, followed by the element content to be inserted in the object before appendTo () is the element content to be inserted, followed by the inserted object
2. Insert prepend () and prependTo () in the DOM ()
In addition to inserting the specified content at the end (still inside) of the selected element through append and appendTo, op
through the process. When routing selection processes do not share information about the network system, it is called night routing (ships in night, SIN )。
3. Default seed measurement values. The default seed measurement values of RIP, IGRP, and VPN are all infinite. They do not enter the route selection table unless the default value is changed; the default IS-IS metric value IS 0, but it can enter the routing table. The default OSPF metric IS two types of LSA value 20, and the routing from
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.