07-09-2019 10:24 PM
Hello experts,
I want to disable RRI for each SSL VPN user, being advertised by EIGRP. The reason is that the subnet is already advertised and I don't see the reason for continuous EIGRP Updates, and of needlessly polluting Routing Table of routers in my network as you see:
router# show ip route | include 10.AAA.BBB.
D EX 10.AAA.BBB.0/24 [170/3072] via 10.101.XXX.YYY, 6d23h, Vlan21
D EX 10.AAA.BBB.29/32 [170/3072] via 10.101.XXX.YYY, 20:38:27, Vlan21
D EX 10.AAA.BBB.34/32 [170/3072] via 10.101.XXX.YYY, 02:55:32, Vlan21
D EX 10.AAA.BBB.35/32 [170/3072] via 10.101.XXX.YYY, 00:00:35, Vlan21
D EX 10.AAA.BBB.36/32 [170/3072] via 10.101.XXX.YYY, 02:55:21, Vlan21
D EX 10.AAA.BBB.37/32 [170/3072] via 10.101.XXX.YYY, 01:28:09, Vlan21
D EX 10.AAA.BBB.38/32 [170/3072] via 10.101.XXX.YYY, 00:00:11, Vlan21
:
Unlike AnyConnect SSL and Reverse Route Injection, I don't want to change the metric, but rather exclude all /32 advertisements.
I see no direct way of provisioning this (as "set reverse route" was for IPsec), so, what would be best way of achieving this?
R's, Alex
Solved! Go to Solution.
07-10-2019 01:08 PM
Hi Alex,
I have just tested this and works OK
On my LAB ASA I do not have the ability to use route null0 due to the image version I am running. You may have the same issue.
I just added a static route for my whole /24 Anyconnect subnet pointing out one of my physical interfaces to a dummy next hop, just to get the /24 into routing table.
e.g
ROWAN-FW-01(config)# sh run route
route Inside 10.44.66.0 255.255.255.0 1.1.1.2
The rest I configured is below using your own proposal -
route-map RM_RD permit 10
match ip address prefix-list PF_ANYCONNECT
prefix-list PF_ANYCONNECT seq 5 permit 10.44.66.0/24 le 31
router eigrp 10
network 172.16.0.2 255.255.255.255
passive-interface default
no passive-interface Inside
redistribute static route-map RM_RD
My devices within the rest of the network only learn the /24. If I remove the route-map, the learn both /32 and /24.
Hopefully helps you out.
07-10-2019 01:07 AM
07-10-2019 01:22 AM - edited 07-10-2019 05:00 PM
> ... use some other form of router/redistribution manipulation, e.g prefix lists / route maps.
Indeed, this is what I'm requesting. (I can't imagine I'm the first.)
Something like this?
prefix-list pf_only_non_32 seq 5 permit 10.AAA.BBB.0/24 le 31
route-map rm_only_non_32 permit 10
match ip address prefix-list pf_only_non_32
router eigrp 1
redistribute static route-map rm_only_non_32
07-10-2019 02:08 AM
07-10-2019 02:38 AM - edited 07-10-2019 04:55 AM
Isn’t your Prefix List equivalent to mine, with permit/deny flipped? (I thought I'm taking advantage of implicit/default deny that is applied to unmatched any prefix-list entries).
07-10-2019 03:45 AM
07-10-2019 05:01 AM
There are no static routes to the ASA in adjacent routers - I’m relying on ASA’s EIGRP to advertise route to its VPN assigned IP address space.
I’m open to the best suggestion (but my preference to only change EIGRP configuration on ASA).
07-10-2019 06:04 AM
07-10-2019 07:16 AM
I previously proposed:
ip prefix-list pf_only_non_32 seq 5 permit 10.AAA.BBB.0/24 le 31
is it incorrect?
07-10-2019 10:05 AM
07-10-2019 01:08 PM
Hi Alex,
I have just tested this and works OK
On my LAB ASA I do not have the ability to use route null0 due to the image version I am running. You may have the same issue.
I just added a static route for my whole /24 Anyconnect subnet pointing out one of my physical interfaces to a dummy next hop, just to get the /24 into routing table.
e.g
ROWAN-FW-01(config)# sh run route
route Inside 10.44.66.0 255.255.255.0 1.1.1.2
The rest I configured is below using your own proposal -
route-map RM_RD permit 10
match ip address prefix-list PF_ANYCONNECT
prefix-list PF_ANYCONNECT seq 5 permit 10.44.66.0/24 le 31
router eigrp 10
network 172.16.0.2 255.255.255.255
passive-interface default
no passive-interface Inside
redistribute static route-map RM_RD
My devices within the rest of the network only learn the /24. If I remove the route-map, the learn both /32 and /24.
Hopefully helps you out.
07-10-2019 06:23 PM - edited 07-10-2019 06:36 PM
Thank you very much.... There's just one more thing...
Currently, there's a large number of /32 static routers already advertised for users that have logged-in into RA VPN Gateway. Once I implement the above filter, no new EIGRP Updates associated will be sent for them (even if I manually issue "no route" for them on the ASA) and those routes will remain in other routers indefinitely.
I don't really want to manually terminate existing VPN sessions (to force EIGRP update before implementing the filter). So, my option seems to issue clear ip eigrp .. neighbors for the ASA's IP address on adjacent router.
Suggestions?
07-12-2019 06:27 AM
03-23-2020 04:19 PM - edited 03-23-2020 04:20 PM
Indeed, after implementation, I did NOT need to enter "clear eigrp .. neighbour" - neighbor's topology table reduced (removing RRI routes) within a few minutes.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide