When i doing the BGP home lab, i came to notice that when iam establishing the BGP session between the two private AS which comes under a single public AS
It is forming the adjacency without giving the command #bgp confederation peers (Private AS number)
The one of the router is running of Version 12.2(5)and other router router is 12.2(8)
I dont know why its happening and i tried of shutdown the interface and made the interface UP, same think is happening
can u help me know abt the issue,other think when i try to establish the bgp session between the One public AS to other Privte AS (Which comes under a Public As)without giving the command # bgp conferderation identifier (Public AS)
Without the bgp confederation peer command, both routers will see each other as a true EBGP peer. R1 will send an open message with AS=20 to R2 and expect to recevie an open message from R2 with AS=65520.
R2 do the same thing.(send an open message with AS=20 and expect to receive an open message with AS=65510). And the result is a wrong-AS issue. Theorectically, the BGP session cannot be established.
And why did your routers can establsh the session successfully? I don't know. Wait the expert to answer you.(Harold, where are you?) Before that, it's a good idea to issue the debug ip bgp command on your routers and see what messages are brought to you.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...