Richard - Lefebvre - Presentation - Architecture IOS-XR
Richard - Lefebvre - Presentation - Architecture IOS-XR
l'architecture de IOS-XR
Richard Lefebvre
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Agenda
1. Introduction to IOS-XR
2. Manageability
3. High Availability
4. Secure Domain Router (Logical Router)
5. RPL – Route Policy Language
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Introduction to IOS XR
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Router OS Evolution
SSH
Forwarding Plane Applications
HA Infrastructure
Control Plane Data Plane Management Plane
SSH
Host Service
L2 Drivers
Per.fMgmt
Interface
Routing
Netflow
SNMP
Alarm
LPTS
OSPF
IGMP
SSH
QoS
ACL
BGB
XML
ISIS
FIB
PIM
PFI
RIB
RIP
CLI
Network Stack
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Modularity
IOS XR Software Packages
Routing:
RIB, BGP, ISIS, OSPF, RPL
Base Admin
Interface manager,
Resource Management:
System database, checkpoint services
Rack, Fabric, LR management
Configuration management, etc.
OS:
Kernel, file system, memory management, and other slow changing core
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
IOS XR Software Packages offer Flexibility
• Ability to upgrade independently
Multi-
MPLS, Multicast, Routing protocols and MPLS
cast
Line Cards
RPL BGP
• Ability to run different versions on Routing
Routing
different nodes Composite
Composite
OSPF ISIS
Security
• Ability to have composites into one
manageable unit if desired Forwarding
Host
Host
Composite
Composite
Base
• Notion of optional packages if
IOX Admin
technology not
OS
Desired on device (Multicast, MPLS)
Line card
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
IOS XR Modular Packaged Software
RP DRP LC
Manage- Manage- Multi-cast Opt’l
Security Security GMPLS
ability ability
Opt’l Opt’l
Forwarding
RPL BGP RPL BGP
Mand
Base
OSPF ISIS OSPF ISIS
OS
Ingress CPU
FIB FIB
LC LC LC LC
Applications
PO
S
Distributed Processing Microkernel I Message Queues
C Threads X
File System Scheduling
Lightweight Messaging
I Debug
S Timers Synchronization
Event Management C
O
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
IOS XR Process Model
Message Passing Inter-Process Communication Model
“OS”
process manager
Separate, Restartable processes
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Manageability
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Manageability Architecture
“Industry Standard” Object Model
External EMS
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Craft Works Interface (CWI)
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
16
IOS XR Boot Overview
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
IOS XR Boot Overview
IOS XR Boot is coupled with various Infra pieces
– Software Packaging
– Upgrades/Downgrades
– Installing patches for bug fixes
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
IOS XR Boot Overview
IOS XR Image:
• Base Image:
• Includes the following components:
• OS
• Admin
• Forwarding (IPv4 / IPv6 Unicast)
• Features
• PIEs (Package Installation Envelope)
• Unique PIE for each feature including
• MPLS, Multicast, Manageability and Security
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
IOS XR Image components
IOS XR Modular Packages
Manage
Security Multicast / MPLS / Security and
ability
Manageability PIEs
Multi-
GMPLS
cast
RPL BGP
OSPF ISIS
Forwarding
Base or Mini Image
Base
IOX Admin
OS
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
IOS XR Boot Overview – C12K Image Names
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
IOS XR Boot Overview – CRS Image
Names
Type File Name Size
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Configuration Management
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
IOS XR and IOS Config differences
IOS XR IOS
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
IOS XR CLI - Location addressing format
CRS-1 is designed to scale 72 linecard chassis’s with a
potential of 1296 linecard and RP slots
Location identifiers use R/S/M/I format
R = Rack (applicable in multi-chassis systems)
S = Slot (physical slot the module is in)
M = module (0 for ‘fixed’ PLIMs, n for SPAs)
I = Interface
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
IOS XR CLI: New CLI format
New CLI reflects the HW position in the system
– Introduces the Hierarchical location scheme
– Each linecard has three-level identification: Shelf/Slot/cpu #
– Interfaces have the Shelf/Slot/Bay/Interface scheme
Protocol referenced by address family type – v4/v6
Backward compatible command-set with IOS
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
IOS XR CLI: Config Modes
RP/0/0/CPU0:ios#config t
RP/0/0/CPU0:ios(config)#interface MgmtEth 0/0/CPU0/0
RP/0/0/CPU0:ios(config-if)#
RP/0/0/CPU0:ios#
RP/0/0/CPU0:ios#admin
RP/0/0/CPU0:ios(admin)#
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
IOS CLI – Single Stage IOS config model
Configuration
Database
CLI user
Active Config
User establishes
config session
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
IOS XR CLI: Two Stage Config model
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
IOS XR CLI: Config Commits
RP/0/0/CPU0:ios#show run int gi0/2/0/0
% No such configuration item(s)
RP/0/0/CPU0:iosxr1#conf t
RP/0/0/CPU0:iosxr1(config)#interface gig0/2/0/0
RP/0/0/CPU0:iosxr1(config-if)#ipv4 address 100.12.1.1/24
RP/0/0/CPU0:iosxr1(config-if)#commit
RP/0/0/CPU0:Apr 24 00:49:28.119 : config[65691]: %MGBL-CONFIG-6-
DB_COMMIT : Configuration committed by user 'root'. Use 'show
configuration commit changes 1000000036' to view the changes.
RP/0/0/CPU0:iosxr1(config-if)#end
RP/0/0/CPU0:Apr 24 00:49:30.701 : config[65691]: %MGBL-SYS-5-
CONFIG_I : Configured from console by root
RP/0/0/CPU0:iosxr1#
RP/0/0/CPU0:iosxr1#show run int gigabitEthernet 0/2/0/0
interface GigabitEthernet0/2/0/0
ipv4 address 100.12.1.1 255.255.255.0
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
IOS XR CLI: Config Commits
• Each commit generates record with unique Commit ID or label
• Each commit ID is a rollback point
• Commit Database stores up to 100 rollback points
Config
Database
Running
Config
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
IOS XR CLI: Config Commits
Commit keyword writes config into Active Config
Supplies a commit ID to help in Config Rollback
– 1000000036 is the commit ID in previous illustration
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
IOS XR CLI: Commit List
• Sample Commit List output
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
IOS XR CLI: Config Rollback
RP/0/0/CPU0:iosxr1#conf t
RP/0/0/CPU0:iosxr1(config)#hostname iox-nw06
RP/0/0/CPU0:iosxr1(config)#commit
RP/0/0/CPU0:Apr 24 01:00:55.302 : config[65691]: %MGBL-CONFIG-6-DB_COMMIT
: Configuration committed by user 'root'. Use 'show configuration commit
changes 1000000034' to view the changes.
RP/0/0/CPU0:iox-nw06(config)#end
RP/0/0/CPU0:iox-nw06#
RP/0/0/CPU0:iox-nw06#rollback configuration to 1000000033
Loading Rollback Changes.
Loaded Rollback Changes in 1 sec
Committing.
3 items committed in 1 sec (2)items/sec
Updating.RP/0/0/CPU0:Apr 24 01:01:07.143 : config_rollback[65691]: %MGBL-
CONFIG-6-DB_COMMIT : Configuration committed by user 'root'. Use 'show
configuration commit changes 1000000035' to view the changes.
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
IOS XR CLI: Config Session locks
More than one user can open a target config session at a time
Provision for multiple users to work on separate target
configurations.
Locking the router config prevents changes by other users while
someone is already committing the config.
RP/0/0/CPU0:ios#configure exclusive
RP/0/0/CPU0:ios(config)#hostname iox-nw06-1
RP/0/0/CPU0:ios(config)#commit
RP/0/0/CPU0:iox-nw06-1(config)#
Config
Database
CLI
Running
Config
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
IOS XR CLI: Pre-config capabilities
Pre-config feature allows configuring physical interfaces before
they are inserted into the router.
Preconfigured interfaces are not verified or applied until the
actual interface with the matching location
Allows reduction down time and helps improve operational tasks
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
IOS XR CLI: Pre-config capabilities
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
IOS XR CLI: Config error handling
Two levels of config error handling
Parser/Syntax error
– Identified by the parser when the <return> key is entered
Commit error
– Syntactically correct but erroneous from config commit standpoint
– Error details viewed through “show configuration failed” command
– Common reasons for this error include:
• Non-atomic config sequence
• Lack of predecessor config
• Unsupported config from platform perspective
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
IOS XR CLI: Config error handling
Sample config error from QoS feature
RP/0/0/CPU0:ios#conf t
RP/0/0/CPU0:ios(config)#policy p1
RP/0/0/CPU0:ios(config-pmap)#class c0
RP/0/0/CPU0:ios(config-pmap-c)#set precedence 0
RP/0/0/CPU0:ios(config-pmap-c)#commit
% Failed to commit one or more configuration items during an
atomic operation, no changes have been made.
Please use 'show configuration failed' to view the errors
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
IOS XR: User Access
Privileges
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
IOS XR: Base User Security Privileges
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
User Security Privileges: Task Group
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
User Security Privileges: Task IDs
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
User Security Privileges: User Groups
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Pre-defined Task Groups: Permissions
Pre-defined User Groups’ Permission
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Base Security Flow
Authentication Authorization
User User Group Task-Group Tasks
john bgp-users ospf-access ospf read/write
… … bgp-access …
… bgp read/write
…
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Limited Visibility of Two Users
Username: user1
Password:
RP/0/9/CPU0:iox1#
RP/0/9/CPU0:iox1#
RP/0/9/CPU0:iox1#
RP/0/9/CPU0:iox1#sh run router ospf Í SO, OSPF is accessible
router ospf 100
log adjacency changes
address-family ipv4 unicast
area 0
interface Loopback0
!
interface GigabitEthernet0/3/0/0
!
…….
RP/0/9/CPU0:iox1#sh run router bgp ÍSo, BGP is also accessible
router bgp 100
bgp router-id 11.11.11.11
address-family ipv4 unicast
!
!
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Limited Visibility of Two Users
Username: user2
Password:
RP/0/9/CPU0:iox1#
RP/0/9/CPU0:iox1#
RP/0/9/CPU0:iox1#sh run
Building configuration...
!! Last configuration change at 11:58:01 UTC Tue Apr 25 2006 by lab
!
…..
router ospf 100
log adjacency changes
address-family ipv4 unicast
area 0
interface Loopback0
!
interface GigabitEthernet0/3/0/0
!
…..
RP/0/9/CPU0:iox1#sh run router bgp
% This command is not authorized Í=
RP/0/9/CPU0:iox1#
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
High Availability
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
IOS XR High Availability Depth
ISSU
Non-Stop Forwarding
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
IOS XR Software Architecture Overview
Process
Filesystem
Manager
TRUE Microkernel
(Mach, QNX)
MMU with full protection
Applications, drivers, and
protocols are protected d FAULT
FAULT
aine )
Application
FAULT Driver
n t d
Co
rtabl
a
e
on t aine )
( Rest C rtabl
e
ta
(Res
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
High Availability Infrastructure
Contained Contained
IP
BGP IS-IS RIB QoS FIB Stack CLI XML Alarm File System
OS Distributed Middleware
L2 Inter Process
OSPF PIM IGMP ACL PFI Drivers Netflow SNMP SSH
Communication
Contained
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
Process Restartability
Used for small/contained faults (individual or small groups of process
failures)
Processes support restarting with dynamic state recovery
Mirrored State via checkpoint or synchronization with peer
First line of defense- All Processes are restartable for fault recovery
Certain processes are ‘mandatory’ – must always be running. Failure of
mandatory processes can cause RP failover
Second line of defense - Card-level Redundancy is used when Process
Restart fails-
Contained Contained
IP
BGP IS-IS RIB QoS FIB Stack CLI XML Alarm File System
OS Distributed Middleware
L2 Inter Process
OSPF PIM IGMP ACL PFI Drivers Netflow SNMP SSH
Communication
Contained
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
Checkpoint support for process restart
(checkpoint to RAM on local card)
State recovery: Processes with dynamic state may utilize
Checkpoint and Checkpoint Mirroring or
Obtain state from neighbors to regain state after a failover
Processes that restart reconcile inconsistencies with peer processes
after restart
In general restarting one process does not cause other processes to
restart
(process dies)
Checkpoint
new shared
instance memory store
of Recover state
process
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Process-level Redundancy
client
Standby
process Standby process
client
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Process-level Redundancy (cont)
Active process dies
New Standby
client
Process is started
Clients use new primary
New primary starts service-providing process
sending updates to
standby process
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
RP/DRP Redundancy
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
RP/DRP Redundancy
Card-level redundancy and failover
Used for handling larger error sets
control plane lock-up on active RP or
Hardware errors on active RP or
cases where critical processes will not restart
properly
Active Standby
“Warm” redundancy - Processes on standby RP RP
card use mirrored, checkpointed data.
Warm Standby processes do not process
checkpointed data until they become active
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
RP Switch over
RP Switchover mechanism is optimized around two goals:
NSF- Non-Stop Forwarding : Continue forwarding packets and prevent route flaps
while reconverging Layer 3 protocols
NSR – Non- Stop Routing: Preserving routing adjacencies, avoiding network
topology change
GR- Graceful Restart : Reestablishes the routing information bases without churning the
network
State Information
Ethernet
FR
ATM
PPP Active Standby
HDLC.. RP RP
BGP
OSPF
ISIS Line Card Line Card
MPLS
Mcast..
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Redundancy - Card-Level Switchover
When?
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
Redundancy - Card-Level Switchover
When is RP switchover NOT allowed?
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
Redundancy - Process state recovery
models
Hot Process A Process A
Check Check
Warm Process B
Point Point Process B
Server Server
ACTIVE RP STANDBY RP
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67
Headless operation limits
How long will the LC’s operate in a ‘headless’-state if control plane
fails?
Case 1: Redundant RP card exists
Standby card switches to active role
Headless operation governed by individual protocol go-active, re-
convergence times
Case 2: no redundant RP
If headless state is due to process failure and restart, headless
operation will exist for as long as it take to restart process
If due to RP crash, LC’s forward until RP reboots and comes active
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68
NSF: Autonomous Hardware and Quick
Control Plane Recovery
State
IOX box (GSR/CRS) has dual Information
RPs
Each LC has dedicated packet
forwarding hardware (PSE) RP x
Active Standby
RP
Packet forwarding is not affected
by:
Control
ISIS, OSPF, BGP, MPLS, Updates But…
Multicast process restart Interrupted
Fwding
Infrastructure process restarts Ok!
RP failover
Packet forwarding on LCs can
function autonomously during LC LC
control plane outages
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69
In Service Software
Upgrade- ISSU
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70
ISSU
• Ability to deliver point fixes (e.g. to fix a BGP bug,
only install/modify a patch to BGP code, nothing else)
or upgrade complete set of functionality whilst system
is operating
• Identify exactly what has changed, and its impact ‘fan-
out’
• Safety Checks conducted before proceeding with
upgrade
• Restart processes to activate new code
• Goal is to preserve NSF / NSR even on “live”
upgrades to active RP
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71
ISSU
Two main forms of ISSU
Software Maintenance Unit (SMU) based –
Patch code to resolve problem. SMU limited to single DDTS
component
Package Installation Envelope (PIE) based –
Complete set of binaries for a particular collection of functions/
Software Package
Routing:
RIB, BGP, ISIS, OSPF, RPL
Base Admin
Interface manager,
Resource Management:
System database, checkpoint services
Rack, Fabric, LR management
Configuration management, etc.
OS:
Kernel, file system, memory management, and other slow changing core
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72
Secure Domain Router
SDR/LR
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73
SDR
Routing system partitioned into discrete
configurable units
Includes at least one RP per LR.
Has a distinct RIB and FIB combination
with its own route processor and routing
protocol instances
Each LR has a secure and distinct mgmt
interface
Fabric and SC shared by all LRs
Can span across chassis
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 74
Terminology
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 75
What is a Secure Domain Router- SDR?
CRS -1 / IOX
Independent/isolated physical Router 1 Router 2
routing instance within a common BGP/IGP Multicast
(multi-) chassis Multicast
BGP/IGP
Multicast …n BGP/IGP
SPA/SIP
Switch
SPA/SIP
SPA/SIP
SPA/SIP
Fabric
LR
Resource sharing between LRs …n
is limited to fabric, power, cooling
Acts as an independent router Carrier Class IOS XR
Processors not shared – CPU Moving to Secure Domain Routers
resources not in contention to Complete
Physical & Logical (Memory Protected)
Memory not shared – Memory
Separation
leaks can only affect that SDR
Hardware Failures Isolated
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 76
Resource allocation for SDR creation
SDR-A
Route Processor[s]
(RPs) & Line Card[s] D
F
A
F
A
R N N
P D D
Slot level granularity C C R R SDR-B
P P
Configure and
communicate via Admin
Plane
D D
All routing apps run in R R
P P R
P
R
P
LR Plane. SDR-C
Mbus
SDR foo
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 78
Default/Owner SDR
Handles inventory of unassigned cards
When IOX router boots first time
All cards belongs to default LR
User configures to assign to diff LR (SDR)
No configuration needed
Head of Admin Plane - DSC
Head of LR Plane : dLRSC/dSDRSC
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 79
Secure Domain Router Architecture
Admin vs. SDR Planes
LRd LRd
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 80
Secure Domain Router Architecture
Overview
LR Planes with Admin Plane
SDRs operate like
SDR1 Plane SDR2 Plane physically separate
routers
RIB FIB RIB FIB
Admin and SDR
Protocol Protocol
planes provide Fault
isolation through
IPC Partitioning
LRd LRd
Chassis Fabric
Control Mgmnt
Admin Plane
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 81
Secure Domain Router Architecture
Configuration Partitioning
• System owner configures fabric/chassis SDR Plane Config
• SDR owner configures LC/(D)RPs Local config stored within
(D)RP
• Fault Isolation through Config Partitioning
Interfaces, applications,
SDR Plane1 SDR Plane 2 (D)RP pairing
Must log into SDR to
RIB FIB RIB FIB configure it
Admin Plane Config
Protocol Config Protocol Config Shared resource config
stored in separate file
Accessible to CRS/GSR
LRd LRd owner only
Scoped within the Admin
Shared
Chassis resource Fabric plane (RPs, SPs and SCs)
Control Config Mgmnt
Admin
Plane
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 82
Secure Domain Router Connectivity
External Connections
External Connectivity:
Physically connected ports
Network connected ports
Support for logical
L1/L2/L3
interfaces per port
SDR1
Network
SDR2
CRS/GSR
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 83
SDR Routers
External connections (Logical view)
Back Bone Routers POP Agg Routers
(SDR1)
Interconnect
Physical
(SDR2)
Single ChassisCRS-1
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 84
RPL
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 85
RPL - Motivation
Scaling
Using route-maps could lead to 100k – 1M lines of
configuration (e.g. 1000s of BGP peers).
Modularity
Exploit modularity to reuse common portions of
configuration.
Parameterization
For elements which are not exact copies of each other we
can add parameterization ( think variables ) to get further re-
use.
Improved Clarity
No Silently skipped statements.
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 86
RPL Syntax – General Structure
RPL is used in 2 steps :
Define the policy in configuration mode:
Router bgp 99
neighbor 2.2.2.2 remote-as 1
address-family ipv4 unicast
route-policy <policy Name> in/out
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 87
RPL Syntax – Salient Features
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 88
RPL - Conditional Statements – if
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 89
RPL - Conditional Statements – else if
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 90
RPL - Conditional Statements - Nested If
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 91
RPL - Boolean Expressions
Boolean expressions evaluate as either true or false.
RPL provides means to build compound conditions by
means of boolean operators
There are three Boolean operators :
– negation (not)
– conjunction (and)
– disjunction (or).
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 92
Summary
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 93
Merci!
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 94
Presentation_ID © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 95