04-20-2025 10:30 PM
Hi there,
I'm trying to emulate SR-TE on cisco CML with the topology below. I was successful emulating sr policy on Pe1 that is a IOS XE and on PE2 that is a IOS XR.
On PE1 I also tried to configure an Te tunnel whit a explicit path using Sr labels.
I use the fallowing configuration.
interface Tunnel1 ip unnumbered Loopback1 tunnel mode mpls traffic-eng tunnel destination 33.33.33.33 tunnel mpls traffic-eng path-option 1 explicit identifier 1 segment-routing
the tunnel comes up and works well, but when I tried to set a static SID to the tunnel i was unable to use the conman for that.
PE1(config-if)#tunnel mpls traffic-eng binding-sid label
and I get the message below.
some one know If there are some thing to configures previous that conman can be use ?
configuration of PE1
Building configuration...
Current configuration : 8160 bytes
!
! Last configuration change at 05:09:53 UTC Mon Apr 21 2025
!
version 17.3
service timestamps debug datetime msec
service timestamps log datetime msec
service call-home
platform qfp utilization monitor load 80
platform punt-keepalive disable-kernel-core
platform console serial
!
hostname PE1
!
boot-start-marker
boot-end-marker
!
!
vrf definition sr-test
rd 1000:101
!
address-family ipv4
route-target export 1000:101
route-target import 1000:101
exit-address-family
!
no logging console
!
no aaa new-model
!
!
!
!
!
!
!
!
!
!
login on-success log
!
!
!
!
!
!
!
subscriber templating
!
!
!
!
!
!
mpls traffic-eng tunnels
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki trustpoint TP-self-signed-2449182574
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2449182574
revocation-check none
rsakeypair TP-self-signed-2449182574
!
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
crypto pki certificate chain TP-self-signed-2449182574
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32343439 31383235 3734301E 170D3235 30343136 30313537
30315A17 0D333530 34313630 31353730 315A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 34343931
38323537 34308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100B820 A99FE1AB D11802BD 8F02B4BD 222EF5E5 BFBC95A3 70BCD662
5B82D2F7 288BD0F8 50CD4AA2 9BA5D063 196B6629 FE8896E3 501EECD6 6AAB7020
9EDD7A07 89897CC8 E10547C1 5FCA8E41 B5E3EBC1 5D3A8F7E 1BF68AF1 7726B011
9C834981 90B43F35 7CCCD86C 6890DF07 20652380 A1EFCBDB F9A22B1B 3C8C1A09
B5C525CC 7BEEDEB6 1FB96CDE CA52A367 70936C95 80071D64 0846C256 D50A801B
400CD164 F415D733 5689AB0F A4BE87A2 7F84CA38 240AC0CF B940698B 2C88DA28
3CF5C04F 3AB29DE5 60CABC10 2D9DED26 BAF7CCB4 48C7856F 77B7C322 3CDD01C3
4490535A 2AD19264 B17BB8E6 5C619077 E357B66C 4A2D3EF0 50FB45A7 EC1A841B
3AA2A069 BCE30203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 1469E2AC 1D75A4A3 EF4D3569 6A8B97CD 6E324C61
1E301D06 03551D0E 04160414 69E2AC1D 75A4A3EF 4D35696A 8B97CD6E 324C611E
300D0609 2A864886 F70D0101 05050003 82010100 AA4CD621 C619E48C C2BB9F15
AE621F6E A358405E 8735A94B 022B5C72 BB1A35D5 B92CC732 9B2BF22E 2BFCAE30
D471BDA3 DFB039E2 E1129E0F C0EA962C 3EB31E92 9AEA57BE C793ED67 6F079B2E
349C540E C05C226B A161F05B E1D2D185 ADCF517F 45BB854C 502DB92D A43C77AC
C34A0187 AE4D19E9 C54185C9 004037B9 66277317 B7FBA0D2 8971E340 6C160561
2A572631 42B553AE 79673055 3CB308F1 04C757EC A67E4A0C A81A5035 11444B07
07863AEB 60B1103C B8BAEA28 6640055A 33145BF7 6F6637B1 42FD995B 127E0D60
17317B58 9B5F903F B4DA5857 932AB4D0 841758FE EE973DFA 011F219C C80580E4
47CAB6B8 EB3A0A45 C825148B 82848950 3E3E006C
quit
!
license udi pid CSR1000V sn 9GDZ5QADXEC
diagnostic bootup level minimal
memory free low-watermark processor 71464
!
!
spanning-tree extend system-id
!
!
redundancy
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
interface Loopback1
ip address 11.11.11.11 255.255.255.255
ip ospf 1 area 0
!
interface Tunnel1
ip unnumbered Loopback1
tunnel mode mpls traffic-eng
tunnel destination 33.33.33.33
tunnel mpls traffic-eng path-option 1 explicit identifier 1 segment-routing
!
interface GigabitEthernet1
ip address 10.100.111.11 255.255.255.0
ip ospf network point-to-point
negotiation auto
mpls traffic-eng tunnels
no mop enabled
no mop sysid
!
interface GigabitEthernet2
ip address 10.100.112.12 255.255.255.0
ip ospf network point-to-point
negotiation auto
mpls traffic-eng tunnels
no mop enabled
no mop sysid
!
interface GigabitEthernet3
vrf forwarding sr-test
ip address 10.200.211.11 255.255.255.0
negotiation auto
no mop enabled
no mop sysid
!
interface GigabitEthernet4
no ip address
shutdown
negotiation auto
no mop enabled
no mop sysid
!
!
segment-routing mpls
global-block 16000 23999
!
connected-prefix-sid-map
address-family ipv4
11.11.11.11/32 index 11 range 1
exit-address-family
!
!
segment-routing traffic-eng
segment-list name to-pe2
index 1 mpls label 16002
index 2 mpls label 16005
index 3 mpls label 16003
index 4 mpls label 16004
index 5 mpls label 16033
!
policy to-pe2
color 100 end-point 33.33.33.33
binding-sid mpls 15102
candidate-paths
preference 100
explicit segment-list to-pe2
!
!
!
!
!
router ospf 1
router-id 11.11.11.11
segment-routing area 0 mpls
distribute link-state
network 10.100.0.0 0.0.255.255 area 0
mpls traffic-eng router-id Loopback1
mpls traffic-eng area 0
!
router bgp 1000
bgp log-neighbor-changes
no bgp default ipv4-unicast
neighbor 5.5.5.5 remote-as 1000
neighbor 5.5.5.5 update-source Loopback1
!
address-family ipv4
exit-address-family
!
address-family vpnv4
neighbor 5.5.5.5 activate
neighbor 5.5.5.5 send-community extended
exit-address-family
!
address-family ipv4 vrf sr-test
neighbor 10.200.211.1 remote-as 200
neighbor 10.200.211.1 ebgp-multihop 3
neighbor 10.200.211.1 update-source GigabitEthernet3
neighbor 10.200.211.1 activate
neighbor 10.200.211.1 as-override
exit-address-family
!
ip forward-protocol nd
no ip http server
ip http secure-server
!
!
ip explicit-path identifier 1 enable
index 1 next-label 16002
index 2 next-label 16005
index 3 next-label 16004
index 4 next-label 16003
index 5 next-label 16033
!
!
!
!
!
!
!
control-plane
!
!
!
!
!
!
line con 0
exec-timeout 0 0
stopbits 1
line vty 0
exec-timeout 0 0
login
transport input ssh
line vty 1
exec-timeout 0 0
login
length 0
transport input ssh
line vty 2 4
exec-timeout 0 0
login
transport input ssh
!
call-home
! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
!
!
!
!
!
end
Solved! Go to Solution.
04-21-2025 12:08 AM
Hello @heiliger-eliet
Try to configure label bloc for static uses:
mpls label range static 24000 24999
After that assign one label under tunnel interface:
(config-if)#mpls traffic-eng binding-sid label 24001
04-21-2025 12:08 AM
Hello @heiliger-eliet
Try to configure label bloc for static uses:
mpls label range static 24000 24999
After that assign one label under tunnel interface:
(config-if)#mpls traffic-eng binding-sid label 24001
04-21-2025 07:56 AM
thanks M02@rt37
I Use the command : mpls label range 11000 11900 static 11901 11999, it work.
I was trying to find the command, I think i would never find it
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide