Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hi allWe have configured SRv6 between a Cisco NCS router and a Huawei router. The peers are communicating over ISIS. BGP peering is established using IPv6 addresses. Under this BGP session, both VPNv4 and VPNv6 address families are enabled.IPv4 route...
I’m looking for some practical design guidance and real-world experience regarding eBGP peering between two ISPs.Scenario:There are two ISPs, each with its own AS number.Each ISP has two BGP Route Reflectors (RRs).Internal iBGP and RR infrastructure ...
I want to configure logging on an IOS XR device so that:Syslog server (Graylog) receives all log messagesSplunk server receives only user login and logout messagesI need to configure them separately so that the filters apply only to the Splunk server...
We want to pass five vlans in one vlan from customer 1 to customer 2. From A side we must receive VLAN ID 3900 and carry it to B side as vlan 13,14,15,16,17PE Router is on both side NCS540 and IOS version is 7.3.2 . We have tried a lot of l2vpn scena...
We have faced load-balance issue on NCS routers. So one of the routers was reloaded and after reload bundle load balance mechanizm runs not correctly. the bundle interface is L2 and there are many subinterfaces.first interface's traffic is 100%, seco...
Hi @Harold Ritter Yes, this is an InterAS deployment, so the BGP session is expected to be eBGP between the NCS and Huawei devices.At the moment, our main issue is related to the 192.168.168.2 prefix. Our goal is to make this prefix reachable from th...
Hi @Harold Ritter I want to make sure that my config above is correct. If you had a chance to look at this config, I would appreciate your help in correcting any mistakes I may have madeshow bgp vpnv4 unicast received-sidsThu May 7 21:22:46.788 UTCBG...
Hello. we have changed RD/RT on huawei side. the commands' outup is below.show bgp vpnv4 unicast rd 65500:6 192.168.168.2/32 detailThu May 7 13:48:55.663 UTCBGP routing table entry for 192.168.168.2/32, Route Distinguisher: 65500:6Versions:Process bR...
I completely agree. Terminating eBGP sessions on dedicated edge routers keeps the network design clean .It’s a best practice for large-scale BGP deployments to maintain clear separation between external and internal responsibilities.
This config is like a solution, I tested is and it runlogging 172.22.48.30 vrf mgmt port defaultlogging 172.22.48.30 vrf mgmt discriminatormatch2 SECURITY-SSHD-6