BGP Listen Range Command

bgp listen range command dynamic neighbors blog post topology

BGP Dynamic Neighbors are a way to bring up  BGP neighbors without specifically defining the neighbors remote IP address. Using the BGP Listen Range command you specify a range of IP addresses typically on your Hub site (maybe in a DMVPN environment) that you trust to become BGP neigbors with you. When a TCP request… [Read More]

Please Sponsor Me: Abseil the Spinnaker Tower

abseil spinnaker tower

If you are a regular visitor to this site or a new one and have learnt anything from it and would like to give something back now is your chance. Please donate whatever you can to support me via the link below. I will be doing a sponsored Abseil of the Spinnaker Tower in… [Read More]

BGP Weight Attribute

bgp weight set with neighbor statement

The BGP weight attribute is the first on the list in the BGP best path algorithm Prefer the path with the highest WEIGHT. Note:  WEIGHT is a Cisco-specific parameter. It is local to the router on which it is configured. So if you want to influence your BGP routing outbound on a cisco router you… [Read More]

EIGRP Named Mode

eigrp named mode redistribution topology rogers ccie blog

EIGRP Named Mode or Multi-AF Mode is a new development in EIGRP starting in Version 15.x Its reason for being is to simplify the EIGRP configuration into one place, as previously with EIGRP classic version the configuration was between the interface and the global process which made it harder to see all the configuration relating… [Read More]

What is Motivation?

push yourself motivation quote

What is Motivation? Why do some people pass one CCIE after the other and others never make it to one? The answer is motivation. They know what they want and more importantly they know what they need to do to achieve it. More motivational quotes here Have you ever wondered what makes you decide to… [Read More]

OSPF Authentication – Part 1

ospf authentication blog post topology

There are three types of OSPF authentication. Type 1 – no authentication Type 2 – clear text Type 3 – cryptographic (MD5 or SHA) Lets explore each type in a lot more detail and then look at the router configuration for some real world examples. Authentication can be configured on a per area or per… [Read More]