Allied Telesis C613-16164-00 REV E manual Configure Dynamic Routing

Page 54

Configuring a complex inter-VRF solution

Configure Dynamic routing protocols are configured as required and associated with each VRF. routing

OSPF instance 1 is associated with VRF red. OSPF instance 2 is associated with VRF orange. RIP and BGP use address-families as the equivalent of OSPF instances. A RIP ipv4 address- family is created and associated with VRF blue. Appropriate IP networks are allocated to each routing protocol instance or address-family. BGP inter-VRF routes are imported and redistributed via each routing protocol instance or address-family. This allows each external peer router connected in each VRF domain to be taught filtered routes to subnets in VRF shared.

The command default-information originate ensures that OSPF or RIP within each VRF instance redistributes, and advertises to external peers in each VRF instance, a static default route to access the Internet via VRF shared.

CONFIGURE DYNAMIC ROUTING

awplus(config)#router ospf 1 red awplus(config-router)#network 192.168.10.0/24 area 0 awplus(config-router)#redistribute bgp awplus(config-router)#default-information originate awplus(config-router)#exit awplus(config)#router ospf 2 orange awplus(config-router)#network 192.168.40.0/24 area 0 awplus(config-router)#redistribute static awplus(config-router)#redistribute bgp awplus(config-router)#default-information originate awplus(config-router)#exit awplus(config)#router rip awplus(config-router)#address-family ipv4 vrf blue awplus(config-router-af)#network 192.168.30.0/24 awplus(config-router-af)#redistribute bgp awplus(config-router-af)#default-information originate awplus(config-router-af)#exit-address-family awplus(config-router)#exit

BGP with ASN 100 is configured. BGP is used to provide inter-VRF communication.

BGP address-families are created. Each BGP address-family is associated with a VRF instance, excluding VRF overlap. There is no route leakage to or from VRF overlap, so VRF overlap does not require an associated BGP address-family to be configured.

Via the address-families, routes (prefixes) from each routing protocol associated with each VRF instance are redistributed into BGP100. Via the VRF export maps, and ACLs they are subsequently leaked to and from VRF shared.

Connected (interface) routes and OSPF instance 1 routes associated with VRF red are imported and redistributed into BGP100.

Page 54 Configure VRF-lite

Image 54
Contents How To Configure VRF-lite Introduction What is VRF-lite?Who should read this document? Software feature licensesCommand summary Which products and software version does it apply to?Contents Glossary VRFUnderstanding VRF-lite Interface management with VRF VRF-lite security domainsRoute table and interface management with VRF-lite Vlan5Route management with VRF Adding a VRF-aware static ARPInter-VRF communication Static and dynamic inter-VRF routing VRF-lite features in AW+ For exampleVRF-aware utilities within AW+ VRF aware services includeRoute limiting per VRF instance  Ping Telnet client  SSH client TCP dump Configuring VRF-lite Awplusconfig# access-list standardAwplusconfig-if#switchportaccess vlanx Family Awplusconfig-route-map#match ip Static inter-VRF routing Ip route 192.168.50.0/24 Ip route vrf green 192.168.1.0/24Dynamic inter-VRF communication explained Forwarding Information Base FIB and routing protocolsBGP Inter-VRF communication via BGP Route-target both ASNVRFinstance For example Using the route-target commandRoute-target import ASNVRFinstance For example Can be replaced withIf VRF shared initially includes Also, if VRF shared configuration includesIf VRF red initially includes Via BGP IVR, VRF shared will end up with the routesIf VRF shared configuration includes Then via BGP IVR, VRF red will end up with the routesHow VRF-lite security is maintained Viewing source VRF and attribute information for a prefixSimple VRF-lite configuration examples Multiple VRFs without inter-VRF communication26 Configure VRF-lite Vlan 28 Configure VRF-lite Configure VRF-lite 30 Configure VRF-lite Configure VRF-lite 32 Configure VRF-lite Inter-VRF configuration examples with Internet access Configuration Configure VRF-lite Example B Configuration 38 Configure VRF-lite Configure VRF-lite Example C Configuration 42 Configure VRF-lite Configure VRF-lite Configuring a complex inter-VRF solution Network description Each VLANs is associated with a VRF instance VRF communication plan Configuration breakdown Configure VRF-lite Configure Vrfs Configure the hardware ACLs This example, three access groups are attached to port Within the same IP subnet that the switch port is a member192.168.43.0/24 via the shared VRF Configure Vlan Database Configure IP Addresses Configure VRF-lite Configure Dynamic Routing Configure VRF-lite 56 Configure VRF-lite Configure Static Routing Complete show run output from VRF device is below Configure VRF-lite 60 Configure VRF-lite Configure VRF-lite IP route table from VRF device is below VRF blue Hostname Internetrouter Hostname sharedrouter Hostname redospfpeer N1 Ospf NssaHostname greeniBGPpeer Hostname bluerippeer Hostname orangerouter Hostname orangeospfpeer Stack provisioning Other features used in this configurationVCStack and VRF-lite GreyX610 VCStack configuration Virtual Chassis IDX900 configuration 74 Configure VRF-lite Green Sharing VRF routing and double tagging on the same portCommunication plan PortConfigurations X610 aX610 B Configure VRF-lite Additional notes BGP configuration tips 80 Configure VRF-lite VRF device Red router vlan database Red router Configuring static route limits Route LimitsConfiguring Dynamic route limits Allowed number of fib routes excluding Connect and Static100 No max-fib-routes SyntaxVRF-lite usage guidelines Useful VRF-related diagnostics command list GeneralRouting general Routing protocols IP prefix network, e.g HW platform table commands TCPdump

C613-16164-00 REV E specifications

The Allied Telesis C613-16164-00 REV E is a robust networking device designed to enhance connectivity and communication within enterprise environments. Renowned for its reliability and efficiency, this device serves as an ideal choice for organizations seeking to improve their network infrastructure.

At its core, the C613-16164-00 REV E is a part of Allied Telesis' suite of products that adhere to high-performance standards. One of the main features is its support for both Layer 2 and Layer 3 networking, making it versatile enough to handle a variety of network configurations. This capability allows for seamless integration into different network architectures, whether for simple local area networks (LANs) or more advanced setups with routing capabilities.

Another significant characteristic of the C613-16164-00 REV E is its high-speed data transfer capabilities. With support for Gigabit Ethernet, the device ensures that data can be transmitted quickly and efficiently across the network. This is particularly important for businesses that rely on heavy data usage and need to maintain performance standards even during peak hours.

Additionally, the C613-16164-00 REV E features advanced security measures, including VLAN support and port security configurations, which help protect sensitive information and prevent unauthorized access. This is essential for businesses that handle confidential data and must comply with industry regulations.

In terms of manageability, the device supports SNMP (Simple Network Management Protocol), allowing for easy monitoring and management of network resources. Network administrators can efficiently manage the device and optimize performance with minimal effort, improving overall productivity.

The design of the C613-16164-00 REV E is also noteworthy; it is built for durability, often featuring a compact form factor that makes installation straightforward without compromising on performance. Its compatibility with various Allied Telesis products ensures that organizations can build a cohesive network ecosystem.

In conclusion, the Allied Telesis C613-16164-00 REV E stands out as an excellent networking solution characterized by its support for multiple networking layers, high-speed data transfer, and robust security features. Ideal for both small to medium enterprises and larger organizations, it helps ensure that businesses can maintain efficient and secure operations in a constantly evolving digital landscape.