It is difficult to tell from this whether you have run into some issue with the simulator or whether it is something else.
So first, can you be a bit more specific about what you mean when you say cant get BGP up? When you do show ip bgp what does it say about the neighbor? While I wonder about the usefulness of having 4 network statements for networks with /30 masks that should not impact getting BGP up. In the configuration as posted I would expect BGP to form the neighbor relationship.
Also can you tell whether the serial link that connects them is up? If you perform show cdp neighbor, does it show the routers as neighbors at layer 2?
Can you post the output of show cdp neighbor detail from router 4 (and/or router 5)? Also the output of show ip bgp neighbor would be helpful.
The BGP configuration that you post is fairly simple and straightforward. Assuming correct connectivity between router 4 and router 5 I do not see anything that would keep it from forming the neighbor relationship.
I believe that there are 2 routes listed because those are the locally connected routes. I assume that the other networks that are represented by network statements are remote networks that you expect to learn via RIP or OSPF? I would interpret from what you have said that either they are not being leaerned, or they are being learned but do not have /30 masks. Posting the output of show ip route would clarify this.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...