0% found this document useful (0 votes)
116 views7 pages

VRF Route leak - ArubaOS-CX

This document serves as a solution guide for validating Inter VRF communication using static routes on ArubaOS-CX. It includes detailed configurations and verifications necessary for route leaking between VRFs BLUE and RED. The guide provides examples of command outputs for configuration and verification processes to ensure proper route leaking functionality.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views7 pages

VRF Route leak - ArubaOS-CX

This document serves as a solution guide for validating Inter VRF communication using static routes on ArubaOS-CX. It includes detailed configurations and verifications necessary for route leaking between VRFs BLUE and RED. The guide provides examples of command outputs for configuration and verification processes to ensure proper route leaking functionality.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Solution Guide for VRF Route

Leak using Static Routes

ArubaOS-CX

Published: Sep 2018


Edition: 2
© Copyright 2018 Hewlett Packard Enterprise Development LP

Notices

The information contained herein is subject to change without notice. The only warranties for
Hewlett Packard Enterprise products and services are set forth in the express warranty
statements accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical
or editorial errors or omissions contained herein.

Confidential computer software. Valid license from Hewlett Packard Enterprise required for
possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer
Software, Computer Software Documentation, and Technical Data for Commercial Items are
licensed to the U.S. Government under vendor's standard commercial license.

Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett
Packard Enterprise has no control over and is not responsible for information outside the
Hewlett Packard Enterprise website.
Table of Contents
Introduction ............................................................................................................................................................................ 1
Route Leaking ......................................................................................................................................................................... 1
Topology ............................................................................................................................................................................. 1
Configurations ................................................................................................................................................................... 1
Verifications ........................................................................................................................................................................ 3
Solution Guide for VRF route leaking using Static Routes on
ArubaOS-CX

Introduction
This document provides instruction on how to validate Inter VRF communication using route leak on
ArubaOS-CX

Route Leaking
This document provides instruction on how to validate Inter VRF commuinication using Static routes on
ArubaOS-CX

Topology

Configurations

SW01-TOP-8320#show running-config

vrf BLUE
rd 220:20

vrf RED
rd 210:10

interface lag 10
no shutdown
no routing
vlan trunk native 1 tag
vlan trunk allowed 210,220
lacp mode active

interface 1/1/15
no shutdown

1
lag 10
interface 1/1/16
no shutdown
lag 10

interface vlan210
vrf attach RED
ip address 210.10.10.1/24
interface vlan220
vrf attach BLUE
ip address 220.20.20.1/24

ip route 10.10.10.0/24 210.10.10.10 vrf RED


ip route 220.20.20.0/24 vlan220 vrf RED << Route Leak
ip route 20.20.20.0/24 vlan220 vrf RED << Route Leak

ip route 20.20.20.0/24 220.20.20.20 vrf BLUE


ip route 10.10.10.0/24 vlan210 vrf BLUE << Route Leak
ip route 210.10.10.0/24 vlan210 vrf BLUE << Route Leak

SW02-BOT-8320#show running-config

vrf BLUE
rd 220:20

vrf RED
rd 210:10

vlan 1,210,220

interface lag 10
no shutdown
no routing
vlan trunk native 1 tag
vlan trunk allowed 210,220
lacp mode active

interface 1/1/15
no shutdown
lag 10
interface 1/1/16
no shutdown
lag 10

interface loopback 210


vrf attach RED
ip address 10.10.10.10/24

interface loopback 220


vrf attach BLUE
ip address 20.20.20.20/24

interface vlan210
vrf attach RED

2
ip address 210.10.10.10/24

interface vlan220
vrf attach BLUE
ip address 220.20.20.20/24

ip route 220.20.20.0/24 210.10.10.1 vrf RED


ip route 20.20.20.0/24 210.10.10.1 vrf RED

ip route 210.10.10.0/24 220.20.20.1 vrf BLUE


ip route 10.10.10.0/24 220.20.20.1 vrf BLUE

Verifications

SW01-TOP-8320# show lldp neighbor-info

LLDP Neighbor Information


=========================
Total Neighbor Entries : 9
Total Neighbor Entries Deleted : 19
Total Neighbor Entries Dropped : 0
Total Neighbor Entries Aged-Out : 19

LOCAL-PORT CHASSIS-ID PORT-ID PORT-DESC TTL SYS-NAME


--------------------------------------------------------------------------------
1/1/15 d0:67:26:e2:02:16 1/1/15 1/1/15 120 SW02-BOT
1/1/16 d0:67:26:e2:02:16 1/1/16 1/1/16 120 SW02-BOT

SW01-TOP-8320# sh ip route vrf RED

Displaying ipv4 routes selected for forwarding

'[x/y]' denotes [distance/metric]

10.10.10.0/24, vrf RED


via 210.10.10.10, [1/0], static
20.20.20.0/24, vrf RED
via vlan220[vrf BLUE], [1/0], static
210.10.10.0/24, vrf RED
via vlan210, [0/0], connected
210.10.10.1/32, vrf RED
via vlan210, [0/0], local
220.20.20.0/24, vrf RED
via vlan220[vrf BLUE], [1/0], static

SW01-TOP-8320# sh ip route vrf BLUE

Displaying ipv4 routes selected for forwarding

3
'[x/y]' denotes [distance/metric]

10.10.10.0/24, vrf BLUE


via vlan210[vrf RED], [1/0], static
20.20.20.0/24, vrf BLUE
via 220.20.20.20, [1/0], static
210.10.10.0/24, vrf BLUE
via vlan210[vrf RED], [1/0], static
220.20.20.0/24, vrf BLUE
via vlan220, [0/0], connected
220.20.20.1/32, vrf BLUE
via vlan220, [0/0], local

SW02-BOT-8320# ping 10.10.10.10 vrf BLUE

PING 10.10.10.10 (10.10.10.10) 100(128) bytes of data.


108 bytes from 10.10.10.10: icmp_seq=1 ttl=63 time=0.316 ms
108 bytes from 10.10.10.10: icmp_seq=2 ttl=63 time=0.319 ms
108 bytes from 10.10.10.10: icmp_seq=3 ttl=63 time=0.299 ms
^C

--- 10.10.10.10 ping statistics ---


3 packets transmitted, 3 received, 0% packet loss, time 1999ms
rtt min/avg/max/mdev = 0.299/0.311/0.319/0.016 ms

SW02-BOT-8320# ping 20.20.20.20 vrf RED

PING 20.20.20.20 (20.20.20.20) 100(128) bytes of data.


108 bytes from 20.20.20.20: icmp_seq=1 ttl=63 time=0.326 ms
108 bytes from 20.20.20.20: icmp_seq=2 ttl=63 time=0.328 ms
108 bytes from 20.20.20.20: icmp_seq=3 ttl=63 time=0.317 ms

^C
--- 20.20.20.20 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3000ms
rtt min/avg/max/mdev = 0.335/0.360/0.387/0.021 ms

You might also like