10.2.1 Configuration algorithm ............................................................................................ 229
10.2.2 Configuration example .............................................................................................. 235
11 Routing management ....................................................................................................... 237
11.1 Routing information advertising policy.........................................................................238
11.1.1 RIP............................................................................................................................... 238
11.1.2 OSPF protocol ............................................................................................................ 238
11.1.3 IS-IS protocol.............................................................................................................. 239
11.1.4 iBPG protocol ............................................................................................................. 240
11.1.5 eBPG protocol ............................................................................................................ 240
11.2 Static routes configuration............................................................................................241
11.2.1 Configuration algorithm ............................................................................................ 241
11.2.2 Static routes configuration example ........................................................................ 242
11.3 RIP configuration ...........................................................................................................244
11.3.1 Configuration algorithm ............................................................................................ 244
11.3.2 RIP configuration example ........................................................................................ 249
11.4 OSFP configuration........................................................................................................250
11.4.1 Configuration algorithm ............................................................................................ 250
11.4.2 OSPF configuration example .................................................................................... 260
11.4.3 OSPF stub area configuration example.................................................................... 261
11.4.4 Virtual link configuration example ............................................................................ 261
11.5 BGP configuration..........................................................................................................263
11.5.1 Configuration algorithm ............................................................................................ 263
11.5.2 Configuration example .............................................................................................. 274
11.5.3 BGP best route selection policy ................................................................................ 276
11.6 BFD configuration ..........................................................................................................278
11.6.1 Timers configuration ................................................................................................. 280
11.6.2 Configuration algorithm ............................................................................................ 281
11.6.3 BFD with BGP configuration example ...................................................................... 285
11.7 PBR routing policy configuration ..................................................................................286
11.7.1 Configuration algorithm of Route-map for BGP....................................................... 286
11.7.2 Configuration example 1. Route-map for BGP......................................................... 290
11.7.3 Configuration example 2. Route-map for BGP......................................................... 291
11.7.4 Route-map based on access control lists (Policy-based routing) configuration
algorithm .................................................................................................................... 291
11.7.5 Route-map based on access control lists (Policy-based routing) configuration
example ...................................................................................................................... 292
11.8 VRF configuration ..........................................................................................................295
11.8.1 Configuration algorithm ............................................................................................ 295