answersLogoWhite

0


Best Answer

The below steps are to network administrator of an upper-tier ISP can implement policy when configuring BGP:

Let us assume Assumethe three ISPs such as ISP A, ISP B and ISP C.

Take ISP B does not carry between ISP A and ISP C.

Then ISP A and ISP C have ISP B as their BGP peers

ISP B does not promote to ISP A, which authorization through ISP C.

User Avatar

Shourav Podder

Lvl 2
11mo ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

10y ago

An administrator can configure Policy-Based Routing via route-maps on routers

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Describe how a network admin of an upper-tier ISP can implement policy when configuring BGP?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the meaning of network setup?

It simply means configuring the settings for the internet or a local network.


What is the final key component in defining Local Policies for planning and configuring for a Windows Server 2008 Active Directory network?

Planning and configuring an Audit Policy


How MANET is used?

A mobile Adhoc network (MANET) is a self-configuring infrastructure-less network of mobile devices connected by


What is a common way to share resources on a client-server network?

configuring using Command promp


What are sold for home use for configuring as firewalls and are capable of performing network address translation?

routers


When configuring wireless connectivity the adapter look for what 2 element from the gateway?

IP address and network mask.


What are key steps for configuring an NPS network policy?

Specify the type of 802.1X connections for the network policy. Select the configuration scenario to use for the NPS server.


Why does one need to know their IP address when configuring Netgear?

When configuring Netgear, you need to know your IP Address because your IP is used by all devices to communicate with each other on a computer network setup.


What can you do to prevent security Hacking?

Implement firewall hardware as well as firewall software on your computer/computer network and implement the use of Access Control Lists (ACLs) on your network's routers.


What is an R-2R ladder network?

a network used to implement a type of digital to analog converter.


Which of these steps form part of configuring a classful dynamic routing protocol?

Selecting a routing protocol. Assigning IP network numbers. Assigning network addressess to interfaces.


What does a network manager do?

If your are referring to the managerial role of a person in network management, a manager is a person that is part of a network management organization. This person is responsible for monitoring, configuring, and adjusting the various aspects of network equipment (elements) and the services and applications supported by a network .