Floating Default Route vs Flow Redirect
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎08-23-2017 08:31 AM
Hi,
Currently working on integrating a legacy Cisco network with Extreme, where the default route for the interim is to send all traffic into the legacy Cisco network.
This is to be configured via static routing, due to problems in the legacy network enabling a common routing protocol. Below is an example of what the network interconnections will look like:
The two Extreme Switches are using MLAG, common VRRP between them for each of the VLANs with Fabric routing mode enabled, and OSPF also enable across the two.
So in the scenario I would like both cores to route all traffic to the first Cisco core, should that fail all traffic to be routed to the other core.
Have been looking at both these articles:
https://extremeportal.force.com/ExtrArticleDetail?an=000083175
https://extremeportal.force.com/ExtrArticleDetail?an=000083436
The new network is all on 10.x.x.x/8, everything else is to go to the legacy network.
Was exploring implementing something like the following:
create flow-redirect core3-redirect
configure flow-redirect core3-redirect add nexthop 10.0.254.204 priority 100
configure flow-redirect core3-redirect add nexthop 10.0.254.138 priority 200
edit policy ACL_redirect
Entry redirect {
If match all {
source-address 10.0.0.0/8;
} then {
permit;
redirect-name core3-redirect;
}
}
configure access-list ACL_redirect ports x ingress
---------------
create flow-redirect core4-redirect
configure flow-redirect core4-redirect add nexthop 10.0.254.142 priority 100
configure flow-redirect core4-redirect add nexthop 10.0.254.203 priority 200
edit policy ACL_redirect
Entry redirect {
If match all {
source-address 10.0.0.0/8;
} then {
permit;
redirect-name core4-redirect;
}
}
configure access-list ACL_redirect ports x ingress
--------------
Not sure if this is the best way to do it, perhaps using the following instead?:
configure iproute priority static [11-65534]
Also, should I use flow-redirect I would probably have to apply the ACL to all ports bar the ISC link and interlinks to legacy network?
Will have to give the same consideration on the legacy side to stop any asymmetric routing, so if you also have any ideas around that?
Many thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎08-23-2017 01:20 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎08-23-2017 01:20 PM
There will be no loop at MLAG-ISC link.
Theres no need to tag VLAN 3999 over the link between the Cisco switches.
The VRRP multicast hello packet will traverse between Extreme Switches.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎08-23-2017 01:20 PM
This article mentions a similar problem, where they just omitted the VLAN between one pair of the cores but VRRP information was still shared between the other core pair because of the common VLAN:
https://supportforums.cisco.com/t5/lan-switching-and-routing/vrrp-looping-issue/td-p/2117103
Below I have tried to depict this in the diagram, by omitting VLAN 3999 between the Cisco Cores:
Would that make sense, or am I missing something or need to do it in another fashion?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎08-23-2017 11:15 AM
Cheers
