[c-nsp] route-map behavior with policy routing
Bruce Pinsky
bep at whack.org
Thu Aug 24 15:07:11 EDT 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Barrie Jones Cook wrote:
> Hi all,
>
> I'm helping out on a network that has Cisco 3750s as
> core and distribution routers/switches. For various
> reasons, policy routing is used to direct traffic to
> different interfaces on the core routers. I'm not too
> familiar with policy routing, so this may turn out to
> be a silly question, but I can't find an answer no
> matter how many google queries I come up with, so
> please bear with me.
>
> Anyway, it's a pretty standard architecture of:
>
> core1---core2
> | \ / |
> | \ / |
> | X |
> | / \ |
> dist1 dist2
> / | \ | \
> a1 a2 a3 a4 a5
>
> On the dist routers, "ip policy route-map PBR" is
> applied to the access switch, or a[n], interfaces like
> this:
>
> interface Vlan16
> description a2
> ip address X.X.X.X 255.255.255.252
> ip policy route-map PBR
>
> route-map PBR permit 10
> match ip address 90
> set ip next-hop Y.Y.Y.Y Z.Z.Z.Z
>
> where Y.Y.Y.Y is the other end of the link to core1,
> and Z.Z.Z.Z is the other end of the link to core2.
>
> On core1 and core2, it's very similar; the same
> route-map is applied to the incoming vlan interfaces
> for dist1, dist2 and the opposite core. On core1, the
> set ip next hop addresses are first the far end IP of
> the desired outbound connection, and then a backup in
> case the primary is down, and finally the IP of the
> other end of the link to core2. On core2, the next
> hop is set to the ip of the other end of the core1
> link, and then the ip of a backup interface on core2.
>
> Unfortunately, I have no console access to this
> network (yet) and when I make a change, I log in from
> a server off of a2. I lose my connection when I try
> to change access-list 90 on core2 as follows:
>
> core2#conf t
> Enter configuration commands, one per line. End with
> CNTL/Z.
> core2(config)#no access-list 90
> core2(config)#access-list 90 denyRead from remote host
> core2: Connection timed out
>
> I still have my connection to core1, but core1 cannot
> ssh to core2, and customers start complaining about
> network problems at this point. Then, I get someone
> who has a connection to a server somewhere else inside
> the network to log onto core2, he pastes the new
> access-list 90 in for me (which includes that first
> deny and then several permits), and voila, we're back
> in business.
>
> Now, if a route-map permit statement matches an
> access-list and there is no access-list (which I had
> always assumed meant that the implicit deny any came
> into effect), shouldn't the route-map just move on and
> not match anything, meaning that the next-hop is
> unchanged on *all* traffic, and it's all routed
> normally? I'm sure it would be interesting to see
> exactly what interfaces are unreachable during this
> issue, but unfortunately with customers complaining,
> there is little time to do so.
>
A quick test showed that without the access-list existing, all packets seem
to match the route map and are policy routed.
- --
=========
bep
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFE7fjfE1XcgMgrtyYRAh0gAKDjW9Ue/FKgdIxjmD7MBkdIjsD/QgCfSKJ8
ny3qVJNXSbFyMLejXNRBOrg=
=9CVG
-----END PGP SIGNATURE-----
More information about the cisco-nsp
mailing list