1) the VRF access link would be present in router LSA or both CE and PE node, as a result of this it should be redistributed from OSPF 5 vrf CCIE into BGP address-faimly ipv4 vrf CCIE. your understanding is correct
2) again without any matching conditions the PE should accept all LSAs received from CE node unless they have the down bit set that would mean they were originated by another PE node.
1. Why is "redistrubuted connected" , wont the connected route between B and C be redistributed if its not configured ?
- As mentioned by Giuseppe, redistributing OSPF will adverise connected interfaces whcih are part of OSPF process. Basically when any routing protocol is redistributed into other, below 2 steps will be followed. For simplicity assume protocol A is redistributed to protocol B,
a. All prefixes learnt via protocol A and installed in routing table "show ip route " will be candidates for redistribution
b. All connected interface whcih are part of protocol A will be candidates for redistribution.
Skip step b if you have "redistribute connected" enabled under protocol B.
2. If only "redistribute OSPF 5 vrf CCIE" is configured, wont external (1 and 2) and internal route be redistributed along ?
- When OSPF is redistributed into BGP, by default it will not advertise any external prefixes. You need to match external inorder to get them redistributed.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...