BGP Troubleshooting Summary
BGP Troubleshooting Summary
A basic way to test the peering up to layer3 is to telnet to port 179 with
specifying the source address. Another way is to use the debug ip tcp
transaction command to check for the TCP three-way hand shake is failing
because of this issue (where RST/closes and bad messages will be displayed).
The update-source/neighbor matching criteria needs to be on one way only
for peering to come up. When the update-source (to use loopback interfaces)
is configured on one side only, the BGP peering will come up with insuring that
this side will be always the TCP client. This is because its session establishment
request will be accepted unlike the one from the other side.
Check if one of these console message appears (which need the command log-
neighbor-changes to be enabled which indicates MD5 authentication issue :
a) %TCP-6-BADAUTH: No MD5 digest which means the other side does
not have authentication configured
b) %TCP-6-BADAUTH: Invalid MD5 digest which means the other side has
a different password configured.
The Cisco Troubleshooting Labs Course
If the two neighbors are external (i.e. are in different ASes and therefore eBGP
is used), then the TTL of BGP packets sent between the two neighbors will be
set to 1 based on the assumption that the directly connected interfaces IP
addresses will be used for peering. Therefore, if the two eBGP neighbors are
not directly connected or using their loopback interface for the peering
establishment, then the first device in the path will drop BGP packets with TTL
equal to 1 sent between them. There are two ways to solve the TTL issue
when configuring eBGP:
a) Using the ebgp-multihop option which increases the TTL value.