Configure Route Leak Between GRT and VRF With IOS XR
Configure Route Leak Between GRT and VRF With IOS XR
with IOS XR
Contents
Introduction
Prerequisites
Requirements
Components Used
Background Information
Topology
Initial Verification
Interface and Static Route Configuration
Configuration
Final Verification
Introduction
This document describes the process to configure route leak between Global Routing Table (GRT)
to VRF with Cisco IOS® XR software.
Prerequisites
Requirements
Components Used
This procedure is not restricted to any software release in Cisco IOS XR therefore, all releases
can be used to complete the next steps.
The information in this document is based on these software and hardware versions:
Background Information
The purpose of this demonstration is to show the configuration for route leak between global route
table and vrf route table on Cisco IOS XR.
Topology
Initial Verification
Interface and Static Route Configuration
ASR9901-1
RP/0/RSP0/CPU0:ASR9901-2#ping 172.16.20.2
Wed Oct 19 15:58:05.961 UTC
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.20.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms
If you try to test the reachability from subnet 192.168.10.0/24 on ASR9K-1 (VRF ORANGE) to
subnet 172.16.20.0/24 located on router 2911, this test must fail as no configuration has been
implemented on ASR9K-2 to complete the connectivity between VRF ORANGE and the GRT.
Configuration
Step1. Configure a BGP process in ASR9K-2, this is the router that performs the route leak and
where the configuration needs to be applied. Besides the creation of the BGP process, you need
to use some network statements to make sure that the prefixes that you plan to leak get installed
in the corresponding BGP table:
RP/0/RSP0/CPU0:ASR9901-2#
As you can see, there is no need to create any BGP neighborship, BGP is needed to place these
prefixes into the BGP table.
Step 2. Configure the route policies, these policies are intended to help you filter which prefixes
are permitted to be leaked. In this example, the route-policy GLOBAL-2-VRF and route-policy
VRF-2-GLOBAL are used.
RP/0/RSP0/CPU0:ASR9901-2#
Step 3. Configure the VRF and apply the route-policy created at the previous step with the
commands import from default-vrf route-policy <policy name> and export to default-vrf
route-policy <policy name> as shown in the next output:
RP/0/RSP0/CPU0:ASR9901-2#
Final Verification
Once the previous configuration has been committed, you can verify the reachability from subnet
192.168.10.0/24 on ASR9K-1 (VRF ORANGE) to subnet 172.16.20.0/24 located on router 2911,
which initially failed. However, with the appropriate configuration, this ping test is now successful:
CISCO2911-3#debug ip icmp
ICMP packet debugging is on
CISCO2911-3#
CISCO2911-3#
*Oct 19 21:34:20.069: ICMP: echo reply sent, src 172.16.20.2, dst 192.168.10.1, topology BASE,
dscp 0 topoid 0
*Oct 19 21:34:20.073: ICMP: echo reply sent, src 172.16.20.2, dst 192.168.10.1, topology BASE,
dscp 0 topoid 0
*Oct 19 21:34:20.077: ICMP: echo reply sent, src 172.16.20.2, dst 192.168.10.1, topology BASE,
dscp 0 topoid 0
*Oct 19 21:34:20.077: ICMP: echo reply sent, src 172.16.20.2, dst 192.168.10.1, topology BASE,
dscp 0 topoid 0
*Oct 19 21:34:20.081: ICMP: echo reply sent, src 172.16.20.2, dst 192.168.10.1, topology BASE,
dscp 0 topoid 0
CISCO2911-3#
Another verification is to check if the prefixes appear in the RIB and BGP tables, for this example,
the GRT or default-vrf shows the next information:
RP/0/RSP0/CPU0:ASR9901-2#show route
Wed Oct 19 22:15:03.930 UTC
RP/0/RSP0/CPU0:ASR9901-2#show ip bgp
Wed Oct 19 22:15:13.069 UTC
BGP router identifier 10.10.10.10, local AS number 100
BGP generic scan interval 60 secs
Non-stop routing is enabled
BGP table state: Active
Table ID: 0xe0000000 RD version: 5
BGP main routing table version 5
BGP NSR Initial initsync version 3 (Reached)
BGP NSR/ISSU Sync-Group versions 0/0
BGP scan interval 60 secs