<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello, in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015996#M276851</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;looking at the docs from AWS, in their configuration example, they don't use a VRF. Is it possible to reconfigure and follow the guidelines as explained in the attached doc ?&lt;/P&gt;
&lt;P&gt;http://docs.aws.amazon.com/AmazonVPC/latest/NetworkAdminGuide/Cisco.html#CustomerGatewayDetail1&lt;/P&gt;</description>
    <pubDate>Thu, 02 Feb 2017 20:40:46 GMT</pubDate>
    <dc:creator>Georg Pauwen</dc:creator>
    <dc:date>2017-02-02T20:40:46Z</dc:date>
    <item>
      <title>Problems with AWS Transit CSR, BGP and advertised routes</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015989#M276844</link>
      <description>&lt;P&gt;I started off by contacting aws support, and they gave up and told me to ask here&lt;/P&gt;
&lt;P&gt;The idea of the AWS transit network is that it uses BGP to negotiate the interconnectivity of subnets between worldwide regions, as there is no direct way of doing so within aws&lt;/P&gt;
&lt;P&gt;We are trying to route traffic from 172.30.0.0/16 via the transit network, and onwards to others.&lt;BR /&gt;TCPDump shows packets leaving this network, arriving on the&amp;nbsp;destination network, and the reply being sent back. &amp;nbsp;However this reply never reaches there&lt;/P&gt;
&lt;P&gt;Some digging around on the cisco CSR showed&amp;nbsp;something rather strange when looking at the bgp info&lt;/P&gt;
&lt;PRE class="prettyprint"&gt; Route Distinguisher: nnnnn:3 (default for vrf vpn-12345678)&lt;BR /&gt; *&amp;gt;  x.x.x.x/16      y.y.y.y                         0 9059 i
 *&amp;gt;  x.x.x.x/16      y.y.y.y                         0 32768 ?
 *&amp;gt;  x.x.x.x/22      y.y.y.y         200             0 9059 i
 *&amp;gt;  x.x.x.x/24      y.y.y.y         200             0 9059 i
 *&amp;gt;  x.x.x.x/24      y.y.y.y         100             0 9059 i
 *&amp;gt;  x.x.x.x/24      y.y.y.y         200             0 9059 i
 *   172.30.0.0      169.254.45.17   200             0 7224 i
 *&amp;gt;                  y.y.y.y         100             0 7224 i
 *&amp;gt; x.x.x.x/22       y.y.y.y         100             0 9059 i
 *   x.x.x.x         y.y.y.y         100             0 7224 i
 *                   y.y.y.y         100             0 9059 i
 *                   y.y.y.y         100             0 9059 i
 *                   y.y.y.y         200             0 7224 i
 *&amp;gt;                  y.y.y.y         100             0 7224 i&lt;BR /&gt;
&lt;/PRE&gt;
&lt;P&gt;I've blanked out a lot of the other details, but left the subnet masks in&lt;/P&gt;
&lt;P&gt;My support contact at aws assured me that the vpn tunnel was sending its local network correctly, so it must be something on the cisco side of it. &amp;nbsp;He recommended setting up a route map to filter out 172.30.0.0, but this does not seem to then allow 172.30.0.0/16&lt;/P&gt;
&lt;P&gt;Has anyone got experience with manually manipulating BGP lists, or suggestions on a work around?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 15:58:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015989#M276844</guid>
      <dc:creator>andrew.rogers</dc:creator>
      <dc:date>2019-03-05T15:58:06Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015990#M276845</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;so you are receiving the 172.30.0.0 from a Windows APIPA address (169.254.x.x)...weird indeed. Can you post the config of the CSR, and a 'show version' ?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 18:58:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015990#M276845</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2017-02-02T18:58:24Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015991#M276846</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;it looks like AWS is using the 169.254 for their BGP VPN peers, so the address would make sense.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The config of the CSR would be useful.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 19:07:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015991#M276846</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2017-02-02T19:07:22Z</dc:date>
    </item>
    <item>
      <title>Hello</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015992#M276847</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;bgp is stating even though it sees that prefix as valid its next hop isn't&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With an AD of 200 I would check your ibgp peers&lt;/P&gt;
&lt;P&gt;res&lt;/P&gt;
&lt;P&gt;paul&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 19:28:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015992#M276847</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2017-02-02T19:28:33Z</dc:date>
    </item>
    <item>
      <title>Also, are you using the AWS</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015993#M276848</link>
      <description>&lt;P&gt;Also, are you using the AWS VPC Wizard, and do you have route propagation enabled as described in the attached document:&lt;/P&gt;
&lt;P&gt;http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_VPN.html&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 19:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015993#M276848</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2017-02-02T19:44:41Z</dc:date>
    </item>
    <item>
      <title>Here's the output from show</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015994#M276849</link>
      <description>&lt;P&gt;Here's the output from show version&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;show version&lt;BR /&gt;Cisco IOS XE Software, Version 16.03.01a&lt;BR /&gt;Cisco IOS Software [Denali], CSR1000V Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 16.3.1a, RELEASE SOFTWARE (fc4)&lt;BR /&gt;Technical Support: &lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;BR /&gt;Copyright (c) 1986-2016 by Cisco Systems, Inc.&lt;BR /&gt;Compiled Fri 30-Sep-16 02:53 by mcpre&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Cisco IOS-XE software, Copyright (c) 2005-2016 by cisco Systems, Inc.&lt;BR /&gt;All rights reserved. Certain components of Cisco IOS-XE software are&lt;BR /&gt;licensed under the GNU General Public License ("GPL") Version 2.0. The&lt;BR /&gt;software code licensed under GPL Version 2.0 is free software that comes&lt;BR /&gt;with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such&lt;BR /&gt;GPL code under the terms of GPL Version 2.0. For more details, see the&lt;BR /&gt;documentation or "License Notice" file accompanying the IOS-XE software,&lt;BR /&gt;or the applicable URL provided on the flyer accompanying the IOS-XE&lt;BR /&gt;software.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ROM: IOS-XE ROMMON&lt;BR /&gt;&lt;BR /&gt;ip-100-64-127-248 uptime is 7 hours, 51 minutes&lt;BR /&gt;Uptime for this control processor is 7 hours, 52 minutes&lt;BR /&gt;System returned to ROM by reload&lt;BR /&gt;System image file is "bootflash:packages.conf"&lt;BR /&gt;Last reload reason: Reload Command&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;This product contains cryptographic features and is subject to United&lt;BR /&gt;States and local country laws governing import, export, transfer and&lt;BR /&gt;use. Delivery of Cisco cryptographic products does not imply&lt;BR /&gt;third-party authority to import, export, distribute or use encryption.&lt;BR /&gt;Importers, exporters, distributors and users are responsible for&lt;BR /&gt;compliance with U.S. and local country laws. By using this product you&lt;BR /&gt;agree to comply with applicable laws and regulations. If you are unable&lt;BR /&gt;to comply with U.S. and local laws, return this product immediately.&lt;BR /&gt;&lt;BR /&gt;A summary of U.S. laws governing Cisco cryptographic products may be found at:&lt;BR /&gt;&lt;A href="http://www.cisco.com/wwl/export/crypto/tool/stqrg.html" target="_blank"&gt;http://www.cisco.com/wwl/export/crypto/tool/stqrg.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If you require further assistance please contact us by sending email to&lt;BR /&gt;export@cisco.com.&lt;BR /&gt;&lt;BR /&gt;License Level: ax&lt;BR /&gt;License Type: Default. No valid license found.&lt;BR /&gt;Next reload license Level: ax&lt;BR /&gt;&lt;BR /&gt;cisco CSR1000V (VXE) processor (revision VXE) with 2042224K/3075K bytes of memory.&lt;BR /&gt;Processor board ID 9GOG3HYXLBE&lt;BR /&gt;1 Gigabit Ethernet interface&lt;BR /&gt;32768K bytes of non-volatile configuration memory.&lt;BR /&gt;3979824K bytes of physical memory.&lt;BR /&gt;7774207K bytes of virtual hard disk at bootflash:.&lt;BR /&gt;0K bytes of at webui:.&lt;BR /&gt;&lt;BR /&gt;Configuration register is 0x2102&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;The device is an aws virtual appliance, with the cost including licensing, so am unsure why it says no valid license&lt;/P&gt;
&lt;P&gt;I'll try and get the full config of the device done, but it will take me some time to take out sensitive info&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 19:51:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015994#M276849</guid>
      <dc:creator>andrew.rogers</dc:creator>
      <dc:date>2017-02-02T19:51:32Z</dc:date>
    </item>
    <item>
      <title>Route propagation is enabled.</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015995#M276850</link>
      <description>&lt;P&gt;Route propagation is enabled.&lt;/P&gt;
&lt;P&gt;AWS configures its tunnels to use 169.x.x.x addresses as the internal end points for the vpns, so the tunnel config looks like this:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;interface Tunnel1&lt;BR /&gt; ip vrf forwarding vpn-1234567&lt;BR /&gt; ip address 169.254.45.18 255.255.255.252&lt;BR /&gt; ip tcp adjust-mss 1387&lt;BR /&gt; tunnel source GigabitEthernet1&lt;BR /&gt; tunnel mode ipsec ipv4&lt;BR /&gt; tunnel destination 1.2.3.4&lt;BR /&gt; tunnel protection ipsec profile ipsec-vpn-aws&lt;BR /&gt; ip virtual-reassembly&lt;/PRE&gt;
&lt;P&gt;and the bgp config:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;router bgp 54321&lt;BR /&gt; bgp log-neighbor-changes&lt;BR /&gt; !&lt;BR /&gt; address-family ipv4 vrf vpn-1234567&lt;BR /&gt; neighbor 169.254.45.17 remote-as 7224&lt;BR /&gt; neighbor 169.254.45.17 timers 10 30 30&lt;BR /&gt; neighbor 169.254.45.17 activate&lt;BR /&gt; neighbor 169.254.45.17 as-override&lt;BR /&gt; neighbor 169.254.45.17 soft-reconfiguration inbound&lt;BR /&gt; exit-address-family&lt;/PRE&gt;
&lt;P&gt;I did try assigning the network 172.30.0.0 to that bgp vrf router like this:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;router bgp 54321 &lt;BR /&gt;address-family ipv4 vrf vpn-1234567 &lt;BR /&gt;network 172.30.0.0 mask 255.255.0.0&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;But when I did a show run, it just said&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;network 172.30.0.0 &lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;Is it possible the show commands giving misleading information?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 20:04:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015995#M276850</guid>
      <dc:creator>andrew.rogers</dc:creator>
      <dc:date>2017-02-02T20:04:45Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015996#M276851</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;looking at the docs from AWS, in their configuration example, they don't use a VRF. Is it possible to reconfigure and follow the guidelines as explained in the attached doc ?&lt;/P&gt;
&lt;P&gt;http://docs.aws.amazon.com/AmazonVPC/latest/NetworkAdminGuide/Cisco.html#CustomerGatewayDetail1&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 20:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015996#M276851</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2017-02-02T20:40:46Z</dc:date>
    </item>
    <item>
      <title>Using VRF is as the AWS</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015997#M276852</link>
      <description>&lt;P&gt;Using VRF is as the AWS solution causes it to be deployed. It uses various AWS technologies to detect Virtual Private Clouds that require a vpn connection. &amp;nbsp;It then creates a vpn from that location to the Cisco device, parses config file and logs into the cisco devices to apply config autonomously. In theory I should never need to log into the box!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 09:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015997#M276852</guid>
      <dc:creator>andrew.rogers</dc:creator>
      <dc:date>2017-02-03T09:25:56Z</dc:date>
    </item>
    <item>
      <title>Hello Andrew,</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015998#M276853</link>
      <description>&lt;P&gt;Hello Andrew,&lt;/P&gt;
&lt;P&gt;makes sense. Strange though that their own docs give config examples without VRFs...&lt;/P&gt;
&lt;P&gt;I'll look and check further...&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 09:30:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015998#M276853</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2017-02-03T09:30:10Z</dc:date>
    </item>
    <item>
      <title>Hello</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015999#M276854</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;BR /&gt;We are trying to route traffic from 172.30.0.0/16 via the transit network, and onwards to others.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You trying to re-advertise this /16 that originated ASN9059 to ebgp neigbour 169.254.45.17 ASN7224 as a connected route.&lt;BR /&gt;&lt;BR /&gt;However it looks like ebgp neighbor 169.254.45.17 ASN7224 is already advertising this subnet towards you so you would be probably getting a conflict black holing of some traffic.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;BR /&gt;But when I did a show run, it just said &lt;BR /&gt;network 172.30.0.0&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This is correct as its classful subnet and as such will be advertised like that.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;TCPDump shows packets leaving this network, arriving on the&amp;nbsp;destination network, and the reply being sent back&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This is probably due to the fact ebgp neigbour 169.254.45.17 ASN7224 already has this in it rib as a connected route and thus has a rib failure for 172.30.0.0&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;You need to find out why that neighbor is advertising that subnet&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;res&lt;BR /&gt;Paul&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 10:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3015999#M276854</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2017-02-03T10:45:32Z</dc:date>
    </item>
    <item>
      <title>I'm still none the wiser to</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3016000#M276855</link>
      <description>&lt;P&gt;I'm still none the wiser to why the cisco device is showing 172.30.0.0/16 without the network mask, but I've found the cause of my routing problems&lt;/P&gt;
&lt;P&gt;On most of my AWS route tables, I'd got the VPN gateway set to propagate the route it had going from it. &amp;nbsp;On one of the tables for the destination network, this had got un-set, and not all the required manual entries had been put in. &amp;nbsp;After correcting this, traffic started flowing as expected&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for all the suggestions&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 17:14:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/problems-with-aws-transit-csr-bgp-and-advertised-routes/m-p/3016000#M276855</guid>
      <dc:creator>andrew.rogers</dc:creator>
      <dc:date>2017-02-03T17:14:23Z</dc:date>
    </item>
  </channel>
</rss>

