Static Route with Tag number

Answered Question
Oct 18th, 2007
User Badges:
  • Bronze, 100 points or more

Hi,

Does this command

ip route 10.64.0.0 255.240.0.0 192.168.50.2 20 tag 102

overwrites this command

ip route 10.64.0.0 255.240.0.0 192.168.50.2 10 tag 101

? or vise versa?


Thanks in advance

Abd Alqader

Correct Answer by ilya.varlashkin about 9 years 9 months ago

Routes must have different next-hop in order to be different, otherwise they're considered as the same route so second command overwrites first one.

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 4 (2 ratings)
Loading.
Danilo Dy Thu, 10/18/2007 - 22:16
User Badges:
  • Blue, 1500 points or more

Hi,


The tag is use to reference a route in a route map for making policy decision.


You have two floating static route diferrentiated by their administrative distance of 10 and 20. I don't think the routes overwrite each other by the tag.


Regards,

Dandy

a.hajhamad Thu, 10/18/2007 - 23:22
User Badges:
  • Bronze, 100 points or more

Hi Dandy,

Yes, this is right. But, why when i apply these two static routes at Cisco 6509 switch, the last one applied is the one appeared at the show running?


Thanks


Abd Alqader

Correct Answer
ilya.varlashkin Thu, 10/18/2007 - 23:27
User Badges:
  • Silver, 250 points or more

Routes must have different next-hop in order to be different, otherwise they're considered as the same route so second command overwrites first one.

Danilo Dy Fri, 10/19/2007 - 00:18
User Badges:
  • Blue, 1500 points or more

Hi,


I didn't noticed the next hop which is the same. The second one will overwrite the first one with or without tag.


Regards,

Dandy

a.hajhamad Fri, 10/19/2007 - 02:21
User Badges:
  • Bronze, 100 points or more

yes, you are right.


Thanks

marhoel_it Mon, 10/29/2007 - 23:10
User Badges:

Hi i have 2 ISP connected to cisco 2811 router, i want to configure a failover on wan side what can i do. i made some configuration on it using route-map ang policy list but it didnt work


my config is


access-list 1 permit 192.168.1.0 0.0.0.255

access-list 2 permit 192.168.2.0 0.0.0.255

!

ip policy-list group1-s1/0 permit

match ip add 1

match int s1/0

!

ip policy-list group1-s1/1 permit

match ip add 1

match int s1/1

!

ip policy-list group2-s1/0 permit

match ip add 2

match int s1/0

!

ip policy-list group2-s1/1 permit

match ip add 2

match int s1/1

!

route-map group 1 permit 1

match policy-list group1-s1/0

match policy-list group1-s1/1

!

route-map group 2 permit

match policy-list group1-s1/0

match policy-list group1-s1/1

!

int s1/0

ip nat outside

ip policy route-map group1

!

int s1/1

ip nat outside

ip policy route-map group2

!

ip nat inside source list route-map group1 int s1/0

ip nat inside source list route-map group2 int s1/1



Actions

This Discussion