Im a new bee to VRF. I have gone through some articles and could understand that you are virtualising a single router into many based on the VRF's defined.
I have a scenario where i want to understand how VRF routing table is Linked to Global routing table.
ip vrf INTERNET
no switchport ip vrf forwarding INTERNET ip address 10.10.10.1 255.255.255.252
Interface Vlan 101
ip vrf forwarding INTERNET
ip addres 10.10.20.1 255.255.255.252
Interface Vlan 201
ip addres 10.10.30.1 255.255.255.252
Default route to access the internet ::
ip route 0.0.0.0 0.0.0.0 10.10.1.1 1
By above default route whether vlan 101 will be able to access internet? If Yes, how vlan101 would be able to access internet as we brought the vlan under seperate VRF INTERNET. If no, what should be done keeping VRF config same making vlan 101 access internet.
1. what is the Difference between VRF and VRF lite with an config example & functioning will help me a lot .
This is out of the subject. but postin here.
2. We have arround 10 sites connected with MPLS together to HUB site and every site Wan router is configured with DMVPN tunnel and inturn every site Core switch is configured as GRE tunnel to HUB core switch. can i know whats the purpose of the GRE tunnel as we already have DMVPN. Note: we are running OSPF as dynamic routing protocl for all of the sites.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...