Cisco Systems 3.6.6 manual BGP Neighbor Loss Scenario

Page 83

Chapter 8 Impact Analysis in MPLS Networks

Supported Fault Scenarios

BGP Neighbor Loss Scenario

Table 8-3shows the impacted calculations and reported affected severities for a BGP neighbor loss fault scenario.

Table 8-3 BGP Neighbor Loss Scenario

Impact and Affected Severity

Description

 

 

Impact calculation

Initiates a local affected flow to all VRFs that are present on the

 

issuing device. Each local VRF that has route entries with a next

 

hop IP that was learned from the BGP neighbor that was lost

 

collects VRFs from both sides and pairs them together as

 

affected.

 

Supports a route reflector configuration, whereby during the

 

affected search, affected parties are located on all BGP neighbors

 

learned via the route reflector.

 

 

Reported affected severity

Only reports on Real Affected on the IBGP domain.

 

 

Note The BGP Neighbor Loss alarm represents a scenario where there is a BGP neighbor down.

Note The affected only relate to L3 VPN services.

BGP rules require all routers within an autonomous system be fully meshed. For large networks, this requirement represents a severe scaling problem. Route reflectors enable a BGP entity to establish a single BGP connection with a peer, where through that single peer, routing information is learned from other peers. As a result, the number of BGP sessions and connections is greatly reduced.

Decreasing the number of BGP connections and the presence of route reflectors further separates the data and control paths. For example, data packets going from A to B do not go through the route reflector while the routing updates between A and B do.

Every BGP router is uniquely identified by a router ID. A route reflector is not a configuration of a specific router. A router may act as a route reflector if it has a BGP neighbor configured as a BGP client. A router may act as both a route reflector to some of its BGP neighbors (those that are configured as BGP clients) and a non-client BGP neighbor to those BGP neighbors that are configured as non-client BGP neighbors.

A route reflector follows the following logic when distributing routes to its BGP neighbors:

A router advertises to its client peers all routes learned from both other client and non-client peers.

A router advertises to its non-client peers only routes received from client peers.

Router ID distribution follows the same logic described previously here.

Cisco ANA modeling provides a list of one or more router IDs for each interface. This reflects the network behavior of receiving BGP updates from a BGP router (possessing that ID) through that interface. The VNE also maintains the nature of the relationships (client and non-client) among the various VNEs representing the BGP routers. Figure 8-2shows an example.

Cisco Active Network Abstraction 3.6.6 MPLS User Guide

 

OL-19192-01

8-5

 

 

 

Image 83
Contents Americas Headquarters Cisco Active Network Abstraction 3.6.6 Mpls User GuidePage N T E N T S Viewing Rate Limit Information IPv6 VPN over Mpls Running a VPN Leak Report A-1 Section Title Description PrefaceOrganization Convention Indication Related DocumentationConventions Obtaining Documentation and Submitting a Service Request OL-19192-01 Supported Mpls and VPN Technologies and Routing Protocols Viewing Mpls VPNsMpls VPN Maps Overview VPN Business ConfigurationsVPN Topology Connections Layer 3 VPN Business ConfigurationLayer 2 VPN Business Configuration and Tunnels Association Example Description Topology Example Line DescriptionLayer 2 VPN Map Layer 3 VPN MapCisco ANA NetworkVision Window Tree Pane Map Pane Description Tree PaneTree Map Pane RepresentsTicket Pane Map PaneAdding a VPN to a Map Managing Mpls VPN MapsRemoving a VPN from a Map Connecting a CE DeviceShowing or Hiding a CE Device Disconnecting a CE DeviceDisaggregating an Aggregated Node Creating an Aggregated NodeNode is separated into its parts OL-19192-01 Creating a VPN Managing VPN Business ConfigurationsManaging VPN Business Configurations Creating a VPN Adding a Tunnel to a VPN Moving a Virtual RouterAdd Tunnels Dialog Box Removing a TunnelDeleting an LCA Creating an LCAMoving an LCA Renaming a Business Element Moving an LCPJumping to an Adjacent LCP Requirements Deleting a Business ElementOL-19192-01 Viewing Site Properties Viewing Mpls VPN PropertiesViewing VPN Properties Viewing Virtual Router Properties VRF Properties Cisco Active Network Abstraction 3.6.6 Mpls User Guide Displaying VRF Egress and Ingress Adjacents Viewing VRF Properties in the Inventory WindowVRF Properties From a Device Inventory Window Choosing an Overlay Working with the VPN Service OverlayDisplaying or Hiding Callouts Displaying or Hiding OverlaysPage OL-19192-01 Mpls VPN Logical Inventory Overview Viewing Mpls Logical InventoryViewing Mpls VPN Properties When finished, press Ctrl + F4 to close the inventory window Viewing Routing Entities Viewing the ARP Table Mpls Interfaces Tab Viewing a Label Switched EntityTraffic Engineering LSPs Tab Viewing Mpls Logical Inventory Viewing Mpls VPN Properties Viewing VRF Information Viewing MP-BGP InformationOL-19192-01 Port Information in the Inventory Window Viewing Port ConfigurationViewing Cross VRF Routing Entries Viewing Pseudowire End-to End Emulation TunnelsViewing Mpls TE Tunnel Information Viewing Access List Information OL-19192-01 OL-19192-01 IPv6 VPN over Mpls PE1 PE2 CE2 6VPE OverviewAddresses Interface Table Properties Window Viewing IPv4 and IPv6 AddressesPort with IPv4 and IPv6 Addresses Device Software Version Cisco ANA 6VPE Support LimitationsIPv6 Address Representation IPv6 AddressingNon-Compressed IPv4 and IPv6 Address IPv6 Address Prefix Text RepresentationAddress Type Compressed IPv6 AddressProvisioning Route Targets Adding Route Target Using Cisco ANA NetworkVisionCommand Builder Route Target Commands 3 4 5 6 Add Route Target Export with Address Family Preview Adding Route Targets with IPv4 and IPv6 Address Families Enabling IPv6 VRFsDeleting Route Targets with IPv4 and IPv6 Address Families Deleting Route Targets Mpls Network Alarms Overview Mpls Network FaultsDescription Up Alarm BGP Neighbor Loss AlarmAlarm Broken LSP Discovered Alarm BGP Process Down AlarmExample of an Mpls Black Hole Scenario LDP Neighbor Down AlarmMpls TE Tunnel Alarms Mpls Black Hole Found AlarmPseudo Wire Mpls Tunnel Down Alarm Impact Analysis in Mpls Networks Service Impact Analysis OverviewL3 VPN Report Service Impact Analysis For MPLS-Based VPN ServicesPseudowire L2 VPN Report Supported Fault ScenariosLink Overutilized/Data Loss Scenario Link Down ScenarioBGP Neighbor Loss Scenario Route Reflector Example Mpls TE Tunnel Down Scenario Pseudowire Mpls Tunnel Down ScenarioBroken LSP Discovered Scenario OL-19192-01 Cisco ANA PathTracer Tracing Capability Using Cisco ANA PathTracer in Mpls NetworksElement Location Start Options Using Cisco ANA PathTracer in Mpls NetworksCisco ANA PathTracer Starting Points Element Location End Options Cisco ANA PathTracer WindowsCisco ANA PathTracer Endpoints Cisco ANA PathTracer Multipath Window Cisco ANA PathTracer Single-Path Window Using Cisco ANA PathTracer for Layer 2 VPN Using Cisco ANA PathTracer for Layer 3 VPNUsing Cisco ANA PathTracer for Mpls TE Tunnels Viewing Mpls TE Tunnel Information Running a VPN Leak Report OL-19192-01 Numerics IN-2 IN-3 IN-4

3.6.6 specifications

Cisco Systems has continually evolved its networking solutions to address the demands of modern enterprises, with the introduction of the Cisco Systems 3.6.6 version being no exception. This version integrates cutting-edge technologies designed to enhance network performance, security, and management efficiency, catering to the increasingly complex needs of businesses across various sectors.

One of the standout features of Cisco Systems 3.6.6 is its enhanced support for automation and orchestration. This version incorporates advanced automation tools, allowing IT teams to deploy and configure network resources more rapidly and efficiently. With features such as Cisco DNA Center’s intent-based networking, organizations can streamline operations and reduce manual intervention, leading to quicker service delivery and reduced operational costs.

Security remains a top priority, and Cisco Systems 3.6.6 includes improved security protocols that help protect sensitive data and critical infrastructure. The integration of Cisco SecureX provides a unified view of security across the network, enabling organizations to respond to threats in real-time, manage vulnerabilities proactively, and maintain compliance with regulatory standards. The incorporation of machine learning and AI-driven analytics ensures that potential threats are identified and mitigated before they can escalate.

Interoperability is another key characteristic of version 3.6.6, allowing existing Cisco hardware and software to work seamlessly together. This flexibility ensures that enterprises can leverage their current investments while adopting newer technologies without the need for a complete overhaul of their existing network architecture.

Additionally, Cisco Systems 3.6.6 has enhanced support for IoT devices, integrating robust frameworks that enable organizations to manage and secure an increasing number of connected devices. With the proliferation of IoT in various industries, this feature is vital for maintaining efficiency and security, as it allows for better monitoring and control over the connected ecosystem.

In conclusion, Cisco Systems 3.6.6 embodies a comprehensive approach to modern networking challenges. Its emphasis on automation, advanced security features, interoperability, and IoT support positions it as a pivotal solution for businesses looking to enhance their operational capabilities and embrace digital transformation. As organizations worldwide adapt to an ever-evolving technological landscape, Cisco Systems 3.6.6 stands out as a reliable partner in navigating these complexities.