I want to thank you for all of your responses. The problem is now solved by adding defaults routes in R4 and R5 to each other. Now I can ping from all iBGP router (R1,R2,R3) to R5's 188.8.131.52 host.
But now I have another problem and I thought the resolution would be similar. R1 is advertising 184.108.40.206 via BGP network command. R5 can see that network with no problem. But R5 is unable to ping R1's loopback address of 220.127.116.11. I added some static routes but no success. I don't understand because if R1 can now ping R5 loopback shouldn't the pings work?
Thank you for all of your help. As you can see I'm a newbie and I will be starting a new job on Monday and there will be BGP involved. Thank you very much.
Thank you all once again.
PS:I meant to post this message all the way in the bottom of the last post- Sorry.
Are you able to Ping 18.104.22.168 from R5 using an extended Ping with 22.214.171.124 source address?
If yes, your R1 router (or some router on the path - R2 or R3) doesn't know a route to R5's interface address 10.1.54.2.
Don't forget the rule: When the source address is not specified, a router is using the IP address of his outgoing interface as the source address in the ICMP Echo Request packet sent while pinging. And the target device has to reply to that address when sending an Echo Reply - i.e., the address must be routable along the whole path through the network.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...