Skip to main content

Posts

Reserve bandwidth for particular destination Ip Address

Reserve bandwidth for particular destination Ip Address Example of how you might use CBWFQ. Much more information can be found by searching Cisco's site either using "CBWFQ" or "class based weigthed fair queue", e.g. http://www.cisco.com/en/US/docs/ios/12_0t/12_0t5/feature/guide/cbwfq.html Steps :- 1 )  make an ACL to match your destination ip access-list 123 permit ip any host X.X.X.X 2)  make a class map to match the ACL class-map AvBckdestination match access-group 123 3)  make a policy-map to match the class above with the QoS you want to give it policy-map reserve5120 class AvBckdestination bandwidth 5120 4)  attach the policy-map to the outgoing interface pointing to the SP interface Serial1/0 service-policy output reserve5120 verify using "show policy-map interface Serial1/0" if the class is being given the appropriate QoS levels. Note: This is only a barebone config and you might need to work with your provider closely to set DSCP valu...

Networking - Interview Questions and Answers on BGP

Introduction This document contains frequently asked questions (FAQs) about Border Gateway Protocol (BGP). Q. How do I configure BGP? A. Refer to these documents for information on how to configure BGP and BGP functioning: Configuring BGP BGP Case Studies Q. How do I configure BGP with the use of a loopback address? A. The use of a loopback interface ensures that the neighbor stays up and is not affected by malfunctioning hardware. BGP uses the IP address configured on the physical interface directly connected to the BGP peer as the source address when it establishes the BGP peering session, by default. Issue the neighbor <ip address> update-source <interface> command in order to change this behavior and configure the BGP that speaks to the router to establish peering with the use of a loopback address as the source address. Refer to Sample Configuration for iBGP and eBGP With ...

administrative distance default values of the protocols that Cisco device

Lists the administrative distance default values of the protocols that Cisco device supports below; Routing protocol / Route source Default Distance Values Connected interface 0 Static route 1 Enhanced Interior Gateway Routing Protocol (EIGRP) summary route 5 External Border Gateway Protocol (eBGP) 20 Internal EIGRP 90 IGRP 100 OSPF 110 Intermediate System-to-Intermediate System (IS-IS) 115 Routing Information Protocol (RIP) 120 Exterior Gateway Protocol (EGP) 140 On Demand Routing (ODR) 160 ...

Monitoring VPN Tunnels

We can do Monitoring VPN Tunnel using Checkpoint itself We have many tunnels on our checkpoint is being used enterprise wide. I was not found any application or monitoring mechanism for vpn tunnel Monitoring. whenever tunnel goes down, we come to know only if partner or any team complains. So The solution I find this one to monitor vpn tunnels. Here is the way 1)     We are using Check Point gateways on both sides of the VPN, the best way to do this is to set Permanent Tunnels in the VPN Community. On the "Tunnel Management" screen of the VPN community we can set up automatic Emails/SNMP Traps for when the tunnel falls down and can't get back up. Once again permanent tunnels only works between Check Point gateways. 2)     If the remote firewalls are not Check Point, the best we can do under "Global Properties > Log and Alert" is to set "VPN Configuration & Key Exchange Errors" & "VPN Packet Handling Errors" ...