当前位置:网站首页>Notes on the ninth day
Notes on the ninth day
2022-07-23 14:07:00 【[white head]】
Default RIP and OSPF If the agreement is reissued at two points , Because of their different priorities , So the first one ASBR After the re release of the device , Will affect other ASBR Routing table of the device . So that the route may be returned to the source protocol , happen Routing feedback ---A Reroute protocol to B After the agreement , It was republished back A agreement . Routing feedback may lead to poor routing and even the emergence of routing loops .
Huawei equipment in order to eliminate the phenomenon of routing feedback , He will be OSPF The priority of internally generated routes is defined as 10, The default priority of routes imported outside the domain is defined as 150.(150 The priority of is higher than that of all Huawei systems IGP Default priority of the protocol ). In this way, route feedback is eliminated .
Due to the seed metric problem of republishing Technology , Will inevitably lead to poor route selection ; Can only rely on Routing strategy To think that interference chooses the way .
Control layer flow : The routing protocol transmits the traffic generated by the routing information
Data layer traffic : When the device accesses the target network segment , Data traffic generated
Routing strategy : In the process of controlling the flow of the layer , Intercept flow , Then modify the traffic and forward it or not ; The final implementation affects the generation of router routing table , The effect of interference in route selection .
1. Grab traffic
1, ACL list --- because ACL The list itself is designed to capture data layer traffic Of , therefore , Because of the existence of wildcards, it can flexibly match digital features , but yes , There is no way to match the mask characteristics in the routing information . therefore , Not good at controlling
Capture of layer traffic .
2, IP-prefix --- The prefix list
[r1]ip ip-prefix aa( Name of the custom prefix list )permit( Allow and deny , You can choose to crawl traffic only Choose permit)192.168.1.0 24 --- Capture the information of the target network in the control layer traffic .
[r1]display ip ip-prefix aa--- View prefix list information
Matching rules for prefix list : From top to bottom , One by one matching , Once matched, the action will be performed according to the corresponding rules do , Don't match down any more . The end implicitly rejects all rules .
The rule in the prefix list defaults to 10 Automatically add a sequence number to the step , Easy to insert and delete rules .
[r1]ip ip-prefix aa index 15 permit 192.168.3.0 24--- According to serial number
Insert rules
[r1]undo ip ip-prefix aa index 15--- Delete the rule in the prefix list
[r1]ip ip-prefix aa permit 192.168.3.0 24 less-equal 28--- Grab
The mask length is longer 24 To 28 Between
[r1]ip ip-prefix aa permit 192.168.4.0 24 greater-equal 28--- After the current contradiction , The latter will prevail , Ahead 24 Become former 24 Is fixed , The matching mask length is greater than or equal to 28 Routing information for .
[r1]ip ip-prefix aa permit 192.168.5.0 24 greater-equal 28 less- equal 30--- front 24 Bit fixation , The matching mask length is 28 -30 Network segment information
[r1]ip ip-prefix aa permit 192.168.6.0 24 greater-equal 28 less-equal 28--- front 24 Bit fixation , The matching mask length is 28 Bit network segment information
[r1]ip ip-prefix aa permit 0.0.0.0 0 greater-equal 32--- Match all host routes
[r1]ip ip-prefix aa permit 0.0.0.0 0 --- Match the default
[r1]ip ip-prefix aa permit 0.0.0.0 0 less-equal 32
2, Routing strategy
1 , RIP Of merticin and merticout --- Offset list --- Only for distance vector protocol design and Application
1, Grab traffic
[r1]ip ip-prefix aa permit 23.0.0.0 24
2, Call... On the interface
[r1-GigabitEthernet0/0/1]rip metricin ip-prefix aa 10
2,filter-policy --- Filtering strategy
1, Grab traffic
[r1]ip ip-prefix bb deny 34.0.0.0 24
[r1]ip ip-prefix bb permit 0.0.0.0 0 less-equal 32
2, Called in the process
[r1-rip-1]filter-policy ip-prefix bb import GigabitEthernet 0/0/0
Be careful : The filtering strategy itself can be used in OSPF Used in , however , stay OSPF When used in the area , Because topology information is transmitted inside the region , therefore , Cannot call in the outgoing direction , Can only be called in the incoming direction , Influence yourself , Nor does it mean that LSA Information filtering out , Only filter the routing information when adding tables , Don't let it add a watch . When routing information is transferred between regions, you can call out of the direction .
3, route-policy --- Routing strategy
1, Grab traffic

2, Configure routing policies
[r2]route-policy aa deny node 10
Info: New Sequence of this List.
[r2-route-policy]if-match acl 2000
[r2]route-policy aa permit node 20
Info: New Sequence of this List.
[r2-route-policy]if-match acl 2001
[r2-route-policy]apply cost 10
[r2]route-policy aa permit node 30
[r2-route-policy]if-match ip-prefix aa
[r2-route-policy]apply cost-type type-1
[r2]route-policy aa permit node 40
Info: New Sequence of this List.
[r2-route-policy]if-match ip-prefix bb
[r2-route-policy]apply cost-type type-1
[r2-route-policy]apply tag 666
Be careful --- One rule , If there are multiple apply perhaps if-match, Then these needs are met at the same time , Satisfy “ And ” Relationship .
[r2]route-policy aa permit node 50--- Allow all
1, No, if-match --- Match all
2, No, apply --- Just follow the big action
3, Call the routing policy during republishing
[r2-ospf-1]import-route rip route-policy aa
Matching rules of routing policy : From top to bottom , One by one matching , Once matched, the action will be executed according to the corresponding rules, and no downward matching . The end implicitly rejects all rules .
ROUTE-POLICY Configuration Guide for
1, Even if a traffic needs to be rejected , When capturing traffic , Permission must also be used , Then reject in the routing policy .
2, In one rule , If there is no flow matching , Then it means that all ; If there is no APPLY( Little affectations ), Only follow the big action . therefore , The big action is allowed, and the empty table means that all .
边栏推荐
- Notes on key vocabulary of the original English book biography of jobs (15) [chapter four]
- Image processing 6: top level file
- Notes on the sixth day
- Establish stm32f103c8t6 project template and STM32 st-link utility burn hex file
- OSPF综合实验
- 图像处理6:顶层文件
- golang远程服务器调试
- 图像处理7:测试文件
- Kingbasees formatting function
- Image processing 5: expansion
猜你喜欢
随机推荐
Golang remote server debugging
NR Modulation 5
overlayfs源代码解析
[激光器原理与应用-7]: 半导体制冷片与TEC温控器
Detailed introduction of RIP
Review of HCIA
锐龙R7 PRO 6850H核显性能怎么样?相当于什么水平
Google Earth engine -- a small bug in gee. Images of transcontinental boundaries cannot be obtained
中等靶场
pingbanceshi
sdf折射反射效果记录
Creo 9.0 如何快速修改CAD坐標系?
小米12S Pro和小米12Pro天玑版区别 两者配置对比
LeetCode_ 47_ Full arrangement II
Notes on key vocabulary of the original English book biography of jobs (15) [chapter four]
APP常用跨端技术栈深入分析
In depth analysis of common cross end technology stacks of app
Static comprehensive experiment (HCIA)
Kafka consumption reports an error coordinator unavailable Rediscovery will be attempt redisCovery
ERP production operation control









