Cisco LoopBack e Interfaces Virtuales
Cisco LoopBack e Interfaces Virtuales
Virtual interfaces are software-based interfaces that you create in the memory of the networking device using
Cisco IOS XE commands. Virtual interfaces do not have a hardware component such as the RJ-45 female
port on a 100BASE-T Fast Ethernet network interface card. This module describes the four common types
of virtual, or logical, interfaces that can be configured using Cisco IOS XE software:
• Loopback interfaces
• Null interfaces
• Subinterfaces
• Tunnel interfaces
Loopback Interfaces
You can specify a software-only interface called a loopback interface to emulate a physical interface. Loopback
interfaces are supported on all platforms. A loopback interface is a virtual interface on a Cisco router that
remains up (active) after you issue the no shutdown command until you disable it with the shutdown command.
Unlike subinterfaces, loopback interfaces are independent of the state of any physical interface.
The loopback interface can be considered stable because once you enable it, it will remain up until you shut
it down. This makes loopback interfaces ideal for assigning Layer 3 addresses such as IP addresses when you
want a single address as a reference that is independent of the status of any physical interfaces in the networking
device. A good example of this is using the IP address of a loopback interface as the IP address for the domain
name system (DNS) host address for the networking device. Before loopback interfaces were available,
network administrators had to configure a DNS host entry for every interface on a router that had an IP address
assigned to it because they could never be certain which interface IP address might be available at any given
time for managing the router. In the sample interface configuration and DNS entries for Router A shown
below, you can see that there is a DNS entry for each interface.
RouterA IN A 10.10.10.1
IN A 10.10.11.1
IN A 10.10.12.1
IN A 10.10.13.1
IN A 10.10.14.1
IN A 10.10.15.1
Interfaces on networking devices can fail, and they can also be taken out of service for maintenance. If any
of the interfaces in Router A fails or is taken out of service, another networking device will not be able to
access that interface. When you configure a networking device with a loopback interface and assign it an IP
address that is advertised throughout the network, the networking device will be reachable by using this IP
address as long as the networking device has at least one network interface capable of sending and receiving
IP traffic. In the sample interface configuration and DNS entries for Router A after a loopback interface is
configured, you can see that there is now only one DNS entry that can be used to reach the router over any
of its physical interfaces.
RouterA IN A 172.16.78.1
The configured IP address of the loopback interface--172.16.78.1--can be used as the source address for
packets generated by the router and forwarded to networking management applications and routing protocols.
Unless this loopback interface is explicitly shut down, it is always reachable.
You can use the loopback interface as the termination address for open shortest path first (OSPF) or border
gateway protocol (BGP) sessions. A loopback interface can also be used to establish a Telnet session from
the console port of the device to its auxiliary port when all other interfaces are down. In applications where
other routers or access servers attempt to reach this loopback interface, you should configure a routing protocol
to distribute the subnet assigned to the loopback address.
IP Packets routed to the loopback interface are rerouted back to the router or access server and processed
locally. IP packets routed out the loopback interface but not destined to the loopback interface are dropped.
Under these two conditions, the loopback interface can behave like a null interface.
Null Interfaces
The null interface is a virtual network interface that is similar to the loopback interface. Whereas traffic to
the loopback interface is directed to the router itself, traffic sent to the null interface is discarded. This interface
is always up and can never forward or receive traffic; encapsulation always fails. The null interface functions
similarly to the null devices available on most operating systems.
Null interfaces are used as a low-overhead method of discarding unnecessary network traffic. For example,
if you do not want your network users to be able to reach certain IP subnets, you can create static IP routes
for the subnets that point to the null interface of a networking device. Using the static IP routes takes less
CPU time for the networking device than using IP access lists. The static-route configuration is also easier to
configure than IP access lists because it is done in global configuration mode instead of in interface
configuration mode.
The null interface may not be configured with an address. Traffic can be sent to this interface only by
configuring a static route where the next hop is the null interface--represented by Null 0. One example of
configuring the next hop to be the null interface is to create a route to an aggregate network that can then be
announced through the BGP, or to ensure that traffic to a particular range of addresses is not propagated
through the router, perhaps for security purposes.
The router always has a single null interface. By default, a packet sent to the null interface causes the router
to respond by sending an Internet Control Message Protocol (ICMP) unreachable message to the source IP
address of the packet. You can configure the router either to send these responses or to drop the packets
silently.
Subinterfaces
Subinterfaces are associated with physical interfaces. Subinterfaces are enabled when the physical interface
with which they are associated is enabled, and subinterfaces are disabled when the physical interface is shut
down.
Note Subinterfaces can be enabled and shut down independently of the physical port with which they are associated.
However, you cannot enable a subinterface of a physical interface that has been shut down.
Subinterfaces are created by subdividing the physical interface into two or more virtual interfaces on which
you can assign unique Layer 3 network addresses such as IP subnets. One of the first uses of subinterfaces
was to resolve the problem with split horizon on Frame Relay WANs. Split horizon is a behavior associated
with IP routing protocols such as RIP in which IP subnets are not advertised back out the same physical
interface that they were learned over. Split horizon was implemented to prevent routing loops in IP networks.
A routing loop can be created when the networking devices at both ends of a network connection advertise
the same IP routes to each other. Split horizon was an issue for Frame Relay multipoint network
interfaces--interfaces that connect to two or more remote networking devices over a single physical
interface--because the default behavior of many networking devices was to implement split horizon, which
means that the networking device did not advertise the IP routes that were learned over an interface back out
the interface to other devices that were also reachable via the same physical interface. Subinterfaces were
invented as a method of virtually subdividing a physical interface into two or more interfaces so that the IP
routing protocols would see the network connection to each remote networking device as a separate physical
interface even though the subinterfaces share a common physical interface. Although TCP/IP now disables
split horizon limitations by default, protocols such as AppleTalk and IPX are still constrained by split horizon.
Subinterfaces are identified by a prefix that consists of the hardware interface descriptor (IDB) followed by
a period and then by a number that is unique for that prefix. The full subinterface number must be unique to
the networking device. For example, the first subinterface for GigabitEthernet interface 0/0/0 might be named
GigabitEthernet 0/0/0.1 where .1 indicates the subinterface.
Tunnel Interfaces
Tunneling provides a way to encapsulate arbitrary packets inside a transport protocol. Tunnels are implemented
as a virtual interface to provide a simple interface for configuration. The tunnel interface is not tied to specific
"passenger" or "transport" protocols, but, rather, it is an architecture that is designed to provide the services
necessary to implement any standard point-to-point encapsulation scheme.
There are several ways to implement tunnel interfaces depending on the connectivity that you need to provide.
One common use for tunnels is to carry data traffic for a network protocol such as IPX over devices in your
network that do not support IPX. For instance, if your network uses IPX in sites at the edge of your network
but not in the core of your network, you can connect the IPX sites at the network edges by tunneling IPX in
IP over the core of the network.
For more details about the various types of tunneling techniques available using Cisco IOS XE software, see
the " Implementing Tunnels " module of the Cisco IOS XE Interface and Hardware Component Configuration
Guide.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface loopback number
4. ip address ip-address mask [secondary]
5. end
6. show interfaces loopback number
7. exit
DETAILED STEPS
Router> enable
Step 3 interface loopback number Specifies a loopback interface and enters interface
configuration mode.
Example:
• Use the number argument to specify the number of the
Router(config)# interface loopback 0 loopback interface that you want to create or configure.
Step 4 ip address ip-address mask [secondary] Specifies an IP address for the loopback interface and
enables IP processing on the interface.
Example:
Router(config-if)# end
Step 6 show interfaces loopback number (Optional) Displays information about loopback interfaces.
Example: • Use the number argument to display information about
one particular loopback interface.
Router# show interfaces loopback 0
Note Only the syntax applicable to this task is used in
this example. For more details, see the Cisco IOS
Interface and Hardware Component Command
Reference.
Router# exit
Examples
The following is sample output for the show interfaces loopback command.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface null number
4. no ip unreachables
5. end
6. show interfaces null [number] [accounting]
DETAILED STEPS
Device> enable
Step 3 interface null number Specifies a null interface and number, and enters interface
configuration mode.
Example:
• The number argument is always 0.
Device(config)# interface null 0
Device(config-if)# end
Step 6 show interfaces null [number] [accounting] (Optional) Displays information about null interfaces.
Example: • For null interfaces, the number argument is always 0.
Device# show interfaces null 0 Note Only the syntax applicable to this task is used in
this example. For more details, see the Cisco IOS
Interface and Hardware Component Command
Reference.
Examples
The following is sample output for the show interfaces null command.
Configuring a Subinterface
This task explains how to configure a subinterface. Subinterfaces can be enabled and shut down independently
of the physical port with which they are associated. However, you cannot enable a subinterface of a physical
interface that has been shut down.
SUMMARY STEPS
1. enable
2. configure terminal
DETAILED STEPS
Router> enable
Step 3 interface type number.subinterface-number Specifies the interface type, interface number, and
subinterface number and enters interface configuration
Example:
mode.
Router(config)# interface GigabitEthernet 2/3.5
Step 4 ip address ip-address mask [secondary] Specifies an IP address for the interface and enables IP
processing on the interface.
Example:
Router(config-if)# end
Step 6 show interfaces type number.subinterface-number (Optional) Displays information about the interfaces.
Example:
Router# exit
Examples
The following is sample output from the show interfacescommand:
Configuring a Subinterface
This task explains how to configure a subinterface. Subinterfaces can be enabled and shut down independently
of the physical port with which they are associated. However, you cannot enable a subinterface of a physical
interface that has been shut down.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number.subinterface-number
4. ip address ip-address mask [secondary]
5. end
6. show interfaces type number.subinterface-number
7. exit
DETAILED STEPS
Router> enable
Step 4 ip address ip-address mask [secondary] Specifies an IP address for the interface and enables IP
processing on the interface.
Example:
Router(config-if)# end
Step 6 show interfaces type number.subinterface-number (Optional) Displays information about the interfaces.
Example:
Router# exit
Examples
The following is sample output from the show interfacescommand:
SUMMARY STEPS
1. configure terminal
2. interface vlan vlan ID
3. ip address ip_address subnet_mask
4. no shutdown
5. end
DETAILED STEPS
Examples
The following is sample output from the show interface vlancommand, which displays the interface
IP address configuration and status of Layer 3 VLAN interface vlan 2
Device# show interface vlan
Vlan2 is up, line protocol is down
Hardware is Ethernet SVI, address is 00D.588F.B604 (bia 00D.588F.B604)
interface loopback 0
ip address 209.165.200.225 255.255.255.0
end
interface null 0
no ip unreachables
end
Where to Go Next
• If you want to implement tunnels in your network, see the " Implementing Tunnels " module of the Cisco
IOS XE Interface and Hardware Component Configuration Guide .
• If you want to implement physical (hardware) interfaces (such as Gigabit Ethernet or serial interfaces)
in your network, see the " Configuring Physical Interfaces " module of the Cisco IOS XE Interface and
Hardware Component Configuration Guide .
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
Interface commands: complete command syntax, Cisco IOS Interface and Hardware Component
command mode, defaults, command history, usage Command Reference
guidelines, and examples
Cisco IOS XE Interface and Hardware Component Cisco IOS XE Interface and Hardware Component
configuration modules Configuration Guide
Configuration example showing how to use loopback Sample Configuration for iBGP and eBGP With or
interfaces with BGP Without a Loopback Address
Standards
Standard Title
No new or modified standards are supported, and support for existing standards has not been modified. --
MIBs
No new or modified MIBs are supported, and To locate and download MIBs for selected platforms, Cisco
support for existing MIBs has not been software releases, and feature sets, use Cisco MIB Locator
modified. found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
No new or modified RFCs are supported, and support for existing RFCs has not been modified. --
Technical Assistance
Description Link