Professional Documents
Culture Documents
Chapter 8: Controlling Routing Inside The AS: I. Interaction of Non-BGP Routers With BGP Routers
Chapter 8: Controlling Routing Inside The AS: I. Interaction of Non-BGP Routers With BGP Routers
4.
II. BGP Policies Conflicting with Internal Defaults - See CH12 Page 411
1. Loops could occur when a default points traffic to a boarder router, and then due
to the boarder router's policy sends the traffic back into the AS.
2. Scenarios when a loop may occur:
1. Defaults inside the AS in conjunction with a primary/backup BGP policy
2. Defaults inside the AS in conjunction with other BGP policies.
2. Scenario 1: Manipulating the IGP Metric - Have RTC advertise the default route with
a much higher IGP metric than RTD, so RTD's default is always preferred by any
internal router.
3. Scenario 2: The IBGP Path Is Shorter Than the IGP Path - Create a physical link
between IBGP routers so as to not redirect the traffic back over the IGP.
4. Scenario 3: Running BGP on Transit Routers - Full IBGP mesh between all routers
shown.
5. Scenario 4: Who Generates the Default, and How Is It Generated? - Have the
Primary edge router stop advertising it's default route if it's external link fails. Also have
the backup router START advertising it's default route only if the preferred default route
is that of it's external link, and not the one coming from RTD. See CH12 Page 395
1. RIP-Generated Default
1. When using RIP for the IBGP you can achieve a loop free backup/primary
design. RIP AD is 120, therefore when RTC receives the RIP advertised default
from RTD, RTC will insert that default into the routing table and not advertise
it's own default that was advertised by another AS. If RTD's external link goes
down, RTD will stop advertising it's default and RTC will start advertising it's
own external default.
III.
2. Policy routing can also be useful for traffic balancing. Shown below dial up
users from one region; traffic can be sent to Provider 1, and the other region can
be sent to Provider 2.
3. Policy routing should not replace dynamic routing, but instead should
complement it. Policy routing has it's own set of drawbacks:
1. Extra static configuration is needed to identify sources of traffic or a
combination of source and destination. Care should be taken not to disrupt
other traffic and to specify other alternatives for traffic in case of backup
situations.
2. Policy routing is CPU-intensive because it is based on the source IP address,
unlike dynamic and static routing, which are based on the destination IP
address. Sophisticated caching and switching techniques have been
implemented all along based on the traffic's destination. Most