as 32 LDP loopback interface work

HI guys

why we need dos interface loop so that / 32 mask LDP work

Thank you

Hello, Ibrahim.

LDP can also work with no/32 mask on telesignalisations but when the IGP's OSPF in a loopback configuration that must be

int loop0

IP ospf network point

Only in this way OSPF announces the subnet mask true of the loop. By default, OSPF recognizes a loopback and announced only a host 32 route.

However, the real reason why we use / 32 telesignalisations on networks of service providers is another and saving address space.

The only sense of the loopback address must represent the single node/p PE in the IGP and the MPLS network.

To host 32 channels are enough.

Also the use of 32 telesignalisations allow you to select a block of specific address for all current and future network nodes.

In large provider networks MPLS LDP is implemented with label filtering: This means that labels are allocated and announced only for loopback addresses (thanks to the fact that they are / 32 belonging to the same address space).

This is done for scalability, in order to avoid affecting MPLS labels to prefixes not loopback IP.

In these networks of suppliers all users associated prefixes either in a form of VPN (L3 or L2) or simply routed on the global routing table is announced by MP BGP internally.

By induction that the BGP next hop is solved by an LSP with a destination = distance PE loopback.

If indeed the ultimate reason to use 32 telesignalisations is scalability.

Hope to help

Giuseppe

Tags: Cisco Network

Similar Questions

  • Ping the loopback interface fails - general failure - all windows 7 Networking fails

    Hello, I am looking for advice on the following question:

    1 ping the loopback interface fails general failure - ping 127.0.0.1-
    2 netsh winsock reset - does not work - the system cannot find the specified file
    3. the wireless interface detects the network but remains in limited access and never receives any dhcp server ip address, other wireless devices work correctly.

    Hello

    I suggest you follow the steps below:

    Method 1:

    a. click on Start -> all programs -> Accessories

    b. right-click on command prompt and select run as administrator.

    c. type ipconfig/flushdns and enter.

    Method 2:

    Reset internet protocol follow the steps described in the article below:

    http://support.Microsoft.com/kb/299357

    Method 3:

    If the steps above fail, follow the steps in the link below:

    http://TechNet.Microsoft.com/en-us/library/cc757819 (WS.10) .aspx

    I hope this helps.

  • Crypto applied on the loopback interface

    Hello

    Here's one of our 2811 router config, we applied crypto on the loopback interface, but its does not work. Can you review the cofig and let us know the suggesstion as elsewhere where we can apply crypto map to VPN to work.

    site #sh run

    Building configuration...

    Current configuration: 5956 bytes

    !

    version 12.4

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    encryption password service

    !

    Site host name

    !

    boot-start-marker

    boot-end-marker

    !

    enable secret cisco

    !

    No aaa new-model

    !

    resources policy

    !

    iomem 25 memory size

    clock timezone IS - 5

    clock to summer time EDT recurring

    No network-clock-participate wic 2

    No network-clock-participate wic 3

    IP subnet zero

    !

    !

    IP cef

    No dhcp use connected vrf ip

    !

    controller T1 2/0/0

    framing ESF

    linecode b8zs

    CableLength short-133

    slots of channel-group 0 1 - 24

    !

    controller T1 0/2/1

    framing ESF

    linecode b8zs

    CableLength short-133

    slots of channel-group 0 1 - 24

    !

    controller T1 3/0/0

    framing ESF

    linecode b8zs

    CableLength short-133

    slots of channel-group 0 1 - 24

    !

    controller T1 3/0/1

    framing ESF

    linecode b8zs

    CableLength short-133

    slots of channel-group 0 1 - 24

    !

    !

    crypto ISAKMP policy 1

    BA 3des

    md5 hash

    preshared authentication

    Group 2

    lifetime 28800

    ISAKMP crypto key wsld0829 address 66.78.246.175

    !

    !

    Crypto ipsec transform-set esp-3des esp-md5-hmac rtpset

    !

    RTP 10 ipsec-isakmp crypto map

    defined by peer 66.78.246.175

    Set transform-set rtpset

    match address 110

    !

    !

    !

    interface Loopback0

    Description * IP address links multiple serial lines *.

    IP 168.88.110.200 255.255.255.252

    crypto rtp map

    !

    interface Serial0/0/0

    Description * Sprint HCGS/987682 / / LB *.

    no ip address

    encapsulation ppp

    no fair queue

    pulse-time 1

    multilink PPP Panel

    crypto rtp map

    !

    interface Serial0/1/0

    Description * Sprint HCGS/987683 / / LB *.

    no ip address

    Check IP unicast reverse path

    no ip redirection

    no ip unreachable

    encapsulation ppp

    no fair queue

    pulse-time 1

    multilink PPP Panel

    !

    interface Serial0/2/0:0

    no ip address

    Check IP unicast reverse path

    no ip redirection

    no ip unreachable

    encapsulation ppp

    no fair queue

    pulse-time 1

    multilink PPP Panel

    crypto rtp map

    !

    interface Serial0/2/1:0

    no ip address

    Check IP unicast reverse path

    no ip redirection

    no ip unreachable

    encapsulation ppp

    no fair queue

    pulse-time 1

    multilink PPP Panel

    crypto rtp map

    !

    interface Serial0/3/0:0

    no ip address

    Check IP unicast reverse path

    no ip redirection

    no ip unreachable

    encapsulation ppp

    Shutdown

    no fair queue

    pulse-time 1

    multilink PPP Panel

    !

    interface Serial0/3/1:0

    no ip address

    Check IP unicast reverse path

    no ip redirection

    no ip unreachable

    encapsulation ppp

    Shutdown

    no fair queue

    pulse-time 1

    multilink PPP Panel

    !

    interface virtual-Template1

    IP unnumbered Loopback0

    multilink PPP Panel

    !

    IP classless

    IP route 0.0.0.0 0.0.0.0 160.81.110.209

    IP route 200.3.201.0 255.255.255.0 207.40.33.100

    IP route 203.13.189.0 255.255.255.0 207.40.33.100

    !

    IP http server

    no ip http secure server

    !

    Note access-list 110 Tunnel ACL

    access-list 110 note authorization router loopback

    access-list 110 permit ip 168.88.110.200 host 67.210.111.204 0.0.0.15

    access-list 110 note IP3 allowing

    access-list 110 permit ip 207.41.32.106 host 65.210.126.240 0.0.0.15

    access-110 note peripheral authorization

    access-list 110 permit ip 208.3.187.0 0.0.0.15 65.210.126.240 0.0.0.15

    access-list 110 permit ip 208.3.187.16 0.0.0.7 65.210.126.240 0.0.0.15

    access-list 110 permit ip 208.3.187.24 0.0.0.1 65.210.126.240 0.0.0.15

    Dialer-list 1 ip protocol allow

    !

    !

    control plan

    !

    !

    Line con 0

    line to 0

    line vty 0 4

    Cisco password

    local connection

    !

    end

    Your suggestion will be highly appreciated.

    Kind regards

    Khan

    1: try to add the following command in your router.

    Panel MultiLink virtual-model 1

    2: set 'crypt map rtp' command in virtual model 1 void-configuation.

    3: remove 'crypt map rtp' command of all the interface configuration and closure of the serial interface.

    4: highly recommended to remove the following command from each serial interface.

    Check IP unicast reverse path

    5: If still does not work, apply new 'crypt card rtp"command in all interfaces of Seraglio under configuration.

    Jerry

  • Using Loopback Interface as Source GRE/IPSec tunnel

    Hi all:

    I need one to spend a working router to router VPN tunnel using an IP WAN IP interface loopback as a source.  I am able to ping the loopback from the other router.  As soon as I change the source of tunnel to use the loopback IP address, change the encryption ACL map, and move the cryptographic card of the WAN interface to the loopback interface, the tunnel will not come to the top.  If I remove all the crypto config, the tunnel comes up fine as just a GRE tunnel.  On the other router, I see the message that says that's not encrypting the traffic below.

    * 00:10:33.515 Mar 1: % CRYPTO-4-RECVD_PKT_NOT_IPSEC: Rec'd package not an IPSEC packet. (ip) vrf/adr_dest = 192.168.0.1, src_addr = 192.168.1.2, prot = 47

    What Miss me?  Is there something else that needs to be done to use the closure of a GRE/IPSec tunnel?

    I have install below config in the laboratory to see if I can get it even work in a non-production environment.

    R1 WAN IP: 192.168.0.1

    R2 WAN IP: 192.168.0.2

    R2 Closure: 192.168.1.2

    hostname R2

    !

    crypto ISAKMP policy 1

    BA 3des

    md5 hash

    preshared authentication

    Group 2

    ISAKMP crypto key abc123 address 192.168.0.1

    !

    Crypto ipsec transform-set esp-3des esp-md5-hmac T1

    transport mode

    !

    crypto map 1 VPN ipsec-isakmp

    Description remote control

    defined peer 192.168.0.1

    game of transformation-T1

    match address VPN1

    !

    interface Loopback0

    IP 192.168.1.2 255.255.255.255

    VPN crypto card

    !

    Tunnel1 interface

    IP 172.30.240.2 255.255.255.252

    IP mtu 1440

    KeepAlive 10 3

    tunnel source 192.168.1.2

    tunnel destination 192.168.0.1

    VPN crypto card

    !

    interface FastEthernet0

    IP 192.168.0.2 255.255.255.0

    !

    VPN1 extended IP access list

    allow ACCORD 192.168.1.2 host 192.168.0.1

    you have tried to add "card crypto VPN 1 - address Loopback0".

  • Use BGP to Loopback interfaces

    Hello

    have seen it several times this loopback interfaces are used to iBGP routers to connect nearby instead of direct physical interface.

    Is this done bacuase Loopback interfaces are still rising (but then I wonder if the physical/link interface breaks down is not the same result!) it also means that a PGI like OSPF or EIGRP must be running to provide communication between the loopback interfaces which is necessary to establish an iBGP connectivity?

    Thank you

    Hello

    If you use a loop or a physical interface will always require you an IGP with IBGP because is not a routing protocol is a transport L4 so the IGP Protocol it informs how stands as the BGP has no idea who he IGP is necessary

    Interns are selected for IBGP because it there once so the IGP has always a looping path the IBGP session will stay up, don't not necessary in EBGP as usually only 1 way between 2 points

  • Cisco easy VPN + loopback interface. static ip address for the client

    Good day people.

    I have a couple a question and answer on which I can't google for a period. BTW I maybe simly use bad aproach to choose keywords.

    Thus,.

    (1) is it possible to assign the same IP to the same customer every time that it authenticated, preferably without using DHCP? Definely im sure it is possible, but can't find match configuration examples (my camera's 1921 Cisco IOS 15.0.1).

    (2) is it possible to assign the dynamic crypto map to the loopback interface (to make EASY VPN Server accessible through two interfaces - maybe you recommend another approach instead?) - that I move the map workingcrypto of int phy loopback - I can not connect with reason "SA Phace1 policy proposal" not accepted

    Hello

    (1) you can attach to the same IP to the same username using RADIUS

    (2) If you have 2 outside interfaces

    Then, you would use

    mymap-address loop0 crypto card

    int gig0/0

    crypto mymap map

    int g0/1

    cryptp map mymap

    By doing so, the local address would actually be the loop0 but Cryptography card HAS to be applied on physical output interfaces

    See you soon

    OLivier

  • address of the loopback interface or sencondary in ASA

    I have a problem with Server Load balancing feature for firewall load balancing. If want to achieve this, we create an address of the loopback interface or secondary ip address in TWO firewalls (ASA). using hurried SLB mode... Can anyone suggest how this can be accomplished.

    Loopback interface cannot be configured on SAA. For load balancing on refer to the URL

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00805fda25.shtml

  • Web interface works is not the well-known address of management

    TLDR:

    • opening webinterface on ip management group-> does not work / ping
    • opening webinterface on eql management ip-> works
    • opening webinterface on ip management group-> suddenly done work
    • Why?

    Yesterday I've updated SanHQ of 2.2 to 3.0.1 to prepare to run the path to upgrade to FW 7.x. Since yesterday, I get the following warning:

    [ID: 1.6] The eql-grp01 group has been added using non well known address (MWKA). Delete and add the group using the well-known address of management of group 172.16.0.9.

    The eql-grp01 group contains a single EQL (eql01 / 172.16.3.15) and has a dedicated management port. The beach is a 16, as such, both the IP and IP management EQL management group are in the same network (again).

    I'm able to reach the Web interface of eql01 on 172.16.3.15 without problems for years. Try to reach the Web interface on 172.16.0.9 has always given problems (timeout, ping works however) until I asked the Web interface on 172.16.3.15, after that, I can reach the Web interface without problems on 172.16.0.9.

    Up until now I did not worth to look into it, but as I'll be add another Member to the group within a few weeks and SanHQ's "tenacious" on do not use well-known management IP address I have tought I might give it a try here, maybe it's the behavior?

    Edit: Adjusted the subject as non-MWKA does not work but the MWKA (submits sugested otherwise)

    OK, you need remove the SANHQ and add in it through the Well Known management address.

    I don't know why he first had to go to the Member port Mgmt vs being able to use the IP alias for group management.

    That's all the management IP address is, like the IP address of the ISCSI discovery.  It is a superior a physical port IP alias.   So if you can reach the Member IP address, you will have no problem reaching the alias.

    Maybe something on your network, or the ARP table has not been updated.

  • The 'cluster of error code.vi error' will be based on the RT 'Dialogue & User Interface' work as expected in a RT application palette?

    The 'cluster of error code.vi error' is available to be included in an application of the RT, but it contains a 'FP. Node Title property"VI and a RT application contains all of the panels before, except when running in debug mode. This vi.lib VI will work properly in an application of the RT running on a cRIO?

    The Cluster error error Code VI works fine on the objectives of the RT, but the behavior is slightly different when the appellant VI has a front title which differs by its qualified name.  Note that there is a selection function that checks the mistakes coming out of the public Service. Node title.  If there is no title of façade, then simply will use name of the VI instead, so this VI certainly works on RT.

    Keep in mind that opening a VI reference and a property of reading is relatively a lot of time, so there is a significant performance impact when you call this VI on RT.  This attention to performance has been reported to R & D in 384767 car, but it can usually be avoided by ensuring to call only this VI when there is an error that must be reported to the user.

    Chris M

  • Stopped Printer Status window Interface - work

    Print 3 times then I get this message. I have restart computer, ptint 3 times and repeat the process. I have a Lexmark 8350 AIO. I uninstalled, run the tool cleanp Lexmark and re-installed new drivers from Lexmark. I thought that it is strictly a matter of Vista. How should I do?

    Hello
     
    Microsoft has an automatic convenience store to find and correct the mistakes of the printer. To download and run the automatic troubleshooting utility, visit the following link and click on the "Run now" button and follow the instructions in the wizard to run the tool.

    Printing problems and printing errors: http://support.microsoft.com/gp/printing_problems
     
    Try the steps and post back with the results, so that we can help you further.
     
    Kind regards
    Syed
    Answers from Microsoft supports the engineer.
  • Loopback Interface client endpoint VPN Site

    My project consists of 871 router connected to the router soho 3845 network head on the MPLS network unencrypted for data communication. For the Client PC behind router 871 on remote site, they need activate the Cisco VPN client and connect to headend 3845 so that they can access information behind the main switch 6506.

    To reduce to a minimum the installation, I would like to prepare a unique VPN profile for all remote controls. So, I plan on using lo0 int for the VPN endpoint. However, I have found that when the VPN connection is in place on the int lo0, the remote client computer can 'ping' lo0 only, but can not 'ping' all other IP addresses. However, when I set up the connection to the IP address on router 3845, the connection is ok.

    I have attached my config for the VPN and the diagram. Can anyone help?

    Hello

    You need to change your ACL split tunnel:

    FEHD_VPN extended IP access list

    Note * outbound VPN client traffic *.

    IP 10.0.0.0 allow 0.255.255.255 10.65.215.0 0.0.0.255

    Note: Do not know what is the purpose of "allowed host ip host 0.0.0.0 0.0.0.0.

  • 64 bit I don't no-interface works guard pushing 64-bit

    Try to download the 32-bit version

    Please let me know what OS are you using.

    Illustrator CS6 supports Windows 32 - bit and 64 - bit OS, but supports 64-bit only for Mac OS operating systems. Refer to the Illustrator CS6 system requirements to make sure that your computer meets the minimum requirements.

  • Maximum number of interfaces loopback on a 3560-8PC-S or a 2960TC-8-L

    Dear community,

    our application monitoring engineer must be able to ping of thousands of IP addresses and we decided to offer the following solution: a port of 8 Cisco switch central as a 3560-8PC-S or a 2960TC-8-L.

    The problem we now face is that only up to 64 Interfaces loopback (0-63) could be created. It is not possible to create a with the value num 64 or higher loopback Interface. Any ideas we could do to fix this?

    We lack IOS 12.2 (55) EX2. Singularly, 0-2147483647 is offered when enter you the loopback Interface?  but the fact is that we cannot produce a loopback Interface 64 or higher.

    Switch (config) #int lo?
      <0-2147483647>Number of the loopback interface

    Thanks a lot and best regards,

    Thorsten

    Just test it on a WS-C3560-8PC with SE5 IPServices 15.0 (2), and also where it stopped after 64 telesignalisations.

    What about a small Linux PC for this?

  • CISCO 3750: OSPF interface IP unnumbered

    Hi Expert,

    This is the first time that I'm working on OSPF and IP Unnumbered interfaces.

    My task is to adjacencies OSPF put forward two switches CISCO 3750 connected back-to-back by IP of interfaces not numbered. I use the loopback interface to borrow the IP addresses for the interfaces not numbered on both CISCO switches. After trying so many times, OSPF is not at all to come through Unnumbered interfaces but when tried with numbered interface was fine.

    I'm pasting here complete running-config. Please help me to solve the problem:

    Here is the brief info put in place:

    R1(Gi1/0/19) - R (article gi1/0/19)

    Swicth R1:

    ===========

    Current configuration: 2129 bytes

    !

    version 12.2

    no service button

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    no password encryption service

    !

    Switch host name

    !

    boot-start-marker

    boot-end-marker

    !

    !

    No aaa new-model

    1 supply ws-c3750g-24ts-1u switch

    mtu 1500 routing system

    IP subnet zero

    IP routing

    !

    !

    !

    !

    !

    !

    !

    !

    !

    !

    pvst spanning-tree mode

    spanning tree extend id-system

    !

    internal allocation policy of VLAN ascendant

    !

    !

    !

    !

    interface Loopback1

    IP 10.10.10.10 address 255.255.255.0

    !

    GigabitEthernet1/0/1 interface

    Shutdown

    !

    interface GigabitEthernet1/0/2

    Shutdown

    !

    interface GigabitEthernet1/0/3

    Shutdown

    !

    interface GigabitEthernet1/0/4

    Shutdown

    !

    interface GigabitEthernet1/0/5

    Shutdown

    !

    interface GigabitEthernet1/0/6

    Shutdown

    !

    interface GigabitEthernet1/0/7

    Shutdown

    !

    interface GigabitEthernet1/0/8

    Shutdown

    !

    interface GigabitEthernet1/0/9

    Shutdown

    !

    interface GigabitEthernet1/0/10

    Shutdown

    !

    interface GigabitEthernet1/0/11

    Shutdown

    !

    interface GigabitEthernet1/0/12

    Shutdown

    !

    interface GigabitEthernet1/0/13

    Shutdown

    !

    interface GigabitEthernet1/0/14

    Shutdown

    !

    interface GigabitEthernet1/0/15

    Shutdown

    !

    interface GigabitEthernet1/0/16

    Shutdown

    !

    interface GigabitEthernet1/0/17

    !

    interface GigabitEthernet1/0/18

    Shutdown

    !

    interface GigabitEthernet1/0/19

    No switchport

    IP unnumbered Loopback1

    IP ospf network point

    !

    interface GigabitEthernet1/0/20

    Shutdown

    !

    interface GigabitEthernet1/0/21

    Shutdown

    !

    interface GigabitEthernet1/0/22

    Shutdown

    !

    interface GigabitEthernet1/0/23

    Shutdown

    !

    interface GigabitEthernet1/0/24

    Shutdown

    !

    interface GigabitEthernet1/0/25

    !

    interface GigabitEthernet1/0/26

    !

    interface GigabitEthernet1/0/27

    !

    interface GigabitEthernet1/0/28

    !

    interface Vlan1

    no ip address

    Shutdown

    !

    router ospf 100

    router ID - 100.100.100.100

    Log-adjacency-changes

    Network 10.10.10.0 0.0.0.255 area 0

    !

    IP classless

    IP route 20.20.20.20 255.255.255.255 GigabitEthernet1/0/19

    IP http server

    IP http secure server

    !

    !

    !

    control plan

    !

    !

    Line con 0

    line vty 5 15

    !

    !

    control the source session interface 1 item in gi1/0/19

    control interface of destination session 1 item in gi1/0/17

    end

    ===

    The #show switch ip interface brief | include the

    The #show switch ip interface brief | include the

    GigabitEthernet1/0/17 no undefined upward down YES

    GigabitEthernet1/0/19 10.10.10.10 YES manual up up

    Loopback1 10.10.10.10 YES manual up up

    ==================================================

    Switch R2:

    ==================

    Switch #sho run

    Switch #sho running-config

    Building configuration...

    Current configuration: 2079 bytes

    !

    version 12.2

    no service button

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    no password encryption service

    !

    Switch host name

    !

    boot-start-marker

    boot-end-marker

    !

    !

    !

    !

    No aaa new-model

    switch 1 supply ws-c3750g-24 t

    mtu 1500 routing system

    allow authentication mac-move

    IP subnet zero

    IP routing

    !

    !

    !

    !

    !

    !

    !

    !

    pvst spanning-tree mode

    spanning tree etherchannel guard misconfig

    spanning tree extend id-system

    !

    internal allocation policy of VLAN ascendant

    !

    !

    !

    !

    interface Loopback1

    IP 20.20.20.20 255.255.255.0

    !

    GigabitEthernet1/0/1 interface

    Shutdown

    !

    interface GigabitEthernet1/0/2

    Shutdown

    !

    interface GigabitEthernet1/0/3

    Shutdown

    !

    interface GigabitEthernet1/0/4

    Shutdown

    !

    interface GigabitEthernet1/0/5

    Shutdown

    !

    interface GigabitEthernet1/0/6

    Shutdown

    !

    interface GigabitEthernet1/0/7

    Shutdown

    !

    interface GigabitEthernet1/0/8

    Shutdown

    !

    interface GigabitEthernet1/0/9

    Shutdown

    !

    interface GigabitEthernet1/0/10

    Shutdown

    !

    interface GigabitEthernet1/0/11

    Shutdown

    !

    interface GigabitEthernet1/0/12

    Shutdown

    !

    interface GigabitEthernet1/0/13

    Shutdown

    !

    interface GigabitEthernet1/0/14

    Shutdown

    !

    interface GigabitEthernet1/0/15

    Shutdown

    !

    interface GigabitEthernet1/0/16

    Shutdown

    !

    interface GigabitEthernet1/0/17

    !

    interface GigabitEthernet1/0/18

    Shutdown

    !

    interface GigabitEthernet1/0/19

    No switchport

    IP unnumbered Loopback1

    IP ospf network point

    !

    interface GigabitEthernet1/0/20

    Shutdown

    !

    interface GigabitEthernet1/0/21

    Shutdown

    !

    interface GigabitEthernet1/0/22

    Shutdown

    !

    interface GigabitEthernet1/0/23

    Shutdown

    !

    interface GigabitEthernet1/0/24

    Shutdown

    !

    interface Vlan1

    no ip address

    Shutdown

    !

    router ospf 100

    router ID - 200.200.200.200

    Log-adjacency-changes

    network 20.20.20.0 0.0.0.255 area 0

    !

    IP classless

    Route IP 10.10.10.10 255.255.255.255 GigabitEthernet1/0/19

    IP http server

    IP http secure server

    !

    !

    activate the IP sla response alerts

    !

    !

    !

    Line con 0

    line vty 5 15

    !

    !

    control the source session interface 1 item in gi1/0/19

    control interface of destination session 1 item in gi1/0/17

    end

    ====================

    The #sho switch ip interface brief | include the

    GigabitEthernet1/0/17 no undefined upward down YES

    20.20.20.20 GigabitEthernet1/0/19 YES manual up up

    Loopback1 20.20.20.20 YES manual up up

    ====================================

    Thank you very much in advance for your answer!

    Kind regards

    Aerts

    Hi AEK.

    the IP unnumbered command does not work on multiaccess-interfaces such as Ethernet (even when you set it up as a point-to-point OSPF):

    Understand and configure the IP without order number

    Cisco IOS IP Addressing Services Command Reference #ip unnumberd

    HTH

    Rolf

    [EDIT]:

    ... apparently, with the exception of high range as the 6 k platforms:

    Order history

    (...)

    12.2 (18) SXF: this command has been modified to support the physical Ethernet interfaces and switched virtual interfaces (LASS).

  • Using the loopback address to identify the IPsec peer

    I have two IOS routers and you want to use the loopback address on the remote router as address such peer recommended in documents such as "Configuration with EIGRP and IPX using GRE Tunneling IPSec."

    On the local router, I identify the remote router via its address and loopback on the remote router, I configure crypto MYMAP map interface S0/0 and BRI1/0 (with nothing configured on the other than the IP address loopback interface)

    When I establish an IPsec tunnel from the remote router, it uses the interface S0/0 as its source address.

    I tried to configure card crypto MYMAP on loopback0 instead of BRI1/0 and S0/0, but it did not work.

    How can I get the remote router to use as source address loopback address?

    Thanks in advance for any help offered.

    Try to use the "crypto-loopback address 0.

    -Dembélé

Maybe you are looking for