I think it is acceptable. In case of doubt consult with the proctor. 

Sent from my iPhone

On 19 aug. 2010, at 15:23, Cody Cook <[email protected]> wrote:

> I have a question for everyone.  I'm using a variety of vendors'
> workbooks to work on labs and have run across something that has been
> bothering me.  Not so much a question about any lab but more of a
> general thing.  If the lab you are working on doesn't expressly forbid
> a solution, is it okay to use it?  More specifically the use of
> tunnels to solve some issues.
> 
> Here is an example of what I mean.  You have two routers that you are
> told to set up as EBGP peers.  Router 1 (R1) is in AS 100 and router 2
> (R2) is in AS 200.  Let's assume that they are connected to a common
> vlan using f0/1.  R1 has an ip of 10.0.0.1/24 with a secondary ip of
> 10.1.1.1/24.  R1 has an ip of 10.1.1.2/24 with a secondary ip of
> 10.0.0.2/24.  You are told to set up the peering without using the
> secondary addresses.
> 
> R1
> int f0/1
> ip address 10.0.0.1 255.255.255.0
> ip address 10.1.1.1 255.255.255.0 secondary
> 
> R2
> int f0/1
> ip address 10.1.1.2 255.255.255.0
> ip address 10.0.0.2 255.255.255.0 secondary
> 
> One way to do this would be to set your neighbor statements within BGP
> to point to each of the primary addresses.  In order to get the peer
> to come up you will need to add "update-source f0/1" for one of the
> neighbor statements.
> 
> R1
> router bgp 100
> neighbor 10.1.1.2 remote-as 200
> neighbor 10.1.1.2 update-source f0/1
> 
> R2
> router bgp 200
> neighbor 10.0.0.1 remote-as 100
> 
> This works well.  Another way would be create a tunnel, assign it some
> addresses and set the peering relationship through it.  While not the
> best solution, it would work.  Probably not a good example, but it one
> that comes to mind.
> 
> So I guess the gist of my question is this, if for some reason you
> can't get something to work for you and for what ever reason you can't
> come up with another solution.  In the example above, say for whatever
> reason you just didn't think of using update-source on one of the ends
> and the tunnel was the only way you could get it to work, would this
> be acceptable in the lab.  While obviously not the optimal solution,
> it does work and it doesn't violate any of the rules of the scenario.
> Is it cool to use something like this in the lab?
> 
> Like I said, not a big deal, just something that's been bugging me.  I
> have had a couple of instances where I have noticed that you could
> come up with a similar soluton.  Hopefully hs makes sense.
> 
> Thanks.
> Cody
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please 
> visit www.ipexpert.com
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to