Tags: ,


Forum Replies

  1. Hi Rene,

    thanks a lot for your helpful explanation, I simulated your lab and found something that I need your explanation for it.

    when I leaked 8.8.8.8 at R4, R2 calculated the metric of 8.8.8.8 with 168 as below:

    R2#sh ip route isis 1
          8.0.0.0/32 is subnetted, 1 subnets
    i ia     8.8.8.8 [115/168] via 192.168.24.4, 00:14:47, Ethernet0/2
    

    although R4 calculated it with 30 :

    R4#sh ip route isis
          8.0.0.0/32 is subnetted, 1 subnets
    i L2     8.8.8.8 [115/30] via 192.168.47.7, 00:50:55, Ethernet0/1
    

    the metric calculated with 40 at R2 when I configured the

    ... Continue reading in our forum

  2. Hi Walid,

    That’s a good question. I just booted this topology again and I see a metric of 40 on R2:

    R2#show ip route isis                         
    
    Gateway of last resort is 192.168.24.4 to network 0.0.0.0
    
    i*L1  0.0.0.0/0 [115/10] via 192.168.24.4, 00:14:23, GigabitEthernet0/2
          8.0.0.0/32 is subnetted, 1 subnets
    i ia     8.8.8.8 [115/40] via 192.168.24.4, 00:14:23, GigabitEthernet0/2
    i L1  192.168.13.0/24 [115/20] via 192.168.12.1, 00:15:16, GigabitEthernet0/1
    i L1  192.168.35.0/24 [115/30] via 192.168.12.1, 00:15:10, GigabitEthernet0/1
    i L1  192.168.47.0
    ... Continue reading in our forum

  3. Hi Rene,

    R1#traceroute 8.8.8.8 

    this command result:

    R1 uses R3

    Why do you write:

    R1 uses R2

  4. When do we use route map and distribute list ?? What are the peculiarities of both?? Can you please distinguish between access list and prefix list also??

  5. Hello Stuat

    Thanks for picking this up. You’re not being picky at all, we appreciate you bringing these things to our attention!

    Laz

5 more replies! Ask a question or join the discussion by visiting our Community Forum