IOS XR / Leaking the routes between VRF and global RIB

一个简单的从global rib往vrf内leak路由的配置案例.

RP/0/0/CPU0:PE4#show run vrf A    
Sun Mar 28 16:35:18.881 UTC
vrf A
 address-family ipv4 unicast
  import from default-vrf route-policy test advertise-as-vpn   <<<<<<<
  import route-target
   1:1
  !
  export route-target
   1:1
  !
 !
!

RP/0/0/CPU0:PE4#
RP/0/0/CPU0:PE4#
RP/0/0/CPU0:PE4#show run route-policy test 
Sun Mar 28 16:35:28.070 UTC
route-policy test
  if destination in test then
    pass
  else
    drop
  endif
end-policy
!

RP/0/0/CPU0:PE4#
RP/0/0/CPU0:PE4#show run prefix-set test 
Sun Mar 28 16:35:34.210 UTC
prefix-set test
  11.11.11.11/32
end-set
!

RP/0/0/CPU0:PE4#

如图PE4 从CE测收到11.11.11.11/32的路由放入default vrf下, 然后leak到vrf A中, 若需要将此leak的路由通过vpnv4邻居通告给其他路由器如P1,需要在import vrf的时候加“advertise-as-vpn” 关键字.

RP/0/0/CPU0:PE4#show bgp ipv4 unicast 11.11.11.11/32
Sun Mar 28 16:41:10.876 UTC
BGP routing table entry for 11.11.11.11/32
Versions:
  Process           bRIB/RIB  SendTblVer
  Speaker                  9           9
Last Modified: Mar 26 10:52:55.657 for 2d05h
Paths: (1 available, best #1)
  Not advertised to any peer
  Path #1: Received by speaker 0
  Not advertised to any peer
  10
    10.1.12.2 from 10.1.12.2 (192.168.0.10)
      Origin IGP, metric 0, localpref 100, valid, external, best, group-best, import-candidate
      Received Path ID 0, Local Path ID 1, version 9
      Origin-AS validity: (disabled)
RP/0/0/CPU0:PE4#

RP/0/0/CPU0:PE4#show bgp vrf A ipv4 unicast  11.11.11.11/32
Sun Mar 28 16:42:44.220 UTC
BGP routing table entry for 11.11.11.11/32, Route Distinguisher: 1:2
Versions:
  Process           bRIB/RIB  SendTblVer
  Speaker                 52          52
    Local Label: 24012
Last Modified: Mar 26 11:06:14.657 for 2d05h
Paths: (1 available, best #1)
  Not advertised to any peer
  Path #1: Received by speaker 0
  Not advertised to any peer
  10
    10.1.12.2 from 10.1.12.2 (192.168.0.10)
      Origin IGP, metric 0, localpref 100, valid, external, best, group-best, import-candidate, imported
      Received Path ID 0, Local Path ID 1, version 52
      Extended community: RT:1:1 
      Origin-AS validity: (disabled)
      Source AFI: IPv4 Unicast, Source VRF: default, Source Route Distinguisher: 0:0:0
RP/0/0/CPU0:PE4#

Other Way import prefix

Community 
route-policy dyna-route-leak-comm-9-x
  if community matches-every (65008:9) then
    pass
  endif
end-policy
vrf vrf2
address-family ipv4 unicast
  import from default-vrf route-policy dyna-route-leak-comm-9-x
  import route-target
   1:2
As-path/prefix
route-policy dyna-route-leak-aspath-prefix-10-x
  if as-path originates-from '65008'  and destination in (10.0.0.0/24) then
    pass
  endif
end-policy
!
vrf vrf3
address-family ipv4 unicast
  import from default-vrf route-policy dyna-route-leak-aspath-prefix-10-x
  import route-target
   1:3

Refer:

https://learningnetwork.cisco.com/s/question/0D53i00000KstGr/ios-xr-leaking-the-routes-between-vrf-and-global-rib
https://community.cisco.com/t5/service-providers-documents/cisco-bgp-dynamic-route-leaking-feature-interaction-with-juniper/ta-p/3139676
           

No comments

Comments feed for this article

Reply

Your email address will not be published.