Allied Telesis C613-16164-00 REV E manual Inter-VRF communication via BGP

Page 20

Dynamic inter-VRF communication explained

Inter-VRF communication via BGP

Dynamic inter-VRF route leakage is achieved by making copies of BGP routes that exist in one BGP address-family associated with one VRF instance, to another BGP address-family associated with a different VRF instance.

OSFP

 

 

 

 

 

 

 

 

routerpeer

 

 

 

 

 

 

 

 

 

 

1

 

 

Redistribute BGP

 

 

 

OSPF

 

 

from VRF red FIB

 

 

 

 

 

 

 

 

 

 

 

 

VRF

 

 

 

 

 

Redistribute OSPF

 

red

 

 

 

Redistribute BGP

 

FIB

 

 

 

 

from VRF red FIB

 

 

 

 

 

from VRF blue FIB

 

 

 

 

 

 

BGP

 

 

 

 

 

 

 

address

 

 

 

 

 

 

 

family

-

 

 

 

 

VRF

 

 

red

 

 

 

 

blue

 

 

 

 

 

BGP

FIB

 

OSPF

 

 

 

 

 

 

2

 

 

 

address

 

 

 

 

 

family

-

 

 

 

 

 

 

blue

 

 

 

 

 

 

 

 

 

 

Redistribute OSPF

 

OSFP

 

 

 

 

 

from VRF blue FIB

 

routerpeer

BGP routes copied between BGP

 

 

 

 

 

 

VRF Device

address-families to facilitate inter-VRF

 

 

 

 

 

 

 

 

communication

 

 

 

 

 

 

 

 

In the diagram above, the following is configured:

OSPF1 is configured in VRF-red, and OSPF1 contains redistribute BGP

OSPF2 is configured in VRF-blue, and OSPF2 contains redistribute BGP

BGP is configured and contains BGP address-families red and blue

Both BGP address-families contain redistribute OSPF

Then route leakage of routes from VRF red to VRF blue occurs as follows:

1.OSPF1 selects appropriate OSPF routes learned from external VRF red OSPF peer and automatically adds them to red FIB route table.

2.OSPF1 routes are imported from red FIB route table into BGP address-family red BGP route table (via the BGP redistribute OSPF command).

3.Via the route-target import command, BGP address-family red BGP routes are selected and copied into BGP address-family blue BGP route table.

4.Appropriate BGP address-family blue BGP routes are selected and automatically added to the VRF blue FIB route table.

5.OSPF2 then imports and redistributes the BGP routes (learned originally from VRF red OSPF peer) into OSPF2 from VRF blue FIB route table (via OSPF redistribute BGP command).

6.Those OSPF routes are then advertised to external VRF blue OSPF peer.

And the same process is used to leak routes from VRF blue to VRF red.

Page 20 Configure VRF-lite

Image 20
Contents How To Configure VRF-lite Introduction What is VRF-lite?Software feature licenses Command summaryWho should read this document? Which products and software version does it apply to?Contents Glossary VRFUnderstanding VRF-lite VRF-lite security domains Route table and interface management with VRF-liteInterface management with VRF Vlan5Route management with VRF Adding a VRF-aware static ARPInter-VRF communication Static and dynamic inter-VRF routing VRF-lite features in AW+ For exampleVRF aware services include Route limiting per VRF instanceVRF-aware utilities within AW+  Ping TCP dump  Telnet client SSH client Configuring VRF-lite Awplusconfig# access-list standardAwplusconfig-if#switchportaccess vlanx Family Awplusconfig-route-map#match ip Static inter-VRF routing Ip route 192.168.50.0/24 Ip route vrf green 192.168.1.0/24Dynamic inter-VRF communication explained Forwarding Information Base FIB and routing protocolsBGP Inter-VRF communication via BGP Using the route-target command Route-target import ASNVRFinstance For exampleRoute-target both ASNVRFinstance For example Can be replaced withAlso, if VRF shared configuration includes If VRF red initially includesIf VRF shared initially includes Via BGP IVR, VRF shared will end up with the routesIf VRF shared configuration includes Then via BGP IVR, VRF red will end up with the routesHow VRF-lite security is maintained Viewing source VRF and attribute information for a prefixSimple VRF-lite configuration examples Multiple VRFs without inter-VRF communication26 Configure VRF-lite Vlan 28 Configure VRF-lite Configure VRF-lite 30 Configure VRF-lite Configure VRF-lite 32 Configure VRF-lite Inter-VRF configuration examples with Internet access Configuration Configure VRF-lite Example B Configuration 38 Configure VRF-lite Configure VRF-lite Example C Configuration 42 Configure VRF-lite Configure VRF-lite  Each VLANs is associated with a VRF instance Configuring a complex inter-VRF solutionNetwork description VRF communication plan Configuration breakdown Configure VRF-lite Configure Vrfs Configure the hardware ACLs 192.168.43.0/24 via the shared VRF This example, three access groups are attached to portWithin the same IP subnet that the switch port is a member Configure Vlan Database Configure IP Addresses Configure VRF-lite Configure Dynamic Routing Configure VRF-lite 56 Configure VRF-lite Configure Static Routing Complete show run output from VRF device is below Configure VRF-lite 60 Configure VRF-lite Configure VRF-lite IP route table from VRF device is below VRF blue Hostname Internetrouter Hostname sharedrouter Hostname redospfpeer N1 Ospf NssaHostname greeniBGPpeer Hostname bluerippeer Hostname orangerouter Hostname orangeospfpeer Other features used in this configuration VCStack and VRF-liteStack provisioning GreyX610 VCStack configuration Virtual Chassis IDX900 configuration 74 Configure VRF-lite Sharing VRF routing and double tagging on the same port Communication planGreen PortX610 B ConfigurationsX610 a Configure VRF-lite Additional notes BGP configuration tips 80 Configure VRF-lite VRF device Red router vlan database Red router Configuring static route limits Route Limits100 Configuring Dynamic route limitsAllowed number of fib routes excluding Connect and Static No max-fib-routes SyntaxVRF-lite usage guidelines Routing general Useful VRF-related diagnostics command listGeneral Routing protocols IP prefix network, e.g HW platform table commands TCPdump

C613-16164-00 REV E specifications

The Allied Telesis C613-16164-00 REV E is a robust networking device designed to enhance connectivity and communication within enterprise environments. Renowned for its reliability and efficiency, this device serves as an ideal choice for organizations seeking to improve their network infrastructure.

At its core, the C613-16164-00 REV E is a part of Allied Telesis' suite of products that adhere to high-performance standards. One of the main features is its support for both Layer 2 and Layer 3 networking, making it versatile enough to handle a variety of network configurations. This capability allows for seamless integration into different network architectures, whether for simple local area networks (LANs) or more advanced setups with routing capabilities.

Another significant characteristic of the C613-16164-00 REV E is its high-speed data transfer capabilities. With support for Gigabit Ethernet, the device ensures that data can be transmitted quickly and efficiently across the network. This is particularly important for businesses that rely on heavy data usage and need to maintain performance standards even during peak hours.

Additionally, the C613-16164-00 REV E features advanced security measures, including VLAN support and port security configurations, which help protect sensitive information and prevent unauthorized access. This is essential for businesses that handle confidential data and must comply with industry regulations.

In terms of manageability, the device supports SNMP (Simple Network Management Protocol), allowing for easy monitoring and management of network resources. Network administrators can efficiently manage the device and optimize performance with minimal effort, improving overall productivity.

The design of the C613-16164-00 REV E is also noteworthy; it is built for durability, often featuring a compact form factor that makes installation straightforward without compromising on performance. Its compatibility with various Allied Telesis products ensures that organizations can build a cohesive network ecosystem.

In conclusion, the Allied Telesis C613-16164-00 REV E stands out as an excellent networking solution characterized by its support for multiple networking layers, high-speed data transfer, and robust security features. Ideal for both small to medium enterprises and larger organizations, it helps ensure that businesses can maintain efficient and secure operations in a constantly evolving digital landscape.