This small lab focuses on
the use of Peer Groups to simplify BGP configuration
Complete the
following tasks:
-Configure iBGP
peerings between R2-R3, R2-R4, and R2-R1
-Configure R3,R4,
and R1 and route reflector clients of R2
-Configure the iBGP
peering using the peer group name PEER_iBGP
-Advertise the
loopback addresses of R3 and R4 and ensure R1 can reach
the loopback
addresses when packets are sourced from its loopback 0
address
-All BGP peers
should authenticate with the password CISCO1
Topology
Concepts tested:
-Peer groups
-Prefix
advertisement
-route reflectors
GNS3 files: Link
Solution
Let's begin with
configuring our iBGP peering.
R1(config)#router
bgp 100
R1(config-router)#neighbor
192.168.12.2 remote-as 100
R1(config-router)#neighbor
192.168.12.2 password CISCO1
Below we use the
peer-group option to create a single configuration profile that we can then
apply to multiple peers. In this case R1, R3, and R4.
R2(config)#router
bgp 100
R2(config-router)#neighbor
PEER_IBGP peer-group
R2(config-router)#neighbor
PEER_IBGP remote-as 100
R2(config-router)#neighbor
PEER_IBGP route-reflector-client
R2(config-router)#neighbor
PEER_IBGP next-hop-self
R2(config-router)#neighbor
PEER_IBGP password CISCO1
R2(config-router)#neighbor
192.168.23.3 peer-group PEER_IBGP
R2(config-router)#neighbor
192.168.12.1 peer-group PEER_IBGP
R2(config-router)#neighbor
192.168.24.4 peer-group PEER_IBGP
Also, we use the
password option on the neighbor command to configure MD5 authentication between
our peers.
R3(config)#router
bgp 100
R3(config-router)#neighbor
192.168.23.2 remote-as 100
R3(config-router)#neighbor
192.168.23.2 password CISCO1
R4(config)#router
bgp 100
R4(config-router)#neighbor
192.168.24.2 remote-as 100
R4(config-router)#neighbor
192.168.24.2 password CISCO1
Now let's advertise
our loopback addresses
R1(config-if)#router
bgp 100
R1(config-router)#network
1.1.1.0 mask 255.255.255.0
R3(config)#router
bgp 100
R3(config-router)#network
172.16.0.0 mask 255.255.255.0
R3(config-router)#network
172.16.1.0 mask 255.255.255.0
R3(config-router)#network
172.16.2.0 mask 255.255.255.0
R3(config-router)#network
172.16.3.0 mask 255.255.255.0
R4(config)#router
bgp 100
R4(config-router)#network
172.16.4.0 mask 255.255.255.0
R4(config-router)#network
172.16.5.0 mask 255.255.255.0
R4(config-router)#network
172.16.6.0 mask 255.255.255.0
R4(config-router)#network
172.16.7.0 mask 255.255.255.0
Now we should just
have to advertise our loopback address on R1 and we should be good to go.
R1(config)#int lo 0
R1(config-if)#ip add
1.1.1.1 255.255.255.0
R1#ping 172.16.1.1
source loopback 0
Type escape sequence
to abort.
Sending 5, 100-byte
ICMP Echos to 172.16.1.1, timeout is 2 seconds:
Packet sent with a
source address of 1.1.1.1
!!!!!
Success rate is 100
percent (5/5), round-trip min/avg/max = 36/46/68 ms
No comments:
Post a Comment