Home > Articles > Cisco Certification > CCIE > CCIE Practical Studies: Configuring Route-Maps and Policy-based Routing

CCIE Practical Studies: Configuring Route-Maps and Policy-based Routing

  • Sample Chapter is provided courtesy of Cisco Press.
  • Date: Nov 26, 2003.

Chapter Description

Route maps are like duct tape for the network—they can be applied to numerous situations to address many issues. At times, they may not be the most "pretty solutions," but they will be very effective. Karl Solie and Leah Lynch show you how to configure and use route maps.

Perhaps one of the most colorful descriptions for route maps is that route maps are like duct tape for the network—not necessarily because they can be used to fix or mend something broken, but because they can be applied to numerous situations to address many issues. At times, they may not be the most "pretty solutions," but they will be very effective. After you learn to configure and use route maps, you will soon see why some engineers refer to them as route tape. In policy-based routing (PBR), for instance, you may use a route map when traffic has to follow a particular path through the internetwork. This path may differ from the path the routing protocol wants to forward traffic on. PBR, along with route maps, enables the network engineer to essentially override the route table and influence which way traffic flows.

You also can apply route maps in a number of ways. The following list contains some of the more common and powerful applications of route maps:

  • Route filtering during redistribution between routing protocols

  • Route control and attribute modification on BGP neighbors

  • Route metric modification or tagging during redistribution between routing protocols

  • Policy-based routing (PBR)

After you have route maps in your engineering tool kit, you will have one of the most powerful and versatile configuration options available on Cisco routers. This chapter discusses how to configure and use route maps and how to configure PBR.

Route Map Overview

Route maps are much like the "If . . . Then . . ." statements of many programming languages. If a certain condition is true, then do something. Route maps enable you to define routing policy that will be considered before the router examines its forwarding table; therefore, you can define routing policy that takes precedence over the different route processes. This is why route maps are some of the most powerful commands you can use on a router. Example 2-1 highlights route map logic.

Example 2-1 Route Map Logic

route-map route_map_name permit 10
 match criteria_1
 set perform_action_1
route-map route-map_name permit 20
 match criteria_2
 set perform_action_2
 set perform_action_3
route-map route-map_name permit 30
 match criteria_3 criteria_4 criteria_5
 set perform_action_2
 set perform_action_4
 set perform_action_5
route-map route-map_name deny 65536  _implicit deny at the end
 match everything

In a nutshell, route maps work in the following manner:

  1. Essentially, a process—whether it is a redistribution process, policy routing, or some other process such as Network Address Translation (NAT)—calls a route map by a text-based name.

  2. The route map, in turn, has conditions or match statements, which are usually, but not always, an access list or extended access list. Border Gateway Protocol (BGP), for instance, can match on an autonomous system number (ASN) or different attributes. The match statement(s) can be followed by set statements.

  3. If the match statement returns a true result, the set statement(s) are executed.

Example 2-2 shows how a route map functions during redistribution.

Example 2-2 Route Map Function During Redistribution

router ospf 2001
 redistribute eigrp 65001 subnets route-map route_map_name  _Call the route-map    
            _and send EIGRP routes for comparison
!
route-map route_map_name permit 10  _Route-map with the lowest sequence number
          gets executed first
 match ip address access_list   _Call access-list, the IF of the route-map
 set condition       _If access-list is true, THEN do something
!
route-map route_map_name permit 20  _Next highest sequence number
          gets executed
 match ip address access_list   _Call access-list, the IF of the route-map
 set condition       _If access-list is true, THEN do something
!
route-map route_map_name deny 65536 _Implicit deny at the end all route-maps
 match ip address all_routes   This will not show up in the config

The next example is the syntax of an actual route map. Example 2-3 demonstrates how a route map can be applied during redistribution.

Example 2-3 Route Map Application During Redistribution

router ospf 65
 log-adjacency-changes
 log-adjacency-changes
 redistribute eigrp 65001 subnets route-map set_tag _Call the route-map "set_tag"
 network 10.10.3.0 0.0.0.255 area 0
 default-metric 10
!
access-list 10 permit 172.16.32.0 0.0.0.255 _Match the 172.16.32.0/24 subnet
access-list 11 permit 172.16.1.0 0.0.0.255 _ Match the 172.16.1.0/24 subnet
!
route-map set_tag permit 100  _Route-map "set_tag"
 match ip address 10    _Call access-list 10, if this is true then_
 set tag 10      _If access-list is true set the tag of 10
!
route-map set_tag permit 200  _If no match above, try and match the following: 
 match ip address 11     _access list 11
 set metric-type type-1   _If the ACL is true, set the OSPF metric type to 1
 set tag 11      _and set a tag of 11
!
route-map set_tag permit 300
 set tag 300      _All other routes get a tag of 300
!

In the preceding example, a route map is used to control and tag the routes from Enhanced Interior Gateway Routing Protocol (EIGRP) when they are redistributed into Open Shortest Path First (OSPF). During the OSPF redistribution process, a route map titled set_tag is called. The route map consists of three parts. The first part calls access control list (ACL) 10, which will permit the network 172.16.32.x and set a tag of 10. The second part calls ACL 11, which in turn matches IP address 172.16.1.x. If a match occurs, the metric will be set such that when the route is redistributed, it becomes an OSPF type 1 route; finally, the tag will be set to 11. The last part of the route map doesn't call an ACL, so all routes are matched, and the set condition is applied. In this example, the router is setting the tag to 300. You can set tags in this manner to help document the network, or you can use the tags to identify routes that you may want to filter or perform some other action on.

Route maps have the following common characteristics:

  • Route maps are executed in the order of the lowest sequence number to the highest. You can edit or modify maps by using the sequence number.

  • If a match is found within a route map instance, execution of further route map instances stops.

  • You can use route maps to permit or deny the information found true by the match statements.

  • If multiple match statements are called within a single route map instance, all match statements must match for the route map instance to yield a true result.

  • If route maps are applied in a policy-routing environment, packets that do not meet the match criteria are then forwarded according to the route table.

  • If there is no match statement in the route map instance, all routes and packets are matched. The set statement will apply to all routes or packets.

  • If there is not a corresponding ACL to the match statement in the route map instance, all routes are matched. The set statement, in turn, applies to all routes.

  • As with ACLs, an implicit deny is included at the end of the route map policy.

  • You can use route maps to create policies based on the following:

    • IP address

    • End-system ID

    • Application

    • Protocol

    • Packet size

Configuring Route Maps

The route map syntax is composed of roughly three separate Cisco commands, depending on what the route map is accomplishing and what type of process is calling it. This discussion covers the following commands in detail as route maps are configured throughout this chapter:

  • route-map commands

  • match commands

  • set commands

When configuring route maps, you can follow a basic five-step configuration process. Depending on the route map application, additional configuration may be needed, such as with BGP communities or PBR.

Step 1

(Optional) Configure any ACLs, AS_PATH list, or any other match criteria that the route map may be using on the match commands. This should be done first, so you do not call an empty ACL or AS-PATH list.

Step 2

Configure the route map instance. This is accomplished with the route-map name permit | deny sequence_number command. Be sure to leave room in between the sequence numbers for future updates or modifications. The route map instance with the lowest sequence number is executed first.

Step 3

Define the match criteria and configure the match statements that will be used in this single route map instance. You do this with the route map configuration match command. In the absence of any match commands, all packets or routes are matched.

Step 4

(Optional) Define the set criteria and configure the set statements that will be used in this single route map instance. You can do so with the route map configuration set command.

Step 5

(Optional) Configure any ACLs, AS_PATH list, or any other match criteria that the route map may be using on the match commands.

Step 6

Apply the route map. Once again, depending on the route map application, it can be applied in many ways. Some of the more common applications include route redistribution, PBR, and BGP.


With this configuration process in mind, we will discuss in more detail the three primary commands used to configure route maps.

route-map Commands

The complete syntax for the route-map command is as follows:

route-map route_map_name [permit_|_deny][sequence_number_1-65535] 

The route_map_name, also called the map tag, is the text-based name of the route map. The name is unique and logically groups and defines the entire route map policy. This is the name that you use to call the route map during redistribution and other processes.

The permit and deny keywords are optional; the default keyword is permit. If the route map is called from a redistribution process, the keyword is set to permit, and the match criteria are met for the route map, the route(s) are redistributed. If the keyword were set to deny, in the same scenario the route(s) would be denied.

If the route map is called from a policy-routing statement, the match criteria are met for the route map, and the keyword is set to permit, the packet would be policy routed. Once again, permit is the default keyword. If the deny keyword is used, the packet is forwarded according to the normal route process.

The sequence-number indicates in what order the route map statements will be executed. When a route map is called, the route map with the lowest sequence number is executed first. If a match is not found in the route map with the lowest sequence number, the route map with the next highest sequence number is executed. This process repeats itself until a match is found or no more route map statements exist. If a match is found, execution for that individual packet or route stops, and the next packet or route begins the process again starting with the route-map statement with the lowest sequence number. The default sequence number is 10.

NOTE

When creating route maps, leave room in between sequence numbers for future editing. Begin your first route map with a sequence of 10 or 100, depending on how big you expect the route map to be. By using increments of 10 or 100, you leave room for 65 to 650 route map instances. Starting at a higher sequence number and leaving space in between your sequence numbers will make editing your route maps easier. The maximum route map instance is 65,535.

match Commands

The match commands enable you to define the criteria of the route map. For instance, you can use the match command to call an ACL to compare routes against. The match statement could also match a route tag, a route type, or the length of a packet. BGP offers many exclusive match statements that are discussed in Chapters 4 and 5. Table 2-1 lists the match parameters available in Cisco IOS Software Release 12.2.

Table 2-1 match Commands in Cisco IOS Software 12.2

Command What It Matches
as-path BGP AS_PATH list
clns CLNS1* information
community BGP community list
extcommunity BGP/VPN2** extended community list
interface First-hop interface of a route
ip IP-specific information
length Packet length
metric Route metric
route-type Route type
tag

Route tag

The match ip address command is by far the most commonly used of the match commands. The match ip address command enables you to call a standard, extended, or expanded-range ACL. You can use it during redistribution, with BGP, NAT, and during policy routing, as well as for other functions. The syntax for this match command is as follows:

match ip {address [access_list | prefix-list] | next-hop [access_list] | 
[ccc]route-source [access_list | prefix-list]} 

In IP networks, this command enables you to match routes that have a network address matching one or more in the specified ACL or prefix list. You can use a standard, extended, or expanded-range ACL.

The next-hop keyword enables you to match routes that have a next-hop address matching one or more in the specified ACL. This is primarily used in BGP.

The route-source keyword enables you to match the advertising router's IP address of the route/network. You can use a standard, extended, or expanded-range ACL. For BGP, you may also use a prefix list.

NOTE

When using the match ip address command in BGP, you can use route maps only to filter outbound updates. The use of a match ip address route map is not supported on inbound BGP updates.

The next-hop keyword is used primarily in BGP, but it can also be used when redistributing routes based on the next-hop IP address that correlates to the route. In this case, the router will examine the NEXT_HOP attribute for this comparison.

The route-source keyword enables you to match a router's advertising IP address. If you view the IP route table, and route 172.16.3.0/24 is advertised from the IP address of 172.16.2.1, for instance, the route-source keyword is used to match the advertising router's IP address of 172.16.2.1. In the next sections, these commands are applied to practical examples to show you how they function.

Practical Example: Matching the Route Source and IP Address

In this model, four routers on a common LAN segment are running two routing protocols. The routers earp and holliday are running EIGRP as the routing protocol, and the routers ringo and clanton are running OSPF. The router ringo is functioning as an OSPF autonomous system boundary router (ASBR) by redistributing between EIGRP and OSPF. The ringo router is receiving several routes from the earp and holliday routers, as depicted in Figure 2-1.

In this practical example, a route map is applied during the redistribution of EIGRP into OSPF on the ringo router. The route map named set_tag3 is called on the redistribution process for OSPF on the ringo router. The first route map instance, route-map set_tag3 permit 100, will perform a match on IP route-source. This statement will match only routes where the advertising IP address is found in ACL 5—in this case, the address 172.16.10.3. Not only will these routes be allowed for redistribution, but the tag of 3 will also be set.

Figure 1Figure 2-1 Route Map Practical Example: Matching the Route Source and IP Address

NOTE

When using a route map with OSPF, the advertising OSPF router ID becomes the route source. Use the OSPF router ID for the IP address of the route source when using the route-source keyword with OSPF networks.

Example 2-4 lists the forwarding/route table of the ringo router. Notice that routes 172.16.16.0/30, 172.16.33.0/24, and 172.16.34.0/24 are from the earp router, 172.16.10.3. The 172.16.2.0/24 and 172.16.16.4/30 routes are from the holliday router, 172.16.10.4.

Example 2-4 Forwarding/Route Table of the ringo Router

ringo# show ip route
<<<text omitted>>>>
C 192.168.10.0/24 is directly connected, Loopback20
  172.16.0.0/16 is variably subnetted, 6 subnets, 2 masks
D  172.16.33.0/24 [90/1812992] via 172.16.10.3, 00:07:13, Ethernet0
D  172.16.34.0/24 [90/1812992] via 172.16.10.3, 00:07:13, Ethernet0
D  172.16.16.4/30 [90/2195456] via 172.16.10.4, 00:07:13, Ethernet0
D  172.16.16.0/30 [90/1787392] via 172.16.10.3, 00:07:13, Ethernet0
C  172.16.10.0/24 is directly connected, Ethernet0
D  172.16.2.0/24 [90/307200] via 172.16.10.4, 00:07:14, Ethernet0
ringo#

Example 2-5 lists the configuration of the route map on the ringo router.

Example 2-5 Configuration of the ringo Router

!
interface Loopback20
 ip address 192.168.10.10 255.255.255.0
!
interface Ethernet0
 ip address 172.16.10.10 255.255.255.0
!
<<<text omitted>>>
!
router eigrp 65001
 network 172.16.0.0
 network 192.168.10.0
 no auto-summary
 no eigrp log-neighbor-changes
!
router ospf 7
 log-adjacency-changes
 redistribute eigrp 65001 subnets route-map set_tag3 _Route-map called
 network 172.16.10.10 0.0.0.0 area 0
 default-metric 10
!
access-list 5 permit 172.16.10.3  _Match route 172.16.10.3 only
access-list 50 permit any   _Match all remaining routes
!
route-map set_tag3 permit 100
 match ip route-source 5    _Match routes from 172.16.10.3 / ACL 5
 set tag 3       _set the tag to three
!
route-map set_tag3 permit 200  _Second Route-map instance
 match ip address 50     _Call access-list 50 to match all routes
 set metric-type type-1    _Set OSPF route type to External Type-1
 set tag 500       _Set the tag to 500 for these routes

In the preceding example, the second instance of the route map calls ACL 50. Access list 50 will allow the remaining routes to be redistributed and will set a tag of 500 and the metric-type to an OSPF type-1 external.

By viewing the OSPF database, you can clearly see the tags and how redistribution is working. Example 2-6 demonstrates the show ip ospf database command on the ringo router.

Example 2-6 show ip ospf database Command

ringo# show ip ospf database
   OSPF Router with ID (192.168.10.10) (Process ID 7)
    Router Link States (Area 0)
Link ID   ADV Router  Age   Seq#  Checksum Link count
172.16.10.5  172.16.10.5  1005  0x8000000B 0x18D8 1
192.168.10.10 192.168.10.10 1027  0x8000000A 0x7017 1
    Net Link States (Area 0)
Link ID   ADV Router  Age   Seq#  Checksum
172.16.10.5  172.16.10.5  1005  0x8000000A 0x75DA
    Type-5 AS External Link States
Link ID   ADV Router  Age   Seq#  Checksum Tag
172.16.2.0  192.168.10.10 1027  0x80000009 0x10E0 <Anchor0>500

172.16.16.0  192.168.10.10 1027  0x80000009 0xD285 3
172.16.16.4  192.168.10.10 1027  0x80000009 0x3BA6 <Anchor1>500

172.16.33.0  192.168.10.10 1027  0x80000009 0x291B 3
172.16.34.0  192.168.10.10 1027  0x80000009 0x1E25 3
192.168.10.0 192.168.10.10 1027  0x80000009 0x8BB0 <Anchor2>500

ringo#

Examining the route table of a downstream OSPF router, such as clanton, you can see the effects of the set metric-type type-1 command. Notice in Example 2-6 that the 172.16.2.0/24, 192.168.10.0/24, and 172.16.16.4/30 routes are OSPF external type 1 routes. Normally, or by default, the routes would be OSPF external type 2 routes. For more information on the different link-state advertisement (LSA) types and their use, refer to CCIE Practical Studies, Volume I. You will learn more about the various set commands in the upcoming section. Example 2-7 lists the forwarding table of the clanton router.

Example 2-7 Route Table of the clanton Router

clanton# show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
  D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
  N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
  E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
  i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
  U - per-user static route, o - ODR
Gateway of last resort is not set
O E1 192.168.10.0/24 [110/20] via 172.16.10.10, 04:47:26, Ethernet0/0
  172.16.0.0/16 is variably subnetted, 6 subnets, 2 masks
O E2 172.16.33.0/24 [110/10] via 172.16.10.10, 04:47:27, Ethernet0/0
O E2 172.16.34.0/24 [110/10] via 172.16.10.10, 04:47:27, Ethernet0/0
O E1 172.16.16.4/30 [110/20] via 172.16.10.10, 04:47:27, Ethernet0/0
O E2 172.16.16.0/30 [110/10] via 172.16.10.10, 04:47:27, Ethernet0/0
C  172.16.10.0/24 is directly connected, Ethernet0/0
O E1 172.16.2.0/24 [110/20] via 172.16.10.10, 04:47:27, Ethernet0/0
clanton#

BGP uses many specific match commands, as the next couple of examples show. BGP can use route maps to call an AS-Path rather than an ACL to control routing information. Table 2-2 lists the syntax for the match as-path command.

Table 2-2 match as-path Command

Command

Description

match as-path [1-199]

Used in BGP to match an autonomous system list. The valid path list is 1–199.


You can use this command in BGP to match the autonomous system path (AS_PATH) attribute.

Another BGP-specific match command is match community. You can use route maps to match and set the COMMUNITY attribute(s) in BGP.

The syntax for the match community command is as follows:

match [community|extcommunity|exactmatch]

The community keyword is used in BGP to call an IP community list. The valid range is 1 through 99 for a standard community list, and 100 through 199 for an expanded community list; alternatively, you can use exact-match to perform precise matching of communities.

You can use route maps to base the selection of the global address pool on the output interface as well as an ACL match for NAT. The match interface command is used in NAT applications. You can also use it to match routes whose next-hop address is an interface, such as a static route pointing at an interface. Table 2-3 shows the syntax for the match interface command.

Table 2-3 match interface Command

Command

Description

match interface interface_name

Used in route maps for NAT to match the output interface, or routes that have an interface as the next-hop address rather than an IP address.


Tags very effectively enable you to control and track routes during redistribution. Cisco routers enable the network engineer to mark certain routes with a numeric value. A tag value is an extra value that is transported along by the routing protocol. The tag value does not influence router forwarding decisions and has no intrinsic value to the routing protocol. The tag is used primarily during redistribution to tag or flag routes. After a route has been tagged, the tag value can be acted on during the redistribution process to control route redistribution. Tags are supported in RIPv2, OSPF, Integrated IS-IS, EIGRP, BGP, and CLNS. IGRP and RIPv1 do not support tags. To view tags, use the show eigrp topology ip_address subnet_mask and the show ip ospf database commands for EIGRP and OSPF, respectively. You can also view the tag value by using the extended show ip route command show ip route ip_address.Table 2-4 shows the syntax for the match tag command.

Table 2-4 match tag Command

Command

Description

match tag [0-4294967295]

Use the match tag command to match tag values in routing protocols such as RIPv2, IS-IS, OSPF, EIGRP, BGP, and CLNS.


You can also use route maps to match specific route types in Cisco IOS Software 12.0. For instance, you can match EIGRP external routes or OSPF external type 1 or type 2 routes. The match route-type keyword enables you to match the following route types:

  • OSPF external type 1 (O E1) and type 2 routes (O E2), NSSA external type 1 (O N1) type 2 (O N2), intra-area routes (O), and interarea routes (O IA)

  • EIGRP external routes (D EX)

  • IS-IS level 1 routes (L1) and level 2 routes (L2)

  • BGP external routes

The syntax for the match route-type command is as follows:

Match route-type {local|internal|external[type-1|type-2]|level-1|level2|nssa-external}

You can use the following keywords with the match route-type command:

External—External route (BGP, EIGRP, and OSPF type 1/2)

Internal—Internal route (including OSPF intra/interarea and EIGRP routes)

level-1—IS-IS level 1 route

level-2—IS-IS level 2 route

local—BGP locally generated route

nssa-external—NSSA external route

Although you can use multiple match statements in a single line, you should use only one match criterion per line. This will make troubleshooting and modifying the route map easier.

Practical Example: Matching Tags

Manipulating the model from the preceding practical example, the following example has the router clanton running OSPF and IGRP as the routing protocols. The clanton router will call a route map on redistribution. This route map will redistribute routes with a tag of 3 and OSPF external type 1 (O E1) routes into IGRP. Figure 2-2 shows the new network model.

Figure 2Figure 2-2 Route Map Practical Example: Matching Tags

Example 2-8 lists the route table of the clanton router, with the OSPF external type-1 routes highlighted. Example 2-9 lists the OSPF database on the clanton router, highlighting the routes that have a tag of 3.

Example 2-8 Route Table of the clanton Router

clanton# show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
  D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
  N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
  E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
  i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
  U - per-user static route, o - ODR
Gateway of last resort is not set
O E1 192.168.10.0/24 [110/20] via 172.16.10.10, 01:59:17, Ethernet0/0
  172.16.0.0/16 is variably subnetted, 6 subnets, 2 masks
O E2 172.16.33.0/24 [110/10] via 172.16.10.10, 01:49:44, Ethernet0/0
O E2 172.16.34.0/24 [110/10] via 172.16.10.10, 01:49:44, Ethernet0/0
O E2 172.16.16.0/30 [110/10] via 172.16.10.10, 01:49:44, Ethernet0/0
C  172.16.10.0/24 is directly connected, Ethernet0/0
O E2 172.16.2.0/24 [110/10] via 172.16.10.10, 01:49:44, Ethernet0/0
  10.0.0.0/24 is subnetted, 1 subnets
O E1 10.10.3.0 [110/20] via 172.16.10.10, 01:59:18, Ethernet0/0
clanton#

Example 2-9 OSPF Database of the clanton Router

clanton# show ip ospf database
  OSPF Router with ID (172.16.10.5) (Process ID 7)

    Router Link States (Area 0)
Link ID   ADV Router  Age   Seq#  Checksum Link count
172.16.10.5  172.16.10.5  557   0x80000006 0x22D3 1
192.168.10.10 192.168.10.10 1642  0x80000005 0x7A12 1
    Net Link States (Area 0)
Link ID   ADV Router  Age   Seq#  Checksum
172.16.10.5  172.16.10.5  557   0x80000005 0x7FD5
    Type-5 AS External Link States
Link ID   ADV Router  Age   Seq#  Checksum Tag
10.10.3.0  192.168.10.10 1642  0x80000004 0x9904 500
172.16.2.0  192.168.10.10 1133  0x80000005 0x87DF 3
172.16.16.4  192.168.10.10 1642  0x80000004 0x45A1 500
172.16.33.0  192.168.10.10 1133  0x80000005 0x3117 3
172.16.34.0  192.168.10.10 1133  0x80000005 0x2621 3
192.168.10.0 192.168.10.10 1643  0x80000004 0x95AB 500
clanton#

To control redistribution between OSPF and IGRP, use a route map on the redistribution process. The route map to accomplish must have two route map instances. The first route map instance will match all routes in OSPF that have a tag value of 3. The second route map instance will match OSPF external type 1 routes. Example 2-10 lists the significant portions of the configuration on the clanton router.

Example 2-10 Route Map Configuration on the clanton Router

hostname clanton
!
router ospf 7
 network 172.16.10.5 0.0.0.0 area 0
!
router igrp 65002
 redistribute ospf 7 route-map match_me _Redistribute OSPF and call the route-map
 network 172.16.0.0
 default-metric 10000 100 254 1 1500
!
route-map match_match_me permit 10
 match tag 3        _Match routes with a tag 3
!
route-map match_match_me permit 20
 match route-type external type-1   _Match OSPF external type-1 routes

To verify redistribution and that the route maps worked properly, view the route table of the mclaury router. Example 2-11 lists the route table of the mclaury router. Notice that routes with a tag value of 3 are present: 172.16.2.0/24, 172.16.33.0/24, and 172.16.34.0/24. Also, notice that the OSPF external type 1 routes are present: 192.168.10.0/24 and 10.0.0.0/8 as summarized subnets.

Example 2-11 Route Table of the mclaury Router

mclaury# show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
  D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
  N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
  E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
  i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
  * - candidate default, U - per-user static route, o - ODR
  P - periodic downloaded static route
Gateway of last resort is not set
I 192.168.10.0/24 [100/1200] via 172.16.10.5, 00:00:50, Ethernet0
  172.16.0.0/24 is subnetted, 4 subnets
I  172.16.33.0 [100/1200] via 172.16.10.5, 00:00:50, Ethernet0
I  172.16.34.0 [100/1200] via 172.16.10.5, 00:00:50, Ethernet0
C  172.16.10.0 is directly connected, Ethernet0
I  172.16.2.0 [100/1200] via 172.16.10.5, 00:00:50, Ethernet0
I 10.0.0.0/8 [100/1200] via 172.16.10.5, 00:00:50, Ethernet0
mclaury#

You can also use route maps to match a route's metric. This is the metric for the route as it appears in the route/forwarding table. If an OSPF route has an associated metric of 20, for instance, match metric 20 is used to match this route. Table 2-5 lists the syntax used with the match metric command.

Table 2-5 match metric Command

Command

Description

match metric [0-4294967295]

Enter the metric value as it appears in the route/forwarding table of the router.


Using Figure 2-1 as a guide, Example 2-12 lists the route table of the clanton router followed by the route map configuration used to match the OSPF routes with a metric of 20. This example redistributes OSPF routes into EIGRP routes that have a metric of 20.

Example 2-12 Demonstration of the match metric Route Map

clanton# show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
  D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
  N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
  E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
  i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
  U - per-user static route, o - ODR
Gateway of last resort is not set
O E1 192.168.10.0/24 [110/20] via 172.16.10.10, 00:19:58, Ethernet0/0
  172.16.0.0/16 is variably subnetted, 6 subnets, 2 masks
O E2 172.16.33.0/24 [110/10] via 172.16.10.10, 00:19:59, Ethernet0/0
O E2 172.16.34.0/24 [110/10] via 172.16.10.10, 00:19:59, Ethernet0/0
O E1 172.16.16.4/30 [110/20] via 172.16.10.10, 00:19:59, Ethernet0/0
O E2 172.16.16.0/30 [110/10] via 172.16.10.10, 00:19:59, Ethernet0/0
C  172.16.10.0/24 is directly connected, Ethernet0/0
O E2 172.16.2.0/24 [110/10] via 172.16.10.10, 00:19:59, Ethernet0/0
  10.0.0.0/24 is subnetted, 1 subnets
O E1 10.10.3.0 [110/20] via 172.16.10.10, 00:19:59, Ethernet0/0

hostname clanton
!
<<<text omitted>>>
!
router ospf 7
 network 172.16.10.5 0.0.0.0 area 0
!
router eigrp 65002
 redistribute ospf 7 route-map match_metric_20
 network 172.16.0.0
 default-metric 10000 100 254 1 1500
!
ip classless
!
route-map match_metric_20 permit 10
 match metric 20
!

In the preceding example, the routes 10.10.3.0/24, 172.16.16.4/30, and 192.168.10.0/24 were redistributed into EIGRP.

The match clns address command is used in ISO CLNS routing much in the same way that it is used in IP routing. The match clns address command calls a CLNS address list and compares the address being testing against it. The next-hop and route-source keywords are used to call an OSI filter set during policy routing. Use the CLNS commands in the same manner as their IP counterparts. The syntax of the match clns command is as follows:

match clns {address [name]|next-hop [filter set]|route-source [filter set]}

Use the match clns address command to match routes that have a network address matching one or more in the specified OSI filter set.

The next-hop keyword is used to match routes that have a next-hop address matching one or more in the specified OSI filter set.

The route-source keyword is used to match routes that have been advertised by routers matching one or more in the specified OSI filter set.

The last match command discussed here is the match length command. This match statement is used primarily in policy routing when ACLs are insufficient for proper traffic distribution. The match length command enables you to match the Layer 3 packet length in bytes, including headers and trailers. You can use a route map such as this to send little interactive packets, such as Telnet traffic, one way, and large bulk-data transfers, such as a large FTP transfer, another way. Table 2-6 lists the syntax for the match length command.

Table 2-6 match length Command

Command

Description

Match length [min_packet_length_0-2147483647] [max_packet_length_0-2147483647]

Used to match the Layer 3 packet length in bytes with all associated headers and trailers included. You must enter the minimum and maximum packet length.


For an example of the match length command, see the later section "Configuring Policy-Based Routing (PBR)."

set Commands

The set commands are executed after a successful match has been made in the route map instance. The set command is optional and may be omitted. If you are using route maps on redistribution, or just to filter networks, for instance, there is no need to use a set command unless you want to tag or further influence the route. If no match statements are present in the route map instance, all set commands are executed for all routes. You may also use multiple set commands in each route map instance. The set commands discussed here are supported in Cisco IOS Software Release 12.2 and are listed in Table 2-7. The set commands have been divided into three categories: BGP-specific set commands, routing protocol/redistribution-specific set commands, and policy-routing specific set commands. The policy-routing specific set commands are covered in the upcoming section "Configuring Policy-Based Routing (PBR)."

Table 2-7 set Commands

set Command

Description

BGP-specific set commands

 

as-path

Prepend string for a BGP AS_PATH attribute

community|extcommunity

Set BGP COMMUNITY attributes

comm-list

BGP community list for deletion

dampening

Set BGP route flap dampening parameters

local-preference

Set BGP LOCAL_PREF path attribute

origin

Set BGP origin code

weight

Set BGP weight

Routing protocol/redistribution-specific set commands

 

metric

Set metric value for destination routing protocol

metric-type

Type of metric for destination routing protocol

tag|automatic-tag

Tag value for destination routing protocol

Policy-routing specific set commands

 

default

Set default routing information

interface

Set the Output interface, used in point-to-point links

ip

IP-specific information


BGP-Specific set Commands

The first set commands covered here are the ones related to BGP. This section discusses the syntax of the various set commands for BGP and their basic application. For more specific and detailed information on the application of the BGP-specific set commands, see Chapter 8, "Introduction to BGP-4 Configuration," and Chapter 9, "Advanced BGP Configuration."

The set as-path command is used in BGP to prepend one or more autonomous systems to the well-known mandatory transitive AS_PATH attribute. In BGP, this can be used to influence routing decisions. BGP views routes that have one or more autonomous systems prepended to the current AS_PATH attribute as less desirable, which can prove useful in a multihomed BGP network.

CAUTION

The purpose of the prepend command is essentially to make the AS_PATH longer—thereby forming a less desirable path—not to completely change it. When using the set as-path prepend command in production environments, always use the same ASN that the route is from. If a different ASN is used, and that autonomous system is encountered by the advertised route, the receiving autonomous system/router will not accept the route. Modifying the AS_PATH by prepending a different autonomous system directly affects the inherent loop prevention provided by the AS_PATH attribute. Some Cisco IOS Software levels will not even enable you to enter an AS_PATH different from your own. For educational purposes, some of the examples in this text show the prepending of different autonomous systems; this is done to highlight the placement of the prepended autonomous system only.

Note an important difference in how the prepend command works with inbound and outbound route maps. When the prepend command is used on outbound route maps, the prepended autonomous system is added after the advertising router's autonomous system. This is because the prepended autonomous system will be in place before the route update is sent. When the update is sent, the advertising router's autonomous system is the first one on the list. If you prepend AS 10 10 to an outbound route map, for instance, and your router's autonomous system is 5, the receiving router/neighbor will have an AS_PATH of 5 10 10.

If you apply the prepend command on an inbound route map, the autonomous system that is prepended will actually precede the originating AS_PATH. This is because the autonomous system prepend is happening after the route has been received from its neighbor. If you prepend AS 10 10 on an inbound route map, and the router/neighbor you are receiving the route from has the AS_PATH of 5 500, for example, the AS_PATH to that route will be 10 10 5 500. The syntax for the set as-path command is as follows:

set as-path {prepend [as_path1|as_path2|as_path3]|[tag]}

Use the set as-path command in BGP networks to modify the AS_PATH attribute, by prepending one or more autonomous systems to it. You can use this command on inbound and outbound route maps.

The tag keyword is used in BGP to recover the AS_PATH information from the tags of Interior Gateway Protocol (IGP)-redistributed routes.

The set as-path tag command is used in BGP when doing redistribution to preserve a consistent and correct AS_PATH across an IGP. The Cisco BGP implementation automatically conveys AS_PATH in the form of a tag when redistributing BGP into an IGP. When redistributing IGP routes into BGP, however, AS_PATH information is lost. To recover the AS_PATH information from the tag of a redistributed IGP, use the set as-path tag command.

Practical Example: Setting the AS_PATH

The network model shown in Figure 2-3 has two routers running BGP between them. The turkey_creek router is in autonomous system 65001, and the ringo router is in autonomous system 65002. The router turkey_creek will advertise the network 192.168.192.0/24 via BGP. In this example, a route map will be used to prepend the AS_PATH with autonomous system 65001 2001 on outbound updates from the turkey_creek router.

Figure 3Figure 2-3 Route Map Practical Example: Setting the AS_PATH

Example 2-13 lists the configuration to manipulate the AS_PATH attribute on the turkey_creek router.

Example 2-13 BGP Configuration of the turkey_creek Router

hostname turkey_creek
!
<<<text omitted>>>
!
router bgp 65001
 no synchronization
 network 192.168.192.0
 neighbor 172.16.100.10 remote-as 65002
 neighbor 172.16.100.10 ebgp-multihop 10
 neighbor 172.16.100.10 update-source Loopback20
 neighbor 172.16.100.10 route-map set_as out  _Call route-map "set_as" for 
             outbound updates
!
route-map set_as permit 10
 set as-path prepend 65001 2001     _prepend AS-PATH with 65001 2001
!

You might be tempted to think that the AS_PATH for route 192.168.192.0/24 would read 65001 2001 65001; after all, the command says "prepend." Because this is an outbound route map, however, the prepended autonomous system will occur before the advertisement is sent. Therefore, the "prepended" AS_PATH will appear after the originating autonomous system to the downstream router. The AS_PATH on the downstream router, the ringo router, will read 65001 65001 2001. Example 2-14 demonstrates this by listing the output of the show ip bgp command on the ringo router.

Example 2-14 show ip bgp Command on the ringo Router

ringo# show ip bgp 192.168.192.0
BGP routing table entry for 192.168.192.0/24, version 4
Paths: (1 available, best #1, table Default-IP-Routing-Table)
 Not advertised to any peer
 65001 65001 2001
 172.16.200.10 (metric 1915392) from 172.16.200.10 (192.168.192.7)
  Origin IGP, metric 0, localpref 100, valid, external, best
ringo#

Example 2-15 applies the route map to inbound updates on the ringo router. The route map will append the AS_PATH 2001 65002 65001 to the routes from the turkey_creek router. Because this is an inbound route map, the final AS_PATH on the ringo router will read 2001 65002 65001 65001. On inbound route maps, the prepend functions like its name implies. Example 2-15 lists the relevant portions of the configuration of the ringo router, followed by the show ip bgp command.

Example 2-15 Configuration of the ringo Router, and the show ip bgp Command

Hostname ringo
!
<<<text omitted>>>
!
router bgp 65002
 no synchronization
 bgp log-neighbor-changes
 neighbor 172.16.200.10 remote-as 65001
 neighbor 172.16.200.10 ebgp-multihop 10
 neighbor 172.16.200.10 update-source Loopback20
 neighbor 172.16.200.10 route-map modify_as in  _Route-map "modify_as" is called
!
route-map modify_as permit 10
 set as-path prepend 2001 65002 65001    _Prepended AS
!
____________________________________________________________
ringo# show ip bgp 192.168.192.0
BGP routing table entry for 192.168.192.0/24, version 2
Paths: (1 available, best #1, table Default-IP-Routing-Table)
 Not advertised to any peer
 2001 65002 65001 65001
 172.16.200.10 (metric 1915392) from 172.16.200.10 (192.168.192.7)
  Origin IGP, metric 0, localpref 100, valid, external, best
ringo#

The set community command is used in BGP to set various community attributes. As discussed in the later chapters on BGP, communities can be a powerful and efficient way to apply policies to a group of routes. The community is an optional transitive route attribute and communicated among BGP peers. The set community command enables you to form community membership. After routes become members of a community, they can be assigned policies, such as "do not export this route to any E-BGP neighbors or advertise this route the Internet community." To send the community attribute in BGP, the neighbor a.b.c.d send-community command must be used.

The syntax for the set community command in Cisco IOS Software Release 12.2 is as follows:

set community {community-number_1-4294967200|AA|NN|no-export|no-advertise |internet
|local-AS [additive]}|none

Use the set community command to designate or form communities from routes and to apply specific policies to those routes. The valid parameters and values are as follows:

  • Community number—A valid number from 1 to 4,294,967,200; the routes will be designated to this community number.

  • AA:NN—This format can also be used to designate communities. The AA is a 16-bit ASN between 1 and 65,535. NN is an arbitrary 16-bit number between 1 and 65,440.

  • Internet—The Internet community. Advertise these routes to the Internet community and any router belonging to it.

  • no-export—Do not advertise these routes to an E-BGP peer. Routes with this community are sent to peers in other subautonomous systems within a confederation.

  • local-as—Do not advertise these routes to peers outside the local autonomous system. These routes will not be advertised to other autonomous systems or subautonomous systems if confederations are in place.

  • no-advertise—Do not advertise these routes to any peer (internal or external). Used for I-BGP peers.

  • Additive—(Optional) Adds the community to the already existing communities.

  • None—Removes the COMMUNITY attribute from the prefixes that pass the route map.

Practical Example: Setting BGP Community Attributes

Consider the same network model from the preceding example, with the turkey_creek and the ringo routers running BGP between them. (See Figure 2-4.) The turkey_creek router is in AS 65001, and the ringo router is in AS 65002. The router turkey_creek will advertise the network 192.168.192.0/24 via BGP and place it in community 7. The turkey_creek router will also advertise another route, 128.168.192.0/24. The turkey_creek router will put this route in community 8 and set the COMMUNITY attribute to no-export. The no-export COMMUNITY attribute will instruct the ringo router not to advertise this route to E-BGP neighbors.

Figure 4Figure 2-4 Route Map Practical Example: Setting Communities

Example 2-16 lists the route map used to accomplish this.

Example 2-16 Route Map for Communities on turkey_creek

Hostname turkey_creek
!
<<<text omitted>>>
!
router bgp 65001
 no synchronization
 network 128.168.192.0 mask 255.255.255.0
 network 192.168.192.0
 neighbor 172.16.100.10 remote-as 65002
 neighbor 172.16.100.10 ebgp-multihop 10
 neighbor 172.16.100.10 update-source Loopback20
 neighbor 172.16.100.10 send-community  _send-community must be enabled
 neighbor 172.16.100.10 route-map set_communities out _route-map "set_communities" called
!
<<<text omitted>>>
!
access-list 10 permit 192.168.192.0 0.0.0.255  _allow network 192.168.192.0/24 only
access-list 11 permit 128.168.192.0 0.0.0.255  _allow network 128.168.192.0/24 only
!
route-map set_communities permit 100
 match ip address 10      _Match ip access-list 10 or 192.168.192.0/24
 set community 7       _set the community to 7
!
route-map set_communities permit 200
 match ip address 11      _Match ip access-list 11 or 128.168.192.0/24
 set community 8 no-export     _set the community to 8 and don't export to
           future E-BGP peers

By observing the routes on the ringo router, you can see that route 192.168.192.0/24 is in community 7. Route 128.168.192.0/24 is in community 8 with the no-export option set. Example 2-17 lists the output of the show ip bgp command on the ringo router.

Example 2-17 Routes with Communities Set on the ring Router

ringo# show ip bgp 192.168.192.0
BGP routing table entry for 192.168.192.0/24, version 3
Paths: (1 available, best #1, table Default-IP-Routing-Table)
 Not advertised to any peer
 65001
 172.16.200.10 (metric 1915392) from 172.16.200.10 (192.168.192.7)
  Origin IGP, metric 0, localpref 100, valid, external, best
  Community: 7
ringo#
ringo#show ip bgp 128.168.192.0
BGP routing table entry for 128.168.192.0/24, version 2
Paths: (1 available, best #1, table Default-IP-Routing-Table, not advertised to
EBGP peer)
 Not advertised to any peer
 65001
 172.16.200.10 (metric 1915392) from 172.16.200.10 (192.168.192.7)
  Origin IGP, metric 0, localpref 100, valid, external, best
  Community: 8 no-export
ringo#

Use the set comm-list delete command to remove the COMMUNITY attribute of an inbound or outbound route update. The syntax is as follows:

set comm-list {[standard | extended community list]} delete

For more examples of the various set communities commands and how they function in BGP, see Chapters 7 through 9 on configuring BGP.

Another BGP-specific feature that you can set is dampening. Because of the long time it takes BGP networks to converge, an unstable route, or "route flapping," can have significant and detrimental impacts on large BGP networks. If a route goes down, a WITHDRAWN message is sent via BGP requesting all peers to remove that route from their tables. An instable route in your autonomous system will cause constant sending and withdrawing of messages to other autonomous systems. This effect multiplied by the hundreds or thousands of routes that may be in an autonomous system can negatively affect BGP.

Dampening allows routers to categorize routes as either well behaved or ill behaved. Obviously, a well-behaved route should be very stable over an extended period of time. On the other end of the spectrum, an ill-behaved route could be a route that is unstable, or flapping. When route dampening is enabled in BGP, with the BGP router command bgp dampening, the router will start a history file on how many times each route flaps. The route dampening feature will start to assign a penalty to a route each time it flaps. The penalties start to accumulate for each route, and when the penalty is greater than an arbitrary number called the suppress value, the route will no longer be advertised. The route will remain suppressed until either the penalty falls below the reuse-limit or the max_suppress timer is exceeded. The penalty for a route can be decreased over time. The half-life timer is a timer, expressed in minutes, that must elapse before the penalty will be reduced by one-half. If the route remains stable, over time the penalty for that route will decrease. When the penalty is below another arbitrary timer called the reuse-limit, the route will be unsuppressed and advertised once again. Figure 2-5 illustrates the time and penalty relationship in route dampening.

Figure 5Figure 2-5 Route Dampening Timer Relationship

Note that this type of route map is called from the BGP router command bgp dampening [route-map route-map_name]. A route map called on the neighbor statement will not work for route dampening.

The set dampening command in Cisco IOS Software Release 12.2 is as follows:

set dampening {half-life_1-45 reuse_1-20000 suppress_1-20000 max_suppress_time_1-255}

Use the set dampening command to influence how the router will react when it encounters unstable routes. The half-life parameter represents a time (in minutes) that must pass with a route being stable, after which the penalty value is reduced by half. The default is 15 minutes, and the valid range is 1 to 45 minutes.

The reuse parameter enables you to mark a point, or a reuse, point that allows the route to be advertised. When the penalty value falls below the reuse point, the route is unsuppressed and re-advertised. The default value is 750, and the valid ranges are 1 to 20,000.

When the penalty exceeds the suppress parameter, the route is suppressed and no longer advertised. The valid range is from 1 to 20,000; the default is 2000.

The max_suppress_time is a value expressed in minutes that specifies how long a route should be suppressed by the dampening feature. The default value of this is 4 times the half-life timer, or 60 minutes. The valid range is from 1 to 255 minutes.

When a prefix is withdrawn, BGP considers the withdrawn prefix as a flap and increases the penalty by 1000. When BGP receives an attribute change, the penalty is increased by 500.

In Figure 2-6, the router ringo is advertising 129.168.192.0/24 to the turkey_creek router via BGP.

Figure 6Figure 2-6 Route Dampening

The turkey_creek router has route dampening enabled, with a route map to apply the dampening to route 129.168.192.0/24. Use the show ip bgp dampened-paths command and the show ip bgp a.b.c.d command to view whether route dampening has occurred and to view what the current penalty count. Note that information related to the dampening does not appear until the route has actually flapped. Example 2-18 shows the penalty and dampening occurring on the turkey_creek router for route 129.168.192.0/24.

Example 2-18 Verifying Dampening

turkey_creek# show ip bgp dampened-paths
BGP table version is 9, local router ID is 192.168.192.7
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal
Origin codes: i - IGP, e - EGP, ? - incomplete
 Network   From    Reuse Path
*d 129.168.192.0/24 172.16.100.10 00:38:00 65002 i
turkey_creek#
turkey_creek# show ip bgp
BGP table version is 9, local router ID is 192.168.192.7
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal
Origin codes: i - IGP, e - EGP, ? - incomplete
 Network   Next Hop   Metric LocPrf Weight Path
*> 128.168.192.0/24 0.0.0.0     0   32768 i
<Anchor3>*d 129.168.192.0/24 172.16.100.10   0    0 65002 i

*> 192.168.192.0 0.0.0.0     0   32768 i
turkey_creek#
turkey_creek# show ip bgp 129.168.192.0
BGP routing table entry for 129.168.192.0/24, version 9
Paths: (1 available, no best path)
 Not advertised to any peer
 65002, <Anchor4>(suppressed due to dampening)

 172.16.100.10 (metric 2323456) from 172.16.100.10 (172.16.100.10)
  Origin IGP, metric 0, localpref 100, valid, external, ref 2
  Dampinfo: penalty 3717, flapped 4 times in 00:04:36, reuse in 00:37:50
turkey_creek#

Example 2-19 lists the BGP configuration for the preceding example and the associated route maps of the turkey_creek router.

Example 2-19 Configuration of the turkey_creek Router

hostname turkey_creek
!
<<<text omitted>>>
!
router bgp 65001
 no synchronization
 bgp dampening route-map set_dampening  _Dampening enabled with route-map
 network 128.168.192.0 mask 255.255.255.0
 network 192.168.192.0
 neighbor 172.16.100.10 remote-as 65002
 neighbor 172.16.100.10 ebgp-multihop 10
 neighbor 172.16.100.10 update-source Loopback20
!
access-list 11 permit 129.168.192.0 0.0.0.255
!
route-map set_dampening permit 100
 match ip address 11       _Match network 129.168.192.0/24
 set dampening 20 1000 2000 80    _Set dampening parameters

For more information and examples on route dampening, see BGP Chapters 7 through 9.

You can also use route maps in BGP to set the well-known discretionary LOCAL_PREF attribute. The LOCAL_PREF attribute is a numeric value ranging from 0 to 4,294,967,295, where the higher the value, the more preferred the route is. The default LOCAL_PREF value is 100. Table 2-8 lists the syntax used in setting the LOCAL_PREF attribute.

Table 2-8 set local-preference Command in Cisco IOS Software Release 12.2

Command

Description

set local-preference {0-4294967295}

Use the set local-preference command to set the LOCAL_PREF of a route. The valid range is from 0 to 4,294,967,295. The default value is 100.


Another BGP attribute that you can set with route maps is the well known mandatory transitive ORIGIN attribute. The ORIGIN attribute is a well-known mandatory attribute. The ORIGIN attribute, as the name states, specifies the origin of the route with respect to the autonomous system that originated it. BGP supports three different types of origin:

  • IGP(i)—The network layer reachability information (NLRI) is internal to the originating autonomous system. This is a remote IGP system. The route originates from the network command.

  • EGP(e)—The NLRI is learned via the EGP. This is a local EGP system. The route is redistributed from EGP.

  • Incomplete(?)—The NLRI is learned from some other means. The route is redistributed from an IGP or static.

Table 2-9 lists the syntax used in setting the origin.

Table 2-9 set origin Command in Cisco IOS Software Release 12.2

Command

Description

set origin {igp | egp [as_number] | incomplete}

Use the set origin command to set the ORIGIN attribute of a route/routes. The valid origin types are IGP, EGP, and incomplete.


The final BGP-specific set command discussed here is the set weight command. The WEIGHT attribute is a Cisco proprietary feature used to measure a route's preference. The WEIGHT attribute is local to the router and does not get exchanged between routers; therefore it is only effective on inbound route maps. Use the WEIGHT attribute to influence routes from multiple service providers to a central location. Like LOCAL_PREF, assigning a higher weight to a route makes that route more preferred. The WEIGHT attribute also has the highest precedence of any BGP attribute. For more information on BGP, see Chapters 7 through 9. Table 2-10 lists the syntax used in setting the WEIGHT attribute.

Table 2-10 set weight Command in Cisco IOS Software Release 12.2

Command

Description

set weight {0-65535]

Use the set weight command to set the weight of a route/routes. The valid weight range is from 0 to 65,535, and the default weight of a route is 32,768.


Practical Example: Configuring BGP Attributes

This practical example uses the same network model as in the previous examples and sets the BGP attributes of LOCAL_PREF, WEIGHT, and ORIGIN. Figure 2-7 is the same network shown earlier. This example calls an inbound route map on the turkey_creek router. The route map set_attributes will set the following attributes: WEIGHT to 1000, LOCAL_PREF to 5000, and ORIGIN to be EGP from autonomous system 65002. In this example, the setting local-preference is for education purposes only. Normally, local-preference would not be used or effective on E-BGP peers.

Figure 7Figure 2-7 Configuring BGP Attributes

Example 2-20 lists the BGP and route map configuration to accomplish this on the turkey_creek router.

Example 2-20 BGP Attribute Configuration

hostname turkey_creek
!
<<<text omitted>>>
!
router bgp 65001
 no synchronization
 network 128.168.192.0 mask 255.255.255.0
 network 192.168.192.0
 neighbor 172.16.100.10 remote-as 65002
 neighbor 172.16.100.10 ebgp-multihop 10
 neighbor 172.16.100.10 update-source Loopback20
 neighbor 172.16.100.10 route-map set_attributes in _call route-map "set_attributes"
!
route-map set_attributes permit 100
 set local-preference 5000  _Set local-preference to 5000
 set weight 1000    _Set weight to 1000
 set origin egp 65002   _Set the ORIGIN to EGP in AS 65002
!        _*note with no match parameter all routes are 
        matched from the neighbor 172.16.100.10

To verify the effectiveness of the route map, use the show ip bgp command, as demonstrated in Example 2-21.

Example 2-21 Verifying the Attributes

turkey_creek# show ip bgp
BGP table version is 4, local router ID is 192.168.192.7
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal
Origin codes: i - IGP, e - EGP, ? - incomplete
 Network   Next Hop   Metric LocPrf Weight Path
*> 128.168.192.0/24 0.0.0.0     0   32768 i
*> 129.168.192.0/24 172.16.100.10   0 <Anchor5>5000 <Anchor6>1000 65002 <Anchor7>e

*> 192.168.192.0 0.0.0.0     0   32768 i
turkey_creek#
turkey_creek#
turkey_creek# show ip bgp 129.168.192.0
BGP routing table entry for 129.168.192.0/24, version 2
Paths: (1 available, best #1)
 Not advertised to any peer
 65002
 172.16.100.10 (metric 2323456) from 172.16.100.10 (172.16.100.10)
  <Anchor8>Origin EGP, metric 0, <Anchor9>localpref 5000, 
<Anchor10>weight 1000, valid, external, best,

ref 2
turkey_creek#

Configuring Routing Protocol/Redistribution-Specific set Commands

The set commands covered next relate primarily to IGP routing protocols and are used mostly during route redistribution. The set metric, set metric-type and set tag commands can all be used to change the metric or the tag of a route during redistribution. As mentioned previously, the metrics and tags can also be matched and used for further route control during redistribution.

The most common use of the set metric command is to set the metric of the route for the destination routing protocol. If you are redistributing EIGRP routes into OSPF, for example, you can use a route map in conjunction with the set metric command to set the new OSPF metric. If you are redistributing into IGRP or EIGRP, the metric value you enter is the composite metric only. This differs slightly from setting the default metric or the metric on redistribution without a route map, where you would set all five submetrics. Another use of the set metric command is to set the BGP optional nontransitive MULTI_EXIT_DISC (MED) attribute. The syntax for the set metric command in Cisco IOS Software Release 12.2 is as follows:

set metric {[-/+<0-4294967295>]|1-4294967295]

The + and – keywords enable you to increase or decrease the current metric. To increase the metric by 10, for example, the command would be set metric +10. To set just the composite metric for EIGRP, the command is set metric 4295. For more information on IGP routing protocol metrics, refer to CCIE Practical Studies, Volume I. You can find more information on the BGP MED attribute in Chapters 7 through 9 of this book.

The set metric-type command is rather limited. It is used primarily in BGP, OSPF, and IS-IS. You can use it to set IS-IS external and internal metrics and OSPF type 1 and type 2 external metrics. The set metric-type command can also be used in BGP to use the IGP metric as the MED for BGP. The syntax for the set metric-type command in Cisco IOS Software Release 12.2 is as follows:

set metric-type [internal|external|type-1|type-2]
  • external—IS-IS external metric.

  • internal—Use the metric of the IGP as the MED for BGP. Also used for setting IS-IS internal metric.

  • type-1—Use to match the OSPF type 1 metric.

  • type-2—Use to match the OSPF external type 2 metric.

The final set command discussed in this section is the set tag command. The set tag command enables you to set the administrative tag of route. For IGPs, the tag value is usually set with a route map and the set tag command. In BGP, when you redistribute BGP into an IGP, the ASN of BGP is automatically put into the tag value. BGP does this to preserve the AS_PATH attribute across an IGP domain. For IGPs, the tag is an administrative value that certain routing protocols carry within the routing update. The tag value has no impact on routing decisions. Instead, it is used to mark routes or flag routes or to track the AS_PATH for BGP. The tag value may also be acted upon during a redistribution process. When the automatic-tag command is used with the BGP table-map command, the tag value includes the ASN and the origin. The syntax used to manipulate the tag value in Cisco IOS Software Release 12.2 is as follows:

set {tag [0-4294967295]|automatic-tag}

Use the set tag value command to set the tag value. Use the set automatic-tag command when redistributing an IGP into BGP to recover the tag value as an AS_PATH attribute.

NOTE

You can also use the tag value strictly for documentation purposes in an internetwork. If you have an OSPF domain, where RIP routes and EIGRP routes are redistributed, for example, you may want to tag the routes from EIGRP with a value of 100 and tag the routes from IGRP with a value of 110. When the OSPF database is viewed, it will be easy to determine the origin of specific routes. This can prove a handy documentation tool for troubleshooting route redistribution.

Tags are supported in RIPv2, OSPF, Integrated IS-IS, EIGRP, BGP, and CLNS. IGRP and RIPv1 do not support tags. To view tags, use the show ip eigrp topology ip_address subnet_mask command and the show ip ospf database command for EIGRP and OSPF, respectively. You can also view the tag value in other routing protocols by using the extended show ip route command, show ip route ip_address.

Practical Example: Setting Route Tags and Metric Types

In the internetwork model in Figure 2-8, the routers turkey_creek, earp, holliday, and ringo are running EIGRP. The ringo router also has a BGP peer to the turkey_creek router and is running OSPF and to the clanton router.

Figure 8Figure 2-8 Route Tagging and Metric Setting

To demonstrate route tagging and metric setting, the following example writes a route map on the ringo router. The route map will be used on the ringo router when redistributing EIGRP routes into OSPF. The route map will first tag the routes from the earp router, 172.16.10.3, with a tag of 3. Next, the route map will tag all other routes with a tag of 500 while making these routes OSPF external type 1 routes. Example 2-22 lists the configuration to accomplish this on the ringo router.

Example 2-22 Configuration of the ringo Router

hostname ringo
!
<<<text omitted>>>
!
router eigrp 65001
 redistribute bgp 65002
 network 172.16.0.0
 network 192.168.10.0
 default-metric 10000 1000 254 1 1500
 no auto-summary
 eigrp log-neighbor-changes
!
router ospf 7
 log-adjacency-changes
 redistribute eigrp 65001 subnets route-map set_tag3 _Redistribute and call route-map
 redistribute bgp 65002
 network 172.16.10.10 0.0.0.0 area 0
 default-metric 10
!
router bgp 65002
 no synchronization
 bgp log-neighbor-changes
 neighbor 172.16.200.10 remote-as 65001
 neighbor 172.16.200.10 ebgp-multihop 10
 neighbor 172.16.200.10 update-source Loopback20
!
access-list 5 permit 172.16.10.3  _Match routes from 172.16.10.3
access-list 50 permit any   _Match all routes
!
route-map set_tag3 permit 100
 match ip route-source 5    _Match routes from 172.16.10.3
 set tag 3       _Set the TAG value to 3
!
route-map set_tag3 permit 200
 match ip address 50     _Match all other routes 
 set metric-type type-1    _Set the OSPF metric to External Type-1
 set tag 500       _Set the TAG value to 500
!

By observing the route table of the ringo router followed by the OSPF database, you can see the effects of the route maps, as shown in Example 2-23.

Example 2-23 Route Map Effects on the ringo Router

ringo# show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
  D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
  N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
  E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
  i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
  * - candidate default, U - per-user static route, o - ODR
  P - periodic downloaded static route
Gateway of last resort is not set
B 192.168.192.0/24 [20/0] via 172.16.200.10, 01:07:04
  172.16.0.0/16 is variably subnetted, 8 subnets, 2 masks
D  172.16.200.0/24 [90/1915392] via 172.16.10.3, 01:07:08, Ethernet0
D  172.16.33.0/24 [90/1812992] via 172.16.10.3, 01:07:08, Ethernet0
D  172.16.34.0/24 [90/1812992] via 172.16.10.3, 01:07:08, Ethernet0
D  172.16.16.4/30 [90/2195456] via 172.16.10.4, 01:07:08, Ethernet0
D  172.16.16.0/30 [90/1787392] via 172.16.10.3, 01:07:08, Ethernet0
C  172.16.10.0/24 is directly connected, Ethernet0
D  172.16.2.0/24 [90/284160] via 172.16.10.3, 01:07:09, Ethernet0
C  172.16.100.0/24 is directly connected, Loopback20
ringo#
ringo# show ip ospf database
   OSPF Router with ID (172.16.100.10) (Process ID 7)
    Router Link States (Area 0)
Link ID   ADV Router  Age   Seq#  Checksum Link count
172.16.10.5  172.16.10.5  1151  0x80000015 0x4E2 1
172.16.100.10 172.16.100.10 1875  0x80000003 0xC969 1
    Net Link States (Area 0)
Link ID   ADV Router  Age   Seq#  Checksum
172.16.10.5  172.16.10.5  1151  0x80000003 0x1693
    Type-5 AS External Link States
Link ID   ADV Router  Age   Seq#  Checksum Tag
172.16.2.0  172.16.100.10 1875  0x80000002 0x8E2E 3
172.16.16.0  172.16.100.10 1875  0x80000002 0xE1CF 3
172.16.16.4  172.16.100.10 1875  0x80000002 0x4AF0 500
172.16.33.0  172.16.100.10 1875  0x80000002 0x3865 3
172.16.34.0  172.16.100.10 1875  0x80000002 0x2D6F 3
172.16.100.0 172.16.100.10 1875  0x80000002 0xE403 500
172.16.200.0 172.16.100.10 1875  0x80000002 0x4F1 3
192.168.192.0 172.16.100.10 1876  0x80000002 0x4A22 65001
ringo#

Notice that at the end of the OSPF database is the BGP route 192.168.192.0/24. This route has a tag of 65001 because BGP will try to preserve the AS_PATH attribute when redistributing BGP into an IGP that supports tags. BGP will use a tag value equal to its autonomous system ID.

You can also see the effects of the route map on the clanton router. Example 2-24 lists the route table of the clanton router, highlighting the different OSPF route types. Notice how the 172.16.16.4/30 and 172.16.100.0/24 routes are not set as default OSPF external type 2 routes, but are external type 1 routes. This is due to the set route-type type-1 command in the route map on the ringo router.

Example 2-24 Route Table of the clanton Router

clanton# show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
  D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
  N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
  E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
  i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
  U - per-user static route, o - ODR
Gateway of last resort is not set
O E2 192.168.192.0/24 [110/10] via 172.16.10.10, 01:00:14, Ethernet0/0
  172.16.0.0/16 is variably subnetted, 8 subnets, 2 masks
O E2 172.16.200.0/24 [110/10] via 172.16.10.10, 01:00:14, Ethernet0/0
O E2 172.16.33.0/24 [110/10] via 172.16.10.10, 01:00:14, Ethernet0/0
O E2 172.16.34.0/24 [110/10] via 172.16.10.10, 01:00:14, Ethernet0/0
O E1 172.16.16.4/30 [110/20] via 172.16.10.10, 01:00:14, Ethernet0/0
O E2 172.16.16.0/30 [110/10] via 172.16.10.10, 01:00:14, Ethernet0/0
C  172.16.10.0/24 is directly connected, Ethernet0/0
O E2 172.16.2.0/24 [110/10] via 172.16.10.10, 01:00:15, Ethernet0/0
O E1 172.16.100.0/24 [110/20] via 172.16.10.10, 01:00:15, Ethernet0/0
clanton#

Route Maps and Policy-Based Routing

Sometimes in the modern internetwork, the forwarding decisions of a router need to be more complex than the decision information offered by the routing protocols and route table. Routers for the most part base their forwarding decisions on the destination address of packet. Policy-based routing enables the network engineer to configure policies that selectively cause packets to take paths that differ from the next-hop path specified by the route table. This section discusses the benefits and configuration of policy-based routing.

Policy-based routing offers the following benefits:

  • Forwarding decision not based on the destination address—Policy routing enables the network engineer to define a path based on attributes of a packet, source/destination IP address, application port, and packet lengths, and to forward them according to a different policy. Policy routing can be configured to set the packet's next hop or the packet's default next hop/interface. Policy routing may also be used to route the packet to the null interface, essentially discarding them.

  • Quality of service (QoS)—Route maps and PBR can provide QoS by enabling you to set the type of service (ToS) values and the IP precedence values in the IP header. QoS configuration is performed on the edge routers. This improves performance by preventing additional configuration on the core devices.

  • Cost saving by using alternative paths—IP traffic can be manipulated with PBR, for instance, traffic such as large bulky batch file transfers can be sent over low-cost, low-bandwidth links, whereas more time-sensitive, user-interactive traffic is sent over higher-cost and higher-speed links.

  • Multiple and unequal path load sharing based on traffic characteristics—Policy routing can be used to load balance traffic across multiple and unequal paths based on traffic characteristics versus the route cost.

Assuming that PBR is enabled and configured on the router and interface, PBR operates in the following manner:

Step 1

All packets received on a PBR-enabled interface are considered for policy routing. Each packet received on that interface is passed through an associated route map.

Step 2

The match commands are called by the route map; if all match commands are met, the route map is marked as a permit or deny, and no further route maps instances are executed. If a match statement is not present, the route map and any set commands apply to all packets.

Step 3

If the route map has a permit statement, all set commands are applied and the packet is forwarded according to the new policy. You can use multiple set commands in a single route map instance. Table 2-7 lists the set commands that are specific to PBR. If you use multiple set commands in conjunction with one another, they are applied in the same order as follows:

 

set ip {precedence [value_0-7 | name] | tos [value_0-8 | name]}

 

set ip next-hop ip_address

 

set interface interface_name

 

set ip default next-hop ip_address

 

set default interface interface_name

 

Each of these commands is covered in further detail later in this section.

Step 4

If the route map has a deny statement, normal forwarding is used, as specified in the route/forwarding table. The set statements will not be applied to the packet.

Step 5

At the end of all the route map instances, an implicit route map will deny all packets. If the packet has not found a match in the previous route map instances, the packet will hit the implicit deny route map instance. When this occurs, the packet will be forwarded by the router following the normal route table.


NOTE

Policy routing only works on inbound packets; therefore, it must be applied to the incoming traffic or to the interface receiving the traffic to be policy routed. To policy route local traffic, you must have local policy routing enabled.

Practical Example: Policy-Based Routing

This section examines how you may use policy routing to control traffic in the internetwork. In the network model depicted in Figure 2-9, a policy route exists on the tombstone router to control traffic from the ringo and curly_bill routers. The policy states that all IP traffic from the ringo router will be forwarded to holliday, whereas all IP traffic from the curly_bill router will be forwarded to earp. All other IP traffic will be handled by the normal routing procedure.

Figure 9Figure 2-9 Policy-Based Routing

To control the traffic from the ringo and curly_bill routers, this example uses policy routing and route maps on the tombstone router. Policy routing will be enabled on the E0/1 interface of the tombstone router. This is the inbound interface, or the interface that will be receiving traffic from the ringo and curly_bill routers. The route map used in this model, policy_1, will have two route map instances. One will match packets from the ringo router, 172.16.64.10, and set the next hop to be 172.16.10.4, the holliday router. The other route map instance will match packets from the curly_bill router, 172.16.64.5, and set the next hop to be 172.16.10.3, the earp router.

The route/forwarding table on the tombstone router shows that there are two paths to the routes 172.16.33.0/24, 172.16.34.0/24, and 172.16.200.0/24 that reside on the turkey_creek router. One path passes through the earp router, whereas the other one passes through the holliday router. Example 2-25 lists the route table of the tombstone router.

Example 2-25 Route Table of the tombstone Router

tombstone# show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
  D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
  N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
  E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
  i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
  * - candidate default, U - per-user static route, o - ODR
  P - periodic downloaded static route
Gateway of last resort is not set
  172.16.0.0/16 is variably subnetted, 9 subnets, 2 masks
D  172.16.200.0/24 [90/40665600] via 172.16.10.3, 03:58:24, Ethernet0/0
      [90/40665600] via 172.16.10.4, 03:58:24, Ethernet0/0
D  172.16.33.0/24 [90/40563200] via 172.16.10.3, 03:58:24, Ethernet0/0
      [90/40563200] via 172.16.10.4, 03:58:24, Ethernet0/0
D  172.16.34.0/24 [90/40563200] via 172.16.10.3, 03:58:24, Ethernet0/0
      [90/40563200] via 172.16.10.4, 03:58:24, Ethernet0/0
D  172.16.16.4/30 [90/40537600] via 172.16.10.4, 03:59:03, Ethernet0/0
D  172.16.16.0/30 [90/40537600] via 172.16.10.3, 04:56:26, Ethernet0/0
C  172.16.10.0/24 is directly connected, Ethernet0/0
D  172.16.2.0/24 [90/284160] via 172.16.10.3, 03:59:03, Ethernet0/0
D  172.16.100.0/24 [90/409600] via 172.16.64.10, 03:49:42, Ethernet0/1
C  172.16.64.0/24 is directly connected, Ethernet0/1
tombstone#

By issuing an extended traceroute command on the tombstone router from the address 172.16.64.6 to 172.16.200.10, you can see that EIGRP is using load sharing between the earp and holliday routers. Policy routing will override this process by sending IP traffic from the ringo router to holliday, and IP traffic from curly_bill to earp, as shown in Example 2-26.

Example 2-26 Extended Trace on the tombstone Router

tombstone# traceroute
Protocol [ip]:
Target IP address: 172.16.200.10
Source address: 172.16.64.6
Numeric display [n]:
Timeout in seconds [3]:
Probe count [3]: 4
Minimum Time to Live [1]:
Maximum Time to Live [30]:
Port Number [33434]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Type escape sequence to abort.
Tracing the route to 172.16.200.10
 1 172.16.10.4 0 msec
 172.16.10.3 0 msec
 172.16.10.4 0 msec
 172.16.10.3 0 msec
 2 172.16.16.5 8 msec
 172.16.16.1 12 msec
 172.16.16.5 8 msec
 172.16.16.1 12 msec
tombstone#

The configuration needed for PBR on the tombstone router is listed in the next example, Example 2-27.

Example 2-27 Policy-Based Routing Configuration on tombstone

hostname tombstone
!
interface Ethernet0/0
 ip address 172.16.10.6 255.255.255.0
!
interface Ethernet0/1
 ip address 172.16.64.6 255.255.255.0
 ip route-cache policy   _Optional fast switching for policy routing
 ip policy route-map policy_1 _Call route-map "policy_1" for policy routing
!
router eigrp 65001
 network 172.16.0.0
 no auto-summary
!
access-list 100 permit ip host 172.16.64.10 any  _match packets from 172.16.64.10
access-list 101 permit ip host 172.16.64.5 any  _match packets from 172.16.64.5
!
route-map policy_1 permit 100      _route-map "policy_1"
 match ip address 100        _call ACL 100 for match criteria
 set ip next-hop 172.16.10.4      _set IP next hop to holliday 
!
route-map policy_1 permit 200      _next route map instance
 match ip address 101        _call ACL 101 for match criteria
 set ip next-hop 172.16.10.3      _set IP next hop to the earp router
!

To test the new policy, issue the traceroute commands on the ringo and curly_bill routers to the IP address of 172.16.200.10, which resides on the turkey_creek router. The traceroute from the ringo router will show that packets pass to the tombstone router, and then to holliday, and finally to turkey_creek. Example 2-28 demonstrates the traceroute command on the ringo router with PBR enabled.

Example 2-28 traceroute Performed on the ringo Router

ringo# traceroute 172.16.200.10
Type escape sequence to abort.
Tracing the route to 172.16.200.10
 1 172.16.64.6 4 msec 4 msec 4 msec
 2 172.16.10.4 8 msec 4 msec 4 msec
 3 172.16.16.5 20 msec 8 msec *
ringo#

To test the new policy for the curly_bill router, issue the traceroute command on the curly_bill router to the IP address of 172.16.200.10. The packets will pass to the tombstone router, and then to earp, and finally to turkey_creek. Example 2-29 demonstrates the traceroute command on the curly_bill router.

Example 2-29 traceroute Performed on the curly_bill Router

curly_bill# traceroute 172.16.200.10
Type escape sequence to abort.
Tracing the route to 172.16.200.10
 1 172.16.64.6 4 msec 4 msec 4 msec
 2 172.16.10.3 4 msec 4 msec 0 msec
 3 172.16.16.1 12 msec 9 msec *
curly_bill#

CAUTION

Whenever implementing policy routing, take care to consider the applications running on the network and the forward and return paths of the network traffic. In models such as this preceding example, you could implement policy routing on the turkey_creek router to avoid asymmetrical routing. Asymmetrical routing refers to when IP packets are forwarded along one path toward a destination, but follow a different path back, which can lead to problems with some applications, such as multicast.

Configuring Policy-Based Routing (PBR)

You can configure PBR by following these steps. Some of the steps may be omitted depending on your application for PBR.

Step 1

Define and configure the route map needed for the policy. This is accomplished with the route-map command, as discussed previously.

Step 2

Define and configure the match statements the route map will use. The most common match statements used are the following:

 

match ip address [access-list number]

 

The match ip address is used to call a standard, extended, or expanded-range ACL.

 

match length [min_packet_length_0-2147483647] [max_packet_length_0-2147483647]

 

The match length is used to match the Layer 3 packet length, in bytes, with all associated headers and trailers included. You must enter the minimum and maximum packet length. Use the match length command to policy route traffic based on packet size. You can deploy this to route traffic with large or small packet sizes to specific areas of the network.

Step 3

Configure and define the new routing policy with set commands. Multiple set commands may be used; if multiple commands are used, they are executed in the following order:

 

set ip {precedence [value_0-7 | name] | tos [value_0-8 | name]}

 

set ip next-hop ip_address

 

set interface interface_name

 

set ip default next-hop ip_address

 

set default interface interface_name

 

Set ip precedence {[1-7]|[routine|critical|flash|flash-override|immediate|internet|network|priority]}

 

By setting the precedence, you are manipulating the first 3 bits, bits 0 through 2, of the 8-bit ToS field in the IP header. Earlier texts on TCP/IP state that this field is unused and ignored by routers, except for some routing protocols. This may have been true in the past; however, with the advent of Voice over IP and newer QoS features, the Precedence field is finding new life and meaning. IP precedence becomes a factor during periods of congestion on an interface. By default, Cisco routers do not manipulate the precedence value in the IP header; it remains at its original setting as when it arrived at the router. When Weighted Fair Queuing (WFQ) is enabled and the precedence bits are set, the packets are ordered for transmission according to the precedence value. The higher the precedence value, the higher its place in the queue for transmission. For the router to act on precedence, the link must be congested, and queuing must be enabled; otherwise, the packets are transmitted in first in, first out (FIFO) order. When setting precedence, you may use the numeric value of the precedence or the name of the precedence. Precedence should be set such that downstream IP devices can take advantage of the settings you use. Table 2-11 lists the valid names values for the set precedence command. For detailed information about the set precedence command, see Chapter 5, "Integrated and Differentiated Services," and Chapter 6, "QoS – Rate Limiting and Queuing Traffic."


Table 2-11 set precedence Commands in CISCO IOS Software Release 12.2

Command

Function

routine

Set routine precedence (value = 0)

priority

Set priority precedence (value = 1)

immediate

Set immediate precedence (value = 2)

flash

Set Flash precedence (value = 3)

flash-override

Set Flash override precedence (value = 4)

critical

Set critical precedence (value = 5)

internet

Set internetwork control precedence (value = 6)

network

Set network control precedence (value = 7)


NOTE

For a router's queuing mechanisms to act on the precedence bits, the following two conditions must be met:

  • The outbound link must be congested.

  • The outbound link must be configured for WFQ or Weighted Random Early Detection (WRED).

Set ip tos {[1-15]|[normal|min-delay|max-throughput|max-reliability|min-monetary-cost|priority]} 

The set ip tos command enables you to set bits 3 through 6 in the IP header's 8-bit ToS field. The ToS bits are composed of 4 bits. These bits are referred to as the following:

  • D bit (bit 3)—Normal = off, low delay = on

  • T bit (bit 4)—Normal = off, high throughput = on

  • R bit (bit 5)—Normal = off, high reliability = on

  • C bit (bit 6)—Unused in Cisco Routers. RFC 1349 calls it the minimize monetary cost. Some TCP/IP implementations ignore this bit or implement it differently.

Bit 7 in the ToS field is currently unused and is set to 0. If all 4 bits are set to 0, it implies normal service.

Table 2-12 lists the recommended guidelines for setting ToS by protocol type.

Table 2-12 Recommended ToS Values by Protocol

Protocol

min-delay

max-throughput

max-reliability

min-monetary-cost

Telnet/Rlogin

1

0

0

0

HTTP

1

0

0

0

FTP control

1

0

0

0

FTP data

0

1

0

0

Any bulk data

0

1

0

0

TFTP

1

0

0

0

SMTP commands

1

0

0

0

SMTP data phase

0

1

0

0

DNS UDP query

1

0

0

0

DNS TCP query

0

0

0

0

DNS zone xfer

0

1

0

0

ICMP

0

0

0

0

IGPs

0

0

1

0

SNMP

0

0

1

0

BOOTP

0

0

0

0

NNTP

0

0

0

1


NOTE

Cisco IOS Software considers the precedence bits of the ToS field if there is traffic that is queued in WFQ, WRED, or Weighted Round Robin (WRR). The precedence bits are not considered when policy routing, Priority Queuing (PQ), Custom Queuing (CQ), or Class-Based Weighted Fair Queuing (CBWFQ) are configured.

set ip next-hop {ip_address}

Use this command to set IP address of the next-hop router to which the packet will be forwarded. The IP address used must be an adjacent router.

set interface {interface_name} 

Use this command to set the output interface for the matched packet.

set ip default next-hop {ip_address}

This command is used like the ip next-hop command. It specifies which IP address to forward packets to if there is not an explicit route to the destination in the route table. Think of this command as a default route to use for policy routing. The next-hop address must be an adjacent router.

set default interface {interface_name}

This command functions much like the ip default next-hop command; it specifies which interface to forward a matched packet to if there is not an explicit route to the destination. Used on point-to-point links.

NOTE

The set ip next-hop and set ip default next-hop commands are similar but function differently. The set ip next-hop command causes the router to use policy routing first and then use the route table. The set ip default next-hop command causes the router to use the route table first and then policy route to the specified default next hop.

Step 4

(Optional) Define and configure any ACLs that will be used with the new routing policy. With extended ACLs, for example, you can use policy to forward traffic based on traffic type (for instance, traffic one way, and FTP traffic another). You can also use ACLs to route traffic from specific addresses. When you use standard ACLs, policy routing compares the source IP address in the packet to the ACL.

Step 5

Configure policy routing on the inbound interface. To configure policy routing for an interface, use the following interface command:

 

router(config-if)# ip policy route-map route-map_name

Step 6

(Optional) Enable fast switching for PBR. In Cisco IOS Software Release 12.0, PBR can be fast switched. Prior to Cisco IOS Software Release 12.0, PBR could only be processed switched. In a process-switched environment, the switching rate is approximately 1000 to 10,000 packets per second. This speed was not considered fast enough for many applications. You can enable fast switching of PBR with the following interface command:

 

router(config-if)# ip route-cache policy

 

PBR must be configured before you configure fast-switched PBR. Fast-switched PBR does not support the set ip default next-hop and set default interface commands. The set interface command is supported over point-to-point links or with a static route cache entry equal to the interface specified in the set interface command.

Step 7

(Optional) Configure local PBR. Packets generated by the router are not policy routed. If you want to policy route traffic generated by the router, you must enable it. To enable local PBR, use the following global configuration command.

 

router(config)# ip local policy route-map route-map_name


Practical Example: Configuring PBR and Setting ToS

In this section, you apply a couple of these concepts to a practical example in policy routing. For the network depicted in Figure 2-10, create a policy route that will forward Telnet traffic to the earp router, 172.16.10.3, while setting the ToS bit to minimum delay. All other IP traffic will be forwarded to the holliday router, 172.16.10.4.

Figure 10Figure 2-10 Policy-Based Routing

Following the multistep process for configuring PBR, Steps 1 through 3 call for you to first configure the route map with the necessary match and set commands. The route map will call an ACL that matches Telnet traffic, and the set command will set the IP next hop to be the IP address of the earp router. Table 2-12 specifies that Telnet traffic should have the ToS set to min-delay; therefore, the route map will set this bit for Telnet traffic in the ToS value to min-delay. Another route map instance will be used to match all other traffic and forward it to the holliday router. Because the route map instance will match all traffic, there is no need to include a match command. Example 2-30 lists the route map configuration on the tombstone router to accomplish this.

Example 2-30 Route Map Configuration on the tombstone Router

route-map policy_2 permit 100
 match ip address 101     _Call access-list 101 
 set ip next-hop 172.16.10.3   _Set the next hop to 172.16.10.3/earp
 set ip tos min-delay     _Set the TOS to min-delay
!
route-map policy_2 permit 200
 set ip next-hop 172.16.10.4   _Match all routes and set the next hop
          _to 172.16.10.4/holliday

Now you must configure any ACLs the route map will need. In this case, configure a single ACL to match TCP telnet traffic from any IP address. The ACL you will use resembles the following:

access-list 101 permit tcp any any eq telnet

There is no need to write an ACL to catch all the regular traffic. As discussed earlier, the absence of a match statement, such as in the second route map instance, will match all routes or all packets.

The last two steps call for you to apply the policy route to an interface and to enable fast switching for PBR. This is accomplished with the interface commands ip policy route-map and ip route-cache policy. In this model, you will enable PBR on the E0/1 interface of the tombstone router. With PBR enabled on the E0/1 interface, all Telnet traffic will be forwarded to the earp router, whereas all other IP traffic will be forwarded to the holliday router. Example 2-31 lists the complete PBR configuration of the tombstone router.

Example 2-31 PBR Configuration on the tombstone Router

hostname tombstone
!
interface Ethernet0/0
 ip address 172.16.10.6 255.255.255.0
!
interface Ethernet0/1
 ip address 172.16.64.6 255.255.255.0
 ip route-cache policy      _enable PBR fast-switching
 ip policy route-map policy_2    _Call route-map "policy_2" for PBR
!
router eigrp 65001
 network 172.16.0.0
 no auto-summary
 no eigrp log-neighbor-changes
!
access-list 101 permit tcp any any eq telnet _Match Telnet traffic
!
priority-list 1 protocol ip high    _Priority queuing for TOS enforcement
priority-list 1 default low
!
route-map policy_2 permit 100
 match ip address 101      _call access-list 101 and match Telnet
 set ip next-hop 172.16.10.3     _Set the next hop to earp/172.16.10.3
 set ip tos min-delay      _Set TOS min-delay bit
!
route-map policy_2 permit 200    _Match all other traffic
 set ip next-hop 172.16.10.4     _Set the next hop to holliday/172.16.10.4
!

In this model, because you are setting ToS values, you need to configure WRED or WFQ on the outbound interface. WFQ is not the default queuing method on Ethernet interfaces. It is the default queuing method on serial interfaces with 2.048 Mbps or less of bandwidth. This portion of the configuration is not present in this example. For more information on configuring WRED and WFQ, see Chapters 5 and 6.

Big Show for Route Maps

CCIE Practical Studies, Volume I introduced what was called the Big Show and Big D. These terms were used because the discussion focused on only a select few show and debug commands considered most useful.

The Big Show and Big D commands for route maps are rather limited in their use. The best way to test the functionality of route maps and policy routing is to actually see how they are performing by viewing the route table and using traceroute commands. The show commands offered by Cisco are very good at showing where the route map is applied and the logical order in which it is operated. The Big Show commands discussed here are as follows:

  • show route-map

  • show ip policy

  • show ip cache policy

The show route-map command enables you to determine the logical order and execution of the route map. If PBR is enabled, the command also shows the number of matches and the number of bytes that were policy routed. Working from the previous network models, Example 2-32 demonstrates the show route-map command on the tombstone router.

Example 2-32 show route-map Command on the tombstone Router

tombstone# show route-map
route-map policy_2, permit, sequence 100
 Match clauses:
 ip address (access-lists): 101
 Set clauses:
 ip next-hop 172.16.10.3
 ip tos min-delay
 Policy routing matches: 264 packets, 15852 bytes
route-map policy_2, permit, sequence 200
 Match clauses:
 Set clauses:
 ip next-hop 172.16.10.4
 Policy routing matches: 60 packets, 4478 bytes
route-map policy_1, permit, sequence 100
 Match clauses:
 ip address (access-lists): 100
 Set clauses:
 ip next-hop 172.16.10.4
 ip tos max-throughput
 Policy routing matches: 85 packets, 6880 bytes
route-map policy_1, permit, sequence 200
 Match clauses:
 ip address (access-lists): 101
 Set clauses:
 ip next-hop 172.16.10.3
 Policy routing matches: 43 packets, 3318 bytes
tombstone#

Use the show ip policy command to verify which interfaces have PBR enabled and which route map they are currently using for PBR. Example 2-33 demonstrates the show ip policy command on the tombstone router.

Example 2-33 show ip policy Command on the tombstone Router

tombstone# show ip policy
Interface  Route map
Ethernet0/1 policy_2

You can use the show ip cache policy command to verify whether fast switching is enabled for policy routing. This command shows the policy type, the route map in use, and the age of the cache entries. If the policy is a next-hop policy, the next hop also displays. Example 2-34 lists the output of the show ip cache policy command on the tombstone router.

Example 2-34 show ip cache policy Command on the tombstone Router

tombstone# show ip cache policy
Total adds 4, total deletes 2
Type Routemap/sequence  Age  Interface    Next Hop
NH policy_2/100   00:38:27 Ethernet0/0   172.16.10.3
NH policy_2/200   00:43:56 Ethernet0/0   172.16.10.4
tombstone#
2. Lab 3: Configuring Complex Route Maps and Using Tagsā€”Part I | Next Section

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020