Implementing Routing Policy on Cisco IOS XR Software

Information About Implementing Routing Policy

Policy four could be rewritten in an equivalent way as follows:

route-policy four-equivalent set weight 100

set med 200

set community (2:666) additive pass

end-policy

Note The pass statement is not required and can be removed to represent the equivalent policy in another way.

Policy Verification

Several different types of verification occur when policies are being defined and used.

Range Checking

As policies are being defined, some simple verifications, such as range checking of values, is done. For example, the MED that is being set is checked to verify that it is in a proper range for the MED attribute. However, this range checking cannot cover parameter specifications because they may not have defined values yet. These parameter specifications are verified when a policy is attached to an attach point. The policy repository also verifies that there are no recursive definitions of policy, and that parameter numbers are correct. At attach time, all policies must be well formed. All sets and policies that they reference must be defined and have valid values. Likewise, any parameter values must also be in the proper ranges.

Incomplete Policy and Set References

As long as a given policy is not attached at an attach point, the policy is allowed to refer to nonexistent sets and policies, which allows for freedom of workflow. You can build configurations that reference sets or policy blocks that are not yet defined, and then can later fill in those undefined policies and sets, thereby achieving much greater flexibility in policy definition. Every piece of policy you want to reference while defining a policy need not exist in the configuration. Thus, a user can define a policy sample that references the policy bar using an apply statement even if the policy bar does not exist. Similarly, a user can enter a policy statement that refers to a nonexistent set.

However, the existence of all referenced policies and sets is enforced when a policy is attached. If you attempt to attach the policy sample with the reference to an undefined policy bar at an inbound BGP policy using the neighbor 1.2.3.4 address-family ipv4 unicast policy sample in command, the configuration attempt is rejected because the policy bar does not exist.

Likewise, you cannot remove a route policy or set that is currently in use at an attach point because this removal would result in an undefined reference. An attempt to remove a route policy or set that is currently in use results in an error message to the user.

A condition exists that is referred to as a null policy in which the policy bar exists but has no statements, actions, or dispositions in it. In other words, the policy bar does exist as follows:

route-policy bar end-policy

This is a valid policy block. It effectively forces all routes to be dropped because it is a policy block that never modifies a route, nor does it include the pass statement. Thus, the default action of drop for the policy block is followed.

Cisco IOS XR Routing Configuration Guide

RC-218

Page 234
Image 234
Cisco Systems IOS XR manual Policy Verification, Range Checking, Incomplete Policy and Set References, RC-218

IOS XR specifications

Cisco Systems IOS XR is an advanced operating system designed specifically for high-performance routers and service provider networks. It serves as the backbone for many of Cisco's high-end routing platforms, enabling service providers to manage their networks with increased efficiency, flexibility, and scalability.

One of the main features of IOS XR is its modular architecture. This allows for the independent operation of various components within the OS, facilitating the deployment of new features and updates without affecting the overall stability of the system. This modularity ensures that service providers can implement rapid changes and enhancements while maintaining service continuity.

Another characteristic of IOS XR is its support for 64-bit architecture, which provides enhanced performance and the ability to manage larger amounts of data. This is particularly beneficial for service providers that deal with high traffic volumes and require robust data processing capabilities. The utilization of 64-bit technology also enables the operating system to utilize memory more efficiently, allowing for greater scalability.

IOS XR incorporates advanced technologies such as Distributed System Architecture (DSA) and Multiple Routing Instances (Merging Routes). DSA allows for the distribution of routing processes across multiple hardware resources, maximizing performance and redundancy. Multiple Routing Instances enable operators to create separate logical routing tables for different services, improving isolation and efficiency in managing network traffic.

The operating system also focuses heavily on security, featuring extensive encryption methods and access controls to safeguard network resources. IOS XR supports various authentication protocols, ensuring secure access to routers and switches. In addition, the OS includes comprehensive logging and monitoring capabilities, allowing network administrators to track activities and respond quickly to potential threats.

Another critical aspect of IOS XR is its adherence to the principles of service-oriented architecture (SOA). This approach permits the development of applications and services that can operate independently, fostering innovation and enabling service providers to tailor their offerings based on customer demands.

Ultimately, Cisco IOS XR is a powerful, reliable operating system that meets the complex needs of modern telecommunications networks. With its focus on modularity, performance, security, and scalability, it enables service providers to deliver high-quality, resilient services to their customers while efficiently managing network resources. As the industry continues to evolve, IOS XR remains a vital tool for those aiming to stay competitive in the ever-changing landscape of networking.