mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
145 lines
5.2 KiB
ReStructuredText
145 lines
5.2 KiB
ReStructuredText
.. _routing-bgp:
|
|
|
|
Border Gateway Protocol (BGP)
|
|
-----------------------------
|
|
|
|
IPv4
|
|
^^^^
|
|
|
|
A simple eBGP configuration:
|
|
|
|
**Node 1:**
|
|
|
|
.. code-block:: sh
|
|
|
|
set protocols bgp 65534 neighbor 192.168.0.2 ebgp-multihop '2'
|
|
set protocols bgp 65534 neighbor 192.168.0.2 remote-as '65535'
|
|
set protocols bgp 65534 neighbor 192.168.0.2 update-source '192.168.0.1'
|
|
set protocols bgp 65534 address-family ipv4-unicast network '172.16.0.0/16'
|
|
set protocols bgp 65534 parameters router-id '192.168.0.1'
|
|
|
|
**Node 2:**
|
|
|
|
.. code-block:: sh
|
|
|
|
set protocols bgp 65535 neighbor 192.168.0.1 ebgp-multihop '2'
|
|
set protocols bgp 65535 neighbor 192.168.0.1 remote-as '65534'
|
|
set protocols bgp 65535 neighbor 192.168.0.1 update-source '192.168.0.2'
|
|
set protocols bgp 65535 address-family ipv4-unicast network '172.17.0.0/16'
|
|
set protocols bgp 65535 parameters router-id '192.168.0.2'
|
|
|
|
|
|
Don't forget, the CIDR declared in the network statement MUST **exist in your
|
|
routing table (dynamic or static), the best way to make sure that is true is
|
|
creating a static route:**
|
|
|
|
**Node 1:**
|
|
|
|
.. code-block:: sh
|
|
|
|
set protocols static route 172.16.0.0/16 blackhole distance '254'
|
|
|
|
**Node 2:**
|
|
|
|
.. code-block:: sh
|
|
|
|
set protocols static route 172.17.0.0/16 blackhole distance '254'
|
|
|
|
|
|
IPv6
|
|
^^^^
|
|
|
|
A simple BGP configuration via IPv6.
|
|
|
|
**Node 1:**
|
|
|
|
.. code-block:: sh
|
|
|
|
set protocols bgp 65534 neighbor 2001:db8::2 ebgp-multihop '2'
|
|
set protocols bgp 65534 neighbor 2001:db8::2 remote-as '65535'
|
|
set protocols bgp 65534 neighbor 2001:db8::2 update-source '2001:db8::1'
|
|
set protocols bgp 65534 neighbor 2001:db8::2 address-family ipv6-unicast
|
|
set protocols bgp 65534 address-family ipv6-unicast network '2001:db8:1::/48'
|
|
set protocols bgp 65534 parameters router-id '10.1.1.1'
|
|
|
|
**Node 2:**
|
|
|
|
.. code-block:: sh
|
|
|
|
set protocols bgp 65535 neighbor 2001:db8::1 ebgp-multihop '2'
|
|
set protocols bgp 65535 neighbor 2001:db8::1 remote-as '65534'
|
|
set protocols bgp 65535 neighbor 2001:db8::1 update-source '2001:db8::2'
|
|
set protocols bgp 65535 neighbor 2001:db8::1 address-family ipv6-unicast
|
|
set protocols bgp 65535 address-family ipv6-unicast network '2001:db8:2::/48'
|
|
set protocols bgp 65535 parameters router-id '10.1.1.2'
|
|
|
|
Don't forget, the CIDR declared in the network statement **MUST exist in your
|
|
routing table (dynamic or static), the best way to make sure that is true is
|
|
creating a static route:**
|
|
|
|
**Node 1:**
|
|
|
|
.. code-block:: sh
|
|
|
|
set protocols static route6 2001:db8:1::/48 blackhole distance '254'
|
|
|
|
**Node 2:**
|
|
|
|
.. code-block:: sh
|
|
|
|
set protocols static route6 2001:db8:2::/48 blackhole distance '254'
|
|
|
|
Route Filter
|
|
^^^^^^^^^^^^
|
|
|
|
Route filter can be applied using a route-map:
|
|
|
|
**Node1:**
|
|
|
|
.. code-block:: sh
|
|
|
|
set policy prefix-list AS65535-IN rule 10 action 'permit'
|
|
set policy prefix-list AS65535-IN rule 10 prefix '172.16.0.0/16'
|
|
set policy prefix-list AS65535-OUT rule 10 action 'deny'
|
|
set policy prefix-list AS65535-OUT rule 10 prefix '172.16.0.0/16'
|
|
set policy prefix-list6 AS65535-IN rule 10 action 'permit'
|
|
set policy prefix-list6 AS65535-IN rule 10 prefix '2001:db8:2::/48'
|
|
set policy prefix-list6 AS65535-OUT rule 10 action 'deny'
|
|
set policy prefix-list6 AS65535-OUT rule 10 prefix '2001:db8:2::/48'
|
|
set policy route-map AS65535-IN rule 10 action 'permit'
|
|
set policy route-map AS65535-IN rule 10 match ip address prefix-list 'AS65535-IN'
|
|
set policy route-map AS65535-IN rule 10 match ipv6 address prefix-list 'AS65535-IN'
|
|
set policy route-map AS65535-IN rule 20 action 'deny'
|
|
set policy route-map AS65535-OUT rule 10 action 'deny'
|
|
set policy route-map AS65535-OUT rule 10 match ip address prefix-list 'AS65535-OUT'
|
|
set policy route-map AS65535-OUT rule 10 match ipv6 address prefix-list 'AS65535-OUT'
|
|
set policy route-map AS65535-OUT rule 20 action 'permit'
|
|
set protocols bgp 65534 neighbor 2001:db8::2 route-map export 'AS65535-OUT'
|
|
set protocols bgp 65534 neighbor 2001:db8::2 route-map import 'AS65535-IN'
|
|
|
|
**Node2:**
|
|
|
|
.. code-block:: sh
|
|
|
|
set policy prefix-list AS65534-IN rule 10 action 'permit'
|
|
set policy prefix-list AS65534-IN rule 10 prefix '172.17.0.0/16'
|
|
set policy prefix-list AS65534-OUT rule 10 action 'deny'
|
|
set policy prefix-list AS65534-OUT rule 10 prefix '172.17.0.0/16'
|
|
set policy prefix-list6 AS65534-IN rule 10 action 'permit'
|
|
set policy prefix-list6 AS65534-IN rule 10 prefix '2001:db8:1::/48'
|
|
set policy prefix-list6 AS65534-OUT rule 10 action 'deny'
|
|
set policy prefix-list6 AS65534-OUT rule 10 prefix '2001:db8:1::/48'
|
|
set policy route-map AS65534-IN rule 10 action 'permit'
|
|
set policy route-map AS65534-IN rule 10 match ip address prefix-list 'AS65534-IN'
|
|
set policy route-map AS65534-IN rule 10 match ipv6 address prefix-list 'AS65534-IN'
|
|
set policy route-map AS65534-IN rule 20 action 'deny'
|
|
set policy route-map AS65534-OUT rule 10 action 'deny'
|
|
set policy route-map AS65534-OUT rule 10 match ip address prefix-list 'AS65534-OUT'
|
|
set policy route-map AS65534-OUT rule 10 match ipv6 address prefix-list 'AS65534-OUT'
|
|
set policy route-map AS65534-OUT rule 20 action 'permit'
|
|
set protocols bgp 65535 neighbor 2001:db8::1 route-map export 'AS65534-OUT'
|
|
set protocols bgp 65535 neighbor 2001:db8::1 route-map import 'AS65534-IN'
|
|
|
|
We could expand on this and also deny link local and multicast in the rule 20
|
|
action deny.
|