search for: ibgp

Displaying 5 results from an estimated 5 matches for "ibgp".

Did you mean: bgp
2007 Dec 06
3
Best setup for redundant routers.
I am setting up 2 Vyatta routers that will serve as redundant failover core routers out to the backbone of our ISP. They will be serving for routing between other branches and the ISP and bandwidth management. I am trying to differentiate between the plethora of information about having redundant, automatic failover routers and pretty much decided on VRRP for the IP address failover mechanism. I
2004 Apr 09
2
link redundancy...
Does anyone know how to make a link redundancy? I have two ADSL lines, and i want the linux machine to be able to switch between the two lines everytime the first ADSL line goes down. Thanks a lot. Cristiano
2002 Feb 14
1
Zebra, Routing ...
Before I start, I don''t want to do ECMP or simple bonding ... I have multiple Internet connections available to multiple boxes on one of my networks. Box A connects to ISPs 1, 2 and 3 Box B connects to ISPs 1 and 4 Boxes A and B are both connected to each other and the rest of the network. 1) I would like to set up some dynamic routing in such a way that any given outgoing packet from
2006 May 22
0
Routing and Redundancy Delima
My setup: LAN A | |-- Wireless-r1 --| |-- Wireless-r2 --| ..................| .................LAN B LAN A is my primary (external) LAN. LAN B is my wireless LAN. LAN A does iBGP and OSPF routing. Each wireless router does the following: 2 Bridged Ethernet + STP connections to LAN A 2 Bridged Ethernet + STP connections to LAN B 2 VLANs on LAN A 5 VLANs on LAN B UCARP on each wireless VLAN (5). Quagga - zebra, bgpd, ospfd (on LAN A) UCARP provides a virtual IP address for...
2004 Apr 20
10
TCP RST attack
http://www.uniras.gov.uk/vuls/2004/236929/index.htm ----Quote---- "The impact of this vulnerability varies by vendor and application, but in some deployment scenarios it is rated critical. Please see the vendor section below for further information. Alternatively contact your vendor for product specific information. If exploited, the vulnerability could allow an attacker to create a