SlideShare a Scribd company logo
1 of 24
Download to read offline
Route Maps
Presented By –
Tandel Vishal P.
• Information about Route Maps
• Permit and deny Clauses
• Match and Set Clause values
• Guidelines and Limitation
• Defining a Route Map
• Customizing a Route Map
• Configuring the Metric values for a route Action
• Configuration Example for Route Map
• Feature History for Route Maps
• Summary
Objective
• Route maps are used when redistributing routes into an OSPF, RIP, or EIGRP routing process.
They are also used when generating a default route into an OSPF routing process. A route map
defines which of the routes from the specified routing protocol are allowed to be redistributed
into the target routing process.
Route maps have many features in common with widely known ACLs. These are some of the
traits common to both:
• They are an ordered sequence of individual statements, each has a permit or deny result.
Evaluation of ACL or route maps consists of a list scan, in a predetermined order, and an
evaluation of the criteria of each statement that matches. They are generic mechanisms—
Criteria matches and match interpretation are dictated by the way that they are applied. The
same route map applied to different tasks might be interpreted differently.
Information about Route Maps
• Route maps frequently use ACLs as matching criteria.
• The main result from the evaluation of an access list is a yes or no answer—An ACL either
permits or denies input data. Applied to redistribution, an ACL determines if a particular route
can (route matches ACLs permit statement) or can not (matches deny statement) be
redistributed. Typical route maps not only permit (some) redistributed routes but also modify
information associated with the route, when it is redistributed into another protocol.
• Route maps are more flexible than ACLs and can verify routes based on criteria which ACLs
can not verify. For example, a route map can verify if the type of route is internal.
• Each ACL ends with an implicit deny statement, by design convention; there is no similar
convention for route maps. If the end of a route map is reached during matching attempts, the
result depends on the specific application of the route map. Fortunately, route maps that are
applied to redistribution behave the same way as ACLs: if the route does not match any clause
in a route map then the route redistribution is denied, as if the route map contained deny
statement at the end.
Difference between ACL and Route
Maps
• The dynamic protocol redistribute command allows you to apply a route map. In
ASDM, this capability for redistribution can be found when you add or edit a new
route. Route maps are preferred if you intend to either modify route information
during redistribution or if you need more powerful matching capability than an ACL
can provide.
• If you simply need to selectively permit some routes based on their prefix or mask,
we recommends that you use a route map to map to an ACL (or equivalent prefix
list) directly in the redistribute command. If you use a route map to selectively
permit some routes based on their prefix or mask, you typically use more
configuration commands to achieve the same goal.
• This section includes the following topics
• Permit and Deny Clauses
• Match and Set Clause Values
Route maps can have permit and deny clauses. In the route-map ospf-to-
eigrp command, there is one deny clause (with sequence number 10) and
two permit clauses. The deny clause rejects route matches from
redistribution. Therefore, the following rules apply:
• If you use an ACL in a route map using a permit clause, routes that are
permitted by the ACL are redistributed.
• If you use an ACL in a route map deny clause, routes that are permitted by
the ACL are not redistributed.
• If you use an ACL in a route map permit or deny clause, and the ACL denies
a route, then the route map clause match is not found and the next route-
map clause is evaluated.
Permit and deny Clauses
Each route map clause has two types of values:
• A match value selects routes to which this clause should be applied.
• A set value modifies information that will be redistributed into the target protocol.
For each route that is being redistributed, the router first evaluates the match
criteria of a clause in the route map. If the match criteria succeed, then the route is
redistributed or rejected as dictated by the permit or deny clause, and some of its
attributes might be modified by the values set from the Set Value tab in ASDM or
from the set commands.
If the match criteria fail, then this clause is not applicable to the route, and the
software proceeds to evaluate the route against the next clause in the route map.
Scanning of the route map continues until a clause is found whose match
command(s), or Match Clause as set from the Match Clause tab in ASDM, match
the route or until the end of the route map is reached.
Match and Set Clause values
A match or set value in each clause can be missed or repeated several times, if one
of these conditions exists:
• If several match commands or Match Clause values in ASDM are present in a
clause, all must succeed for a given route in order for that route to match the clause
(in other words, the logical AND algorithm is applied for multiple match commands).
• If a match command or Match Clause value in ASDM refers to several objects in one
command, either of them should match (the logical OR algorithm is applied). For
example, in the match ip address 101 121 command, a route is permitted if access
list 101 or access list 121 permits it.
• If a match command or Match Clause value in ASDM is not present, all routes match
the clause. In the previous example, all routes that reach clause 30 match; therefore,
the end of the route map is never reached.
• If a set command, or Set Value in ASDM, is not present in a route map permit
clause, then the route is redistributed without modification of its current attributes.
A route map clause without a match or set command, or Match or Set Value
as set on the Match or Set Value tab in ASDM, performs an action. An empty
permit clause allows a redistribution of the remaining routes without
modification. An empty deny clause does not allows a redistribution of other
routes (this is the default action if a route map is completely scanned, but no
explicit match is found).
This section includes the guidelines and limitations for this
feature.
• Context Mode Guidelines
• Supported in single context mode.
• Firewall Mode Guidelines
• Supported only in routed firewall mode. Transparent firewall
mode is not supported.
• IPv6 Guidelines
• Does not support IPv6.
Guidelines and Limitation
• You must define a route map when specifying which of the routes from
the specified routing protocol are allowed to be redistributed into the
target routing process.
• To define a route map, enter the following command:
Defining a Route Map
Command Purpose
route-map name {permit | deny}
[sequence_number]
Example:
hostname(config)# route-map name
{permit}
[12]
Creates the route map entry. Enters route-
map configuration mode.
Route map entries are read in order. You can
identify the order using the
sequence_number argument, or the ASASM
uses the order in which you add route map
entries
This section describes how to customize the route map and includes the
following topics:
• Defining a Route to Match a Specific Destination Address
• Configuring the Metric Values for a Route Action
Defining a Route to Match a Specific Destination Address
To define a route to match a specified destination address, perform the
following steps:
Detailed Steps
Customizing a Route Map
Command Purpose
Step 1 route-map name {permit | deny}
[sequence_number]
Example:
hostname(config)# route-
map name {permit}
[12]
Creates the route map entry.
Enters route-map configuration
mode.
Route map entries are read in
order. You can identify the order
using
the sequence_number option, or
the ASASM uses the order in
Step 2 Enter one of the following match commands to match routes to a specified destination
address:
match ip address acl_id [acl_id] [...]
[prefix-list]
Example:
hostname(config-route-map)# match ip
address acl_id [acl_id] [...]
[prefix-list]
Matches any routes that have a destination
network that matches a standard ACL or prefix
list.
If you specify more than one ACL, then the
route can match any of the ACLs.
match metric metric_value
Example:
hostname(config-route-map)# match metric
200
Matches any routes that have a specified
metric.
The metric_value can range from 0 to
4294967295.
match ip next-hop acl_id [acl_id] [...]
Example:
hostname(config-route-map)# match ip
next-hop acl_id [acl_id] [...]
Matches any routes that have a next hop router
address that matches a standard ACL.
If you specify more than one ACL, then the
route can match any of the ACLs.
match interface if_name
Example:
hostname(config-route-map)# match
interface if_name
Matches any routes with the specified next hop
interface.
If you specify more than one interface, then the
route can match either interface.
match ip route-source acl_id [acl_id]
[...]
Example:
hostname(config-route-map)# match ip
route-source acl_id [acl_id] [...]
Matches any routes that have been advertised
by routers that match a standard ACL.
If you specify more than one ACL, then the
route can match any of the ACLs.
match route-type {internal | external
[type-1 | type-2]}
Example:
Matches the route type.
• If a route matches the match commands, then the
following set commands determine the action to perform on the route
before redistributing it.
• To configure the metric value for a route action, perform the following
steps:
• Detailed Steps
Command Purpose
Step 1 route-map name {permit |
deny} [sequence_number]
Example:
hostname(config)# route-
map name {permit} [12]
Creates the route map entry.
Route map entries are read
in order. You can identify the
order using
the sequence_number argu
ment, or the ASASM uses
the order in which you add
route map entries.
Configuring the Metric values for a
route Action
Step 2 To set a metric for the route map, enter one or more of the
following set commands:
set metric metric_value
Example:
hostname(config-route-map)#
set metric 200
Sets the metric value.
The metric_value argument
can range from 0 to
294967295.
set metric-type {type-1 | type-2}
Example:
hostname(config-route-map)# set
metric-type type-2
Sets the metric type.
The metric-type argument
can be type-1 or type-2.
• The following example shows how to redistribute routes with a hop count
equal to 1 into OSPF.
• The ASASM redistributes these routes as external LSAs with a metric of
5 and a metric type of Type 1.
hostname(config)# route-map 1-to-2 permit
hostname(config-route-map)# match metric 1
hostname(config-route-map)# set metric 5
hostname(config-route-map)# set metric-type type-1
Configuration Example for Route Map
Route-maps are very powerful but complicated tools for the redistribution of
routes. They allow for very fine manipulation of routing information when it is
redistributed between protocols. However, they can be dangerous and can
create “blackholes” or suboptimal traffic flow in your network. You must design
networks very carefully, if you are going to employ complex redistribution
features between multiple routing protocols.
Summary
TABLE 1 AND TABLE 2 USE THESE
CONVENTIONS
• Supported commands are marked with a Yes.
• Unsupported commands are marked with a dash (—).
• Unsupported commands known to perform an action (probably an
unwanted action) are marked with a No.
Table 1 – Route-map Commands to Match Routes Installed into
Routing Tables by Protocols
Command
Redistribution Support
connecte
d
static RIP EIGRP OSPF IS-IS BGP
match clns
address
— Yes — — — Yes Yes
match clns
next-hop
— Yes — — — Yes —
match
interface
Yes Yes Yes Yes Yes Yes —
match ip
address
Yes Yes Yes Yes Yes Yes Yes
match ip
address
prefix-list
Yes Yes Yes Yes Yes Yes Yes
match ip
next-hop
— Yes Yes Yes Yes Yes Yes
Table 1 – Route-map Commands to Match Routes Installed into Routing Tables by
Protocols
match ip
next-hop
prefix-list
— No No No No No No
match ip
route-
source
— — Yes Yes Yes — Yes
match ip
route-
source
prefix-list
— — No No No — No
match ipv6
address
[prefix-list]
Yes Yes Yes — Yes Yes Yes
match ipv6
next-hop
[prefix-list]
— Yes Yes — — — Yes
match ipv6
route-
source
[prefix-list]
— — Yes — — — Yes
match
metric
— — Yes Yes Yes Yes Yes
match
policy-list
Yes Yes Yes Yes Yes Yes Yes
match
route-type
external
— — — Yes Yes Yes Yes
match
route-type
internal
— — — Yes Yes — Yes
match
route-type
local
— — — — — — Yes
match
route-type
nssa-
external
— — — — Yes — —
match
Table 2 – Commands that Modify Route Attributes During Redistribution into the Target
ProtocolCommand
Redistribution Support
RIP EIGRP OSPF IS-IS BGP
set as-path tag — — — — Yes
set community — — — — Yes
set ip next-hop — — — — Yes
set ip next-hop peer-
address
— — — — No
set ipv6 next-hop — — — — Yes
set level
{backbone|stub-area}
— — No — —
set level {level-1|level-
2|level-1-2}
— — — Yes —
set local-preference — — — — Yes
set metric Yes — Yes Yes Yes
set metric +/- No — No No No
set metric eigrp-metric — Yes — — —
set metric +/- eigrp-
metric
— No — — —
set metric-type internal — — — Yes —
set metric-type
external
— — — Yes —
set metric-type {type-
1|type-2}
— — Yes — —
set nlri — — — — Yes
set origin — — — — Yes
set tag Yes Yes Yes — —
set weight — — — — Yes
Table 21-1 lists each feature change and the platform release in which it
was implemented.
Table 21-1 Feature History for Route Maps
Feature Name Platform Releases Feature Information
Route maps 7.0(1) We introduced this feature.
We introduced the following
command: route-map.
Enhanced support for static
and dynamic route maps
8.0(2) Enhanced support for dynamic
and static route maps was added.
Support for stateful failover of
dynamic routing protocols
(EIGRP, OSPF, and RIP) and
debugging of general routing-
related operations
8.4(1) We introduced the following
commands: debug route, show
debug route.
We modified the following
command:show route.
Feature History for Route Maps
Route maps

More Related Content

Viewers also liked

Bare Metal to OpenStack with Razor and Chef
Bare Metal to OpenStack with Razor and ChefBare Metal to OpenStack with Razor and Chef
Bare Metal to OpenStack with Razor and ChefMatt Ray
 
Futures Trading Strategies on SGX - India chapter in AFACT in Singapore
Futures Trading Strategies on SGX - India chapter in AFACT in SingaporeFutures Trading Strategies on SGX - India chapter in AFACT in Singapore
Futures Trading Strategies on SGX - India chapter in AFACT in SingaporeQuantInsti
 
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Odinot Stanislas
 
[Webinar Slides] Programming the Network Dataplane in P4
[Webinar Slides] Programming the Network Dataplane in P4[Webinar Slides] Programming the Network Dataplane in P4
[Webinar Slides] Programming the Network Dataplane in P4Open Networking Summits
 
Implementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers CiscoImplementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers CiscoPaulo Colomés
 
8237 / 8257 DMA
8237 / 8257 DMA8237 / 8257 DMA
8237 / 8257 DMAAJAL A J
 
Understanding DPDK algorithmics
Understanding DPDK algorithmicsUnderstanding DPDK algorithmics
Understanding DPDK algorithmicsDenys Haryachyy
 

Viewers also liked (13)

CCCNP ROUTE v6_ch04
CCCNP ROUTE  v6_ch04CCCNP ROUTE  v6_ch04
CCCNP ROUTE v6_ch04
 
The 10 step road map (tiwana 2002
The 10 step road map (tiwana 2002The 10 step road map (tiwana 2002
The 10 step road map (tiwana 2002
 
Bare Metal to OpenStack with Razor and Chef
Bare Metal to OpenStack with Razor and ChefBare Metal to OpenStack with Razor and Chef
Bare Metal to OpenStack with Razor and Chef
 
Lec18
Lec18Lec18
Lec18
 
CCIE Lab - IGP Routing
CCIE Lab -  IGP Routing  CCIE Lab -  IGP Routing
CCIE Lab - IGP Routing
 
Futures Trading Strategies on SGX - India chapter in AFACT in Singapore
Futures Trading Strategies on SGX - India chapter in AFACT in SingaporeFutures Trading Strategies on SGX - India chapter in AFACT in Singapore
Futures Trading Strategies on SGX - India chapter in AFACT in Singapore
 
DPDK KNI interface
DPDK KNI interfaceDPDK KNI interface
DPDK KNI interface
 
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
 
Vagrant
VagrantVagrant
Vagrant
 
[Webinar Slides] Programming the Network Dataplane in P4
[Webinar Slides] Programming the Network Dataplane in P4[Webinar Slides] Programming the Network Dataplane in P4
[Webinar Slides] Programming the Network Dataplane in P4
 
Implementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers CiscoImplementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers Cisco
 
8237 / 8257 DMA
8237 / 8257 DMA8237 / 8257 DMA
8237 / 8257 DMA
 
Understanding DPDK algorithmics
Understanding DPDK algorithmicsUnderstanding DPDK algorithmics
Understanding DPDK algorithmics
 

Similar to Route maps

Cisco Route Maps
Cisco Route MapsCisco Route Maps
Cisco Route Mapsabdulquyyum
 
BSCI30S05 Redistribution, DHCP.pptx
BSCI30S05 Redistribution, DHCP.pptxBSCI30S05 Redistribution, DHCP.pptx
BSCI30S05 Redistribution, DHCP.pptxsumankumar770546
 
Route static Configuration
Route static ConfigurationRoute static Configuration
Route static ConfigurationGausul Azam
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRPDmitry Figol
 
Redistribution into EIGRP with Route Maps
Redistribution into EIGRP with Route MapsRedistribution into EIGRP with Route Maps
Redistribution into EIGRP with Route MapsNetProtocol Xpert
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionNetwax Lab
 
Route Redistribution
Route RedistributionRoute Redistribution
Route RedistributionNetwax Lab
 
How to configure pbr (policy based routing)
How to configure pbr (policy based routing)How to configure pbr (policy based routing)
How to configure pbr (policy based routing)Lirouter Li
 
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1aishwaryaarrao3
 
Lecture 3. MS SQL. Cursors.
Lecture 3. MS SQL. Cursors.Lecture 3. MS SQL. Cursors.
Lecture 3. MS SQL. Cursors.Alexey Furmanov
 
3 ip routing bgp-updated
3 ip routing bgp-updated3 ip routing bgp-updated
3 ip routing bgp-updatedSagarR24
 
3 ip routing part b
3 ip routing part b3 ip routing part b
3 ip routing part bSagarR24
 
Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)CCNAResources
 
.NET Core, ASP.NET Core Course, Session 10
.NET Core, ASP.NET Core Course, Session 10.NET Core, ASP.NET Core Course, Session 10
.NET Core, ASP.NET Core Course, Session 10aminmesbahi
 
Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guideAbel Saduwa
 
EIGRP Authentication & Load Balancing
EIGRP Authentication & Load BalancingEIGRP Authentication & Load Balancing
EIGRP Authentication & Load Balancing NetProtocol Xpert
 
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...EM Legacy
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTINGanilinvns
 

Similar to Route maps (20)

Cisco Route Maps
Cisco Route MapsCisco Route Maps
Cisco Route Maps
 
BSCI30S05 Redistribution, DHCP.pptx
BSCI30S05 Redistribution, DHCP.pptxBSCI30S05 Redistribution, DHCP.pptx
BSCI30S05 Redistribution, DHCP.pptx
 
Route static Configuration
Route static ConfigurationRoute static Configuration
Route static Configuration
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
 
Redistribution into EIGRP with Route Maps
Redistribution into EIGRP with Route MapsRedistribution into EIGRP with Route Maps
Redistribution into EIGRP with Route Maps
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
 
Route Redistribution
Route RedistributionRoute Redistribution
Route Redistribution
 
Mvc3 part2
Mvc3   part2Mvc3   part2
Mvc3 part2
 
How to configure pbr (policy based routing)
How to configure pbr (policy based routing)How to configure pbr (policy based routing)
How to configure pbr (policy based routing)
 
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
 
Lecture 3. MS SQL. Cursors.
Lecture 3. MS SQL. Cursors.Lecture 3. MS SQL. Cursors.
Lecture 3. MS SQL. Cursors.
 
3 ip routing bgp-updated
3 ip routing bgp-updated3 ip routing bgp-updated
3 ip routing bgp-updated
 
3 ip routing part b
3 ip routing part b3 ip routing part b
3 ip routing part b
 
Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)
 
.NET Core, ASP.NET Core Course, Session 10
.NET Core, ASP.NET Core Course, Session 10.NET Core, ASP.NET Core Course, Session 10
.NET Core, ASP.NET Core Course, Session 10
 
Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guide
 
EIGRP Overview
EIGRP OverviewEIGRP Overview
EIGRP Overview
 
EIGRP Authentication & Load Balancing
EIGRP Authentication & Load BalancingEIGRP Authentication & Load Balancing
EIGRP Authentication & Load Balancing
 
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 

More from Vishal Tandel

Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Vishal Tandel
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its typesVishal Tandel
 
Introduction of Windows azure and overview
Introduction of Windows azure and overviewIntroduction of Windows azure and overview
Introduction of Windows azure and overviewVishal Tandel
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
Introduction on Prolog - Programming in Logic
Introduction on Prolog - Programming in LogicIntroduction on Prolog - Programming in Logic
Introduction on Prolog - Programming in LogicVishal Tandel
 
Case Study on Google.
Case Study on Google.Case Study on Google.
Case Study on Google.Vishal Tandel
 
Cluster analysis for market segmentation
Cluster analysis for market segmentationCluster analysis for market segmentation
Cluster analysis for market segmentationVishal Tandel
 

More from Vishal Tandel (7)

Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Introduction of Windows azure and overview
Introduction of Windows azure and overviewIntroduction of Windows azure and overview
Introduction of Windows azure and overview
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Introduction on Prolog - Programming in Logic
Introduction on Prolog - Programming in LogicIntroduction on Prolog - Programming in Logic
Introduction on Prolog - Programming in Logic
 
Case Study on Google.
Case Study on Google.Case Study on Google.
Case Study on Google.
 
Cluster analysis for market segmentation
Cluster analysis for market segmentationCluster analysis for market segmentation
Cluster analysis for market segmentation
 

Recently uploaded

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Recently uploaded (20)

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Route maps

  • 1. Route Maps Presented By – Tandel Vishal P.
  • 2. • Information about Route Maps • Permit and deny Clauses • Match and Set Clause values • Guidelines and Limitation • Defining a Route Map • Customizing a Route Map • Configuring the Metric values for a route Action • Configuration Example for Route Map • Feature History for Route Maps • Summary Objective
  • 3. • Route maps are used when redistributing routes into an OSPF, RIP, or EIGRP routing process. They are also used when generating a default route into an OSPF routing process. A route map defines which of the routes from the specified routing protocol are allowed to be redistributed into the target routing process. Route maps have many features in common with widely known ACLs. These are some of the traits common to both: • They are an ordered sequence of individual statements, each has a permit or deny result. Evaluation of ACL or route maps consists of a list scan, in a predetermined order, and an evaluation of the criteria of each statement that matches. They are generic mechanisms— Criteria matches and match interpretation are dictated by the way that they are applied. The same route map applied to different tasks might be interpreted differently. Information about Route Maps
  • 4. • Route maps frequently use ACLs as matching criteria. • The main result from the evaluation of an access list is a yes or no answer—An ACL either permits or denies input data. Applied to redistribution, an ACL determines if a particular route can (route matches ACLs permit statement) or can not (matches deny statement) be redistributed. Typical route maps not only permit (some) redistributed routes but also modify information associated with the route, when it is redistributed into another protocol. • Route maps are more flexible than ACLs and can verify routes based on criteria which ACLs can not verify. For example, a route map can verify if the type of route is internal. • Each ACL ends with an implicit deny statement, by design convention; there is no similar convention for route maps. If the end of a route map is reached during matching attempts, the result depends on the specific application of the route map. Fortunately, route maps that are applied to redistribution behave the same way as ACLs: if the route does not match any clause in a route map then the route redistribution is denied, as if the route map contained deny statement at the end. Difference between ACL and Route Maps
  • 5. • The dynamic protocol redistribute command allows you to apply a route map. In ASDM, this capability for redistribution can be found when you add or edit a new route. Route maps are preferred if you intend to either modify route information during redistribution or if you need more powerful matching capability than an ACL can provide. • If you simply need to selectively permit some routes based on their prefix or mask, we recommends that you use a route map to map to an ACL (or equivalent prefix list) directly in the redistribute command. If you use a route map to selectively permit some routes based on their prefix or mask, you typically use more configuration commands to achieve the same goal. • This section includes the following topics • Permit and Deny Clauses • Match and Set Clause Values
  • 6. Route maps can have permit and deny clauses. In the route-map ospf-to- eigrp command, there is one deny clause (with sequence number 10) and two permit clauses. The deny clause rejects route matches from redistribution. Therefore, the following rules apply: • If you use an ACL in a route map using a permit clause, routes that are permitted by the ACL are redistributed. • If you use an ACL in a route map deny clause, routes that are permitted by the ACL are not redistributed. • If you use an ACL in a route map permit or deny clause, and the ACL denies a route, then the route map clause match is not found and the next route- map clause is evaluated. Permit and deny Clauses
  • 7. Each route map clause has two types of values: • A match value selects routes to which this clause should be applied. • A set value modifies information that will be redistributed into the target protocol. For each route that is being redistributed, the router first evaluates the match criteria of a clause in the route map. If the match criteria succeed, then the route is redistributed or rejected as dictated by the permit or deny clause, and some of its attributes might be modified by the values set from the Set Value tab in ASDM or from the set commands. If the match criteria fail, then this clause is not applicable to the route, and the software proceeds to evaluate the route against the next clause in the route map. Scanning of the route map continues until a clause is found whose match command(s), or Match Clause as set from the Match Clause tab in ASDM, match the route or until the end of the route map is reached. Match and Set Clause values
  • 8. A match or set value in each clause can be missed or repeated several times, if one of these conditions exists: • If several match commands or Match Clause values in ASDM are present in a clause, all must succeed for a given route in order for that route to match the clause (in other words, the logical AND algorithm is applied for multiple match commands). • If a match command or Match Clause value in ASDM refers to several objects in one command, either of them should match (the logical OR algorithm is applied). For example, in the match ip address 101 121 command, a route is permitted if access list 101 or access list 121 permits it. • If a match command or Match Clause value in ASDM is not present, all routes match the clause. In the previous example, all routes that reach clause 30 match; therefore, the end of the route map is never reached. • If a set command, or Set Value in ASDM, is not present in a route map permit clause, then the route is redistributed without modification of its current attributes.
  • 9. A route map clause without a match or set command, or Match or Set Value as set on the Match or Set Value tab in ASDM, performs an action. An empty permit clause allows a redistribution of the remaining routes without modification. An empty deny clause does not allows a redistribution of other routes (this is the default action if a route map is completely scanned, but no explicit match is found).
  • 10. This section includes the guidelines and limitations for this feature. • Context Mode Guidelines • Supported in single context mode. • Firewall Mode Guidelines • Supported only in routed firewall mode. Transparent firewall mode is not supported. • IPv6 Guidelines • Does not support IPv6. Guidelines and Limitation
  • 11. • You must define a route map when specifying which of the routes from the specified routing protocol are allowed to be redistributed into the target routing process. • To define a route map, enter the following command: Defining a Route Map Command Purpose route-map name {permit | deny} [sequence_number] Example: hostname(config)# route-map name {permit} [12] Creates the route map entry. Enters route- map configuration mode. Route map entries are read in order. You can identify the order using the sequence_number argument, or the ASASM uses the order in which you add route map entries
  • 12. This section describes how to customize the route map and includes the following topics: • Defining a Route to Match a Specific Destination Address • Configuring the Metric Values for a Route Action Defining a Route to Match a Specific Destination Address To define a route to match a specified destination address, perform the following steps: Detailed Steps Customizing a Route Map Command Purpose Step 1 route-map name {permit | deny} [sequence_number] Example: hostname(config)# route- map name {permit} [12] Creates the route map entry. Enters route-map configuration mode. Route map entries are read in order. You can identify the order using the sequence_number option, or the ASASM uses the order in
  • 13. Step 2 Enter one of the following match commands to match routes to a specified destination address: match ip address acl_id [acl_id] [...] [prefix-list] Example: hostname(config-route-map)# match ip address acl_id [acl_id] [...] [prefix-list] Matches any routes that have a destination network that matches a standard ACL or prefix list. If you specify more than one ACL, then the route can match any of the ACLs. match metric metric_value Example: hostname(config-route-map)# match metric 200 Matches any routes that have a specified metric. The metric_value can range from 0 to 4294967295. match ip next-hop acl_id [acl_id] [...] Example: hostname(config-route-map)# match ip next-hop acl_id [acl_id] [...] Matches any routes that have a next hop router address that matches a standard ACL. If you specify more than one ACL, then the route can match any of the ACLs. match interface if_name Example: hostname(config-route-map)# match interface if_name Matches any routes with the specified next hop interface. If you specify more than one interface, then the route can match either interface. match ip route-source acl_id [acl_id] [...] Example: hostname(config-route-map)# match ip route-source acl_id [acl_id] [...] Matches any routes that have been advertised by routers that match a standard ACL. If you specify more than one ACL, then the route can match any of the ACLs. match route-type {internal | external [type-1 | type-2]} Example: Matches the route type.
  • 14. • If a route matches the match commands, then the following set commands determine the action to perform on the route before redistributing it. • To configure the metric value for a route action, perform the following steps: • Detailed Steps Command Purpose Step 1 route-map name {permit | deny} [sequence_number] Example: hostname(config)# route- map name {permit} [12] Creates the route map entry. Route map entries are read in order. You can identify the order using the sequence_number argu ment, or the ASASM uses the order in which you add route map entries. Configuring the Metric values for a route Action
  • 15. Step 2 To set a metric for the route map, enter one or more of the following set commands: set metric metric_value Example: hostname(config-route-map)# set metric 200 Sets the metric value. The metric_value argument can range from 0 to 294967295. set metric-type {type-1 | type-2} Example: hostname(config-route-map)# set metric-type type-2 Sets the metric type. The metric-type argument can be type-1 or type-2.
  • 16. • The following example shows how to redistribute routes with a hop count equal to 1 into OSPF. • The ASASM redistributes these routes as external LSAs with a metric of 5 and a metric type of Type 1. hostname(config)# route-map 1-to-2 permit hostname(config-route-map)# match metric 1 hostname(config-route-map)# set metric 5 hostname(config-route-map)# set metric-type type-1 Configuration Example for Route Map
  • 17. Route-maps are very powerful but complicated tools for the redistribution of routes. They allow for very fine manipulation of routing information when it is redistributed between protocols. However, they can be dangerous and can create “blackholes” or suboptimal traffic flow in your network. You must design networks very carefully, if you are going to employ complex redistribution features between multiple routing protocols. Summary
  • 18. TABLE 1 AND TABLE 2 USE THESE CONVENTIONS • Supported commands are marked with a Yes. • Unsupported commands are marked with a dash (—). • Unsupported commands known to perform an action (probably an unwanted action) are marked with a No. Table 1 – Route-map Commands to Match Routes Installed into Routing Tables by Protocols
  • 19. Command Redistribution Support connecte d static RIP EIGRP OSPF IS-IS BGP match clns address — Yes — — — Yes Yes match clns next-hop — Yes — — — Yes — match interface Yes Yes Yes Yes Yes Yes — match ip address Yes Yes Yes Yes Yes Yes Yes match ip address prefix-list Yes Yes Yes Yes Yes Yes Yes match ip next-hop — Yes Yes Yes Yes Yes Yes Table 1 – Route-map Commands to Match Routes Installed into Routing Tables by Protocols
  • 20. match ip next-hop prefix-list — No No No No No No match ip route- source — — Yes Yes Yes — Yes match ip route- source prefix-list — — No No No — No match ipv6 address [prefix-list] Yes Yes Yes — Yes Yes Yes match ipv6 next-hop [prefix-list] — Yes Yes — — — Yes
  • 21. match ipv6 route- source [prefix-list] — — Yes — — — Yes match metric — — Yes Yes Yes Yes Yes match policy-list Yes Yes Yes Yes Yes Yes Yes match route-type external — — — Yes Yes Yes Yes match route-type internal — — — Yes Yes — Yes match route-type local — — — — — — Yes match route-type nssa- external — — — — Yes — — match
  • 22. Table 2 – Commands that Modify Route Attributes During Redistribution into the Target ProtocolCommand Redistribution Support RIP EIGRP OSPF IS-IS BGP set as-path tag — — — — Yes set community — — — — Yes set ip next-hop — — — — Yes set ip next-hop peer- address — — — — No set ipv6 next-hop — — — — Yes set level {backbone|stub-area} — — No — — set level {level-1|level- 2|level-1-2} — — — Yes — set local-preference — — — — Yes set metric Yes — Yes Yes Yes set metric +/- No — No No No set metric eigrp-metric — Yes — — — set metric +/- eigrp- metric — No — — — set metric-type internal — — — Yes — set metric-type external — — — Yes — set metric-type {type- 1|type-2} — — Yes — — set nlri — — — — Yes set origin — — — — Yes set tag Yes Yes Yes — — set weight — — — — Yes
  • 23. Table 21-1 lists each feature change and the platform release in which it was implemented. Table 21-1 Feature History for Route Maps Feature Name Platform Releases Feature Information Route maps 7.0(1) We introduced this feature. We introduced the following command: route-map. Enhanced support for static and dynamic route maps 8.0(2) Enhanced support for dynamic and static route maps was added. Support for stateful failover of dynamic routing protocols (EIGRP, OSPF, and RIP) and debugging of general routing- related operations 8.4(1) We introduced the following commands: debug route, show debug route. We modified the following command:show route. Feature History for Route Maps