summaryrefslogtreecommitdiff
path: root/docs/configexamples/inter-vrf-routing-vrf-lite.rst
diff options
context:
space:
mode:
Diffstat (limited to 'docs/configexamples/inter-vrf-routing-vrf-lite.rst')
-rw-r--r--docs/configexamples/inter-vrf-routing-vrf-lite.rst69
1 files changed, 44 insertions, 25 deletions
diff --git a/docs/configexamples/inter-vrf-routing-vrf-lite.rst b/docs/configexamples/inter-vrf-routing-vrf-lite.rst
index d5c13e35..e109c12c 100644
--- a/docs/configexamples/inter-vrf-routing-vrf-lite.rst
+++ b/docs/configexamples/inter-vrf-routing-vrf-lite.rst
@@ -16,6 +16,8 @@ where you might need that some network can access other in a different VRF.
The scope of this document is to cover such cases in a dynamic way without the
use of MPLS-LDP.
+General information about L3VPNs can be found in the :ref:`configuration/vrf/index:L3VPN VRFs` chapter.
+
********
Overview
********
@@ -68,12 +70,14 @@ community(ies) into that prefix.
********
Topology
********
-
.. image:: /_static/images/inter-vrf-routing-vrf-lite.png
:width: 70%
- :align: left
+ :align: center
:alt: Network Topology Diagram
+
+
+
IP Schema
=========
@@ -133,7 +137,8 @@ Step 1: VRF and Configurations to remote networks
-------------------------------------------------
- Configuration
-^^^^^^^^^^^^^^^
+
+
Set the VRF name and Table ID, set interface address and bind it to the VRF.
Last add the static route to the remote network.
@@ -153,7 +158,8 @@ Last add the static route to the remote network.
set vrf name <VRF> protocols static route <NETWORK/CIDR> next-hop <REMOTE IP ADDRESS>
- Verification
-^^^^^^^^^^^^^^
+
+
Checking the routing table of the VRF should reveal both static and connected
entries active. A PING test between the Core and remote router is a way to
@@ -221,8 +227,10 @@ validate connectivity within the VRF.
Step 2: BGP Configuration for VRF-Lite
--------------------------------------
+
- Configuration
-^^^^^^^^^^^^^^^
+
+
Setting BGP global local-as as well inside the VRF. Redistribute static routes
to inject configured networks into the BGP process but still inside the VRF.
@@ -238,7 +246,8 @@ to inject configured networks into the BGP process but still inside the VRF.
set vrf name <VRF> protocols bgp address-family <AF IPv4/IPv6> redistribute static
- Verification
-^^^^^^^^^^^^^^
+
+
Check the BGP VRF table and verify if the static routes are injected showing
the correct next-hop information.
@@ -277,8 +286,9 @@ the correct next-hop information.
Step 3: VPN Configuration
-------------------------
+
- Configuration
-^^^^^^^^^^^^^^^
+
Within the VRF we set the Route-Distinguisher (RD) and Route-Targets (RT), then
we enable the export/import VPN.
@@ -308,7 +318,8 @@ There are some cases where this is not needed -for example, in some
DDoS appliance- but most inter-vrf routing designs use the above configurations.
- Verification
-^^^^^^^^^^^^^^
+
+
After configured all the VRFs involved in this topology we take a deeper look
at both BGP and Routing table for the VRF LAN1
@@ -410,10 +421,11 @@ installed, we can see -between round brackets- the exported VRF table.
Step 4: End to End verification
-------------------------------
+
Now we perform some end-to-end testing
- From Management to LAN1/LAN2
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
.. code-block:: none
@@ -455,7 +467,8 @@ Now we perform some end-to-end testing
rtt min/avg/max/mdev = 1.660/1.960/2.315/0.236 ms
- From Management to Outside (fails as intended)
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+
.. code-block:: none
@@ -505,7 +518,8 @@ Now we perform some end-to-end testing
- LAN1 to Outside
-^^^^^^^^^^^^^^^^^
+
+
.. code-block:: none
@@ -559,7 +573,8 @@ Now we perform some end-to-end testing
route and ping will fail.
- LAN1 to LAN2
-^^^^^^^^^^^^^^
+
+
.. code-block:: none
@@ -596,10 +611,10 @@ Appendix-A
**********
Full configuration from all devices
------------------------------------
+===================================
- Core
-^^^^^^
+
.. code-block:: none
@@ -684,7 +699,7 @@ Full configuration from all devices
- LAN1
-^^^^^^
+
.. code-block:: none
@@ -696,9 +711,11 @@ Full configuration from all devices
set protocols static route6 ::/0 next-hop 2001:db8::*
- LAN2
-^^^^^^
+
+
.. code-block:: none
+
set interfaces dummy dum0 address '172.16.0.1/24'
set interfaces dummy dum0 address '2001:db8:0:2::1/64'
set interfaces ethernet eth0 hw-id '50:00:00:03:00:00'
@@ -708,7 +725,7 @@ Full configuration from all devices
set protocols static route6 ::/0 next-hop 2001:db8::2
- Management
-^^^^^^^^^^^^
+
.. code-block:: none
@@ -720,7 +737,7 @@ Full configuration from all devices
set protocols static route6 ::/0 next-hop 2001:db8::4
- ISP
-^^^^^
+
.. code-block:: none
@@ -747,14 +764,16 @@ Appendix-B
**********
Route-Filtering
----------------
+===============
+
When importing routes using MP-BGP it is possible to filter a subset of them
before are injected in the BGP table. One of the most common case is to use a
route-map with an prefix-list.
- Configuration
-^^^^^^^^^^^^^^^
+
+
We create a prefix-list first and add all the routes we need to.
@@ -794,11 +813,11 @@ actions inside the rules of the route-map.
set policy route-map LAN2-Internet-v6 rule 1 match ipv6 address prefix-list 'LAN2-Internet-v6'
We are using a "white list" approach by allowing only what is necessary. In case
-that need to implement a "black list" approach you will ned to change the action
-in the route-map for a deny BUT you need to add a rule that permit the rest due
-to the implicit deny in the route-map.
+that need to implement a "black list" approach then you will need to change the
+action in the route-map for a deny BUT you need to add a rule that permits the
+rest due to the implicit deny in the route-map.
-Then we need to attach the policy into the bgp process. This needs to be under
+Then we need to attach the policy to the BGP process. This needs to be under
the import statement in the vrf we need to filter.
.. code-block:: none
@@ -808,7 +827,7 @@ the import statement in the vrf we need to filter.
- Verification
-^^^^^^^^^^^^^^
+
.. code-block:: none