We appear to having some issues with the hold down routes on our c6509e border routers. We use a collapsed core model, so the border routers also act as IBGP route reflectors to the core routers.
The core routers advertise (IBGP) routes to the border routers, which then advertise (EBGP) upstream to the internets.
If the core stops advertising internal routes to the borders, the border router hold down routes continue to advertise our networks upstream to the internets, without the risk of being dampened(if there is any flapping).
When this happens the IBGP routes learned from the core are removed from the border router FIB's, and replaced with static-hold down routes. The problem we are seeing is that when the BGP routes are re-learned from the core, they are placed into the RIB, but do not replace the static-hold down routes in the FIB table. The main issue is that any external ingress traffic destined for hosts in the core hit the border routers, but obviously goes no further.
As soon as I remove the static hold-down routes from the borders, the IBGP routes get added back into to the FIB, and external ingress traffic can reach hosts in the core. After I re-add the hold-down routes, the IBGP routes continue to remain in the FIB.
Has anyone else struck this problem before? Sounds almost like an IOS bug.
Note - Since we run a collapsed core/border I had to enable this on all ebgp neighbor peers as well. Adding the static weight entry to only ibgp neighbor peers had the effect of overriding local preference. This prevented some multihomed BGP customers from using local preference to determine path selection.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...