Hello everyone! Please help me solve the problem with leaking routes. It is required to allocate a host route from a subnet and perform route leaking between two VPNs Configuration example: # ip vpn-instance VPN_CUSTOMER1 ipv4-family route-distinguisher 192.168.255.111:100 export route-policy FROM-CUST1 apply-label per-instance vpn-target 65000:100 export-extcommunity vpn-target 65000:100 65000:1301 import-extcommunity # ip vpn-instance VPN_CUSTOMER2 ipv4-family route-distinguisher 192.168.255.111:1300 export route-policy FROM-CUST2 apply-label per-instance vpn-target 65000:1300 export-extcommunity vpn-target 65000:1300 65000:117 import-extcommunity # mpls lsr-id 192.168.255.111 mpls # mpls ldp # # # interface GigabitEthernet0/0/0 description <<< TO MPLS CLOUD >>> set flow-stat interval 30 ip address 192.168.10.22 255.255.255.252 ospf cost 5 ospf mtu-enable ospf network-type p2p ospf timer hello 5 ospf timer dead 10 mpls mpls mtu 1500 mpls ldp # # interface Eth-trunk1 description <<< TO SWITCH S5731 >>> # interface Eth-trunk1.2 description <<< CONTROLLER CUSTOMER2 >>> dot1q termination vid 2 ip binding vpn-instance VPN_CUSTOMER2 ip address 192.168.2.1 255.255.255.0 arp broadcast enable # interface Eth-trunk1.3 description <<< CONTROLLER CUSTOMER1 >>> dot1q termination vid 3 ip binding vpn-instance VPN_CUSTOMER1 ip address 192.168.1.1 255.255.255.0 arp broadcast enable # interface LoopBack255 description <<< MPLS CORE >>> ip address 192.168.255.111 255.255.255.255 # bgp 65000 router-id 192.168.255.111 group RR-SERVERS internal peer RR-SERVERS connect-interface LoopBack255 peer 192.168.255.11 as-number 65000 peer 192.168.255.11 group RR-SERVERS # ipv4-family unicast undo synchronization peer RR-SERVERS enable peer 192.168.255.11 enable peer 192.168.255.11 group RR-SERVERS # ipv4-family vpnv4 undo policy vpn-target peer RR-SERVERS enable peer RR-SERVERS next-hop-local peer 192.168.255.11 enable peer 192.168.255.11 group RR-SERVERS # ipv4-family vpn-instance VPN_CUSTOMER1 import-route direct import-route static # ipv4-family vpn-instance VPN_CUSTOMER2 import-route direct import-route static # # ospf 100 router-id 192.168.255.111 silent-interface all undo silent-interface GigabitEthernet0/0/0 spf-schedule-interval intelligent-timer 3000 100 20 lsa-originate-interval intelligent-timer 3000 100 50 lsa-arrival-interval 20 area 0.0.0.0 network 192.168.11.22 0.0.0.0 network 192.168.255.111 0.0.0.0 # route-policy FROM-CUST1 permit node 10 if-match ip-prefix CONTROLLER-CUST1 apply extcommunity rt 65000:117 additive # route-policy FROM-CUST1 permit node 20 # route-policy FROM-CUST2 permit node 10 if-match ip-prefix CONTROLLER-CUST2 apply extcommunity rt 65000:1301 additive # route-policy FROM-CUST2 permit node 20 # ip ip-prefix CONTROLLER-CUST2 index 20 permit 192.168.2.4 32 ip ip-prefix CONTROLLER-CUST1 index 10 permit 192.168.1.177 32 # ip route-static vpn-instance VPN_CUSTOMER1 192.168.1.177 255.255.255.255 Eth-trunk1.3 ip route-static vpn-instance VPN_CUSTOMER2 192.168.2.4 255.255.255.255 Eth-trunk1.2 # And the output of diagnostic commands: dis ip routing-table vpn-instance VPN_CUSTOMER2 Route Flags: R - relay, D - download to fib ------------------------------------------------------------------------------ Routing Tables: VPN_CUSTOMER2 Destinations : 6 Routes : 6 Destination/Mask Proto Pre Cost Flags NextHop Interface 192.1688.1.177/32 BGP 255 0 D 192.168.1.1 Eth-trunk1.3 192.168.2.0/24 Direct 0 0 D 192.168.2.1 Eth-trunk1.2 192.168.2.1/32 Direct 0 0 D 127.0.0.1 Eth-trunk1.2 192.168.2.4/32 Static 60 0 D 192.168.2.1 Eth-trunk1.2 dis ip routing-table vpn-instance VPN_CUSTOMER1 Route Flags: R - relay, D - download to fib ------------------------------------------------------------------------------ Routing Tables: VPN_CUSTOMER1 Destinations : 76 Routes : 76 Destination/Mask Proto Pre Cost Flags NextHop Interface 192.168.1.0/24 Direct 0 0 D 192.168.1.1 Eth-trunk1.3 192.168.1.1/32 Direct 0 0 D 127.0.0.1 Eth-trunk1.3 192.168.1.177/32 Static 60 0 D 192.168.1.1 Eth-trunk1.3 192.168.2.4/32 BGP 255 0 D 192.168.2.1 Eth-trunk1.2 PC-CONTROLLER-CUST1>ping 192.168.2.4 -t Ping 192.168.2.4: 32 data bytes, Press Ctrl_C to break Request timeout! Request timeout! Request timeout! Request timeout! Request timeout! --- 192.168.2.4 ping statistics --- 5 packet(s) transmitted 0 packet(s) received 100.00% packet loss PC-CONTROLLER-CUST2>ping 192.168.1.177 Ping 192.168.1.177: 32 data bytes, Press Ctrl_C to break Request timeout! Request timeout! Request timeout! Request timeout! --- 192.168.1.177 ping statistics --- 5 packet(s) transmitted 0 packet(s) received 100.00% packet loss PC-USER>ping 192.168.1.1 Ping 10.8.247.1: 32 data bytes, Press Ctrl_C to break From 10.8.247.1: bytes=32 seq=1 ttl=255 time=31 ms From 10.8.247.1: bytes=32 seq=2 ttl=255 time=31 ms From 10.8.247.1: bytes=32 seq=3 ttl=255 time=31 ms --- 10.8.247.1 ping statistics --- 3 packet(s) transmitted 3 packet(s) received 0.00% packet loss round-trip min/avg/max = 31/31/31 ms PC-USER>ping 192.168.1.177 Ping 192.168.1.177: 32 data bytes, Press Ctrl_C to break Request timeout! Request timeout! Request timeout! Request timeout! --- 192.168.1.177 ping statistics --- 5 packet(s) transmitted 0 packet(s) received 100.00% packet loss Visually, everything looks correct, but the point is, as soon as the host route is present, the connection between the nodes stops with PC-USER.
Posted by user_3440255 at 2021-08-30 15:54 In fact, the problem was with static routes. As soon as the controller address itself was specified ...
View more
|
|
|
Hello, dear.
It's nice to meet you in the community. We're working on getting the right answer for you. Please rest assured that we'll be back with an answer shortly.
View more
|
|
|
Hi,
The configuration seems fine, and I already tried that in the test environment, and everything works normally. Can you please check the gateway configuration on the two CUSTOMER PC? That is the only potential problem that I could imagine by now.
View more
|
|
|
gateway from PC-CUSTOMER is available
PC-CONTROLLER-CUST1>ping 192.168.1.1 Ping 192.168.1.1: 32 data bytes, Press Ctrl_C to break From 192.168.1.1: bytes=32 seq=1 ttl=255 time=62 ms From 192.168.1.1: bytes=32 seq=2 ttl=255 time=32 ms From 192.168.1.1: bytes=32 seq=3 ttl=255 time=47 ms --- 192.168.1.1 ping statistics --- 3 packet(s) transmitted 3 packet(s) received 0.00% packet loss round-trip min/avg/max = 32/47/62 ms PC-CONTROLLER-CUST2>ping 192.168.2.1 Ping 192.168.2.1: 32 data bytes, Press Ctrl_C to break From 192.168.2.1: bytes=32 seq=1 ttl=255 time=16 ms From 192.168.2.1: bytes=32 seq=2 ttl=255 time=16 ms From 192.168.2.1: bytes=32 seq=3 ttl=255 time=31 ms From 192.168.2.1: bytes=32 seq=4 ttl=255 time=16 ms --- 192.168.2.1 ping statistics --- 4 packet(s) transmitted 4 packet(s) received 0.00% packet loss round-trip min/avg/max = 16/19/31 ms
View more
|
|
Posted by user_3440255 at 2021-08-30 12:21 gateway from PC-CUSTOMER is availablePC-CONTROLLER-CUST1>ping 192.168.1.1Ping 192.168.1.1: 32 data b ...
View more
|
|
|
In fact, the problem was with static routes. As soon as the controller address itself was specified as the nexthop address (PC-CONTROLLER-CUST1 and PC-CONTROLLER-CUST2), then everything worked as it should be. dis ip routing-table vpn-instance VPN_CUSTOMER1
View more
|
|
|
As a result, for correct operation leaking of / 32 hosts routes between vpn should look like this #
View more
|
|
Posted by user_3440255 at 2021-08-30 15:54 In fact, the problem was with static routes. As soon as the controller address itself was specified ...
View more
|
|
|
Very good answer
View more
|
|
`@trans`drinking_poetry_des`~trans`
Contact Us: e_online@huawei.com Copyright © 2022 Huawei Technologies Co., Ltd. All rights reserved.