Allied Telesis C613-16164-00 REV E manual No max-fib-routes, Syntax

Models: C613-16164-00 REV E

1 91
Download 91 pages 55.02 Kb
Page 86
Image 86

Route Limits

awplus(config)# ip vrf red

awplus(config-vrf)#max-fib-routes 2000 75

Alternatively, to ensure a warning message is generated when the number of routes exceeds the limit (whilst ensuring routes exceeding the limit can still be added), configure the following:

awplus(config)# ip vrf red

awplus(vrf-config)#max-fib-routes <1-4294967294> warning-only

Note: Dynamic limits routes are applied before adding routes to the FIB. All routes, including rejected dynamic routes can be displayed via the command show ip

route database.

See Also max-fib-routes

no max-fib-routes

show ip route

no max-fib-routes

Description Use this command to reset the maximum number of dynamic routes in FIB.

When this command is executed in VRF Configuration mode, it sets the maximum number of dynamic routes that can be added to the HW FIB table associated with the VRF instance.

Command no max-fib-routes

Syntax

PARAMETER

DESCRIPTION

 

 

no

Negate a command or set its defaults

 

 

max-fib-routes

Set maximum fib routes number

 

 

Default

Command Level

By default, the maximum number of dynamic routes is 4294967294 and no warning threshold is set.

PROMPT

MODE

PRIVILEGE LEVEL

 

 

 

(config)

CONFIG_MODE PRIVILEGE_MAX

PRIVILEGE_MAX

 

 

 

(config-vrf)

VRF_MODE PRIVILEGE_VR_MAX

PRIVILEGE_VR_MAX

 

 

 

See Also max-fib-routes

show ip route

Page 86 Configure VRF-lite

Page 86
Image 86
Allied Telesis C613-16164-00 REV E manual No max-fib-routes, Syntax

C613-16164-00 REV E specifications

The Allied Telesis C613-16164-00 REV E is a robust networking device designed to enhance connectivity and communication within enterprise environments. Renowned for its reliability and efficiency, this device serves as an ideal choice for organizations seeking to improve their network infrastructure.

At its core, the C613-16164-00 REV E is a part of Allied Telesis' suite of products that adhere to high-performance standards. One of the main features is its support for both Layer 2 and Layer 3 networking, making it versatile enough to handle a variety of network configurations. This capability allows for seamless integration into different network architectures, whether for simple local area networks (LANs) or more advanced setups with routing capabilities.

Another significant characteristic of the C613-16164-00 REV E is its high-speed data transfer capabilities. With support for Gigabit Ethernet, the device ensures that data can be transmitted quickly and efficiently across the network. This is particularly important for businesses that rely on heavy data usage and need to maintain performance standards even during peak hours.

Additionally, the C613-16164-00 REV E features advanced security measures, including VLAN support and port security configurations, which help protect sensitive information and prevent unauthorized access. This is essential for businesses that handle confidential data and must comply with industry regulations.

In terms of manageability, the device supports SNMP (Simple Network Management Protocol), allowing for easy monitoring and management of network resources. Network administrators can efficiently manage the device and optimize performance with minimal effort, improving overall productivity.

The design of the C613-16164-00 REV E is also noteworthy; it is built for durability, often featuring a compact form factor that makes installation straightforward without compromising on performance. Its compatibility with various Allied Telesis products ensures that organizations can build a cohesive network ecosystem.

In conclusion, the Allied Telesis C613-16164-00 REV E stands out as an excellent networking solution characterized by its support for multiple networking layers, high-speed data transfer, and robust security features. Ideal for both small to medium enterprises and larger organizations, it helps ensure that businesses can maintain efficient and secure operations in a constantly evolving digital landscape.