I have configured ip default-gateway on a cisco 2811 router. However, after configuring this, I could not ping to the internet from all my hosts. However when I use the ip route 0.0.0.0 0.0.0.0 ip address, I am able to do that.
May i know why this happen. What the difference between a ip route command and a ip default-gateway command ? :)
think of ip default-gateway in a PC analogy. The default-gateway for the PC is just for itself to get to the gateway so that is can talk to other devices in the other network. The same with router, the router uses "ip route 0.0.0.0 0.0.0.0 x.x.x.x" as a way of routing the packet that is does not have a regular route for, a gateway of last resort. Further explanation, when a router sess a packet destined to, say 10.1.1.1.1 host, it looks at its routing table, it have routes for 22.214.171.124, 126.96.36.199 networks but none for 10.x.x.x network, if it has "ip route" or gateway of last resort, it will forward destination to that gateway of last resort hop. IP default-gateway does not make an entry in the routing table it is for router's own use to reach other subnet, not for routing the packets.
You really shouldn't every use the default-gateway command on a router. The default-gateway command only works if you turn off ip routing. Turing off routing on a router kinda defeats the purpose of the box.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...