• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

MSR36-40 路由如何分辨路由是从OSPF获取的还是BGP获取?

2018-08-16提问
  • 0关注
  • 1收藏,1398浏览
粉丝:0人 关注:0人

问题描述:

一台MSR36-40路由,通过2M线接入对端路由,按接入方式要求,路由只能从OSPF获取,不允许从BGP获取。


现在对端反馈说是对端截获到了BGP协议,请问msr36-40  如何查看路由表是从OSPF 获取的,还是从BGP获取的?


本端路由配置如下:

<CQNA-DFSB.R1>dis cu

#

 version 7.1.059, Release 0304P15

#

 sysname CQNA-DFSB.R1

#

 clock timezone beijing add 08:00:00

#

ip vpn-instance vpn-nrt

 route-distinguisher 25513:2

 vpn-target 25513:2110 30000:802 20000:200 import-extcommunity

 vpn-target 25513:2110 25588:200 export-extcommunity

#

ip vpn-instance vpn-rt

 route-distinguisher 25513:1

 vpn-target 25513:1110 30000:801 20000:100 import-extcommunity

 vpn-target 25513:1110 25588:100 export-extcommunity

#

 router id 55.2.42.49

#

ospf 1

 area 0.0.0.3

  network 55.2.42.49 0.0.0.0

  network 55.3.74.192 0.0.0.3

  network 55.3.77.192 0.0.0.3

#

 mpls lsr-id 55.2.42.49

 mpls ttl propagate vpn

#

 password-recovery enable

#

vlan 1

#

traffic classifier c_vpn-nrt-in operator and

 if-match acl 2001

#

traffic classifier c_vpn-nrt-out operator and

 if-match mpls-exp 3

#

traffic classifier c_vpn-rt-in operator and

 if-match acl 2001

#

traffic classifier c_vpn-rt-out operator and

 if-match mpls-exp 4

#

traffic behavior b_vpn-nrt-in

 remark dscp af31

#             

traffic behavior b_vpn-nrt-out

 queue af bandwidth pct 30

#

traffic behavior b_vpn-rt-in

 remark dscp af41

#

traffic behavior b_vpn-rt-out

 queue af bandwidth pct 70

#

qos policy p_vpn-nrt-in

 classifier c_vpn-nrt-in behavior b_vpn-nrt-in

#

qos policy p_vpn-out

 classifier c_vpn-rt-out behavior b_vpn-rt-out

 classifier c_vpn-nrt-out behavior b_vpn-nrt-out

#

qos policy p_vpn-rt-in

 classifier c_vpn-rt-in behavior b_vpn-rt-in

#

mpls ldp

#

controller Cellular0/0

#             

controller Cellular0/1

#

interface Aux0

#

interface Serial3/0

 description DD2-DFSB1-2M

 fe1 unframed

 ip address 55.3.74.194 255.255.255.252

 ospf authentication-mode md5 1 cipher $c$3$WMl1Z2MYGKzrg92B0lKzs9TjtchL/gbDGA==

 mpls enable

 mpls ldp enable

 mpls ldp transport-address interface

#

interface Serial3/1

 shutdown

#

interface Serial4/0

 description BD2-DFSB1-2M

 fe1 unframed

 ip address 55.3.77.194 255.255.255.252

 ospf authentication-mode md5 1 cipher $c$3$SPqUzpH7rwULmfoA0+aGtTRiCntrDuoa4g==

 mpls enable

 mpls ldp enable

 mpls ldp transport-address interface

#

interface Serial4/1

 shutdown

#

interface NULL0

#

interface LoopBack0

 ip address 55.2.42.49 255.255.255.255

#

interface Ethernet2/0

 port link-mode bridge

 shutdown

#

interface Ethernet2/1

 port link-mode bridge

 shutdown

#

interface Ethernet2/2

 port link-mode bridge

 shutdown

#

interface Ethernet2/3

 port link-mode bridge

 shutdown

#

interface GigabitEthernet0/0

 port link-mode route

 description R1-S1

 combo enable copper

 ip binding vpn-instance vpn-rt

 ip address 55.110.32.126 255.255.255.128

#

interface GigabitEthernet0/1

 port link-mode route

 description R1-S2

 combo enable copper

 ip binding vpn-instance vpn-nrt

 ip address 55.111.32.126 255.255.255.128

#

interface GigabitEthernet0/2

 port link-mode route

 shutdown

#

bgp 25513

 group ibgp-peer internal

 peer ibgp-peer connect-interface LoopBack0

 peer 55.2.40.2 group ibgp-peer

 peer 55.2.40.5 group ibgp-peer

 #

 address-family ipv4 unicast

  import-route direct

  peer ibgp-peer enable

 #

 address-family vpnv4

  peer ibgp-peer enable

 #

 ip vpn-instance vpn-nrt

  #

  address-family ipv4 unicast

   import-route direct

 #

 ip vpn-instance vpn-rt

  #

  address-family ipv4 unicast

   import-route direct

#

 scheduler logfile size 16

#             

line class aux

 user-role network-admin

#

line class tty

 user-role network-operator

#

line class vty

 user-role network-operator

#

line aux 0

 authentication-mode scheme

 user-role level-15

 user-role network-admin

 idle-timeout 5 0

#

line vty 0 4

 authentication-mode scheme

 user-role level-15

 user-role network-admin

 protocol inbound ssh

 idle-timeout 5 0

#

line vty 5 63 

 user-role network-operator

#

 info-center loghost 55.254.13.1

#

 snmp-agent

 snmp-agent local-engineid 800063A280D461FE43CA2900000001

 snmp-agent community read CQEP-READ

 snmp-agent community write CQEP-WRITE

 snmp-agent sys-info version v3

 snmp-agent group v3 CQEP privacy read-view CQEP-READ write-view CQEP-WRITE notify-view CQEP-READ

 snmp-agent target-host trap address udp-domain 55.254.13.1 params securityname CQEP-READ

 snmp-agent mib-view included CQEP-READ iso

 snmp-agent mib-view included CQEP-WRITE iso

 snmp-agent usm-user v3 cqdl CQEP cipher authentication-mode sha $c$3$zUJ3vlz2/td/QKfBkBlH7tD5YyNV1GTTzikvWCMGN2iTISyS3cw= privacy-mode des56 $c$3$5xdVHLv69qIpcvayjR45JyTa3TcB7YtLUIIxSqEryG0clg==

 snmp-agent trap source LoopBack0

#

 ssh server enable

 ssh user cqdl-ssh service-type stelnet authentication-type password

#

 ntp-service unicast-server 55.2.40.2

 ntp-service unicast-server 55.2.40.5

#

acl basic 2001

 rule 0 permit source 55.254.13.0 0.0.0.255

 rule 5 permit source 55.3.0.0 0.0.255.255

#

domain system

#

 domain default enable system

#

role name level-0

 description Predefined level-0 role

#

role name level-1

 description Predefined level-1 role

#

role name level-2

 description Predefined level-2 role

#

role name level-3

 description Predefined level-3 role

#

role name level-4

 description Predefined level-4 role

#

role name level-5

 description Predefined level-5 role

#

role name level-6

 description Predefined level-6 role

#

role name level-7

 description Predefined level-7 role

#

role name level-8

 description Predefined level-8 role

#

role name level-9

 description Predefined level-9 role

#

role name level-10

 description Predefined level-10 role

#

role name level-11

 description Predefined level-11 role

#

role name level-12

 description Predefined level-12 role

#             

role name level-13

 description Predefined level-13 role

#

role name level-14

 description Predefined level-14 role

#

user-group system

#

local-user cqdl-con class manage

 password hash $h$6$spxLOTDn+b99u2k4$bhcSm9KNOfjxbcw5Qwk5BN31nDwXR0W8KQ0S3jDTP1qtctEmG2Dv5iWhCIOBKxtkyRgbmvE0uEiVpGOHbsFaww==

 service-type terminal

 authorization-attribute user-role level-15

 authorization-attribute user-role network-admin

#

local-user cqdl-ssh class manage

 password hash $h$6$UvnTyFOktg0s5tvl$yJy5divtM8HQ+lMxC+mqKSO6O4N22ItRByP/3memdCgJFOT+DkeYI8IMgICHHQRk0872PV5tpn6Si9b7pFYYlA==

 service-type ssh

 authorization-attribute user-role level-15

 authorization-attribute user-role network-admin

#

public-key peer 55.110.32.124

 public-key-code begin

   308201B73082012C06072A8648CE3804013082011F02818100D757262C4584C44C211F18BD

   96E5F061C4F0A423F7FE6B6B85B34CEF72CE14A0D3A5222FE08CECE65BE6C265854889DC1E

   DBD13EC8B274DA9F75BA26CCB987723602787E922BA84421F22C3C89CB9B06FD60FE01941D

   DD77FE6B12893DA76EEBC1D128D97F0678D7722B5341C8506F358214B16A2FAC4B36895038

   7811C7DA33021500C773218C737EC8EE993B4F2DED30F48EDACE915F0281810082269009E1

   4EC474BAF2932E69D3B1F18517AD9594184CCDFCEAE96EC4D5EF93133E84B47093C52B20CD

   35D02492B3959EC6499625BC4FA5082E22C5B374E16DD00132CE71B020217091AC717B6123

   91C76C1FB2E88317C1BD8171D41ECB83E210C03CC9B32E810561C21621C73D6DAAC028F4B1

   585DA7F42519718CC9B09EEF0381840002818071810E8D5F8C3609D843DA2750E8E9ADAB69

   58FDD3D827BBEE75344568A7E730FBD132712F53217F3F1C96B128246CDE826BC284224FA7

   42A0E49B0C44645D731F5ADB53F4FA19920FABD1697ED9BC000A936FB23575A6C1F8389615

   1954AD65FA22E95E33AE7C9FBEB36346845492266FF905B6B7AFD9F8A4DFD3DBB777DBAF

 public-key-code end

 peer-public-key end

#

return

最佳答案

display ip rou可以看到路由协议是什么,bgp的话,协议一列就是bgp,O_INTER为ospf的域内和域间路由,O_ASE是ospf的外部引入路由

暂无评论

0 个回答

该问题暂时没有网友解答

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明