<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Bits of Progress]]></title><description><![CDATA[Bits of Progress]]></description><link>https://bitsofprogress.com</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 09:33:15 GMT</lastBuildDate><atom:link href="https://bitsofprogress.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[BGP + NAT Lab with Real Troubleshooting: Static NAT, PAT, and Packet Capture]]></title><description><![CDATA[This lab was designed to simulate what a real-world edge network might look like when connecting internal private IP address space to the internet using BGP and NAT. It covers multi-AS BGP peering, static NAT, PAT, and includes real packet analysis u...]]></description><link>https://bitsofprogress.com/bgp-nat-lab-with-real-troubleshooting-static-nat-pat-and-packet-capture</link><guid isPermaLink="true">https://bitsofprogress.com/bgp-nat-lab-with-real-troubleshooting-static-nat-pat-and-packet-capture</guid><category><![CDATA[ITLabs]]></category><category><![CDATA[Cisco]]></category><category><![CDATA[network address translation]]></category><category><![CDATA[Networking, IP Address, IPv4, IPv6.]]></category><category><![CDATA[bgp]]></category><category><![CDATA[Wireshark]]></category><category><![CDATA[Network Engineering]]></category><category><![CDATA[ccnp]]></category><category><![CDATA[eve-ng]]></category><dc:creator><![CDATA[Patrick]]></dc:creator><pubDate>Sat, 22 Mar 2025 16:40:51 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/M5tzZtFCOfs/upload/0b27ee49657f416bdbeb95f0e23593c9.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This lab was designed to simulate what a real-world edge network might look like when connecting internal private IP address space to the internet using BGP and NAT. It covers multi-AS BGP peering, static NAT, PAT, and includes real packet analysis using Wireshark. The lab also documents a few mistakes I made along the way, the troubleshooting steps I took to fix them, and why those problems mattered.</p>
<p>If you're trying to get solid on BGP and NAT fundamentals in a hands-on, practical way—not just memorizing config commands—this lab is for you.</p>
<hr />
<h2 id="heading-objective">Objective</h2>
<p>The goal of this lab was to set up BGP between three autonomous systems and configure NAT at the edge routers to provide internet access to internal VPCs. Specifically, I wanted to demonstrate the difference between static NAT and dynamic NAT (PAT), and visually confirm NAT translations using Wireshark. The internal LANs were intentionally not advertised in BGP, to force NAT to be the mechanism that allows traffic to reach the internet and return correctly.</p>
<hr />
<h2 id="heading-lab-environment-and-topology">Lab Environment and Topology</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1742663133799/c2f484ea-ff9b-40c2-9078-bb3ee7f7b545.png" alt class="image--center mx-auto" /></p>
<p>This was done in EVE-NG using Cisco IOSv routers and VPCS hosts. The setup included four routers:</p>
<ul>
<li><p><strong>EdgeRouter1 (AS 65005)</strong> – connects to internal subnet 172.16.10.0/24</p>
</li>
<li><p><strong>EdgeRouter2 (AS 65010)</strong> – connects to internal subnet 172.16.20.0/24</p>
</li>
<li><p><strong>ISPRouter2 (AS 65005)</strong> – serves as a BGP core and handles inter-AS communication</p>
</li>
<li><p><strong>ISPRouter1 (AS 65015)</strong> – simulates the external internet and handles DHCP on the external interface</p>
</li>
</ul>
<p>The VPCs behind EdgeRouter1 and EdgeRouter2 were:</p>
<ul>
<li><p>VPC6 – 172.16.10.2</p>
</li>
<li><p>VPC7 – 172.16.10.3</p>
</li>
<li><p>VPC8 – 172.16.20.2</p>
</li>
<li><p>VPC9 – 172.16.20.3</p>
</li>
</ul>
<p>These were basic simulated endpoints used to generate ICMP traffic for testing NAT.</p>
<p>No configurations were made on the switches—they were just Layer 2 passthroughs. This lab was focused entirely on Layer 3 routing and NAT behavior.</p>
<hr />
<h2 id="heading-configuration-summary">Configuration Summary</h2>
<h3 id="heading-bgp-peering-with-loopbacks">BGP Peering with Loopbacks</h3>
<p>BGP peering was done between all four routers using Loopback interfaces. This simulated a more stable peering relationship like what you’d expect in production, where physical interfaces may go down but logical peering should persist.</p>
<p>Each router had a Loopback0 interface with a /32 IP address, and static routes were created to make sure those Loopbacks were reachable from their peers. I also used <code>ebgp-multihop</code> and <code>update-source Loopback0</code> to make sure the sessions could form across multiple hops.</p>
<p>I made a point not to advertise the internal LANs behind EdgeRouter1 and EdgeRouter2. This ensured that the only way for those networks to reach the internet would be through NAT.</p>
<h3 id="heading-static-nat-on-edgerouter1">Static NAT on EdgeRouter1</h3>
<p>I wanted to do a clear, visual demonstration of static NAT using VPC6. I configured a static NAT mapping to translate 172.16.10.2 to a public IP address. That allowed me to show one-to-one translation and confirm that traffic from VPC6 could reach the internet, and that return traffic could find its way back.</p>
<pre><code class="lang-plaintext">ip nat inside source static 172.16.10.2 203.0.113.100
</code></pre>
<p>This was then verified using Wireshark, capturing outbound packets from ISPRouter1’s G0/0 interface.</p>
<h3 id="heading-pat-dynamic-nat-overload">PAT (Dynamic NAT Overload)</h3>
<p>Once static NAT was working, I configured PAT on both EdgeRouters so the rest of the VPCs could reach the internet using their respective outside interfaces.</p>
<pre><code class="lang-plaintext">ip access-list extended NAT-LIST
 permit ip 172.16.10.0 0.0.0.255 any

ip nat inside source list NAT-LIST interface GigabitEthernet0/0 overload
</code></pre>
<p>The key here was making sure the access list matched the correct internal subnet, the NAT interface roles were set properly (inside vs. outside), and the NAT configuration used the correct overload syntax.</p>
<hr />
<h2 id="heading-packet-capture-and-verification">Packet Capture and Verification</h2>
<p>To verify that NAT was functioning as expected, I used Wireshark on the G0/0 interface of ISPRouter1. This allowed me to observe ICMP packets as they left the network.</p>
<p>Before configuring NAT, I ran a ping from VPC6 to 8.8.8.8. The packet capture showed that the source IP address was 172.16.10.2—a private address. The ICMP Echo Request went out, but no reply ever came back. That’s expected, because return traffic doesn’t know how to get back to a private RFC 1918 address.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1742664814184/041cb68b-300d-4617-99e9-500e210b3506.png" alt class="image--center mx-auto" /></p>
<p>Once static NAT was configured, I repeated the ping. This time, Wireshark showed the source IP had changed to the public NAT address. ICMP Echo Replies came back with no issue.</p>
<p>Same process was repeated after PAT was configured, showing multiple VPCs successfully translating to the router’s public-facing IP.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1742664831664/bdd15972-9a8b-4be0-ae35-1a169c1c8bed.png" alt class="image--center mx-auto" /></p>
<hr />
<h2 id="heading-troubleshooting-mistakes-and-fixes">Troubleshooting Mistakes and Fixes</h2>
<p>I don’t edit out mistakes in these labs. They’re part of the process and where the real learning happens. Here’s what I ran into:</p>
<h3 id="heading-mistake-1-accidentally-advertised-internal-networks-in-bgp">Mistake #1: Accidentally Advertised Internal Networks in BGP</h3>
<p>Early on, I was deep into BGP config and out of habit, I advertised the internal LANs (172.16.10.0/24 and 172.16.20.0/24) into BGP. I didn’t realize it at first. When I tested NAT by pinging 8.8.8.8 from VPC6, I expected it to fail since NAT hadn’t been configured yet—but it worked.</p>
<p>That stopped me in my tracks.</p>
<p>What I didn’t account for was that BGP had already propagated the internal subnets, so return traffic had a route back. I wasn’t testing NAT—I was just testing basic routing.</p>
<p>To fix it, I went back to the EdgeRouters and removed the BGP advertisements for the internal networks. Then I tested again. This time, the pings failed (as expected), and I could properly demonstrate how NAT was necessary for return traffic. Wireshark confirmed that the packets were going out with the private source IPs and never making it back.</p>
<h3 id="heading-mistake-2-used-a-subnet-mask-instead-of-a-wildcard-mask-in-the-acl">Mistake #2: Used a Subnet Mask Instead of a Wildcard Mask in the ACL</h3>
<p>When configuring the NAT ACL for PAT, I mistakenly used a subnet mask (<code>255.255.255.0</code>) instead of a wildcard mask (<code>0.0.0.255</code>). It’s a simple mistake, but it caused a complete failure of NAT.</p>
<p>After applying the configuration, I went back to VPC6 and tried to ping 8.8.8.8 again. Nothing happened. No response, no error—just silence.</p>
<p>At that point, I ran <code>show ip access-list</code> on the router and immediately saw the problem. The ACL wasn’t matching any traffic because the mask was incorrect. Once I corrected it and re-applied the NAT config, everything worked as expected.</p>
<p>These kinds of mistakes are easy to make when you’re in the zone, but catching and fixing them is where the actual learning happens.</p>
<hr />
<h2 id="heading-lessons-learned">Lessons Learned</h2>
<ul>
<li><p>Don’t advertise internal NAT networks into BGP if your goal is to demonstrate NAT behavior. Doing so undermines the purpose of NAT by allowing routing to take over.</p>
</li>
<li><p>Always double-check NAT ACLs. Wildcard masks, not subnet masks.</p>
</li>
<li><p>Static NAT is useful for fixed one-to-one mappings (e.g., specific servers or hosts that need consistent external access).</p>
</li>
<li><p>PAT is great for general outbound access and simulates how most home routers work in practice.</p>
</li>
<li><p>Wireshark is a powerful way to visually confirm that NAT is working. Seeing the source address change before and after NAT helps reinforce what’s happening under the hood.</p>
</li>
<li><p>Troubleshooting is the best teacher. Making mistakes, recognizing them, and fixing them burns the lesson into memory in a way that reading or watching never could.</p>
</li>
</ul>
<hr />
<h2 id="heading-files-and-resources">Files and Resources</h2>
<p>This lab includes full router configurations, a topology screenshot, and the video walkthrough showing everything in action.</p>
<ul>
<li><p>EdgeRouter1.txt</p>
</li>
<li><p>EdgeRouter2.txt</p>
</li>
<li><p>ISPRouter1.txt</p>
</li>
<li><p>ISPRouter2.txt</p>
</li>
<li><p>Topology Screenshot</p>
</li>
<li><p>Watch the lab in action on my YouTube channel <a target="_blank" href="https://www.youtube.com/watch?v=0aLSPyd1_pA">HERE</a>!</p>
</li>
<li><p>Find the GitHub Repo for this project including Config Files <a target="_blank" href="https://github.com/PRivers251/BGP-NAT-LAB-032125">HERE</a>!</p>
</li>
</ul>
<hr />
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>I didn’t try to make this perfect. The goal wasn’t a polished demo. The goal was to get hands-on, break things, fix them, and understand what was really happening. This is the kind of lab that builds actual confidence, not just theoretical knowledge.</p>
<p>If you're learning networking, especially BGP and NAT, I highly recommend doing this kind of setup yourself. Don’t just read about it—build it, break it, fix it. That’s where the skills come from.</p>
<p>— Patrick Rivers<br /><em>Bits of Progress</em></p>
]]></content:encoded></item><item><title><![CDATA[The Hardest Part of Changing Careers That No One Talks About]]></title><description><![CDATA[Everywhere you look online, you’ll find gurus, books, and courses promising to take you from the land of misery—where you hate your job—to the promised land, where you wake up every morning excited to do work you love. That’s a noble goal. I believe ...]]></description><link>https://bitsofprogress.com/the-hardest-part-of-changing-careers-that-no-one-talks-about</link><guid isPermaLink="true">https://bitsofprogress.com/the-hardest-part-of-changing-careers-that-no-one-talks-about</guid><category><![CDATA[career transition]]></category><category><![CDATA[It career]]></category><category><![CDATA[Network Engineering]]></category><category><![CDATA[Career]]></category><category><![CDATA[Career Change]]></category><category><![CDATA[tech industry]]></category><dc:creator><![CDATA[Patrick]]></dc:creator><pubDate>Tue, 18 Mar 2025 17:27:29 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1742320968286/e744559f-c243-49cd-a7ef-108965dd7190.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Everywhere you look online, you’ll find gurus, books, and courses promising to take you from the land of misery—where you hate your job—to the promised land, where you wake up every morning excited to do work you love. That’s a noble goal. I believe it’s absolutely worth pursuing.</p>
<p>But what gets overlooked in all that motivational hype are the real challenges you’re going to face along the way.</p>
<p>I’ve been navigating this process myself, shifting from the chemical production and transportation industry to IT and network engineering. And I want to share some of the hardest parts of career transition that rarely get talked about. Because if you’re in the middle of this journey—or thinking about making the leap—knowing what’s ahead can prepare you for the fight.</p>
<p>Let’s get into it.</p>
<h3 id="heading-1-your-family-responsibilities-dictate-your-options"><strong>1. Your Family Responsibilities Dictate Your Options</strong></h3>
<p>I started this process in my early 30s. I went back to school around 30 or 31, and now, at 34, I’ve been grinding at this for years. But unlike a fresh college grad, I have real responsibilities—bills to pay, a wife and kids to take care of, and a standard of living I can’t just ignore.</p>
<p>Here’s what that means:</p>
<ul>
<li><p>When you transition to a new field, especially a completely different industry, you often have to take a <strong>pay cut</strong> to get your foot in the door.</p>
</li>
<li><p>The size of that pay cut depends on your circumstances—how much flexibility do you have? Can you afford to make less while you gain experience?</p>
</li>
<li><p>I don’t chase money. I’m doing this because I want to solve interesting problems and do meaningful work. But that doesn’t mean I can work for peanuts. I still have a baseline income I need to maintain.</p>
</li>
</ul>
<p>That’s why entry-level IT jobs were never really an option for me. I tried it once—took a job as a <strong>NOC Technician</strong>(Network Operations Center Tech), making far less than I needed, thinking I could make up the gap with side gigs.</p>
<p>It didn’t work.</p>
<p>I was driving Uber, doing DoorDash, taking IT gigs on platforms like <strong>Field Nation</strong> and <strong>WorkMarket</strong>, but I barely had time to breathe. I couldn’t spend quality time with my family. And worse? I didn’t have the time to <strong>learn</strong> and develop my skills like I needed to.</p>
<p>That experience made one thing clear: <strong>I couldn’t take an entry-level job just to “get my foot in the door.”</strong> Instead, I had to be laser-focused on building real, demonstrable skills so I could go straight into a <strong>network admin or engineering role.</strong></p>
<p>If you’re in a similar boat—if you have a family, responsibilities, and real financial needs—you have to be more strategic. You need to <strong>create your own opportunities,</strong> not just wait for someone to give you one.</p>
<h3 id="heading-2-the-competition-is-brutal"><strong>2. The Competition is Brutal</strong></h3>
<p>When you start this journey, it’s easy to think that as long as you work hard, you’ll find an opportunity.</p>
<p>But here’s the truth:</p>
<p>You’re competing with a <strong>sea of candidates</strong>—young, fresh college grads with degrees, people with years of experience, and others just like you trying to make a transition.</p>
<p>I didn’t take college seriously the first time around. I flunked out of a small community college when I was younger because I wasn’t intentional about my future. By the time I <strong>did</strong> get serious, I was already behind.</p>
<p>Now, as I compete for mid-level IT jobs, I’m going up against:</p>
<ul>
<li><p>College grads with <strong>degrees and internships</strong></p>
</li>
<li><p>People with <strong>several years of IT experience</strong></p>
</li>
<li><p>IT career changers who might have fewer responsibilities than I do, meaning they can take lower-paying jobs and <strong>build experience faster</strong></p>
</li>
</ul>
<p>That means I have to work <strong>twice as hard</strong> to stand out.</p>
<p>This is why <strong>Bits of Progress</strong> is so important to me. This isn’t just a content brand—it’s my <strong>proof of work.</strong> It forces me to:</p>
<ul>
<li><p>Learn deeply and <strong>actually master</strong> the skills I need</p>
</li>
<li><p>Document what I’m doing to <strong>show my work</strong> to potential employers</p>
</li>
<li><p>Differentiate myself from every other job seeker out there</p>
</li>
</ul>
<p>Someone with a degree and a couple of years of IT experience might be moderately valuable. But for me to compete, I need to be <strong>extraordinarily valuable.</strong></p>
<p>That’s the mindset shift you need to have. If you’re up against people with more credentials, <strong>you have to bring something else to the table.</strong></p>
<h3 id="heading-3-the-timeline-is-always-longer-than-you-think"><strong>3. The Timeline is Always Longer Than You Think</strong></h3>
<p>Gurus love to tell you about their <strong>fastest success stories.</strong></p>
<ul>
<li><p>“John landed his dream IT job in <strong>six months!</strong>”</p>
</li>
<li><p>“Sarah transitioned to cybersecurity in <strong>three months!</strong>”</p>
</li>
</ul>
<p>They sell you the success story, but they <strong>don’t</strong> tell you about the blood, sweat, and frustration. They fail to mention the months and years of sacrificed evenings and weekends.</p>
<p>Here’s what no one tells you:</p>
<p><strong>However long you think this is going to take, you might as well double or triple it.</strong></p>
<p>When I started, I thought I’d land a mid-level IT job <strong>within a year or two.</strong> That was <strong>way off.</strong></p>
<ul>
<li><p>I underestimated how much time I’d need to <strong>learn real, applicable skills</strong></p>
</li>
<li><p>I overestimated how much entry-level IT jobs actually <strong>paid in my area</strong></p>
</li>
<li><p>I didn’t realize just how much <strong>competition</strong> there was for every single role</p>
</li>
</ul>
<p>This journey is longer, harder, and more frustrating than most people expect. But if you stick with it, you <strong>will</strong> break through.</p>
<h3 id="heading-why-its-still-worth-it"><strong>Why It’s Still Worth It</strong></h3>
<p>Despite all of this, I’m <strong>still excited</strong> about where I’m headed.</p>
<p>Why?</p>
<p>Because this transition isn’t just about <strong>getting a better job.</strong> It’s about <strong>becoming the kind of person who can handle the challenges</strong> that come with that job.</p>
<p>If you’re just chasing money, this is going to be miserable. But if you’re chasing work that truly <strong>energizes you</strong>, the grind is worth it.</p>
<p>Here’s why passion matters:</p>
<ul>
<li><p><strong>It gives you a competitive advantage.</strong> If you love the work, you’ll spend extra hours learning, practicing, and honing your skills—while others are watching Netflix.</p>
</li>
<li><p><strong>It makes the long journey easier.</strong> You’ll push through the frustration, rejection, and obstacles because you actually <strong>care about the craft.</strong></p>
</li>
<li><p><strong>It makes you more valuable.</strong> Companies need problem solvers, not just people looking for a paycheck. When you love what you do, you naturally <strong>become more skilled and sought after.</strong></p>
</li>
</ul>
<p>I don’t go home and waste time. I go home and:</p>
<ul>
<li><p>Build networks.</p>
</li>
<li><p>Lab new configurations.</p>
</li>
<li><p>Study cybersecurity principles.</p>
</li>
<li><p>Sharpen my problem-solving skills.</p>
</li>
</ul>
<p>Not because I <strong>have</strong> to. Because I <strong>want</strong> to.</p>
<p>And that’s why I’m confident that, in the long run, I’ll win.</p>
<h3 id="heading-final-thoughts"><strong>Final Thoughts</strong></h3>
<p>If you’re thinking about changing careers, here’s what I want you to take away from this:</p>
<ol>
<li><p><strong>Be realistic about your financial situation.</strong> If you have a family, you can’t afford to take just any job—plan accordingly.</p>
</li>
<li><p><strong>Understand the competition.</strong> You need to <strong>differentiate yourself</strong> if you want to stand out.</p>
</li>
<li><p><strong>Expect it to take longer than you think.</strong> If you assume it’ll be a quick transition, you’ll get discouraged too soon.</p>
</li>
</ol>
<p>This journey isn’t easy. But it’s worth it.</p>
<p>Because at the end of the day, the real reward isn’t just a better job. It’s <strong>becoming the person capable of earning that job.</strong></p>
<p>So the question is—<strong>are you willing to go through the process?</strong></p>
]]></content:encoded></item><item><title><![CDATA[BGP & OSPF Multi-Area Routing Lab: ISP Peering & Route Redistribution]]></title><description><![CDATA[Introduction
This lab simulates an enterprise network peering with two ISP routers via BGP, while utilizing a multi-layered, multi-area OSPF topology for internal routing. The goal of this setup is to explore BGP peering, OSPF multi-area configuratio...]]></description><link>https://bitsofprogress.com/bgp-and-ospf-multi-area-routing-lab-isp-peering-and-route-redistribution</link><guid isPermaLink="true">https://bitsofprogress.com/bgp-and-ospf-multi-area-routing-lab-isp-peering-and-route-redistribution</guid><category><![CDATA[Network Engineering]]></category><category><![CDATA[bgp]]></category><category><![CDATA[ospf]]></category><dc:creator><![CDATA[Patrick]]></dc:creator><pubDate>Fri, 07 Mar 2025 04:47:10 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1741358766099/b056b752-155e-4791-ade5-35ab472c0fdc.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction">Introduction</h2>
<p>This lab simulates an <strong>enterprise network peering with two ISP routers via BGP</strong>, while utilizing a <strong>multi-layered, multi-area OSPF topology</strong> for internal routing. The goal of this setup is to explore <strong>BGP peering, OSPF multi-area configuration, route redistribution, VLAN segmentation, DHCP services, and external DNS integration</strong>.</p>
<p>This is part of my <strong>Bits of Progress</strong> journey, where I document my hands-on networking experience. Rather than a step-by-step tutorial, this blog post presents my thought process, configurations, and the learning experience gained from building this lab.</p>
<hr />
<h2 id="heading-lab-topology-overview"><strong>Lab Topology Overview</strong></h2>
<h3 id="heading-key-components"><strong>Key Components:</strong></h3>
<ol>
<li><p><strong>ISP Routers (BGP AS 65010 &amp; 65020)</strong> – Simulate two separate ISPs peering with the enterprise network.</p>
</li>
<li><p><strong>Core Routers (BGP AS 65001, OSPF Backbone Area 0)</strong> – Serve as the backbone of the enterprise, interconnecting various OSPF areas and managing route redistribution.</p>
</li>
<li><p><strong>Access Routers (OSPF Area 1, DHCP Services)</strong> – Provide connectivity to end devices in separate VLANs.</p>
</li>
<li><p><strong>Access Switches (Layer 2 VLAN Segmentation)</strong> – Facilitate communication between clients, servers, and IoT devices.</p>
</li>
<li><p><strong>ISP Exchange Router (BGP AS 65050)</strong> – Acts as an intermediary router simulating upstream internet access.</p>
</li>
</ol>
<hr />
<h2 id="heading-configuration-breakdown"><strong>Configuration Breakdown</strong></h2>
<h3 id="heading-1-bgp-peering-amp-route-redistribution"><strong>1. BGP Peering &amp; Route Redistribution</strong></h3>
<p>The <strong>core routers</strong> establish BGP sessions with the ISP routers while also redistributing internal OSPF routes into BGP.</p>
<h4 id="heading-corerouter1-bgp-configuration"><strong>CoreRouter1 BGP Configuration:</strong></h4>
<pre><code class="lang-plaintext">router bgp 65001
 bgp log-neighbor-changes
 aggregate-address 192.168.0.0 255.255.0.0 summary-only
 aggregate-address 10.0.0.0 255.0.0.0 summary-only
 redistribute ospf 1 match internal external 1 external 2
 neighbor 172.16.2.1 remote-as 65010
</code></pre>
<ul>
<li><p><strong>Redistributes OSPF routes into BGP</strong>, allowing the enterprise network to advertise summarized internal networks to the ISPs.</p>
</li>
<li><p><strong>Uses aggregate addressing</strong> to reduce the number of advertised routes.</p>
</li>
</ul>
<h4 id="heading-isprouter1-amp-isprouter2-bgp-configuration"><strong>ISPRouter1 &amp; ISPRouter2 BGP Configuration:</strong></h4>
<pre><code class="lang-plaintext">router bgp 65010
 bgp log-neighbor-changes
 network 172.16.1.0 mask 255.255.255.252
 network 172.16.2.0 mask 255.255.255.252
 neighbor 172.16.1.2 remote-as 65020
 neighbor 172.16.2.2 remote-as 65001
 neighbor 172.16.2.2 route-map ADVERTISE-DEFAULT-ROUTE out
 neighbor 172.16.4.1 remote-as 65050
</code></pre>
<pre><code class="lang-plaintext">router bgp 65020
 bgp log-neighbor-changes
 network 172.16.3.0 mask 255.255.255.252
 network 172.16.5.0 mask 255.255.255.252
 neighbor 172.16.1.1 remote-as 65010
 neighbor 172.16.3.2 remote-as 65001
 neighbor 172.16.3.2 route-map ADVERTISE-DEFAULT-ONLY out
 neighbor 172.16.5.1 remote-as 65050
</code></pre>
<ul>
<li><p>Both ISPs advertise a <strong>default route</strong> to the enterprise network.</p>
</li>
<li><p><strong>ISPRouter2 (AS 65020) also peers with ISPRouter1 (AS 65010)</strong>, forming a redundant external connection.</p>
</li>
</ul>
<hr />
<h3 id="heading-2-ospf-multi-area-design"><strong>2. OSPF Multi-Area Design</strong></h3>
<p>The enterprise network follows a structured OSPF design with multiple areas for efficient routing and scalability.</p>
<h4 id="heading-corerouter1-ospf-configuration"><strong>CoreRouter1 OSPF Configuration:</strong></h4>
<pre><code class="lang-plaintext">router ospf 1
 router-id 1.1.1.1
 network 10.1.0.0 0.0.0.3 area 0
 network 10.1.1.0 0.0.0.3 area 0
 network 10.1.2.0 0.0.0.3 area 0
 default-information originate metric-type 1
</code></pre>
<ul>
<li><p><strong>OSPF Backbone (Area 0)</strong> connects all access routers.</p>
</li>
<li><p>Advertises the default route to propagate <strong>internet access throughout the network</strong>.</p>
</li>
</ul>
<h4 id="heading-accessrouter1-ospf-configuration"><strong>AccessRouter1 OSPF Configuration:</strong></h4>
<pre><code class="lang-plaintext">router ospf 1
 router-id 2.2.1.1
 network 192.168.10.0 0.0.0.255 area 1
 network 192.168.20.0 0.0.0.255 area 1
 network 192.168.30.0 0.0.0.255 area 1
</code></pre>
<ul>
<li><p>Belongs to <strong>Area 1</strong> and connects local VLANs to the enterprise network.</p>
</li>
<li><p>Establishes an <strong>OSPF adjacency with CoreRouter1</strong>.</p>
</li>
</ul>
<hr />
<h3 id="heading-3-vlans-subnets-and-dhcp"><strong>3. VLANs, Subnets, and DHCP</strong></h3>
<p>Each <strong>Access Router</strong> provides DHCP services for clients, servers, and IoT devices.</p>
<h4 id="heading-accessrouter1-dhcp-configuration"><strong>AccessRouter1 DHCP Configuration:</strong></h4>
<pre><code class="lang-plaintext">ip dhcp pool CLIENTS1
 network 192.168.10.0 255.255.255.0
 default-router 192.168.10.1
 dns-server 8.8.8.8
</code></pre>
<ul>
<li><p>Assigns IPs dynamically to devices in VLAN 10 (Clients).</p>
</li>
<li><p>Uses <strong>Google’s DNS (8.8.8.8)</strong> for external name resolution.</p>
</li>
</ul>
<hr />
<h2 id="heading-testing-amp-validation"><strong>Testing &amp; Validation</strong></h2>
<h3 id="heading-1-bgp-neighbor-verification"><strong>1. BGP Neighbor Verification</strong></h3>
<p>Checking BGP peers from <strong>CoreRouter1</strong>:</p>
<pre><code class="lang-plaintext">CoreRouter1# show ip bgp summary
</code></pre>
<ul>
<li>Ensures BGP sessions are <strong>established with ISP routers</strong>.</li>
</ul>
<h3 id="heading-2-ospf-neighbor-verification"><strong>2. OSPF Neighbor Verification</strong></h3>
<p>Checking OSPF neighbors on <strong>AccessRouter1</strong>:</p>
<pre><code class="lang-plaintext">AccessRouter1# show ip ospf neighbor
</code></pre>
<ul>
<li>Confirms <strong>OSPF adjacencies with CoreRouter1</strong>.</li>
</ul>
<h3 id="heading-3-route-summarization-check"><strong>3. Route Summarization Check</strong></h3>
<p>Checking advertised routes on <strong>ISP Routers</strong>:</p>
<pre><code class="lang-plaintext">ISPRouter1# show ip bgp
</code></pre>
<ul>
<li>Confirms that <strong>only summarized routes are advertised</strong> to the ISPs.</li>
</ul>
<hr />
<h2 id="heading-conclusion"><strong>Conclusion</strong></h2>
<p>This lab was a great learning experience in <strong>BGP peering, OSPF multi-area routing, and network services like VLANs and DHCP</strong>. By configuring an ISP environment and enterprise network, I gained hands-on insight into real-world networking scenarios.</p>
<p>This is just one step in my <strong>Bits of Progress</strong> journey. Stay tuned for more labs and technical deep dives.</p>
<hr />
<p>📺 <strong>Watch the Lab in Action:</strong> <a target="_blank" href="https://youtu.be/cb68HlbxOk8">https://youtu.be/cb68HlbxOk8</a><br />📂 <strong>Download Config Files:</strong> <a target="_blank" href="https://github.com/PRivers251/RoutingLab_BGP_OSPF_3-6-25">https://github.com/PRivers251/RoutingLab_BGP_OSPF_3-6-25</a></p>
]]></content:encoded></item></channel></rss>