Hi John,
That is bizarre; why should ttl-security permit the peering but make the
next hop appear inaccessible?  I am sure you have checked, but do you still
have a good route to 10.1.1.100?  Can you send us show ip route 10.1.1.100?
Bob Sinclair CCIE 10427 CCSI 30427
CIERS2 Online Instructor
www.tinyurl.com/ciers2online 
> -----Original Message-----
> From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf Of
> Edward John
> Sent: Tuesday, September 07, 2010 2:53 PM
> To: Narbik Kocharians
> Cc: shiran guez; Cisco certification
> Subject: Re: BGP - multihop & ttl security
> 
> Hi,
> 
> Thanks to all for very detail explanation. I understand that ttl
> behaviour
> different than ebgp-multihop, but both matters when establishing the
> peering.
> But my problem here, I get the adjacency up. But if ttl-security is
> configured, received prefixes are not chosen as best routes..
> 
> 
> PE1#show ip bgp summary
> BGP router identifier 10.1.1.1, local AS number 65001
> BGP table version is 24, main routing table version 24
> 26 network entries using 2938 bytes of memory
> 26 path entries using 1352 bytes of memory
> 13/10 BGP path/bestpath attribute entries using 1404 bytes of memory
> 2 BGP rrinfo entries using 48 bytes of memory
> 5 BGP AS-PATH entries using 120 bytes of memory
> 0 BGP route-map cache entries using 0 bytes of memory
> 10 BGP filter-list cache entries using 120 bytes of memory
> BGP using 5982 total bytes of memory
> BGP activity 26/0 prefixes, 26/0 paths, scan interval 60 secs
> 
> Neighbor        V    AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down
>  State/PfxRcd
> 10.1.1.100      4   100      47      55       24    0    0 00:41:51
> 4
> 10.1.1.254      4 65001      37      31       24    0    0 00:22:31
> 12
> 140.100.1.2     4  1540      48      48       24    0    0 00:40:16
> 9
> PE1#sh
> PE1#show ip bg
> PE1#show ip bgp | i
> PE1#show ip bgp | include 10.1.1.100
> *  0.0.0.0          10.1.1.100                             0 100 200 i
> *  101.101.101.0/24 10.1.1.100               0             0 100 i
> *  172.16.111.0/24  10.1.1.100               0             0 100 i
> *  172.16.113.0/24  10.1.1.100                             0 100 200 i
> PE1#sh
> PE1#sh ip bg
> PE1#sh ip bgp 101.101.101.0
> BGP routing table entry for 101.101.101.0/24, version 0
> Paths: (1 available, no best path)
>   Not advertised to any peer
>   100
>     10.1.1.100 (inaccessible) from 10.1.1.100 (10.1.1.100)
>       Origin IGP, metric 0, localpref 100, valid, external
> PE1#
> 
> 
> Regards,
> John
> 
> 
> Blogs and organic groups at http://www.ccie.net
> 
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
> 
> 
> 
> 
> 
> 
> 
> No virus found in this incoming message.
> Checked by AVG - www.avg.com
> Version: 9.0.851 / Virus Database: 271.1.1/3118 - Release Date:
> 09/07/10 14:43:00
Blogs and organic groups at http://www.ccie.net
Received on Tue Sep 07 2010 - 19:26:16 ART
This archive was generated by hypermail 2.2.0 : Fri Oct 01 2010 - 05:58:05 ART