- Written by Shamit Kapadia
- Posted on October 20, 2022
- Updated on October 26, 2022
- 5143 Views
BGP Monitoring Protocol (BMP) allows a monitoring station to connect to a router and collect all of the BGP announcements received from the router’s BGP peers. The announcements are sent to the station in the form of BMP Route Monitoring messages generated from path information in the router’s BGP Adj-Rib-In tables.
- Written by Shamit Kapadia
- Posted on May 3, 2022
- Updated on June 2, 2022
- 6936 Views
Routing Control Functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by Shamit Kapadia
- Posted on May 3, 2022
- Updated on June 5, 2023
- 7873 Views
Routing Control Functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by Shamit Kapadia
- Posted on April 25, 2022
- Updated on June 19, 2023
- 7983 Views
To understand why BGP-LU tunnels are required to be redistributed into LDP and vice versa, let’s consider the following basic topology for InterAS Option C. It uses IS-IS as IGP where indicated along with LDP:
- Written by Shamit Kapadia
- Posted on February 23, 2021
- Updated on February 5, 2022
- 6385 Views
In EVPN deployment with VXLAN underlay when an EVPN type 5 prefix is imported into an IP VRF, the IGP cost of the underlay
- Written by Shamit Kapadia
- Posted on September 30, 2015
- Updated on January 31, 2024
- 9879 Views
In an MLAG setup, routing on a switch (MLAG peer) is possible using its own bridge/system MAC, VARP MAC or VRRP MAC. When a peer receives an IP packet with destination MAC set to one of the aforementioned MACs, the packet gets routed if the hardware has enough information to route the packet. Before introducing this feature, if the destination MAC is peer’s bridge MAC, the packet is L2 bridged on the peer-link and the routing takes place on the peer. This behavior to use the peer-link to bridge the L3 traffic to the peer is undesirable especially when the MLAG peers can route the packets themselves.