一个简单的从global rib往vrf内leak路由的配置案例.
RP/0/0/CPU0:PE4#show run vrf A
Sun Mar 28 16:35:18.881 UTC
vrf A
address-family ipv4 unicast
import from default-vrf route-policy test advertise-as-vpn <<<<<<<
import route-target
1:1
!
export route-target
1:1
!
!
!
RP/0/0/CPU0:PE4#
RP/0/0/CPU0:PE4#
RP/0/0/CPU0:PE4#show run route-policy test
Sun Mar 28 16:35:28.070 UTC
route-policy test
if destination in test then
pass
else
drop
endif
end-policy
!
RP/0/0/CPU0:PE4#
RP/0/0/CPU0:PE4#show run prefix-set test
Sun Mar 28 16:35:34.210 UTC
prefix-set test
11.11.11.11/32
end-set
!
RP/0/0/CPU0:PE4#

如图PE4 从CE测收到11.11.11.11/32的路由放入default vrf下, 然后leak到vrf A中, 若需要将此leak的路由通过vpnv4邻居通告给其他路由器如P1,需要在import vrf的时候加“advertise-as-vpn” 关键字.
RP/0/0/CPU0:PE4#show bgp ipv4 unicast 11.11.11.11/32
Sun Mar 28 16:41:10.876 UTC
BGP routing table entry for 11.11.11.11/32
Versions:
Process bRIB/RIB SendTblVer
Speaker 9 9
Last Modified: Mar 26 10:52:55.657 for 2d05h
Paths: (1 available, best #1)
Not advertised to any peer
Path #1: Received by speaker 0
Not advertised to any peer
10
10.1.12.2 from 10.1.12.2 (192.168.0.10)
Origin IGP, metric 0, localpref 100, valid, external, best, group-best, import-candidate
Received Path ID 0, Local Path ID 1, version 9
Origin-AS validity: (disabled)
RP/0/0/CPU0:PE4#
RP/0/0/CPU0:PE4#show bgp vrf A ipv4 unicast 11.11.11.11/32
Sun Mar 28 16:42:44.220 UTC
BGP routing table entry for 11.11.11.11/32, Route Distinguisher: 1:2
Versions:
Process bRIB/RIB SendTblVer
Speaker 52 52
Local Label: 24012
Last Modified: Mar 26 11:06:14.657 for 2d05h
Paths: (1 available, best #1)
Not advertised to any peer
Path #1: Received by speaker 0
Not advertised to any peer
10
10.1.12.2 from 10.1.12.2 (192.168.0.10)
Origin IGP, metric 0, localpref 100, valid, external, best, group-best, import-candidate, imported
Received Path ID 0, Local Path ID 1, version 52
Extended community: RT:1:1
Origin-AS validity: (disabled)
Source AFI: IPv4 Unicast, Source VRF: default, Source Route Distinguisher: 0:0:0
RP/0/0/CPU0:PE4#
Other Way import prefix
Community
route-policy dyna-route-leak-comm-9-x
if community matches-every (65008:9) then
pass
endif
end-policy
vrf vrf2
address-family ipv4 unicast
import from default-vrf route-policy dyna-route-leak-comm-9-x
import route-target
1:2
As-path/prefix
route-policy dyna-route-leak-aspath-prefix-10-x
if as-path originates-from '65008' and destination in (10.0.0.0/24) then
pass
endif
end-policy
!
vrf vrf3
address-family ipv4 unicast
import from default-vrf route-policy dyna-route-leak-aspath-prefix-10-x
import route-target
1:3
Refer:
https://learningnetwork.cisco.com/s/question/0D53i00000KstGr/ios-xr-leaking-the-routes-between-vrf-and-global-rib
https://community.cisco.com/t5/service-providers-documents/cisco-bgp-dynamic-route-leaking-feature-interaction-with-juniper/ta-p/3139676
No comments
Comments feed for this article
Trackback link: http://imxing.cn/wp-trackback.php?p=1081