VRF Lite Route Leaking

It seems the incorrect text is still in there for the MP-BGP part.

Now the confusion comes with this statement in the MP-BGP section:

For each VRF, I will create a static route that points to the loopback 0 interface of the other VRF:

It should read:

For each VRF, I will create a static route that points to the loopback 0 interface within that VRF:

----

Maybe reflect that on the page so there is a bit less confusion on this?

Thanks!!

1 Like

Hello Jorisklop

Thanks for pointing this out. I’ll let Rene know to make the change as soon as possible.

Thanks again!

Laz

Vrf Lite means Vrf without MPLS, why do you put a title like this VRF Lite Route Leaking?
What does LITE has to do with Leaking??

I learned fron you that you can do route leaking with vrf LITE and you completely messed me up because there is no such thing…imagine that i would be a joke at a random networking interview.

Hello Adrian

I’m sorry you feel that this has been misleading. VRF-lite is a feature that enables a service provider to support two or more VPNs, where IP addresses can be overlapped among the VPNs. VRF-lite uses input interfaces to distinguish routes for different VPNs and forms
virtual packet-forwarding tables by associating one or more Layer 3 interfaces with each VRF. VRF-lite is also termed multi-VRF CE, or multi-VRF Customer Edge Device, and is typically applied without MPLS.

Route leaking allows you to route some traffic between VRFs. Now when you perform route leaking in an environment where VRF lite is applied, as in this lesson, then it makes sense to call that “VRF lite route leaking.” However, if you are not happy with that title, then feel free to think about it as simply VRF leaking.

I hope this has been helpful!

Laz

Hello Laz,

How about ios XR can we leak routes between two VRFs statically.

Best regards

Hello Ahmedlmad

As stated in the lesson, route leaking directly between VRFs is not supported in any IOS version. However, you can leak routes from a VRF into the global routing table and then leak them again from there to another VRF. This can be done on IOS XR as well.

To find out more about VRF route leaking on IOS XR, take a look at this Cisco documentation that details how this can be done:

If you need any more specific information, feel free to let us know!

I hope this has been helpful!

Laz

1 Like

Hello Laz ,
Thanks for your reply ,

But could help me with below case, as you see in the static route of the IOSxr router I can add vrf table and add in the destination another vrf, isn’t this static route between two different vrfs?

Hello Ahmedlmad

According to this Cisco document, at least for Cisco IOS, it is not possible to perform route leaking directly from one VRF to another. However, this document is indeed old, and newer versions of IOS and IOS-XR and others may now support the feature. I have been doing some research to determine what the current capabilities of various platforms are to respond to your question.

In the meantime, can you please tell me what exact command you have issued in this output so I can research further? It’s not clear from your description or your screenshot. Please let me know so I can help you out further.

I hope this has been helpful!

Laz

1 Like

Hello Laz,

Thanks For your reply, yes it would be very helpful if you can find something approves that static route between two vrf is applicable or not, what I have shared is adding static route between two different vrfs opposite of what you mentioned in the lesson, the commands are in cisco 9k asr as follows,

Rx#conf t
Rx#router static
Rx#address-family ipv4 unicast
Rx#vrf WORD
Rx#address-family ipv4 unicast 
Rx#X.X.X.X/X"destination ip"   vrf"any other VRF name in the router"    Y.Y.Y.Y"Forwarding router's address"

Hello Ahmedlmad

It turns out that it is now possible to do route leaking from one VRF directly to another. Here is some more documentation that shows this:

When the lesson was written, this was not possible, but it is a feature that has been added recently. I have spoken to Rene, and he will update the lesson accordingly.

I hope this has been helpful!

Laz

1 Like

Hello, everyone!

I have a question about this topology here.

I’ve assigned the routers on the right to various VLANs and i wanted to keep them isolated, so I created a separate VRF for each of them which matches their color (BLUE, GREEN, RED).

However, if R1 wants to send anything to those VLANs, R2 drops the traffic because R2’s G0/1 interface is not in the same VRF as its VLANs.

How exactly can I allow communication here? I would have to assign all 3 VRFs to G0/1 somehow in order for it to work.

Hello David

Hmm, it seems that the topology doesn’t fit the configuration. When applying VRFs, they are applied to a central router that connects directly to multiple other routers much like the below topology from the VRF Lite Configuration on Cisco IOS lesson:
image
In this lesson, you will notice that it is only the ISP router that has any VRF configuration. The other four routers are oblivious to any VRF configuration.

The only way to get your topology to work in a similar manner is to make R2 that central router that has the VRF configurations. The Gi0/0 interface will have subinterfaces, one on each VLAN, and each subinterface will correspond with a different VRF. That way each router R3, R4, and R5 will connect to R2 as if each one is connected to a different interface, and will be served by a different VRF.

However, you must understand the difference between the VLANs and the VRFs. VLANs segment a network at Layer 2, VRFs segment a network at Layer 3. Does that make sense?

Let us know a little bit more about the topology and the way you had planned to set up the VRFs so that we can help you further…

I hope this has been helpful!

Laz

hi all,

This is making me confuse. we put the config as address family ipv4 unicast. but when we need to verify we put vpnv4. anyone can explain.

ISP(config-router)#address-family **ipv4** vrf BLUE

ISP#show bgp **vpnv4** unicast vrf RED

Hello Hilmi

The confusion you’re experiencing is understandable and is due to the nature of VRFs and VPN routes. When you configure a VRF for a customer on your ISP router, you use the address-family ipv4 vrf BLUE command under the BGP configuration. This is because, from the customer’s perspective, they are just using regular IPv4 addresses.

However, within the ISP network, these IPv4 addresses are transported using VPNv4 addresses, which are distributed using MP-BGP. This is why when you want to verify the BGP routes being advertised, you use the show bgp vpnv4 unicast vrf RED command. This command will show you the VPNv4 prefixes that are being advertised, which includes both the customer’s IPv4 address and the Route Distinguisher.

So address-family ipv4 vrf is used for configuration on the ISP router, while show bgp vpnv4 is used for verification because the ISP network sees these routes as VPNv4 addresses.

I hope this has been helpful!

Laz

VPNv4 address 96bit = 32bit IPV4 + 64bit Route Distinguisher.
Is RT 64bit also included in VPNv4 address?
orRT = 96bit VPNv4+ 64bit RT

Hello Hemant.

A VPNv4 route/address (96 bits) is simply a route that uses the route distinguisher (64 bits) combined with the advertised prefix (32bits). We know that the RD makes the prefix unique within the MPLS infrastructure as customers can use overlapping IP spaces.
route-distinguisher-96-bit

Here’s how it looks like in the BGP table and in the BGP advertisements. I’ve spinned up a simple MPLS lab in Cisco CML. I have 3 customers that we can refer to as RED, BLUE and GREEN. They’re connected to the same ISP that is identified under AS 1234.



Notice how each customers’ prefix is uniquely identified by the RD. These are the VPNv4 routes in PE1’s BGP table.

Here’s how a VPNv4 route advertisement for customer RED looks like in Wireshark
obrázok

The RD is included within the NLRI information of the BGP UPDATE message together with the advertised prefix, as I’ve said above.

To answer your question about RTs, remember that RTs tell the router in which VRF should VPNv4 routes be imported and exported to.

So you have the unique VPNv4 route (96 bits) and now you need a way to tell the router which VRF to import/export the route to. You use an RT for this. The RT is nothing but an extended community value that is included within the Path Attributes of the route advertisement.

If anything is unclear, please let me know.

David

Hello Hemant

The Route Target (RT) is not included in the VPNv4 address. The VPNv4 address is a combination of a 64-bit Route Distinguisher (RD) and a 32-bit IPv4 address, making it a total of 96 bits. The Route Target is a separate attribute used in BGP (Border Gateway Protocol) for VPN membership information. It is not part of the VPNv4 address itself. You can see more about RDs and RTs and how they work with MP-BGP in this lesson.

I hope this has been helpful!

Laz

Hello David

Thanks so much for this thorough explanation, and for enriching the forum.

Laz