BGP CASE STUDIES SAM HALABI PDF

However, this attribute can vary depending on the type of BGP session that has been formed between the BGP peers and whether the destination network is within the AS or outside it. We will now consider these different case studies. We will look at two different scenarios to explain this. The first scenario is a destination 1. The second scenario we will consider under this section is where the destination network is not directly connected to the advertising BGP speaker as shown in the network diagram below:.

Author:Kigacage Sajora
Country:Burundi
Language:English (Spanish)
Genre:Travel
Published (Last):17 October 2017
Pages:387
PDF File Size:1.49 Mb
ePub File Size:14.3 Mb
ISBN:806-4-18778-656-6
Downloads:14620
Price:Free* [*Free Regsitration Required]
Uploader:Zulkikasa



However, this attribute can vary depending on the type of BGP session that has been formed between the BGP peers and whether the destination network is within the AS or outside it.

We will now consider these different case studies. We will look at two different scenarios to explain this. The first scenario is a destination 1. The second scenario we will consider under this section is where the destination network is not directly connected to the advertising BGP speaker as shown in the network diagram below:.

The configuration changes on R2 are as follows:. This is because R3 is the advertising router for that destination. This second scenario tells us something: R1 must know how to reach the If R1 cannot reach the next hop address, the route will not be installed in its IP routing table. We will use the network diagram below to illustrate this point:. R2 receives the 1. However, because the advertising router for 1. Refer to the second scenario under Case study 1.

This default behavior can be overwritten, by using the next-hop-self command in Cisco, for example. I hope you have found this article insightful and I look forward to the next article in the series. InfoSec institute respects your privacy and will never use your personal information for anything other than to notify you of your requested course pricing.

We will never sell your information to third parties. You will not be spammed. Author Adeolu Owokade. Adeolu Owokade is a technology lover who has always been intrigued by Security.

He has multiple years of experience in the design, implementation and support of network and security technologies. I'm not interested in training To get certified - company mandated To get certified - my own reasons To improve my skillset - get a promotion To improve my skillset- for a new job Other. I have no current timeline for training Within a month months months months Over 1 year.

ERIK ERIKSON TEORIA PSICOSOCIAL ETAPAS PDF

BGP series part 3: The NEXT_HOP Attribute

In the last article , we discussed and configured one of the technologies that can be used to reduce the requirement of fully meshed IBGP peers within an AS. In this article, we will be discussing the second method which is by making use of Confederations. Two articles ago, we described how Confederations work: an AS is broken down into smaller member ASs. There are a couple of terms we need to be familiar with when configuring confederations.

CONIZACION Y EMBARAZO PDF

How to use BGP to achieve Internet redundancy

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy. See our Privacy Policy and User Agreement for details. Published on Aug 28,

Related Articles