As a follow up to the VPN tunnel between Cisco and VyOS routers using VTIs post, let’s see a different scenario where the VyOS router is on a private network behind a firewall that provides NAT; for example hosted a cloud network.
Creating VPN tunnels between different vendors is usually at the bottom of a networker’s list of desires, however sometimes it can’t be avoided. We’re connecting a Cisco router to a VyOS one, and make them exchange routing information using OSPF.
“It’s fine to have a backup link, but normally it’s not used and we’re paying a lot for it; could you send our file storage’s replication traffic through it?
“It’s fine to have a backup link, but normally it’s not used and we’re paying a lot for it; could you send our file storage’s replication traffic through it?
“It’s fine to have a backup link, but normally it’s not used and we’re paying a lot for it; could you send our file storage’s replication traffic through it?
Cisco’s OSPF path selection, that is different from RFC 2328 and 3101, has been discussed in many articles (here’s a nice one from INE). I was wondering how VyOS, running Quagga, handles the same prefixes received with different LSAs.