Directing MPLS VPN Traffic Using Policy-Based Routing
This module explains how to configure policy-based routing (PBR) to classify and forward Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) traffic based on multiple VPN routing and forwarding (VRF) selection match criteria.
Module History
This module was first published on May 2, 2005, and last updated on September 10, 2007.
Finding Feature Information in This Module
Your Cisco IOS software release may not support all features. To find information about feature support and configuration, use the "Feature Information for Directing MPLS VPN Traffic Using Policy-Based Routing" section.
Contents
•Prerequisites for Directing MPLS VPN Traffic Using Policy-Based Routing
•Restrictions for Directing MPLS VPN Traffic Using Policy-Based Routing
•Information About Directing MPLS VPN Traffic Using Policy-Based Routing
•How to Configure Policy-Based Routing To Direct MPLS VPN Traffic
•Configuration Examples for Directing MPLS VPN Traffic Using Policy-Based Routing
•Additional References
•Feature Information for Directing MPLS VPN Traffic Using Policy-Based Routing
Prerequisites for Directing MPLS VPN Traffic Using Policy-Based Routing
•Multiprotocol BGP (MP-BGP), Multiprotocol Label Switching (MPLS), Cisco Express Forwarding (CEF), and MPLS VPNs must be enabled in your network.
•The router must be running Cisco IOS software that supports policy-based routing (PBR).
•A VRF must be defined prior to the configuration of this feature. An error message is displayed in the console if no VRF exists.
Restrictions for Directing MPLS VPN Traffic Using Policy-Based Routing
•VRF Select is supported only in Service Provider (-p-) images.
•This feature can coexist with features that use VRF selection based on the source IP address, but these features cannot be configured together on the same interface. This is designed behavior to prevent VRF table selection conflicts that could occur if these features were misconfigured together. The console returns an error message if you attempt to configure the ip vrf select source and the ip vrf policy-map commands on the same interface.
•Protocol Independent Multicast (PIM) and multicast packets do not support PBR and cannot be configured for a source IP address that is match criteria for this feature.
•The set vrf command cannot be configured with the following commands in the same route map sequence:
–set ip default interface
–set interface
–set ip default next-hop
–set ip next-hop
A packet cannot be set to an interface or to a next hop when the set vrf command is specified. This is designed behavior. An error message is displayed if you attempt to configure the set vrf command with any of the above four set clauses.
•The VRF Selection using Policy Based Routing feature cannot be configured with IP prefix lists.
•If an interface is associated with a VRF by configuring the ip vrf forwarding interface configuration command, you cannot also configure the same interface to use PBR with the set vrf route map configuration command.
•PBR can be configured on an interface where a VRF is defined. However, the console displays the following warning messages if you attempt to configure both PBR and a VRF on the same interface:
%% Policy Based Routing is NOT supported for VRF" interfaces
%% IP-Policy can be used ONLY for marking "(set/clear DF bit) on
Information About Directing MPLS VPN Traffic Using Policy-Based Routing
Before configuring this feature, you should understand the following concepts:
•Directing MPLS VPN Traffic Using Policy-Based Routing Overview
•VRF Selection Introduces a New PBR Set Clause
Directing MPLS VPN Traffic Using Policy-Based Routing Overview
This feature allows you to route VPN traffic based on the following match criteria:
•IP Access Lists — IP addresses, IP address ranges, and other IP packet access list filtering options. Named, numbered, standard, and extended access lists are supported. All IP access list configuration options in Cisco IOS software can be used to define match criteria.
•Packet Lengths— Length of a packet in bytes. The packet length filter is defined in a route map with the match length route map configuration command.
Policy routing is defined in the route map. The route map is applied to the incoming interface with the ip policy route-map interface configuration command. IP access list match criteria is applied to the route map with the match ip address route map configuration command. Packet length match criteria is applied to the route map with the match length route map configuration command. The set action is defined with the set vrf route map configuration command. The match criteria is evaluated, and the appropriate VRF is selected by the set clause. This combination allows you to define match criteria for incoming VPN traffic and policy route VPN packets out to the appropriate VRF.
VRF Selection Introduces a New PBR Set Clause
When configuring PBR, the following four set clauses can be used to change normal routing and forwarding behavior:
•set ip default interface
•set ip interface
•set ip default next-hop
•set ip next-hop
Configuring any of the above set clauses will overwrite normal routing forwarding behavior of a packet.
This feature introduces the fifth set clause that can be used to change normal routing and forwarding behavior. You can use the set vrf command to select the appropriate VRF after the successful match occurs in the route map. However, the set vrf command cannot be configured with the above four PBR set clauses. This is designed behavior, because a packet cannot be set to an interface or a specific next hop when it is configured within a VRF. An error message will be displayed in the console if you attempt to configure the set vrf command with any of the above four PBR set clauses within the same route map.
How to Configure Policy-Based Routing To Direct MPLS VPN Traffic
•Defining the Match Criteria (required)
•Configuring the Route Map and Specifying VRFs (required)
•Applying a Route Map to an Interface (required)
•Configuring IP VRF Receive on the Interface (required)
•Verifying the Configuration (optional)
Defining the Match Criteria
The match criteria is defined in an access list. Standard and extended access lists are supported. The following sections show how to configure each type of access list:
•Defining Match Criteria with a Standard Access List
•Defining Match Criteria with an Extended Access List
Match criteria can also be defined based on the packet length by configuring the match length route-map configuration command. You use a route map to configure VRF selection based on packet length. See the "Configuring the Route Map and Specifying VRFs" section for more information.
Prerequisites
The following tasks assume that the VRF and associated IP address are already defined.
Defining Match Criteria with a Standard Access List
SUMMARY STEPS
1. enable
2. configure terminal
3. access-list access-list-number {deny | permit} source [source-wildcard] [log]
DETAILED STEPS
|
|
|
Step 1 |
enable
Router> enable |
Enables privileged EXEC mode. •Enter your password if prompted. |
Step 2 |
configure terminal
Router# configure terminal |
Enters global configuration mode. |
Step 3 |
access-list access-list-number {deny | permit} source [source-wildcard] [log]
Router(config)# access-list 40 192.168.1.0 0.0.0.255 permit |
Creates an access list and defines the match criteria for the route map. •Match criteria can be defined based on IP addresses, IP address ranges, and other IP packet access list filtering options. Named, numbered, standard, and extended access lists are supported. All IP access list configuration options in Cisco IOS software can be used to define match criteria. •The example creates a standard access list numbered 40. This filter will permit traffic from any host with an IP address in the 192.168.1.0/24 subnet. |
Defining Match Criteria with an Extended Access List
SUMMARY STEPS
1. enable
2. configure terminal
3. ip access-list {standard | extended}[access-list-name | access-list-number]
4. [sequence-number] permit | deny protocol source source-wildcard destination destination-wildcard [option option-value] [precedence precedence] [tos tos] [log] [time-range time-range-name] [fragments]
5. exit
DETAILED STEPS
|
|
|
Step 1 |
enable
Router> enable |
Enables privileged EXEC mode. •Enter your password if prompted. |
Step 2 |
configure terminal
Router# configure terminal |
Enters global configuration mode. |
Step 3 |
ip access-list {standard|extended} [access-list-name|access-list-number]
Router(config)# ip access-list extended NAMEDACL |
Specifies the IP access list type, and enters the corresponding access list configuration mode. •A standard, extended, or named access list can be used. |
Step 4 |
[sequence-number]permit | deny protocol source source-wildcard destination destination-wildcard [option option-value][precedence precedence] [tos tos] [log] [time-range time-range-name] [fragments]
Router(config-ext-nacl)# permit ip any any option any-options |
Defines the criteria for which the access list will permit or deny packets. •Match criteria can be defined based on IP addresses, IP address ranges, and other IP packet access list filtering options. Named, numbered, standard, and extended access lists are supported. All IP access list configuration options in Cisco IOS software can be used to define match criteria. •The example creates a named access list that permits any configured IP option. |
Step 5 |
exit
Router(config-ext-nacl)# exit |
Exits named access list configuration mode, and enters global configuration mode. |
Configuring the Route Map and Specifying VRFs
You define a route map then assign an access list to it. Then you specify a VRF for the traffic that matches the criteria in the route map. Use the set vrf command to specify the VRF through which the outbound VPN packets are routed.
Prerequisites
Define the VRF before configuring the route map; otherwise the console displays an error.
SUMMARY STEPS
1. enable
2. configure terminal
3. route-map map-tag [permit | deny] [sequence-number]
4. match ip address {acl-number [acl-number ...| acl-name ...]| acl-name [acl-name ...| acl-number ...] }
or
match length minimum-length maximum-length
5. set vrf vrf-name
6. exit
DETAILED STEPS
|
|
|
Step 1 |
enable
Router> enable |
Enables privileged EXEC mode. •Enter your password if prompted. |
Step 2 |
configure terminal
Router# configure terminal |
Enters global configuration mode. |
Step 3 |
route-map map-tag [permit | deny] [sequence-number]
Router(config)# route-map RED permit 10 |
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing. Enters route map configuration mode. |
Step 4 |
match ip address {acl-number [acl-number ... | acl-name ...] | acl-name [acl-name ... | acl-number ...] }
Router(config-route-map)# match ip address 1 or match length minimum-length maximum-length
Router(config-route-map)# match length 3 200 |
Distributes any routes that have a destination network number address that is permitted by a standard or extended access list, and performs policy routing on matched packets. •IP access lists are supported. •The example configures the route map to use standard access list 1 to define match criteria. or Specifies the Layer 3 packet length in the IP header as a match criteria in a class map. •The example configures the route map to match packets that are between 3 and 200 bytes in size. |
Step 5 |
set vrf vrf-name
Router(config-route-map)# set vrf RED |
Defines which VRF to send VPN packets that are successfully matched. •The example policy routes matched packets out to the VRF named RED. |
Step 6 |
exit
Router(config-route-map)# exit |
Exits route-map configuration mode and enters global configuration mode. |
Applying a Route Map to an Interface
You apply a route map to the incoming interface with the ip policy route-map global configuration command.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number [name-tag]
4. ip policy route-map map-tag
5. ip vrf receive vrf-name
6. end
DETAILED STEPS
|
|
|
Step 1 |
enable
Router> enable |
Enables privileged EXEC mode. •Enter your password if prompted. |
Step 2 |
configure terminal
Router# configure terminal |
Enters global configuration mode. |
Step 3 |
interface type number [name-tag]
Router(config)# interface FastEthernet 0/1 |
Configures an interface and enters interface configuration mode. |
Step 4 |
ip policy route-map [map-tag]
Router(config-if)# ip policy route-map RED |
Identifies a route map to use for policy routing on an interface. |
Step 5 |
ip vrf receive vrf-name
Router(config-if)# ip vrf receive VRF_1 |
Adds the IP addresses that are associated with an interface into the VRF table. •This command can be configured so that the receiving packets can be received by the router after being set to a specific VRF. |
Step 6 |
end
Router(config-if)# end |
Exits interface configuration mode and enters global configuration mode. |
Configuring IP VRF Receive on the Interface
You must add the source IP address to the VRF selection table. VRF Selection is a one-way (unidirectional) feature. It is applied to the incoming interface. If a match and set operation occurs in the route map but there is no receive entry in the local VRF table, the packet will be dropped if the packet destination is local.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number [name-tag]
4. ip policy route-map map-tag
5. ip vrf receive vrf-name
6. end
|
|
|
Step 1 |
enable
Router> enable |
Enables privileged EXEC mode. •Enter your password if prompted. |
Step 2 |
configure terminal
Router# configure terminal |
Enters global configuration mode. |
Step 3 |
interface type number [name-tag]
Router(config)# interface FastEthernet 0/1 |
Configures an interface and enters interface configuration mode. |
Step 4 |
ip policy route-map [map-tag]
Router(config-if)# ip policy route-map RED |
Identifies a route map to use for policy routing on an interface. |
Step 5 |
ip vrf receive vrf-name
Router(config-if)# ip vrf receive VRF_1 |
Adds the IP addresses that are associated with an interface into the VRF table. •This command must be configured for each VRF that will be used for VRF selection. |
Step 6 |
end
Router(config-if)# end |
Exits interface configuration mode and enters privileged EXEC mode. |
Verifying the Configuration
To verify that the configuration is correct, perform the steps in this section.
SUMMARY STEPS
1. enable
2. show ip access-list [access-list-number | access-list-name]
3. show route-map [map-name]
4. show ip policy
DETAILED STEPS
|
|
|
Step 1 |
enable
Router> enable |
Enables privileged EXEC mode. •Enter your password if prompted. |
Step 2 |
show ip access-list [access-list-number | access-list-name]
Router# show ip access-list |
Displays the contents of all current IP access lists. •This command is used to verify the match criteria that is defined in the access list. Both named and numbered access lists are supported. |
Step 3 |
show route-map [map-name]
Router# show route-map |
Displays all route maps configured or only the one specified. •This command is used to verify match and set clauses within the route map. |
Step 4 |
show ip policy
Router# show ip policy |
Displays the route map used for policy routing. •This command can be used to display the route map and the associated interface. |
Configuration Examples for Directing MPLS VPN Traffic Using Policy-Based Routing
This section provides the following configuration examples:
•Configuring Policy-Based Routing with a Standard Access List: Example
•Verifying Policy-Based Routing: Example
Configuring Policy-Based Routing with a Standard Access List: Example
In the following example, three standard access lists are created to define match criteria for three different subnets. A route map called PBR-VRF-Selection is assigned to interface Ethernet 0/1. If interface Ethernet 0/1 receives a packet whose source IP address is part of the 10.1.0.0/24 subnet, that packet is sent to VRF_1.
access-list 40 permit 10.1.0.0 0.0.255.255
access-list 50 permit 10.2.0.0 0.0.255.255
access-list 60 permit 10.3.0.0 0.0.255.255
route-map PBR-VRF-Selection permit 10
route-map PBR-VRF-Selection permit 20
route-map PBR-VRF-Selection permit 30
ip address 192.168.1.6 255.255.255.252
ip policy route-map PBR-VRF-Selection
Verifying Policy-Based Routing: Example
The following verification examples show defined match criteria and route-map policy configuration.
Verifying Match Criteria
To verify the configuration of match criteria for PBR VRF selection, use the show ip access-lists command. The following show ip access-lists command output displays three subnet ranges defined as match criteria in three standard access-lists:
Router# show ip access-lists
Standard IP access list 40
10 permit 10.1.0.0, wildcard bits 0.0.255.255
Standard IP access list 50
10 permit 10.2.0.0, wildcard bits 0.0.255.255
Standard IP access list 60
10 permit 10.3.0.0, wildcard bits 0.0.255.255
Verifying Route-Map Configuration
To verify route-map configuration, use the show route-map command. The output displays the match criteria and set action for each route-map sequence. The output also displays the number of packets and bytes that have been policy routed per each route-map sequence.
route-map PBR-VRF-Selection, permit, sequence 10
ip address (access-lists): 40
Policy routing matches: 0 packets, 0 bytes
route-map PBR-VRF-Selection, permit, sequence 20
ip address (access-lists): 50
Policy routing matches: 0 packets, 0 bytes
route-map PBR-VRF-Selection, permit, sequence 30
ip address (access-lists): 60
Policy routing matches: 0 packets, 0 bytes
Verifying PBR VRF Selection Policy
The following show ip policy command output displays the interface and associated route map that is configured for policy routing.
Ethernet0/1 PBR-VRF-Selection
Additional References
The following sections provide references related to MPLS VPNs.
Related Documents
Standards
|
|
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature. |
— |
MIBs
|
|
No new or modified MIBs are supported by this feature, and support for existing MIBs has not been modified by this feature. |
To obtain lists of supported MIBs by platform and Cisco IOS release, and to download MIB modules, go to the Cisco MIB website on Cisco.com at the following URL: http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml |
RFCs
|
|
No new or modified RFCs are supported by this feature, and support for existing RFCs has not been modified by this feature. |
— |
Technical Assistance
|
|
The Cisco Technical Support website contains thousands of pages of searchable technical content, including links to products, technologies, solutions, technical tips, and tools. Registered Cisco.com users can log in from this page to access even more content. |
http://www.cisco.com/techsupport |
Feature Information for Directing MPLS VPN Traffic Using Policy-Based Routing
Table 1 lists the features in this module and provides links to specific configuration information.
Not all commands may be available in your Cisco IOS software release. For details on when support for specific commands was introduced, see the command reference documents.
Cisco IOS software images are specific to a Cisco IOS software release, a feature set, and a platform. Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2007 Cisco Systems, Inc. All rights reserved.