Re: OSPF_SL0 from FULL to DOWN, Neighbor Down: Interface down

From: Bilal Hansrod <bilal.hansrod_at_gmail.com>
Date: Sun, 3 Jul 2011 15:32:13 +1000

Thanks everyone for providing your valuable inputs. The problem has been
resolved ; however, I am still confused. I noticed that SW1 connected to R6
was establishing the OSPF neighbourship on vrf VPN_A, but using 2.2.2.2 as a
router-id. As a OPSF rule, it was using the highest loopback IP address from
loopback 200 as it was only configured in vrf VPN_A. Even when I shutdown
the loopback 200 on R6, it was still establishing OSPF relationship with
loopback 200, pretty wierd. i cleared neighbour relationship many times, but
Sw1 was still establishing neighbourship with router-id 2.2.2.2.

I change the IP address to 3.3.3.3 and it worked as charm. As per logic, I
was thinking it was still use 3.3.3.3 as neighbour-id , but Sw1 is using
connected interface address.

R5

interface Loopback200
 ip vrf forwarding VPN_A
 ip address 1.1.1.1 255.255.255.255

router ospf 10 vrf VPN_A
 log-adjacency-changes
 area 1 sham-link 1.1.1.1 3.3.3.3
 redistribute bgp 100 subnets tag 667
 network 155.1.58.5 0.0.0.0 area 1

router bgp 100
 no bgp default ipv4-unicast
 bgp log-neighbor-changes
 neighbor 150.1.4.4 remote-as 100
 neighbor 150.1.4.4 update-source Loopback0
 !
 address-family vpnv4
  neighbor 150.1.4.4 activate
  neighbor 150.1.4.4 send-community extended
 exit-address-family
 !
 address-family ipv4 vrf VPN_B
  redistribute connected
  redistribute static
  no synchronization
 exit-address-family
 !
 address-family ipv4 vrf VPN_A
  redistribute connected metric 1
  redistribute static
  redistribute ospf 10 vrf VPN_A
  no synchronization
 exit-address-family

R6

interface Loopback200
 ip vrf forwarding VPN_A
 ip address 3.3.3.3 255.255.255.255

router ospf 10 vrf VPN_A
 log-adjacency-changes
 area 1 sham-link 3.3.3.3 1.1.1.1
 summary-address 172.16.0.0 255.255.0.0
 redistribute bgp 100 subnets tag 666
 network 155.1.67.6 0.0.0.0 area 1

router bgp 100
 no bgp default ipv4-unicast
 bgp log-neighbor-changes
 neighbor 150.1.4.4 remote-as 100
 neighbor 150.1.4.4 update-source Loopback0
 !
 address-family vpnv4
  neighbor 150.1.4.4 activate
  neighbor 150.1.4.4 send-community extended
 exit-address-family
 !
 address-family ipv4 vrf VPN_B
  redistribute connected
  redistribute static
  no synchronization
 exit-address-family
 !
 address-family ipv4 vrf VPN_A
  redistribute connected metric 1
  redistribute static
  redistribute ospf 10 vrf VPN_A
  no synchronization
 exit-address-family

Regards,

Bilal Hansrod

On Sat, Jul 2, 2011 at 10:04 AM, Marko Milivojevic <markom_at_ipexpert.com>wrote:

> On Fri, Jul 1, 2011 at 16:49, Bilal Hansrod <bilal.hansrod_at_gmail.com>
> wrote:
> > I have adverstised both loopbacks via BGP. I can see both /32's are
> learned
> > via BGP when tunnel is down and when sham-link is up for few seconds, I
> see
> > that routes are now advertised via OSPF.
> >
> > Am I missing something-
>
> Yes you are - my previous message, which would've covered this exact
> case you're experiencing. You need to prevent PE routers from learning
> about each others' sham-link endpoints in OSPF. They must be known
> only in BGP.
>
> --
> Marko Milivojevic - CCIE #18427
> Senior Technical Instructor - IPexpert
>
> FREE CCIE training: http://bit.ly/vLecture
>
> Mailto: markom_at_ipexpert.com
> Telephone: +1.810.326.1444
> Web: http://www.ipexpert.com/

Blogs and organic groups at http://www.ccie.net
Received on Sun Jul 03 2011 - 15:32:13 ART

This archive was generated by hypermail 2.2.0 : Mon Aug 01 2011 - 06:30:05 ART