Solved

CISCO Router and Switch Loopback Address Problems

Posted on 2013-06-20
2
641 Views
Last Modified: 2013-06-23
I tried to seach the usage of Loopback address on the internet, and I noted that there are 3 main reasons for using configure Loopback address.
1. Router's management address
2. Dynamic Routing's router id
3. BGP establish TCP connection's source address

However, are there any risk is NOT configure lookback address? Or loopback address is forget to be configured.
0
Comment
Question by:mawingho
2 Comments
 
LVL 17

Accepted Solution

by:
TimotiSt earned 400 total points
ID: 39262076
There's no particular risk when not configuring them; they are just handy to have.
- management address can be any address on a router, just keep security considerations in mind (don't allow management from the internet, etc)
- router ID can be configured under the routing protocol
- eBGP usually (not always) uses the physical address, iBGP usually uses a loopback address (when assisted by an IGP, like OSPF)

If you don't run dynamic routing protocols, you can live happily without a loopback, if you run dynamic, it depends on your environment.

Tamas
0
 
LVL 7

Assisted Solution

by:avcontrol
avcontrol earned 100 total points
ID: 39266049
In general, all hardware should have 127.0.0.1 loopback..........
This way makes possible navigate through local file/directory.
Any others loopback, will serve in case of routing hardware purpose described by TimotiSt.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now