
Configuring BGP Services
5-23
Use BGP message logging parameters to limit the volume of debug-level
messages that BGP generates and logs. If you allow BGP to log all debug-level
events, the messages that BGP generates will quickly overrun and overwrite the
log file.
For More Information about BGP
For more information about BGP, refer to the following documentation:
Lougheed, K., and Rekhter, Y. “A Border Gateway Protocol 3.” RFC 1267,
Network Information Center (NIC), SRI International, Menlo Park, California,
October 1991.
Perlman, Radia. Interconnections: Bridges and Routers. Reading, Massachusetts:
Addison-Wesley Publishing Company, 1992.
Rekhter, Y. “Application of the Border Gateway Protocol in the Internet.” RFC
1268, Network Information Center (NIC), SRI International, Menlo Park,
California, October 1991.
Varadhan, K. “BGP OSPF Interaction.” RFC 1364, Network Information Center
(NIC), SRI International, Menlo Park, California, September 1992.
Willis, S., and Burruss, J. “Definition of Managed Objects for the Border Gateway
Protocol (Version 3).” RFC 1269, Network Information Center (NIC), SRI
International, Menlo Park, California, October 1991.
BGP Implementation Notes
This section provides you with some guidelines that you should follow when you
configure BGP. If you do not follow these guidelines, BGP will either not work
efficiently or will become disabled on the interfaces involved.
• BGP will not operate with an IP router in nonforwarding (host-only) mode.
Make sure that the routers you want BGP to operate with are in forwarding
mode.
For instructions on using Site Manager to configure BGP message logging on the router,
see “Generating BGP Event Messages” on page 5-52.
Comentarios a estos manuales