Solved

Loopback addresses and BGP

Posted on 2009-05-08
3
884 Views
Last Modified: 2012-05-06
I need a clarification to make is it correct to say that use of loopback interfaces as BGP source address is recommended since the loopback interface  unlike a physical Interface / subinterface does not go down . As such this reduces the flapping on the BGP tables in the network
0
Comment
Question by:sgknoc
3 Comments
 
LVL 43

Expert Comment

by:JFrederick29
ID: 24335961
Yes, assuming the router has multiple physical interfaces or paths to which the loopback can be reached.  If the router only has one physical interface or one path to it's neighbor(s), using a loopback doesn't provide any further stability.
0
 
LVL 10

Expert Comment

by:lanboyo
ID: 24335981
Well, certainly true on iBGP connections. eBGP requires connectivity to your peer, and usually this is on a single interface anyway.
0
 
LVL 1

Accepted Solution

by:
donnlee earned 500 total points
ID: 24342918
The following are best practices for BGP and addressing:
Case1: When configuring an iBGP session, use/configure the other router's loopback address.
Case2: When configuring an eBGP session, and there is only one link to the other router, use the other router's physical interface address (usually the address on the other side of the /30 or /31 link).
Case3: When configuring an eBGP session, and there are multiple links to the other router, use eBGP multihop and the other router's loopback address.

Because a router can have both iBGP and eBGP sessions, the above rules use the "other router" terminology.

All routers should be configured with a loopback address because IGPs (OSPF, IS-IS) will use that address for the router-id, and you almost always run BGP with an IGP.

I have been doing BGP for 14 years at Cisco and later at large Internet companies.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

In a WLAN, anything you broadcast over the air can be intercepted.  By default a wireless network is wide open to all until security is configured. Even when security is configured information can still be intercepted! It is very important that you …
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now