一台MSR36-40路由,通过2M线接入对端路由,按接入方式要求,路由只能从OSPF获取,不允许从BGP获取。
现在对端反馈说是对端截获到了BGP协议,请问msr36-40 如何查看路由表是从OSPF 获取的,还是从BGP获取的?
本端路由配置如下:
#
version 7.1.059, Release 0304P15
#
sysname CQNA-DFSB.R1
#
clock timezone beijing add 08:00:00
#
ip vpn-instance vpn-nrt
route-distinguisher 25513:2
vpn-target 25513:2110 30000:802 20000:200 import-extcommunity
vpn-target 25513:2110 25588:200 export-extcommunity
#
ip vpn-instance vpn-rt
route-distinguisher 25513:1
vpn-target 25513:1110 30000:801 20000:100 import-extcommunity
vpn-target 25513:1110 25588:100 export-extcommunity
#
router id 55.2.42.49
#
ospf 1
area 0.0.0.3
network 55.2.42.49 0.0.0.0
network 55.3.74.192 0.0.0.3
network 55.3.77.192 0.0.0.3
#
mpls lsr-id 55.2.42.49
mpls ttl propagate vpn
#
password-recovery enable
#
vlan 1
#
traffic classifier c_vpn-nrt-in operator and
if-match acl 2001
#
traffic classifier c_vpn-nrt-out operator and
if-match mpls-exp 3
#
traffic classifier c_vpn-rt-in operator and
if-match acl 2001
#
traffic classifier c_vpn-rt-out operator and
if-match mpls-exp 4
#
traffic behavior b_vpn-nrt-in
remark dscp af31
#
traffic behavior b_vpn-nrt-out
queue af bandwidth pct 30
#
traffic behavior b_vpn-rt-in
remark dscp af41
#
traffic behavior b_vpn-rt-out
queue af bandwidth pct 70
#
qos policy p_vpn-nrt-in
classifier c_vpn-nrt-in behavior b_vpn-nrt-in
#
qos policy p_vpn-out
classifier c_vpn-rt-out behavior b_vpn-rt-out
classifier c_vpn-nrt-out behavior b_vpn-nrt-out
#
qos policy p_vpn-rt-in
classifier c_vpn-rt-in behavior b_vpn-rt-in
#
mpls ldp
#
controller Cellular0/0
#
controller Cellular0/1
#
interface Aux0
#
interface Serial3/0
description DD2-DFSB1-2M
fe1 unframed
ip address 55.3.74.194 255.255.255.252
ospf authentication-mode md5 1 cipher $c$3$WMl1Z2MYGKzrg92B0lKzs9TjtchL/gbDGA==
mpls enable
mpls ldp enable
mpls ldp transport-address interface
#
interface Serial3/1
shutdown
#
interface Serial4/0
description BD2-DFSB1-2M
fe1 unframed
ip address 55.3.77.194 255.255.255.252
ospf authentication-mode md5 1 cipher $c$3$SPqUzpH7rwULmfoA0+aGtTRiCntrDuoa4g==
mpls enable
mpls ldp enable
mpls ldp transport-address interface
#
interface Serial4/1
shutdown
#
interface NULL0
#
interface LoopBack0
ip address 55.2.42.49 255.255.255.255
#
interface Ethernet2/0
port link-mode bridge
shutdown
#
interface Ethernet2/1
port link-mode bridge
shutdown
#
interface Ethernet2/2
port link-mode bridge
shutdown
#
interface Ethernet2/3
port link-mode bridge
shutdown
#
interface GigabitEthernet0/0
port link-mode route
description R1-S1
combo enable copper
ip binding vpn-instance vpn-rt
ip address 55.110.32.126 255.255.255.128
#
interface GigabitEthernet0/1
port link-mode route
description R1-S2
combo enable copper
ip binding vpn-instance vpn-nrt
ip address 55.111.32.126 255.255.255.128
#
interface GigabitEthernet0/2
port link-mode route
shutdown
#
bgp 25513
group ibgp-peer internal
peer ibgp-peer connect-interface LoopBack0
peer 55.2.40.2 group ibgp-peer
peer 55.2.40.5 group ibgp-peer
#
address-family ipv4 unicast
import-route direct
peer ibgp-peer enable
#
address-family vpnv4
peer ibgp-peer enable
#
ip vpn-instance vpn-nrt
#
address-family ipv4 unicast
import-route direct
#
ip vpn-instance vpn-rt
#
address-family ipv4 unicast
import-route direct
#
scheduler logfile size 16
#
line class aux
user-role network-admin
#
line class tty
user-role network-operator
#
line class vty
user-role network-operator
#
line aux 0
authentication-mode scheme
user-role level-15
user-role network-admin
idle-timeout 5 0
#
line vty 0 4
authentication-mode scheme
user-role level-15
user-role network-admin
protocol inbound ssh
idle-timeout 5 0
#
line vty 5 63
user-role network-operator
#
info-center loghost 55.254.13.1
#
snmp-agent
snmp-agent local-engineid 800063A280D461FE43CA2900000001
snmp-agent community read CQEP-READ
snmp-agent community write CQEP-WRITE
snmp-agent sys-info version v3
snmp-agent group v3 CQEP privacy read-view CQEP-READ write-view CQEP-WRITE notify-view CQEP-READ
snmp-agent target-host trap address udp-domain 55.254.13.1 params securityname CQEP-READ
snmp-agent mib-view included CQEP-READ iso
snmp-agent mib-view included CQEP-WRITE iso
snmp-agent usm-user v3 cqdl CQEP cipher authentication-mode sha $c$3$zUJ3vlz2/td/QKfBkBlH7tD5YyNV1GTTzikvWCMGN2iTISyS3cw= privacy-mode des56 $c$3$5xdVHLv69qIpcvayjR45JyTa3TcB7YtLUIIxSqEryG0clg==
snmp-agent trap source LoopBack0
#
ssh server enable
ssh user cqdl-ssh service-type stelnet authentication-type password
#
ntp-service unicast-server 55.2.40.2
ntp-service unicast-server 55.2.40.5
#
acl basic 2001
rule 0 permit source 55.254.13.0 0.0.0.255
rule 5 permit source 55.3.0.0 0.0.255.255
#
domain system
#
domain default enable system
#
role name level-0
description Predefined level-0 role
#
role name level-1
description Predefined level-1 role
#
role name level-2
description Predefined level-2 role
#
role name level-3
description Predefined level-3 role
#
role name level-4
description Predefined level-4 role
#
role name level-5
description Predefined level-5 role
#
role name level-6
description Predefined level-6 role
#
role name level-7
description Predefined level-7 role
#
role name level-8
description Predefined level-8 role
#
role name level-9
description Predefined level-9 role
#
role name level-10
description Predefined level-10 role
#
role name level-11
description Predefined level-11 role
#
role name level-12
description Predefined level-12 role
#
role name level-13
description Predefined level-13 role
#
role name level-14
description Predefined level-14 role
#
user-group system
#
local-user cqdl-con class manage
password hash $h$6$spxLOTDn+b99u2k4$bhcSm9KNOfjxbcw5Qwk5BN31nDwXR0W8KQ0S3jDTP1qtctEmG2Dv5iWhCIOBKxtkyRgbmvE0uEiVpGOHbsFaww==
service-type terminal
authorization-attribute user-role level-15
authorization-attribute user-role network-admin
#
local-user cqdl-ssh class manage
password hash $h$6$UvnTyFOktg0s5tvl$yJy5divtM8HQ+lMxC+mqKSO6O4N22ItRByP/3memdCgJFOT+DkeYI8IMgICHHQRk0872PV5tpn6Si9b7pFYYlA==
service-type ssh
authorization-attribute user-role level-15
authorization-attribute user-role network-admin
#
public-key peer 55.110.32.124
public-key-code begin
308201B73082012C06072A8648CE3804013082011F02818100D757262C4584C44C211F18BD
96E5F061C4F0A423F7FE6B6B85B34CEF72CE14A0D3A5222FE08CECE65BE6C265854889DC1E
DBD13EC8B274DA9F75BA26CCB987723602787E922BA84421F22C3C89CB9B06FD60FE01941D
DD77FE6B12893DA76EEBC1D128D97F0678D7722B5341C8506F358214B16A2FAC4B36895038
7811C7DA33021500C773218C737EC8EE993B4F2DED30F48EDACE915F0281810082269009E1
4EC474BAF2932E69D3B1F18517AD9594184CCDFCEAE96EC4D5EF93133E84B47093C52B20CD
35D02492B3959EC6499625BC4FA5082E22C5B374E16DD00132CE71B020217091AC717B6123
91C76C1FB2E88317C1BD8171D41ECB83E210C03CC9B32E810561C21621C73D6DAAC028F4B1
585DA7F42519718CC9B09EEF0381840002818071810E8D5F8C3609D843DA2750E8E9ADAB69
58FDD3D827BBEE75344568A7E730FBD132712F53217F3F1C96B128246CDE826BC284224FA7
42A0E49B0C44645D731F5ADB53F4FA19920FABD1697ED9BC000A936FB23575A6C1F8389615
1954AD65FA22E95E33AE7C9FBEB36346845492266FF905B6B7AFD9F8A4DFD3DBB777DBAF
public-key-code end
peer-public-key end
#
return
(0)
最佳答案
display ip rou可以看到路由协议是什么,bgp的话,协议一列就是bgp,O_INTER为ospf的域内和域间路由,O_ASE是ospf的外部引入路由
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论