• Home
  • About Fryguy
  • Published Workbooks
  • Nexus 7000 Training
  • Reading List
  • Resume/CV
  • Disney

Fryguy's Blog

~ A Network Blog by a Network Engineer

Fryguy's Blog

Monthly Archives: September 2012

IOS XR – VRF lite and dot1q Trunks

28 Friday Sep 2012

Posted by fryadmin in CCIE, How To, IOS XR

≈ 4 Comments

Tags

ccie, IOS XR, service provider

Ok, time for some VRF lite basics and we can throw in some Dot1Q trunks to go with it.

First, let’s create our VRF called LAB
RP/0/7/CPU0:R1(config)#vrf LAB

Now we need to enable the address family for this VRF, there IPv4 Unicast
RP/0/7/CPU0:R1(config-vrf)#address-family ipv4 un
RP/0/7/CPU0:R1(config-vrf-af)#exit

Now we need to enable the IPv6 address family for this VRF
RP/0/7/CPU0:R1(config-vrf)#address-family ipv6 unicast

Now we can create our Dot1Q trunk to the other router:
RP/0/7/CPU0:R1(config-vrf-af)#int g0/3/0/3.100

Little different then IOS, but this actually makes more sense
RP/0/7/CPU0:R1(config-subif)#dot1q vlan 100
RP/0/7/CPU0:R1(config-subif)#ip add 150.1.21.1/24
RP/0/7/CPU0:R1(config-subif)#ipv6 add 2001:1:1:21::1/64
RP/0/7/CPU0:R1(config-subif)#vrf LAB

Continue reading →

Share this:

  • Twitter
  • Facebook
  • Reddit
  • Google
  • LinkedIn
  • More
  • Print

IOS XR – Route Filtering

27 Thursday Sep 2012

Posted by fryadmin in CCIE, How To, IOS XR

≈ 3 Comments

Tags

IOS XR, service provider, XR

 

 

Ok, now that BGP has been covered, lets talk about filtering routes received from our neighbor.  Here I have created some additional Loopbacks on R2 that are being advertised to R1:

RP/0/7/CPU0:R1#sh ip route bgp
Fri Mar 30 13:13:36.797 UTC

B    200.100.200.100/32 [20/0] via 2.2.2.2, 00:00:42
B    200.200.200.200/32 [20/0] via 2.2.2.2, 13:45:00
B    200.200.200.203/32 [20/0] via 2.2.2.2, 00:00:42
B    200.200.200.204/32 [20/0] via 2.2.2.2, 00:00:42
B    200.200.200.205/32 [20/0] via 2.2.2.2, 00:00:42
B    200.200.200.206/32 [20/0] via 2.2.2.2, 00:00:42
B    200.200.200.207/32 [20/0] via 2.2.2.2, 00:00:42
B    200.200.200.208/32 [20/0] via 2.2.2.2, 00:00:42
B    200.200.200.209/32 [20/0] via 2.2.2.2, 00:00:42
B    200.200.200.210/32 [20/0] via 2.2.2.2, 00:00:42
RP/0/7/CPU0:R1#

As you can see, we are getting a bunch of 200.200.200.x/32 routes now as well as a 200.100.200.100/32 route.  For this exercise, lets filter our all the 200.200.200.x routes we are receiving from our neighbor.

Ok, lets create a prefix-set for the loopback we want to permit:

RP/0/7/CPU0:R1(config)#conf t
RP/0/7/CPU0:R1(config)#prefix-set R2Loopbacks

Continue reading →

Share this:

  • Twitter
  • Facebook
  • Reddit
  • Google
  • LinkedIn
  • More
  • Print

IOS XR – iBGP and eBGP

24 Monday Sep 2012

Posted by fryadmin in CCIE, IOS, IOS XR

≈ 2 Comments

Tags

bgp, ccie, ccie sp, ios, IOS XR

BGP, this is where it starts to get different with IOS XR.
First up, configuring an iBGP peering with R2’s 150.1.12.2 in AS1 and advertise our loopback interface.

RP/0/7/CPU0:R1(config)#
RP/0/7/CPU0:R1(config)#router bgp 1

Let’s define the network we want to advertise, under the address family:
RP/0/7/CPU0:R1(config-bgp)#address-family ipv4 unicast
RP/0/7/CPU0:R1(config-bgp-af)#net 1.1.1.1/32
RP/0/7/CPU0:R1(config-bgp-af)#exit

Now, we can configure the neighbor.  Notice all the commands for the neighbor are under the neighbor now – not next to the neighbor.
RP/0/7/CPU0:R1(config-bgp)#nei 150.1.12.2
RP/0/7/CPU0:R1(config-bgp-nbr)#remote-as 1
RP/0/7/CPU0:R1(config-bgp-nbr)#address-family ipv4 unicast
RP/0/7/CPU0:R1(config-bgp-nbr-af)#exit
RP/0/7/CPU0:R1(config-bgp-nbr)#comm
Thu Mar 29 22:47:05.147 UTC

RP/0/7/CPU0:R1(config-bgp)#exit
RP/0/7/CPU0:R1(config)#exit

Now, time to see if we have a neighbor established:
RP/0/7/CPU0:R1#sh bgp nei 150.1.12.2
Thu Mar 29 22:48:13.338 UTC

Continue reading →

Share this:

  • Twitter
  • Facebook
  • Reddit
  • Google
  • LinkedIn
  • More
  • Print
← Older posts

Paying the hosting fees.

Archives

  • January 2019
  • November 2018
  • October 2018
  • May 2018
  • April 2018
  • March 2018
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • April 2016
  • October 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • October 2014
  • September 2014
  • August 2014
  • June 2014
  • May 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • October 2013
  • September 2013
  • August 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010

Commercial

  • INE All Access INE All Access
  • SolarWinds Thwack
  • Tech Field Day

Networking

  • Amy Engineer
  • Broken Network
  • CCIE Flyer
  • CCIE In 3 Months
  • CCIE Journey
  • CHesapeake Netcraftsman Blogs
  • Ethereal Mind
  • Firewall.cx
  • Gestlalt IT
  • Herding Packets
  • INE All Access INE All Access
  • IP Space (Ivan Pepelnjak)
  • Lame Journal
  • Marko's Blog
  • Networking Nerd
  • Orhan Ergun – CCDE
  • Packet Life
  • Packet Queue
  • Tech Field Day
  • The Data Center Overlords

Podcast

  • No Strings Attached
  • Packet Pushers

Proudly powered by WordPress Theme: Chateau by Ignacio Ricci.