Solved

Distribute-list for adjusting route selection

Posted on 2015-01-15
5
398 Views
Last Modified: 2015-01-28
I was wanting to put together a distribution-list that would use the dmvpn eigrp routes first for specific networks and then if that is not available it would use mpls-bgp second. Little background is we have a mpls circuit utilizing bgp to provider. Also have EIGRP as internal and have a DMVPN setup as route through ISP. The reasoning for this need is mpls is 1.5 and isp is 20meg. We are in transition to new mpls but there is a need for the high bandwidth for some applications. So in the transition time I want to push traffic except for some control and voice traffic out dmvpn but have the automated ability to fail back to mpls if isp or asa fails.
 If my thought process is correct I am trying to block inbound bgp and site outbound bgp advertisements to cause the routing process of EIGRP and DMVPN tunnel to be used as long as they are up. I created a access-list to only allow phone and management ips to use bgp so that we can get to them via bgp also ip sla to monitor the dmvpn tunnels. Also track their reachability in a route-map to then use in a distribute-list. Now the only thing I am wondering if when the distribute list gets to the end of the set statement and the tunnels are down will they use the access-list in the routemap and fail over to bgp and advertise blocked networks.
So if someone could look at this and let me know if my thought process is straight this would be much appreciated.
New-BGP-Route-list.txt
0
Comment
Question by:Jonathan Dunn
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 32

Expert Comment

by:harbor235
ID: 40564734
What you want to do is set metrics that will prefer the EIGRP routes over the MPLS BGP based routes. However, since EIGRP routes are preferred over BGP anyway there is really nothing you need to do. As loing as the routes are learned dynamically?

I assume we are talking about the same network prefixes and CIDR notations?


harbor235 ;}
0
 

Author Comment

by:Jonathan Dunn
ID: 40564883
well the bgp is ibgp so it is metric of 20 and eigrp is 90. I was wanting to see if I could get the process to run the distribute list and if the ip sla does not meet the set commands to drop the distribute list and fall back to the bgp neighbor process. I did not want to mess with metrics if I did not have to.
0
 
LVL 32

Accepted Solution

by:
harbor235 earned 500 total points
ID: 40573302
You have it backwards, iBGP AD is 200, EBGP AD is 20 so you should be good .....

If that was a typo, you do not want to incorporte scripts to determine your routing policy, you can but there is a potential downside. Its one thing to provide a specialized capability and another to base your routing design on it, in my opinion this should not be part of your overall routing design philosphy.

However, You could adjust administrastive distance making EIGRP king as an alternate solution, this way you do not have much to do.

But you should be good since iBGP AD is 200.


harbor235 ;}
0
 

Author Closing Comment

by:Jonathan Dunn
ID: 40575371
I think the solution of changing ad will be the best way for the solution that I am trying to achieve. Thanks for the help.,
0

Featured Post

Resolve Critical IT Incidents Fast

If your data, services or processes become compromised, your organization can suffer damage in just minutes and how fast you communicate during a major IT incident is everything. Learn how to immediately identify incidents & best practices to resolve them quickly and effectively.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question