i am not 100% sure what you are asking for but let's say you have a router R1 with a subnet 220.127.116.11/24 and you need to reach the router R6 on your infrastructure with a network of 18.104.22.168/24 then, you can write on R1
ip route 0.0.0.0 0.0.0.0 22.214.171.124 ! assuming 126.96.36.199 is a valid ip
and on R6
ip route 0.0.0.0 0.0.0.0 188.8.131.52 ! assuming 184.108.40.206 is a valid ip
Of course you need at least one of these two conditions to be true:
a) a only-layer 2 technology is connecting the two routers
b) each router knows how to reach the next hop in your infrastructure
with a dynamic routing protocol you fix this issue because you share the same routing table (or routing instance) where you can find information about the network to reach.
For MPLS it gets a little bit more complicated. I would divide your question in the analysis of:
1) CE to PE routing
2) PE to PE routing type
3) PE to CE routing
Let's say anywa that your provider is running AToM over its network, that you could communicate with a static route in quite a number of cases. Of course AToM wouldn't be the only way.
what I mean is, can I push a route to an address that is not directly connected, so If I have a router 3 hops away say with address 220.127.116.11 , 18.104.22.168 is reachable on my routing table, could I say push 192.168.1.0/24 to 22.214.171.124 3 hops away, would this work ?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...