EasyManua.ls Logo

Quanta Cloud Technology QuantaMesh QNOS5 User Manual

Quanta Cloud Technology QuantaMesh QNOS5
256 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #220 background imageLoading...
Page #220 background image
220
The two routes are leaked from the global route table into the Red VR and the connected subnet 8.0.0.0/24 is
leaked from the Red VR to the global route table.
The following commands also add a non-leaked static route for the 56.6.6.0/24 subnetwork scoped to the
domain of Red VR.
(Switch) (Config)#ip routing (Switch) (Config)#interface 0/27 (Switch) (Interface
0/27)#routing
(Switch) (Interface 0/27)#ip vrf forwarding Red
Warning: routing interface moved from Default router instance to "Red" router in stance.
(Switch) (Interface 0/27)#ip address 8.0.0.1 /24
(Switch) (Interface 0/27)#interface 0/26
(Switch) (Interface 0/26)#routing
(Switch) (Interface 0/26)#ip address 9.0.0.1 /24
(Switch) (Interface 0/26)#exit
(Switch) (Config)#ip route 56.6.6.0 255.255.255.0 9.0.0.2
4. To leak routes from the global routing table to the VRF route table, use the following
example:
(Switch) (Config)#ip route vrf Red 9.0.0.2 255.255.255.255 9.0.0.2 0/26 (Switch) (Config)#ip
route vrf Red 56.6.6.0 255.255.255.0 9.0.0.2 0/26
To leak routes from the VRF's routing table to the global routing table, use the following example:
(Switch) (Config)#ip route 8.0.0.2 255.255.255.255 0/27
To leak routes (non-leaked) internal to the VRF's route table, use the following example:
(Switch) (Config)#ip route vrf Red 66.6.6.0 255.255.255.0 8.0.0.2

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Quanta Cloud Technology QuantaMesh QNOS5 and is the answer not in the manual?

Quanta Cloud Technology QuantaMesh QNOS5 Specifications

General IconGeneral
BrandQuanta Cloud Technology
ModelQuantaMesh QNOS5
CategoryNetwork Router
LanguageEnglish

Summary

1. QuantaMesh QNOS5 Features

1.5. Routing Features

Explains IP routing, OSPF, BGP, VRRP, and other routing protocols supported by the switch.

2. Getting Started

2.1. Accessing the switch Command-Line Interface

Guides on connecting to the switch via console or remote access methods like Telnet or SSH.

4. Configuring Security Features

4.1. Controlling Management Access

Details methods for controlling access to the switch management interface using authentication.

4.2. Configuring DHCP Snooping, DAI, and IPSG

Covers security features like DHCP Snooping, Dynamic ARP Inspection, and IP Source Guard.

7. Configuring Routing

7.1. Basic Routing and Features

Introduces general routing features and configuration on the switch.

7.5. Border Gateway Patrol (BGP)

Details BGP operation, topology, behavior, and configuration examples.

9. Configuring Data Center Features