route-target configs are only required if you run MPLS. Since you only want to run VRF-Lite, you don't have to configure route-target for your VRF(s). Consequently, there's not export-map required either. If you start playing around with export-map and the likes, you're opening up a whole new can of worms, 'cuz then you need to set up MP-BGP, etc. Unless you do want to set up your own MPLS network.
I don't think you need to create a "WAN VRF". You only need the 2 VRFs and the global routing table. How many layer-3 devices do you have? If you only have the WAN router as the routing device, you may not even need to leak routes. Just relevant static VRF routes in each VRF to reach the WAN (default route may be sufficient?). Might help if you can provide your intended network topology.
well, what I meant was that you don't need "ip vrf" config for your "WAN segment". Here's an example config:
ip vrf Segment1
ip vrf Segment2
description SVI for Segment1
ip vrf forwarding Segment1
description SVI for Segment2
ip vrf forwarding Segment2
Note on RD: best practice typically calls for BGP AS number being used for the 1st part of RD, while the 2nd part is typically an arbitrary number that you choose.
Now, not knowing your exact requirements or your topology, I can't guarantee that the configs above will meet your needs. They're just a guide. Will help heaps if you can provide topology and also state your requirements.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...