Re: Controling mutual redistribution loops

From: Imal kalutotage (imal.kalutotage@gmail.com)
Date: Sun Dec 04 2005 - 16:15:10 GMT-3


Hi All,
This is how u spot the redistribution loops.
1 Look for physical loops in the topology..
2. If that loop is covered by more than single routing protocol then you may
encounter a routing loop. If the physical loop is covered by only single
routing protocol, there should not be any issues.

This is very well explained in NMC Tech library..

Cheers
Imal

On 12/4/05, Schulz, Dave <DSchulz@dpsciences.com> wrote:
>
> Serge -
>
> The rule of the thumb (I think, at least one of them) on mutual
> distribution
> ...is not redistribute routes back into the area that they originally came
> from (causing a loop). IMHO, the best way to do this is through tags,
> though
> you can use specific route....but these are little less
> administration-friendly, since if the routes change, so do your
> access-lists/route-maps. Also, watch out for your metrics (not as big in
> ospf
> as in eigrp). Here is an example that I have....hope this
> helps....(mutual
> redistribution from ospf to eigrp). Also, I am doing this for memory, so
> it
> may look different on your router. Please correct me if I missed
> something.
>
> ------------------------
>
> router ospf 1
> redistribute eigrp 100 route-map E2O subnets
>
> router eigrp 100
> redistribute ospf 1 route-map O2E metric 100000 1000 255 1 1500
> !
> !
> route-map E2O deny 10
> match tag 110 (I use the tag that has the same admin distance #)
> !
> route-map E2O permit 20
> match tag 90
> !
> route-map O2E deny 10
> match tag 90
> !
> route-map O2E permit 20
> match tag 110
> !
> Note: I like to use the tag that has the same admin distance where the
> route
> originally came from, just to keep it straight....but this your choice.
>
>
> -----Original Message-----
> From: nobody@groupstudy.com
> To: ccielab@groupstudy.com
> Sent: 12/4/2005 9:23 AM
> Subject: Controling mutual redistribution loops
>
> Hi all,
>
> I'm always afraid when it comes to spoting mutual redistribution loops
> !!
> What are the rules of tumbs for visualising the potential loops ?
> What is the logic behind this ?
> Does packet tagging always block the redistribution loops ?
> what is the implementation logic ?
>
> Thx for your answers !
>
>
>
> Serge R. N'GBESSO
> serge.ngbesso@bnpparibas.com
> Security Consultant
> CCDA, CCSP, CCIE:Security,
> Certified Etichal Hacker.
> www.1000club.com/club/japon/
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> ---------------------------------
> Appel audio GRATUIT partout dans le monde avec le nouveau Yahoo!
> Messenger
> Tilichargez le ici !
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html



This archive was generated by hypermail 2.1.4 : Mon Jan 09 2006 - 07:07:50 GMT-3