Configuring Internal BGP in Gaia Clish
Use these commands to configure internal BGP sessions (between routers within the same autonomous system).
Syntax
|
|
Parameters
Parameter |
Description |
||
---|---|---|---|
|
Enable or disable an internal BGP group. |
||
|
Optional: A brief text description of the group. |
||
|
Defines the Multi-Exit Discriminator (MED) metric used when advertising routes to all peers in this group. If no value is specified, then no metric is propagated. Any metric configured in redistribution policy for this peer group will override the value configured here. Default: No MED is advertised |
||
|
Configures or disables the amount of time in seconds that a route must be present in the routing database before it is redistributed to BGP. The configured value applies to all peers configured in this group. This feature dampens route fluctuation. Default: 0 (means that this feature is disabled) |
||
|
This router sends one of its own IP addresses as the BGP next hop. Default: |
||
|
The address used on the local end of the TCP connection with the peer. For external peers that do not have multihop enabled, the local address must be on an interface that is shared with the peer or with the peer's gateway when the gateway parameter is used. A session with an external peer is opened only when an interface with a local address through which the peer or gateway address is directly reachable operates. For other types of peers, a peer session is maintained when any interface with the specified local address operates. In both cases, incoming connections are recognized as matching a configured peer only if they are addressed to the configured local address. Default:
|
||
|
Enable or disable the specified internal peer group on all interfaces or a specific interface. |
||
|
Enable or disable all internal routing protocols on the specified internal peer group or specific internal protocols. You can enter the following specific internal protocols: |
||
|
Specifies if this is a Route Reflector client.
|
||
|
The weight associated with the specified peer. BGP implicitly stores any rejected routes by not mentioning them in a route filter. BGP explicitly mentions them within the routing table by using a restrict keyword with a negative weight. A negative weight prevents a route from becoming active, which prevents it from being installed in the forwarding table or exported to other protocols. This eliminates the need to break and reestablish a session upon reconfiguration if import route policy is changed. |
||
|
Disables the weight associated with the specified peer. |
||
|
The router's aggregate attribute as zero (rather than the router ID value). This option prevents different routers in an AS from creating aggregate routes with different AS paths. Default: |
||
|
The BGP holdtime interval, in seconds, when negotiating a connection with the specified peer. If the BGP speaker does not receive a keepalive update or notification message from its peer within the period specified in the holdtime field of the BGP open message, the BGP connection is closed. |
||
|
A holdtime of 180 seconds. |
||
|
The keepalive option is an alternative way to specify a holdtime value in seconds when negotiating a connection with the specified peer. You can use the keepalive interval instead of the holdtime interval. You can also use both interval, but the holdtime value must be 3 times the keepalive interval value. |
||
|
A keepalive interval of 60 seconds. |
||
|
Ignore the first autonomous system number in the autonomous system path for routes learned from the corresponding peer.
|
||
|
This router always sends keepalive messages even when an update message is sufficient. This option allows interoperability with routers that do not strictly adhere to protocol specifications regarding update. |
||
|
The router dynamically request BGP route updates from peers or respond to requests for BGP route updates. |
||
|
An inbound BGP policy route if one is not already configured. Enter " Depending on the local inbound route policy, these routes are then made active or inactive. |
||
|
An inbound BGP policy route if one is not already configured. Enter " This option saves memory overhead when many routes are rejected because no inbound policy exists. |
||
|
The router waits for the specified peer to issue an open message. No TCP connections are initiated by the router. Default: |
||
|
Do not use an authentication scheme between peers. Using an authentication scheme guarantees that routing information is accepted only from trusted peers. |
||
|
Use MD5 authentication between peers. In general, peers must agree on the authentication configuration to and from peer adjacencies. Using an authentication scheme guarantees that routing information is accepted only from trusted peers. |
||
|
The number of BGP updates to send at one time. The throttle count option limits the number of BGP updates when there are many BGP peers. |
||
|
Disables the throttle count option. |
||
|
The router generates a log message whenever a peer enters or leave the established state. |
||
|
The router generates a log message whenever a warning scenario is encountered in the codepath. |
||
|
Tracing options for the BGP implementation. Log messages are saved in the See Trace Options. |
||
|
Whether the Check Point system should maintain the forwarding state advertised by peer routers even when they restart to minimize the negative effects caused by peer routers restarting. |
||
|
The maximal amount of time that routes previously received from a restarting router are kept so that they can be validated again. The timer is started after the peer sends an indication that it has recovered. |
||
|
Re-learns routes previously sent by the BGP peer or refreshes the routing table of the peer. The peer responds to the message with the current routing table. Similarly, if a peer sends a route refresh request the current routing table is re-sent. A user can also trigger a route update without having to wait for a route refresh request from the peer. |
||
|
Configure Bidirectional Forwarding Detection (BFD) on each Security Gateway
Make sure the SmartConsole |