Professional Documents
Culture Documents
Training
RPL in depth
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Why RPL
Scaling
Using route-maps on IOX scale could lead to configs in the several
100k lines to over a million depending on number of peers this doesn‟t
scale. How do we solve the scaling problem.
Rewrote a major isp‟s 15k lines of route-maps in 1k lines of RPL won‟t
always get this kind of reduction :-{
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Scaling policy (add reuse)
Modularity
Exploit modularity to reuse common portions of configs
Parameterization
For elements which are not exact copies of each other we can add
parameterization ( think variables ) to get further re-use.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Improve the clarity
No silently skipped statements: wysiwyg
Explicit logic relationships
Match ip community-list 10 20
Is this a logical or or a logical and ?
User defined control flow -- no forced structure to match
statements
All elements should have meaningful names
Inline lists where needed
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
RPL Definitions
AttachPoint
Any place in the system that binds the use of a specific policy for a specific
purpose.
Example:
router bgp 2
neighbor 1.2.3.3
address-family ipv4 unicast
policy foo in
policy bar out
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
RPL Definitions
continued
Hierarchical policy
A policy which refers to another policy with an apply statement
Example:
route-policy one
set med 100
end-policy
route-policy two
apply one
set community (10:100)
end-policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
RPL Definitions
continued
Parameterized policy
A hierarchical policy that passes values e.g.
route-policy two
apply one (10)
end-policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
RPL Syntax
Review
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
RPL Lexicon
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
If-then, Elseif, Nested If
An if statement uses a conditional expression to decide which actions or dispositions should be
taken for the given route.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
If-then, Elseif, Nested If (Continue …)
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Boolean Expressions
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Compound Booleans
The RPL provides means to build compound conditions from simple
conditions by means of Boolean operators. There are three Boolean
operators: negation (not), conjunction (and), and disjunction (or).
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Sets
The term set is used in its mathematical sense to mean
an unordered collection of unique elements. The policy
language provides sets as a container for groups of
values for matching purposes.
They are used in conditional expressions. The elements
of the set are separated by commas.
There are four kinds of sets as-path-set, community-set,
extcommunity-set and prefix-set .
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Prefix, Community, AS-PATH Sets
prefix-set
A prefix-set holds IPv4/IPv6 prefix match specifications, each of which has
four parts: an address, a mask length, a minimum matching length, and a
maximum matching length.
community-set
A community-set holds community values for matching against the BGP
community attribute. A community is a 2 * 16-bit quantity. For notational
convenience, each community value is expressed as two unsigned decimal
integers in the range 0 to 65535, separated by a colon.
as-path-set
An as-path-set comprises operations for matching an AS path attribute. The
only matching operation is a regular expression match, compatible with the
as-regexp provided by IOS in ip as-path access-list
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Prefix Sets (prefix, mask length, minimum
match length, maximum match length)
A prefix-set holds IPv4 and v6 prefix match specifications, each of which has four parts:
an address, a mask length, a minimum matching length, and a maximum matching
length.
The address is required, but the other three parts are optional.
Address: a standard format IPV4 or IPV6 address
mask length : is a nonnegative decimal integer in the range from 0 to 32 following the
address and separated from it by a slash.
minimum matching length : is expressed as the keyword ge (mnemonic for greater than
or equal to).
maximum matching length : is expressed by the keyword le (mnemonic for less than or
equal to).
10.0.3.0/24 ge 28,
10.0.4.0/24 le 28,
10.0.5.0/24 ge 26 le 30,
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
AS-PATH Sets
An as-path-set comprises operations for matching an AS path
attribute. The only matching operation is a regular expression
match, compatible with the as-regexp provided by IOS in ip as-path
access-list
as-path-set aset1
ios-regex ‟_42$‟,
ios-regex ‟_127$‟
end-set
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Community Sets
community-set cset1
12:34,
12:78,
internet
end-set
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Extended Community Set
An extended community-set is analogous to a
community set only it contains extended community
values instead of regular community values. It also
supports named forms and inline forms.
extcommunity-set ?
cost EIGRP Cost Community type extended community
rt BGP Route Target (RT) extended community
soo BGP Site of Origin (SoO) extended community
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Hierarchical Policy Structure
route-policy one
set weight 100
end-policy
route-policy two
set med 200
end-policy
route-policy three
apply two
set community (2:666) additive
end-policy
route-policy four
apply one
apply three
pass
end-policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
RPL
BGP Attributes and
Operations
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
AS-PATH
AS-PATH -- Match
AS-PATH -- Assignment
route-policy prepend-example
prepend as-path 2 3
prepend as-path 666 2
end-policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
AS-PATH contd..
AS-PATH – is-local
AS-PATH – neighbor-is
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
AS-PATH contd..
AS-PATH – Passes-through
AS-PATH – Originates-from
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
AS-Path continued
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Community
Community -- Match
Community -- Assignment
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Dampening
Dampening -- Assignment
route-policy foo-damp
if destination in (0.0.0.0/0 ge 25) then
set dampening halflife 42 others default
set dampening max-suppress 15 halflife 42 others default
else
set dampening halflife 15 max-suppress 60 reuse 750 suppress 2000
endif
end-policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Destination
Destination -- Match
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Extcommunity
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Local-Preference - Assignment
Local-Preference assignment
set local-preference 200
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
MED
MED -- Match
if (med eq 10) then ...
MED -- Assignment
set med 10
MED -- Increment/Decrement
set med +5
set med -2
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Next-Hop
Next-Hop -- Match
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Origin
Origin -- Assignment
set origin [incomplete| igp | egp]
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Rib-has-route
Rib-has-route -- check if rib has route (default origination)
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Route-Distinguisher
Compare against VPN-IPv4 routes.
if rd in my-rd-set then
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Source
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Suppress-route
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Unsuppress-route
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Tag
Tag -- Match
used in route redistribution
if tag eq 10 then …
Tag -- Assignment
set tag 20
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Traffic-Index
Traffic-Index -- Assignment
supports bgp policy accounting feature
set traffic-index 10
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Weight
Weight -- Assignment
set weight 100
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
RPL-Specific Show
Commands
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
show rpl policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
show rpl <policy-type> <policy-name> attachpoints
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
show rpl <policy-type> <policy-name> detail
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
show rpl <policy-type> states
RP/0/0/CPU0:ios#show rpl route-policy states
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
show bgp policy route-policy <name>
NOTE – only prefixes already installed in the BRIB that match the policy will be shown
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Other Show Commands
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Rules of RPL
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
RPL
Verification
Control Flow
Default-Drop
Semantics to be aware of
Hierarchy and Parameterization
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
RPL Verification
Verification
Beyond syntax verification
Per attachpoint verification ensures all statements in a policy
are sane for this protocol.
Statements which cannot be executed are not silently skipped
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
RPL Verification
continued
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
RPL Verification
continued
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
RPL Control Flow
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Control Flow
continued
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
Control Flow
continued
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
Default Drop
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
RPL Semantics
continued
MED/cost/metric
In RPL, the attribute metric is NOT overloaded in each protocol. Per-
Protocol metrics are specified explicitly.
Protocol Keyword
BGP med
OSPF ospf-metric
metric(deprecated)
ISIS
isis-metric
EIGRP eigrp-metric
RIP rip-metric
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
RPL Semantics
continued
if med eq 12 then
set med 42
if med eq 42 then
drop
endif
endif
This policy will never execute the drop statement, because the
second test (med eq 42) sees the original, unmodified value
(med eq 12) of the MED in the route.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Hierarchy and Parameterization
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
Hierarchy and Parameterization
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
EBGP peers must have Policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Policies/Sets as Configuration objects
All route-policies and sets are treated as individual objects rather
than a group of related but independent lines of config so a
complete policy or set is entered stored verified run etc.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
No Nested Denies
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
RPL AttachPoints
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65
Operators are Scoped to AttachPoints
All RPL operations are relative to the scope of the AttachPoint that the
policy is attached to.
For example:
Setting traffic-index can only be done at the table-policy AttachPoint
rib-has-route can only be used at the default-origination AttachPoint
Next-hop is the only attribute that can be set within a VRF-import
policy.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66
Operators are Scoped to AttachPoints
% Failed to commit one or more configuration items during an atomic operation, no changes have
been made. Please use 'show configuration failed' to view the errors
RP/0/8/CPU0:TC-PE1(config-vrf-af)# sho conf fail
Mon Feb 20 10:23:46.104 UTC!! CONFIGURATION FAILED DUE TO SEMANTIC ERRORS
vrf OPNET
address-family ipv4 unicast
import route-policy GRX!!%
Could not find entry in list: Policy [GRX] uses 'assign local-preference'. 'set' is not a valid operator for
the 'local-preference' attribute at the BGP import attach point.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67
BGP Attachpoints
BGP Process BGP Policy Accounting
Network command Table policy
Aggregation
Default-originate
Dampening MPLS/VPN
Redistribution VRF Import
VRF Export
Label-Allocate
BGP Neighbor
Neighbor inbound
Neighbor outbound Some BGP show commands
Neighbor ORF
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68
BGP AttachPoints
Supported Operators/Attributes
•Notes
pass / drop
destination
orf-prefix
next-hop
w eight
local-preference
med
origin
as-path
as-path length
community
suppress
unsuppress
dampening
traffic-index
source
route-type
rib-has-route
label
m = match
AttachPoint/ s = set
Attribute
•* = supported
neighbor orf * m
„Set‟ attributes
aggregation * m m/s s s m/s m/s m m m/s s s m applied only to
aggregate NLRI
default originate * s m
redistribute * s s s s s s s m
dampening * m m m m m m m s m
table policy * m m m m m m m s m
allocate-label * m m m m m m m s
Show cmd * m m m m m m m m m m
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69
IGP Attachpoints
OSPF, OSPFv3 EIGRP
Default (in/out)
Default originate
IPV4 Redistribution
IPV4 Redistribution
Global (in/out)
Area in/out (LSA-Type 3)
Interface (in/out)
ISIS RIP
Default originate
Default originate
IPV4 Redistribution
IPV4 Redistribution
Global (in/out)
Interface (in/out)
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70
IGP AttachPoints
Supported Operators/Attributes
destination
next-hop
tag
ospf-cost
rip-metric
isis-metric
eigrp-metric
level
metric-type
protocol
route-type
rib-has-route
m = match
AttachPoint/Attribute s = set
•* = supported
OSPF
default originate * s s m
redistribute * m m/s s s m
area-in * m
area-out * m m
ISIS
default originate * m m m s s s m m
redistribute * m s m s s s m m
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71
IGP AttachPoints
Supported Operators/Attributes
•Notes
pass / drop
destination
next-hop
tag
ospf-cost
rip-metric
isis-metric
eigrp-metric
level
metric-type
protocol
route-type
rib-has-route
m = match
AttachPoint/Attribute s = set
•* = supported
EIGRP
redistribute * m m m/s s m m
default accept-in * m
default accept-out * m
global-inbound * m m m/s s
global-outbound * m m m/s s m
Interface-in * m m s
Interface-out * m m m/s s m
RIP
default originate * s s m
redistribute * s s
global-inbound * m m m/s s
global-outbound * m m/s s m
Interface-in * m m m/s s
Interface-out * m m/s s m
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72
Route-Maps at AttachPoints
Bug fixes and maintenance is not being done on IOX route-map code
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73
Exploiting RPL
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 74
Exploiting RPL
To get the best advantages of RPL you‟ll need to spend some
time looking at your router configs
Look for common subtasks that can exploit the power of
parameterization and/or reuse
Convert them to hierarchical policy blocks or parameterized
policy blocks which can be reused
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 75
Exploiting RPL
Replace small lists of prefixes or communities with inline forms
Look for ways of eliminating repeated matches by using nested
if then else structures
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 76
Exploiting RPL
Look at control flow issues. Can a given policy be re-arranged to
be more easily understood and/or require less repetition?
RPL allows you to set an attribute value more than once
Therefore you can set a default local preference and further in the
policy change the local preference for a specific case which
requires a different value
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 77
Exploiting RPL
Reevaluate the items within your access-lists, prefix-lists, as-path-
lists, etc. Remove those that are no longer relevant.
To get the best conversions think about what does the policy do
and what does it share in common with other policies
Don‟t be afraid to write the policies that you need rather than just
doing a simple line for line translation of your route-maps
You‟ll be surprised about the historical cruft you may find
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 78
Converting Route-
Maps into RPL
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 79
Converting Route Maps to RPL Policies
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 80
Step 1: Direct Syntax Translation
• Each Route-Map becomes a route-policy
• Each clause in a route-map becomes a clause in an if-then-else sequence.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 81
Step 2: Nest Conditionals
route-policy PROCESS_INBOUND
if (as-path in as_path_150) then
drop
endif
else
set local-preference 90
set community (100:500, 100:505, 100:999) additive
endif
end-policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 82
Step 3: Use Inline Sets
route-policy PROCESS_INBOUND
if (as-path in '_701_‟, '_3561_‟) then
drop
endif
else
set local-preference 90
set community (100:500, 100:505, 100:999) additive
endif
end-policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 83
Step 4: Parameterize
• Similar actions can be grouped into a common policy with parameters.
endif
else
apply set_attributes (90)
endif
end-policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 84
Using Named Sets as Parameters
In 3.3.0, we added the ability to pass named sets as
parameters.
prefix-set foo
10.0.3.0/24 ge 28,
10.0.4.0/24 le 28,
10.0.5.0/24 ge 26 le 30
end-set
route-policy my-neighbor
apply do-filtering(foo)
apply other-stuff
end-policy
route-policy do-filtering($set)
if not destination in $set then drop
endif
end-policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 85
Using BGP Global Variables as
Parameters
In 3.2.0, we added the global variable $PEERIP (for
BGP attach points) – the peer IP address from attach
point.
Since this is a “global” it doesn‟t have to be a declared
parameter.
• Route-Maps that reference policy-list(s) [Community, AS-Path, Prefix-List] with mixed entries.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 87
Route-Maps with access-list(s)
• Route-Maps often use access-list(s) to
reference NLRI (prefixes)
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 88
Policy Lists with mixed entries.
• Recall, that sets within IOX do not convey the
concept of permit or deny - only membership.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 89
Policy Lists with mixed entries.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 90
Policy Lists with mixed entries.
The answer is: BOTH ! prefix-set pfx_martians_p1_permit
0.0.0.0/0
127.0.0.0/8 le 32
end-set
1) Partition the prefix-list into separate !
prefix-set pfx_martians_p2_deny
sections - each containing a string of 10.192.0.0/10 ge 12 le 21
„permit‟ or „deny‟ entries. end-set
!
prefix-set pfx_martians_p3_permit
10.0.0.0/8 le 32,
2) Create a prefix-set to correspond to 172.16.0.0/12 le 32,
each section. 192.168.0.0/16 le 32,
128.0.0.0/16 le 32,
191.255.0.0/16 le 32,
192.0.0.0/24 le 32,
3) Adjust the route-policy to process each 223.255.255.0/24 le 32,
partition in turn. 224.0.0.0/3 le 32,
192.157.69.0/24 le 32
end-set
Keeping the partitions in order is !
route-policy CUST_FACE
important to preserve the original logic if (destination in pfx_martians_p1_permit) then
drop
with respect to overlapping entries. elseif (destination in pfx_martians_p2_deny) then
pass
elseif (destination in pfx_martians_p3_permit) then
The same process can be applied to drop
endif
as-path-set(s) & community-set(s). end-policy
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 91
BGP Combinatorial policies
• Remember, not all BGP policy is specified within Route-Maps.
• Some policy can be specified as part of per-neighbor cli.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 92
BGP Combinatorial policies
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 93
RPL Scale
RPL configuration: Per if statement:
Up to 5,000 policies
Up to 16 conditions
Up to 128K lines of
configuration Up to 512 elseif clauses
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 94
RPL Test Feature Feedback
We have under development a tool to test policy
results from the CLI. The first test point is BGP attach
point.
The idea to present a prefix with attach point specific
parameters (in a pre-dictated format) and return BGP
RIB formatted results.
In addition, it will be possible to use a text file (each
line similarly formatted) to test a group of routes.
See proposal in notes.
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 95
Presentation_ID © 2004, Cisco Systems, Inc. All rights reserved. 96