IP SLA explanation and examples of when to use it An IP SLA (Service Level Agreement) is an agreement between the Service Provider and (you) the customer, that you will get an agreed upon level of uptime / bandwidth for your money, and IP SLA configuration on a router is a mechanism to measure and … Continue reading IP SLA configuration, verification, “object tracking” configured and explained, quite an extensive subject and read so brace yourself!
Category: Policy Based Routing
Policy Based Routing / Local Policy Routing, and Route-Map configuration and explanation, review for exam day!
I will be using this Topology not as an OSPF course, but to perform Policy Based Routing (PBR) to influence how traffic travels from R5 to destination network 172.12.23.0, but first we need to review the basics of PBR: PBR effects packets on the Ingress interface it is configured on, not traffic generated by the … Continue reading Policy Based Routing / Local Policy Routing, and Route-Map configuration and explanation, review for exam day!
Part 6: Troubleshooting of sub-optimal routing via route-maps / redist/ policy routing, and an old friend OSPF distance comes to save the day! (GREAT review!)
Not /fin with this Topology of course, after this lab of fine tuning some sub-optimal routing I am taking copies of all "sh run" to be able to spin this lab up again if it ever gets the "wr er", however it will be /fin for review and onto the subject of VPN's. So, Part … Continue reading Part 6: Troubleshooting of sub-optimal routing via route-maps / redist/ policy routing, and an old friend OSPF distance comes to save the day! (GREAT review!)
Part 5: Turning “IP Routing” on for Layer 3 SW1, Policy / Local Policy Routing, found sub-optimal routing due to AD! (Will be 6th lab to troubleshoot)
I took a quick moment to post before this, advising not to study or lab tired, cause as can be seen towards the end of my Part 4 of this lab I am just tired and swinging at air. Anyway, we now have R1 and R3 both acting as ASBR's, with R1 doing 2-way route-tagged … Continue reading Part 5: Turning “IP Routing” on for Layer 3 SW1, Policy / Local Policy Routing, found sub-optimal routing due to AD! (Will be 6th lab to troubleshoot)
Part 1: Setting up the new, bigger, and better lab to configure everything we’ve learned up to this point!
As previously mentioned I believe, this will be a multi-part lab in which I will configure "Multi-Point" 2-way Redistribution / Policy-Routing / Distribute-Lists / Route-Maps / and troubleshooting all along the way. Here are a few things I know I want to achieve over the several parts of this lab: Authentication deep dive for … Continue reading Part 1: Setting up the new, bigger, and better lab to configure everything we’ve learned up to this point!
The extended traceroute command, and Local Policy Routing Configuration!
Still working with the same Topology seen above, I want to round off the Policy Routing videos to see if I can bring that into some scenario or freestyle lab, and see how crazy one can get with Policy Routing. The first thing to note that I have amazingly not known at all until this … Continue reading The extended traceroute command, and Local Policy Routing Configuration!
Using Extended ACL’s for Policy Routing to overcome sub-optimal routing
As seen in the previous look at policy routing using a standard ACL, it led to sub-optimal routing due to only routing on the source, and not both source and destination addresses - for this we will use an Extended ACL to correct. So I took the old commands off, nothing fancy: R1(config)#no access-list 5 … Continue reading Using Extended ACL’s for Policy Routing to overcome sub-optimal routing
Policy Routing with a Standard Access-list, sub-optimal routing (Ugh)
Due to some winter illness and the fact that I had to swap cables with my home production network to make this topology work, it took some time to physically put this all together, so getting it setup just to lab was quite the undertaking but once all said and done I have this to … Continue reading Policy Routing with a Standard Access-list, sub-optimal routing (Ugh)