I set up IP SLA for icmp-echo on an IP that would then be tracked by a static route. The IP SLA summary showed this as succeeding but the route is not in the routing table. I believe this should be all relevant configuration and output. The IPs and naming have been altered so apologies if I end up missing something. The idea behind this is that when an IP is active at this site (active/standby site) the IP SLA tracked route will kick in and be redistributed into BGP and advertised to the 2 routes that have the GLBP address of 10.30.30.8. BGP conifguration not inlcuded since the issue seems to be with the IP SLA config (no static route in table).
track 5 ip sla 1 reachability
delay down 3 up 3
ip sla 5
icmp-echo 10.10.10.10 source-ip 10.30.30.11
ip sla schedule 5 life forever start-time now
ip route vrf Customer1 10.10.10.0 255.255.255.0 GigabitEthernet0/0/0.5 10.30.30.8 track 5
encapsulation dot1Q 5
ip vrf forwarding Customer1
ip address 10.30.30.11 255.255.255.0
ASR1001#show ip route vrf Customer1
Gateway of last resort is 10.30.30.1 to network 0.0.0.0
S* 0.0.0.0/0 [1/0] via 10.30.30.1, GigabitEthernet0/0/0.5
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C 10.30.30.0/24 is directly connected, GigabitEthernet0/0/0.5
L 10.30.30.11/32 is directly connected, GigabitEthernet0/0/0.5
Sorry, that was a copy paste error. I checked and the route statement has the correct subinterface tag in the configuration. I'll edit the post. I copied the route line from the other site device which has the interface tagged as .3, then I altered the gateway IP for security. VRF and destination IP/Mask are the same for the routes at each site but the gateway and subinterface are different.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...