Connectivity Guide
4_OCTET_AS(65)
Prefixes accepted 3, Prefixes advertised 0
Connections established 1; dropped 0
Last reset never
For address family: IPv4 Unicast
Allow local AS number 0 times in AS-PATH attribute
Prefixes ignored due to:
Martian address 0, Our own AS in AS-PATH 0
Invalid Nexthop 0, Invalid AS-PATH length 0
Wellknown community 0, Locally originated 0
For address family: IPv6 Unicast
Allow local AS number 0 times in AS-PATH attribute
Local host: 3.1.1.3, Local port: 58633
Foreign host: 3.1.1.1, Foreign port: 179
Verify neighbor fall-over on peer-group
OS10# show running-configuration
!
router bgp 102
!
address-family ipv4 unicast
aggregate-address 6.1.0.0/16
!
neighbor 40.1.1.2
inherit template bgppg
no shutdown
!
neighbor 60.1.1.2
inherit template bgppg
no shutdown
!
neighbor 32.1.1.2
remote-as 100
no shutdown
!
template bgppg
fall-over
remote-as 102
!
Congure password
You can enable message digest 5 (MD5) authentication with a password on the TCP connection between two BGP neighbors.
Congure the same password on both BGP peers. When you congure MD5 authentication between two BGP peers, each segment of the
TCP connection is veried and the MD5 digest is checked on every segment sent on the TCP connection. Conguring a password for a
neighbor establishes a new connection.
NOTE
: You can secure the VTEP neighbor communications as well using the MD5 authentication.
Congure password
• Congure the password in both the BGP peers in ROUTER-NEIGHBOR CONFIGURATION or ROUTER-TEMPLATE CONFIGURATION
mode. The password provided in ROUTER-NEIGHBOR mode takes preference over the password in ROUTER-TEMPLATE mode. Enter
the password either as plain text or in encrypted format.
– password {9 encrypted password–string|password-string}
View password conguration
• show configuration
446
Layer 3