Solved

EBGP connection between cisco and juniper peers

Posted on 2009-07-09
5
622 Views
Last Modified: 2012-05-07
Can there be an ethernet connection between 2 EBGP peers. The ethernet connection will be made using a switch in between the routers. So I just wanted to know will it be technically correct or not?
Also please note that there are 2 scenarios like in one case the EBGP connection is between 1 cisco and 1 juniper router....and in another case the EBGP connection is between 2 cisco routers
0
Comment
Question by:shwaqar82
  • 4
5 Comments
 
LVL 23

Accepted Solution

by:
that1guy15 earned 500 total points
ID: 24818955
The only thing that defines an EBGP peer compaired to a IBGP is the AS number.

So if one router is in AS 100 and the other is in AS 200 (no matter the connection medium) then they share an EBGP peering
0
 
LVL 23

Expert Comment

by:that1guy15
ID: 24819046
To verify the peering run a "sh ip bgp" on your cisco router and check the last setting on each route and it will tell you if it is internal or external.

Also a sh ip bgp <ip address> will show more details about a specific neighbor
router#show ip bgp

BGP table version is 8, local router ID is 192.168.0.231

Status codes: s suppressed, d damped, h history, * valid, > best, i - internal,

r RIB-failure
 

Origin codes: i - IGP, e - EGP, ? - incomplete

Network		Next Hop 	Metric 	LocPrf 	Weight Path

*>i4.0.0.0 	100.2.4.4 	0 	100 	200 	400 i<<---ibgp peer

*>i5.0.0.0 	100.2.3.2 	0 	100 	0 	300 e<<---eBGP peer

Open in new window

0
 
LVL 23

Expert Comment

by:that1guy15
ID: 24824952
Did this answer your question?
0
 

Author Comment

by:shwaqar82
ID: 24832958
yes thanks
0
 
LVL 23

Expert Comment

by:that1guy15
ID: 24840631
Just a reminder...

dont forget to accept a solutions and close the question.

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction This article explores the design of a cache system that can improve the performance of a web site or web application.  The assumption is that the web site has many more “read” operations than “write” operations (this is commonly the ca…
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now