From: Scott Morris (smorris@ipexpert.com)
Date: Wed Sep 19 2007 - 12:21:41 ART
I think Brian Dennis summed it up quite well a few days ago.... In the
grand scale of things, it is more unlikely that you'll get a redistribution
scenario from hell. It's good to know how to do the tags, and play with it
a little to be familiar with it, but I wouldn't spend a lot of time
stressing myself out over redistribution!
Let the tools on the router help you. Whether you are profiling routes (in
Brians message) or whether you are doing "debug ip routing" just be able to
predict what will happen on all devices when you are doing redistribution!
In your practice, start small. Start introducing tags and make sure the
effect is what you expect it to be. Keep a journal of progress, that'll all
help.
HTH,
Scott Morris, CCIE4 (R&S/ISP-Dial/Security/Service Provider) #4713, JNCIE-M
#153, CISSP, et al.
CCSI/JNCI-M/JNCI-ER
VP - Technical Training - IPexpert, Inc.
IPexpert Sr. Technical Instructor
A Cisco Learning Partner - We Accept Learning Credits!
smorris@ipexpert.com
Telephone: +1.810.326.1444
Fax: +1.810.454.0130
http://www.ipexpert.com
-----Original Message-----
From: Joe Dewberry [mailto:jdewberr@bellsouth.net]
Sent: Wednesday, September 19, 2007 11:11 AM
To: Scott Morris
Cc: 'Joe Dewberry'; ccielab@groupstudy.com
Subject: Re: the value of tags
Hey Scott,
I built for myself a simple mnemonic to remember
deny target
deny target & source
deny other & source
permit other --> add source
permit source --> set tag of source
my biggest fear is running into a nasty multiprotocol redistribution scheme
and having something be missed. I spent a while thinking about this tagging
scheme and scenarios where it would not work..couldn't think of any yet.
-- Joe>At 11:07 2007.09.19 Scott Morris wrote: > You can scale the tags as much or as little as you want. It's simply >an exercise in logic (and typing!). :) > > Whether you have multiple points of redistribution to the same routing > protocol and wanto to use the same tag or different tags is up to you. > > You may have 100 = RIP, 200 = OSPF as an example. In a larger > concept, you could have tag 101 = RIP from R1, 102 = RIP from R2, 204 > = OSPF from R4, etc. > > The goal of it all is a simpler/scalable way to pick exactly what goes > where and watching to be sure you don't have loops. > > Sometimes it'll make your head hurt, but should scale just fine. > > > Scott Morris, CCIE4 (R&S/ISP-Dial/Security/Service Provider) #4713, > JNCIE-M #153, CISSP, et al. > CCSI/JNCI-M/JNCI-ER > VP - Technical Training - IPexpert, Inc. > IPexpert Sr. Technical Instructor > > A Cisco Learning Partner - We Accept Learning Credits! > > smorris@ipexpert.com > > Telephone: +1.810.326.1444 > Fax: +1.810.454.0130 > http://www.ipexpert.com > > > -----Original Message-----
This archive was generated by hypermail 2.1.4 : Sat Oct 06 2007 - 12:01:13 ART