To set the time period during which the
authentication key on a key chain is received as valid, use the accept-lifetimecommand inkey chain key configuration mode. To revert to the default value, use the no form of this command.
Beginning time that the key specified by the key command is valid to be received. The syntax can be either of the following:
hh:mm:ssMonthdateyear
hh:mm:ssdateMonthyear
hh--hours
mm--minutes
ss--s
econds
Month--first three letters of the month
date--date (1-31)
year--y
ear (four digits)
The default start time and the earliest acceptable date is January 1, 1993.
infinite
Key is valid to be received from the start-time value on.
end-time
Key is valid to be received from the start-time value until the end-timevalue. The syntax is the same as that for the start-timevalue. The end-time value must be after the start-timevalue. The default end time is an infinite time period.
durationseconds
Length of time (in seconds) that the key is valid to be received. The range is from 1 to 2147483646.
Command Default
The authentication key on a key chain is received as valid forever (the starting time is January 1, 1993, and the ending time is infinite).
Command Modes
Key chain key configuration (config-keychain-key)
Command History
Release
Modification
11.1
This command was introduced.
12.4(6)T
Support for IPv6 was added.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Only DRP Agent, Enhanced Interior Gateway Routing Protocol (EIGRP), and Routing Information Protocol (
RIP) Version 2 use key chains.
Specify a start-time value and one of the following values: infinite, end-time, or durationseconds.
We recommend running Network Time Protocol (NTP) or some other time synchronization method if you assign a lifetime to a key.
If the last key expires, authentication will continue and an error message will be generated. To disable authentication, you must manually delete the last valid key.
Examples
The following example configures a key chain named chain1. The key named key1 will be accepted from 1:30 p.m. to 3:30 p.m. and will be sent from 2:00 p.m. to 3:00 p.m. The key named key2 will be accepted from 2:30 p.m. to 4:30 p.m. and will be sent from 3:00 p.m. to 4:00 p.m. The overlap allows for migration of keys or a discrepancy in the set time of the router. There is a 30-minute leeway on each side to handle time differences.
The following example configures a key chain named chain1 for EIGRP address-family. The key named key1 will be accepted from 1:30 p.m. to 3:30 p.m. and be sent from 2:00 p.m. to 3:00 p.m. The key named key2 will be accepted from 2:30 p.m. to 4:30 p.m. and be sent from 3:00 p.m. to 4:00 p.m. The overlap allows for migration of keys or a discrepancy in the set time of the router. There is a 30-minute leeway on each side to handle time differences.
Defines an authentication key-chain needed to enable authentication for routing protocols.
key-string(authentication)
Specifies the authentication string for a key.
send-lifetime
Sets the time period during which an authentication key on a key chain is valid to be sent.
showkeychain
Displays authentication key information.
authentication (BFD)
To configure authentication in a Bidirectional Forwarding Detection (BFD) template for single hop and multihop sessions, use the
authentication command in BFD configuration mode. To disable authentication in BFD template for single-hop and multihop sessions, use the
no form of this command.
Authentication type. Valid values are md5, meticulous-md5, meticulous-sha-1, and sha-1.
keychainkeychain-name
Configures an authentication key chain with the specified name. The maximum number of characters allowed in the name is 32.
Command Default
Authentication in BFD template for single hop and multihop sessions is not enabled.
Command Modes
BFD configuration (config-bfd)
Command History
Release
Modification
15.1(3)S
This command was introduced.
15.2(4)S
This command was modified. This command can be configured in both single hop and multihop templates.
Cisco IOS XE Release 3.7S
This command was integrated into Cisco IOS XE Release 3.7S.
Usage Guidelines
You can configure authentication in single hop and multihop templates. We recommend that you configure authentication to enhance security. Authentication must be configured on each BFD source-destination pair, and authentication parameters must match on both devices.
Examples
The following example shows how to configure authentication for the template1 BFD single-hop template:
Sets the baseline BFD session parameters on an interface.
bfdmap
Configures a BFD map that associates timers and authentication with multihop templates.
bfd-template
Configures a BFD template.
bfd
To set the baseline Bidirectional Forwarding Detection (BFD) session parameters on an interface, use the
bfd command in interface configuration mode. To remove the baseline BFD session parameters, use the
no form of this command.
Specifies the rate, in milliseconds, at which BFD control packets will be sent to BFD peers. The valid range for the
milliseconds argument is from 50 to 999.
min_rxmilliseconds
Specifies the rate, in milliseconds, at which BFD control packets will be expected to be received from BFD peers. The valid range for the
milliseconds argument is from 50 to 999.
multipliermultiplier-value
Specifies the number of consecutive BFD control packets that must be missed from a BFD peer before BFD declares that the peer is unavailable and the Layer 3 BFD peer is informed of the failure. The valid range for the
multiplier-valueargument is from 3 to 50.
Command Default
No baseline BFD session parameters are set.
Command Modes
Interface configuration (config-if)
Command History
Release
Modification
12.2(18)SXE
This command was introduced.
12.0(31)S
This command was integrated into Cisco IOS Release 12.0(31)S.
12.2S
This command was modified. Support for IPv6 was added.
12.4(4)T
This command was integrated into Cisco IOS Release 12.4(4)T.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SB
This command was integrated into Cisco IOS Release 12.2(33)SB.
Cisco IOS XE Release 2.1
This command was implemented on Cisco ASR 1000 Series Aggregation Services Routers.
12.2(33)SRE
This command was modified. Support for IPv6 was added.
15.0(1)M
This command was modified. Support was removed from ATM and inverse multiplexing over ATM (IMA) interfaces.
15.1(2)T
This command was modified. Support for IPv6 was added.
Cisco IOS XE Release 3.4
This command was modified. Support for point-to-point IPv4, IPv6, and generic routing encapsulation (GRE) tunnels was added.
15.1(1)SG
This command was integrated into Cisco IOS Release 15.1(1)SG.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
15.3(1)S
This command was modified. Support for multilink interface was added.
15.2(1)E
This command was integrated into Cisco IOS Release 15.2(1)E.
Usage Guidelines
The
bfd command can be configured on the following interfaces:
ATM
Dot1Q VLAN subinterfaces (with an IP address on the Dot1Q subinterface)
Ethernet
Frame Relay
Inverse Multiplexing over ATM (IMA)
IP tunnel
Port channel
PoS
Multilink
Serial
Tunnel (The tunnel type must be point-to-point, not Multiprotocol Label Switching (MPLS).
If BFD runs on a port channel interface, BFD has a timer value restriction of 750 * 3 milliseconds. Other interface types are not supported by BFD.
Note
The
intervalcommand is not supported on ATM and IMA interfaces in Cisco IOS Release 15.0(1)M and later releases.
The bfd interval configuration is not removed when:
an IPv4 address is removed from an interface
an IPv6 address is removed from an interface
IPv6 is disabled from an interface
an interface is shutdown
IPv4 CEF is disabled globally or locally on an interface
IPv6 CEF is disabled globally or locally on an interface
The bfd interval configuration is removed when:
the subinterface on which it is configured is removed
Examples
The following example shows the BFD session parameters set for Fast Ethernet interface 3/0:
Enables BFD on a per-interface basis for a BFD peer.
clearbfd
Clears BFD session parameters.
ipospfbfd
Enables BFD on a specific interface configured for OSPF.
bfd all-interfaces
To enable Bidirectional Forwarding Detection (BFD) for all interfaces participating in the routing process, use the
bfdall-interfaces command in router configuration or address family interface configuration mode. To disable BFD for all neighbors on a single interface, use the
no form of this command.
bfdall-interfaces
nobfdall-interfaces
Syntax Description
This command has no arguments or keywords.
Command Default
BFD is disabled on the interfaces participating in the routing process.
Command Modes
Router configuration (config-router)
Address family interface configuration (config-router-af)
Command History
Release
Modification
12.2(18)SXE
This command was introduced.
12.0(31)S
This command was integrated into Cisco IOS Release 12.0(31)S.
12.4(4)T
This command was integrated into Cisco IOS Release 12.4(4)T.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS Release XE 2.1 and implemented on the Cisco ASR 1000 Series Aggregation Services Routers.
12.2(33)SRE
This command was modified. Support for IPv6 was added.
15.0(1)M
This command was modified. Thebfdall-interfaces command in named router configuration mode was replaced by the
bfd command in address family interface mode.
15.1(2)T
This command was modified. Support for IPv6 was added.
Cisco IOS XE Release 3.3
This command was modified. Support for the Routing Information Protocol (RIP) was added.
15.2(4)S
This command was modified. Support for IPv6 was added.
Cisco IOS XE Release 3.7S
This command was modified. Support for IPv6 was added.
Usage Guidelines
There are two methods to configure routing protocols to use BFD for failure detection. To enable BFD for all interfaces, enter the
bfdall-interfaces command in router configuration mode. In Cisco IOS Release 12.4(24)T, Cisco IOS 12.2(33)SRA, and earlier releases, the
bfdall-interfaces command works in router configuration mode and address family interface mode.
In Cisco IOS Release 15.0(1)M and later releases, the
bfdall-interfaces command in named router configuration mode is replaced by the
bfd command in address family interface configuration mode. Use the
bfd command in address family interface configuration mode to achieve the same functionality as that of the
bfdall-interfaces command in router configuration mode.
Examples
The following example shows how to enable BFD for all Enhanced Interior Gateway Routing Protocol (EIGRP) neighbors:
The following example shows how to enable IPv6 BFD for all IS-IS neighbors, in address family interface configuration mode:
Router> enable
Router# configure terminal
Router(config)# router isis
Router(config-router)# address family ipv6
Router(config-router-af)# bfd all-interfaces
Router(config-router-af)# end
Related Commands
Command
Description
bfd
Sets the baseline BFD session parameters on an interface.
bfd check-ctrl-plane-failure
To enable Bidirectional Forwarding Detection (BFD) control plane failure checking for the Intermediate System-to-Intermediate System (IS-IS) routing protocol, use the
bfdcheck-control-plane-failure command in router configuration mode. To disable control plane failure detection, use the
no form of this command.
bfdcheck-ctrl-plane-failure
nobfdcheck-ctrl-plane-failure
Syntax Description
This command has no arguments or keywords.
Command Default
BFD control plane failure checking is disabled.
Command Modes
Router configuration (config-router)
Command History
Release
Modification
Cisco IOS XE Release 3.7S
This command was introduced.
Usage Guidelines
The
bfdcheck-ctrl-plane-failure command can be configured for an IS-IS routing process only. The command is not supported on other protocols.
When a router restarts, a false BFD session failure can occur, where neighboring routers behave as if a true forwarding failure has occurred. However, if the
bfdcheck-ctrl-plane-failure command is enabled on a router, the router can ignore control plane related BFD session failures. We recommend that you add this command to the configuration of all neighboring routers just prior to a planned router restart, and that you remove the command from all neighboring routers when the restart is complete.
Examples
The following example enables BFD control plane failure checking for the IS-IS routing protocol:
Sets the baseline BFD session parameters on an interface.
routerisis
Enables the IS-IS routing protocol and specifies an IS-IS process.
bfd echo
To enable Bidirectional Forwarding Detection (BFD) echo mode, use the bfdecho command in interface configuration mode. To disable BFD echo mode, use the no form of this command.
bfdecho
nobfdecho
Syntax Description
This command has no arguments or keywords.
Command Default
BFD echo mode is enabled by default.
Command Modes
Interface configuration (config-if)
Command History
Release
Modification
12.4(9)T
This command was introduced.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
15.0(1)M
This command was modified. Support was removed from ATM and inverse multiplexing over ATM (IMA) interfaces.
Usage Guidelines
Echo mode is enabled by default. Entering the nobfdecho command without any keywords turns off the sending of echo packets and signifies that the router is unwilling to forward echo packets received from BFD neighbor routers.
When echo mode is enabled, the desired minimum echo transmit interval and required minimum transmit interval values are taken from the bfdintervalmillisecondsmin_rxmilliseconds parameters, respectively.
Note
If the noiproute-cachesame-interface command is configured, the bfdechoaccept command will not be accepted.
Note
Before using BFD echo mode, you must disable the sending of Internet Control Message Protocol (ICMP) redirect messages by entering the noipredirects command, in order to avoid high CPU utilization.
The bfdecho command is not supported on ATM and IMA interfaces Cisco IOS Release 15.0(1)M and later releases.
Echo Mode Without Asymmetry
Echo mode is described as without asymmetry when it is running on both sides (both BFD neighbors are running echo mode).
Examples
The following example configures echo mode between BFD neighbors:
The following output from the showbfdneighborsdetails command shows that the BFD session neighbor is up and using BFD echo mode. The relevant command output is shown in bold in the output.
Router# show bfd neighbors details
OurAddr NeighAddr LD/RD RH/RS Holdown(mult)State Int
172.16.1.2 172.16.1.1 1/6 Up 0 (3 ) Up Fa0/1
Session state is UP and using echo function with 50 ms interval.
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 1000000, MinRxInt: 1000000, Multiplier: 3
Received MinRxInt: 1000000, Received Multiplier: 3
Holdown (hits): 3000(0), Hello (hits): 1000(337)
Rx Count: 341, Rx Interval (ms) min/max/avg: 1/1008/882 last: 364 ms ago
Tx Count: 339, Tx Interval (ms) min/max/avg: 1/1016/886 last: 632 ms ago
Registered protocols: EIGRP
Uptime: 00:05:00
Last packet: Version: 1 - Diagnostic: 0
State bit: Up - Demand bit: 0
Poll bit: 0 - Final bit: 0
Multiplier: 3 - Length: 24
My Discr.: 6 - Your Discr.: 1
Min tx interval: 1000000 - Min rx interval: 1000000
Min Echo interval: 50000
Related Commands
Command
Description
bfd
Sets the baseline BFD session parameters on the interface.
ipredirects
Enables the sending of ICMP redirect messages if the Cisco IOS software is forced to resend a packet through the same interface on which it was received.
iproute-cache
Controls the use of switching methods for forwarding IP packets.
bfd interface
To enable Bidirectional Forwarding Detection (BFD) on a per-interface basis, use the bfdinterfacecommand in router configuration mode. To disable BFD for all neighbors on a single interface, use the no form of this command.
bfdinterfacetypenumber
nobfdinterfacetypenumber
Syntax Description
type
Interface type for the interface to be enabled for BFD.
number
Interface number for the interface to be enabled for BFD.
Command Default
BFD is not enabled for the interface.
Command Modes
Router configuration (config-router)
Command History
Release
Modification
12.2(18)SXE
This command was introduced.
12.0(31)S
This command was integrated into Cisco IOS Release 12.0(31)S.
12.4(4)T
This command was integrated into Cisco IOS Release 12.4(4)T.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
15.0(1)M
This command was modified. Thebfdinterface command in named router configuration mode was replaced by thebfdcommand in address family interface mode.
Usage Guidelines
In Cisco IOS Release 12.4(24)T and 12.2(33)SRA and earlier releases, the bfdinterface command works in router configuration mode and address-family intreface mode (af-interface mode).
In Cisco IOS Release 15.0(1)M and later releases, the bfdinterface command in named router configuration mode is replaced by the bfdcommand in address-family interface mode. Use the bfd command in af-interface mode to achieve the same functionality as that of the bfdinterface command in router configuration mode.
Examples
The following example shows how to enable BFD for the Enhanced Interior Gateway Routing Protocol (EIGRP) neighbors on Fast Ethernet interface 3/0:
Sets the baseline BFD session parameters on an interface.
bfdall-interfaces
Enables BFD for all interfaces for a BFD peer.
bfd map
To configure a Bidirectional Forwarding Detection (BFD) map that associates timers and authentication with multihop templates, use the
bfd map command in global configuration mode. To delete a BFD map, use the
no form of this command.
(Optional) Configures a VPN routing and forwarding instance (VRF).
source
(Optional) The source address.
template-name
The name of the template associated with the BFD map.
Command Default
If this command is not configured, a BFD map does not exist.
Command Modes
Global configuration (config)
Command History
Release
Modification
15.1(3)S
This command was introduced.
15.2(2)SNG
This command was implemented on Cisco ASR 901 Series Aggregation Services Routers.
Usage Guidelines
The
showbfdneighbors command can be used to help troubleshoot the BFD feature.
The full output for the
showbfdneighborsdetails command is not supported on the Route Processor (RP) for the Cisco 12000 series Internet router. If you want to enter the
showbfdneighbors command with the
details keyword on the Cisco 12000 series Internet router, you must enter the command on the line card. Use the
attachslot command to establish a CLI session with a line card.
In Cisco IOS Release 15.1(2)S and later releases that support BFD hardware offload, the Tx and Rx intervals on both BFD peers must be configured in multiples of 50 milliseconds. If they are not, output from the
showbfdneighborsdetails command will show the configured intervals, not the changed ones.
For more information about prerequisites and restrictions for hardware offload, see the “Configuring Synchronous Ethernet on the Cisco 7600 Router with ES+ Line Card” section of the
Cisco 7600 Series Ethernet Services Plus (ES+) and Ethernet Services Plus T (ES+T) Line Card Configuration Guide.
Cisco IOS Release 15.1(3)S and later releases support BFD on multiple network hops. The
bfd-templatecommand configures timers and authentication for a template. The
bfdmap command associates those timers and authentication with unique source/destination address pairs in multihop BFD sessions. Use the
bfd-template command to configure a multihop template and the
bfdmapcommand to associate it with a map of destinations and associated BFD timers.
For IPv6 addresses, use X:X:X:X::X format; for IPv4 addresses, use the A.B.C.D. classless interdomain routing (CIDR) notation to represent the mask for both source and destination addresses.
Examples
The following example shows how to create a BFD multihop template, create a BFD map with IPv4 addresses, and associate the map with the template:
Configures authentication in BFD multihop sessions.
bfd
Set the baseline BFD session parameters on an interface.
bfdall-interfaces
Enables BFD for all router interfaces.
bfdecho
Enables BFD echo mode.
bfdinterface
Enables BFD on a per-interface basis for a BFD peer.
bfdslow-timer
Configures the BFD slow timer value.
bfd-template
Configures a BFD template.
interval
Configures the transmit and receive intervals between BFD packets.
keychain
Configures an authentication key chain.
bfd slow-timers
To configure the Bidirectional Forwarding Detection (BFD) slow timers value, use the bfdslow-timers command in global configuration mode. This command does not have a no form.
bfdslow-timers [milliseconds]
Syntax Description
milliseconds
(Optional) BFD slow timers value, in milliseconds. The range is from 1000 to 30000. The default is 1000.
Command Default
The BFD slow timer value is 1000 milliseconds.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(9)T
This command was introduced.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example shows how to configure the BFD slow timers value to 14,000 milliseconds:
Router(config)# bfd slow-timers 14000
The following output from the showbfdneighborsdetails command shows that the BFD slow timers value of 14,000 milliseconds has been implemented. The values for the MinTxInt and MinRxInt will correspond to the configured value for the BFD slow timers. The relevant command output is shown in bold.
Router# show bfd neighbors details
OurAddr NeighAddr LD/RD RH/RS Holdown(mult) State Int
172.16.10.1 172.16.10.2 1/1 Up 0 (3 ) Up Et2/0
Session state is UP and using echo function with 50 ms interval.
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 14000, MinRxInt: 14000
, Multiplier: 3
Received MinRxInt: 10000, Received Multiplier: 3
Holdown (hits): 3600(0), Hello (hits): 1200(418)
Rx Count: 422, Rx Interval (ms) min/max/avg: 1/1480/1087 last: 112 ms ago
Tx Count: 420, Tx Interval (ms) min/max/avg: 1/2088/1090 last: 872 ms ago
Registered protocols: OSPF
Uptime: 00:07:37
Last packet: Version: 1 - Diagnostic: 0
State bit: Up - Demand bit: 0
Poll bit: 0 - Final bit: 0
Multiplier: 3 - Length: 24
My Discr.: 1 - Your Discr.: 1
Min tx interval: 14000 - Min rx interval: 14000
Min Echo interval: 4000
Related Commands
Command
Description
bfdecho
Enables BFD echo mode.
bfd template
To bind a single hop Bidirectional Forwarding Detection (BFD) template to an interface, use the
bfdtemplate command in interface configuration mode. To unbind single-hop BFD template from an interface, use the
no
form of this command.
bfd template template-name
no bfd template template-name
Syntax Description
template-name
Name of the BFD template.
Command Default
A BFD template is not bound to an interface.
Command Modes
Interface configuration (config-if)
Command History
Release
Modification
15.2(4)S
This command was introduced.
Cisco IOS XE Release 3.7S
This command was integrated into Cisco IOS XE Release 3.7S.
Usage Guidelines
Even if you have not created the template by using the
bfd-template command, you can configure the name of the template under an interface, but the template is considered invalid until you define the template. You do not have to reconfigure the template name again. It becomes valid automatically.
Creates a BFD template and enters BFD configuration mode.
bfd-template
To create a Bidirectional Forwarding Detection (BFD) template and to enter BFD configuration mode, use the
bfd-template command in global configuration mode. To remove a BFD template, use the
no form of this command.
This command was modified. The
multi-hop keyword was added.
Cisco IOS XE Release 3.7S
This command was integrated into Cisco IOS XE Release 3.7S.
Usage Guidelines
The
bfd-template command allows you to create a BFD template and places the device in BFD configuration mode. The template can be used to specify a set of BFD interval values. BFD interval values specified as part of the BFD template are not specific to a single interface.
The
bfd map command associates timers and authentication in multihop templates with unique source/destination address pairs in multihop BFD sessions.
You can configure authentication in single-hop and multihop templates. Although it is not required, authentication is recommended to enhance security.
Examples
The following example shows how to create a BFD template and specify BFD interval values:
Configures authentication in BFD single-hop and multihop sessions.
bfd
Sets the baseline BFD session parameters on an interface.
bfdall-interfaces
Enables BFD for all router interfaces.
bfdecho
Enables BFD echo mode.
bfdinterface
Enables BFD on a per-interface basis for a BFD peer.
bfdmap
Configures a BFD map.
bfdslow-timer
Configures the BFD slow-timer value.
bfdtemplate
Binds a single-hop BFD template to an interface.
echo
Enables BFD echo mode under a BFD template.
interval
Configures transmit and receive intervals between BFD packets.
dampening
To configure a device to automatically dampen a flapping session, use the
dampening command in interface configuration mode. To disable automatic dampening, use the
no form of this command.
(optional) Time (in seconds) after which a penalty is decreased. Once the route has been assigned a penalty, the penalty is decreased by half after the half-life period expires. The range of the half-life period is from 1 to 30 seconds. The default time is 5 seconds.
reuse-threshold
(optional) Reuse value based on the number of penalties. When the accumulated penalty decreases enough to fall below this value, the route is unsuppressed. The range of the reuse value is from 1 to 20000; the default is 1000.
suppress-threshold
(optional) Value of the accumulated penalty that triggers the router to dampen a flapping interface. A route is suppressed when its penalty exceeds this limit. The range is from 1 to 20000; the default is 2000.
max-suppress-time
(optional) Maximum time (in seconds) a route can be suppressed. The range is from 1 to 20000; the default is four times the
half-life-periodvalue. If the
half-life-period value is allowed to default, the maximum suppress time defaults to 20 seconds.
restart-penalty
(optional) Penalty to applied to the interface when it comes up for the first time after the router reloads. The configurable range is from 1 to 18000 penalties. The default is 2000 penalties. This argument is not required for any other configurations.
Command Default
This command is disabled by default. To manually configure the timer for the restart-penalty argument, the value for all arguments must be manually entered.
Command Modes
Interface configuration (config-if)
Command History
Release
Modification
12.0(22)S
This command was introduced.
12.2(14)S
This command was integrated into Cisco IOS Release 12.2(14)S.
12.2(13)T
This command was integrated into Cisco IOS Release 12.2(13)T.
12.2(18)SXD
This command was integrated into Cisco IOS Release 12.2(18)SXD.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(31)SB2
This command was integrated into Cisco IOS Release 12.2(31)SB2.
Usage Guidelines
The IP Event Dampening feature will function on a subinterface but cannot be configured on only the subinterface. Only the primary interface can be configured with this feature. Primary interface configuration is applied to all subinterfaces by default.
When an interface is dampened, the interface is dampened to both IP and Connectionless Network Services (CLNS) routing equally. The interface is dampened to both IP and CLNS because integrated routing protocols such as Intermediate System-to-Intermediate System (IS-IS), IP, and CLNS routing protocols are closely interconnected, so it is impossible to apply dampening separately.
Copying a dampening configuration from virtual templates to virtual access interfaces is not supported because dampening has limited usefulness to existing applications using virtual templates. Virtual access interfaces are released when an interface flaps, and new connections and virtual access interfaces are acquired when the interface comes up and is made available to the network. Because dampening states are attached to the interface, the dampening states would not survive an interface flap.
If the
dampeningcommand is applied to an interface that already has dampening configured, all dampening states are reset and the accumulated penalty will be set to 0. If the interface has been dampened, the accumulated penalty will fall into the reuse threshold range, and the dampened interface will be made available to the network. The flap counts, however, are retained.
Examples
The following example sets the half life to 30 seconds, the reuse threshold to 1500, the suppress threshold to 10000, and the maximum suppress time to 120 seconds:
The following example configures the router to apply a penalty of 500 on Ethernet interface 0/0 when the interface comes up for the first time after the router is reloaded:
Displays a summary of the dampening parameters and status.
distance (IP)
To define an
administrative distance for routes that are inserted into the routing table,
use the
distance
command in router configuration mode. To return the administrative distance to
its default distance definition, use the
no form of this
command.
Administrative distance. An integer from 10 to 255. (The values 0 to 9 are
reserved for internal use. Routes with a distance value of 255 are not
installed in the routing table.)
ip-address
IP
address in four-part, dotted decimal notation. The IP address or the network
address from where routes are learned.
wildcard-mask
Wildcard
mask in four-part, dotted decimal notation. A bit set to 1 in the
wildcard-mask
argument instructs the software to ignore the corresponding bit in the address
value.
ip-standard-acl
(Optional) Standard IP access list (ACL) number to be applied to incoming
routing updates.
access-list-name
(Optional) Named access list to be applied to incoming routing updates.
Command Default
For information on
default administrative distances, see the “Usage Guidelines” section.
Command Modes
Router
configuration(config-router)
Command History
Release
Modification
10.0
This
command was introduced.
11.2
This
command was modified. The
access-list-nameargument was added.
11.3
This
command was modified. The ip keyword was removed.
12.0
This
command was modified. The
ip-standard-aclandip-extended-aclarguments were added.
12.2(33)SRA
This
command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This
command is supported in the Cisco IOS Release 12.2SX train. Support in a
specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Cisco
IOS XE Release 2.1
This
command was integrated into Cisco IOS XE Release 2.1.
15.0(1)M
This
command was integrated into a release earlier than Cisco IOS Release 15.0(1)M.
15.2(4)S
This command was modified. The
ip-extended-acl
argument was removed.
Usage Guidelines
The table below
lists default administrative distances.
Intermediate System-to-Intermediate System (IS-IS)
115
Routing
Information Protocol (RIP)
120
EIGRP
external route
170
Internal
BGP
200
Unknown
255
An administrative
distance is a rating of the trustworthiness of a routing information source,
such as an individual router or a group of routers. Numerically, an
administrative distance is an integer from 0 to 255. In general, the higher the
value, the lower the trust rating. An administrative distance of 255 means the
routing information source cannot be trusted at all and should be ignored.
When the optional
access list name is used with this command, it is applied when a network is
being inserted into the routing table. This behavior allows filtering of
networks according to the IP address of the router that supplies the routing
information. This option could be used, for example, to filter possibly
incorrect routing information from routers that are not under your
administrative control.
Note
Extended ACL is not supported for defining the administrative
distance for a particular route which is inserted into the routing table. Use
the standard IP access list to define the administrative distance.
The order in
which you enter
distance
commands can affect the assigned administrative distances in unexpected ways.
See the “Examples” section for further clarification.
For BGP, the
distance
command sets the administrative distance of the External BGP (eBGP) route.
The
show ip protocols
privileged EXEC command displays the default administrative distance for the
active routing processes.
Always set the
administrative distance from the least to the most specific network.
Note
The weight of a
route can no longer be set with the distance command. To set the weight for a
route, use a route map.
Examples
In the following
example, the
router eigrp global
configuration command sets up EIGRP routing in autonomous system number 109.
The
network
router configuration commands specify EIGRP routing on networks 192.168.7.0 and
172.16.0.0. The first
distance
command sets the administrative distance to 90 for all routers on the Class C
network 192.168.7.0. The second
distance
command sets the administrative distance to 120 for the router with the address
172.16.1.3.
In this
example, adding distance 255 to the end of the list would override the distance
values for all networks within the range specified in the example. The result
would be that the distance values are set to 255.
Entering the
show ip
protocols command displays the default
administrative distance for the active routing processes, as well as the
user-configured administrative distances:
Device# show ip protocols
.
.
.
Routing Protocol is "isis tag1"
Invalid after 0 seconds, hold down 0, flushed after 0
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Redistributing: isis
Address Summarization:
None
Maximum path: 4
Routing for Networks:
Routing Information Sources:
Gateway Distance Last Update
Distance: (default is 115)
Address Wild mask Distance List
10.11.0.0 0.0.0.255 45
10.0.0.0 0.0.0.255 22
Address Wild mask Distance List
10.11.0.0 0.0.0.255 33
10.11.12.0 0.0.0.255 44
Related Commands
Command
Description
distance(IPv6)
Configures an administrative distance for IS-IS, RIP, or OSPF IPv6 routes
inserted into the IPv6 routing table.
distance(ISOCLNS)
Configures the administrative distance for CLNS routes learned.
distancebgp
Allows
the use of external, internal, and local administrative distances that could be
a better route to a node.
distancebgp(IPv6)
Allows
the use of external, internal, and local administrative distances that could be
a better route than other external, internal, or local routes to a node.
distanceeigrp
Allows
the use of two administrative distances--internal and external--that could be a
better route to a node.
distanceospf
Defines
OSPF route administrative distances based on route type.
showipprotocols
Displays the parameters and current state of the active routing protocol
process.
distribute-list in (IP)
To filter networks received in updates, use the
distribute-listin command in router configuration mode, address family configuration mode or address family topology configuration mode. To delete the distribution list and remove it from the running configuration file, use the no form of this command.
IP access-list name. The access-list-name argument defines which networks are to be received and which are to be suppressed in routing updates.
The range is from 1 to 199.
access-list-number
IP access-list number. The access-list-number argument defines which networks are to be received and which are to be suppressed in routing updates.
gateway
Filters incoming address updates based on a gateway.
prefix-list-name
IP prefix-list name. The prefix-list-name argument defines which routes from specified IP prefixes in the routing table are to be received and which are to be suppressed in routing updates.
prefix
Filters prefixes in address updates.
interface-type
(Optional) Type of interface. The interface-type argument defines the type of interface from which routing updates are to be received or suppressed.
The
interface-type argument cannot be used in address family configuration mode.
interface-number
(Optional) Interface number on which the access list should be applied to incoming updates. If no interface is specified, the access list will be applied to all incoming updates.
The
interface-type and
interface-number arguments are applied if you specify an access list, not a route map. The
interface-number argument cannot be used in address family configuration mode.
route-map
Specifies the route map that defines which networks are to be installed in the routing table and which are to be filtered from the routing table.
route-map-name
Name of route-map. The route-map-name argument defines the networks from which routing updates are to be received or suppressed. This argument is supported by OSPF, EIGRP and IS-IS.
Command Default
Networks received in updates are not filtered.
Command Modes
Router configuration (config-router)
Address family configuration (config-router-af)
Router address family topology configuration (config-router-af-topology)
Command History
Release
Modification
10.0
This command was introduced.
11.2
This command was modified. The
access-list-name,
type, and
number arguments were added.
12.0(7)T
This command was modified. Address family configuration mode was added.
12.0(24)S
This command was modified. The
route-maproute-map-name keyword-argument pair was added.
12.2(27)SBC
This command was integrated into Cisco IOS Release 12.2(27)SBC.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SRB
This command was modified. Router address family topology configuration mode was added.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
15.3(3)M
This command was modified. The IS-IS protocol is now supported.
Usage Guidelines
The distribute-listin command is used to filter incoming updates. An access list, gateway, route map, or prefix list must be defined prior to configuration of this command. Standard and expanded access lists are supported. IP prefix lists are used to filter based on the bit length of the prefix. An entire network, subnet, supernet, or single host route can be specified. Prefix list and access list configuration is mutually exclusive when configuring a distribution list.
This command must specify either an access list or a map-tag name of a route map. The route map is supported for Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP) filtering.
The
interface-type and
interface-number arguments cannot be used in address family configuration mode.
OSPF routes cannot be filtered from entering the OSPF database. If you use this command for OSPF, it only filters routes from the routing table; it does not prevent link-state packets from being propagated.
If a route map is specified, the route map can be based on the following
match options:
matchinterface
matchipaddress
matchipnext-hop
matchiproute-source
matchmetric
matchroute-type
matchtag
Configure the route map before specifying it in the
distribute-listin command.
Release 12.2(33)SRB
If you plan to configure the Multi-Topology Routing (MTR) feature, you must enter the
distribute-listin command in address family topology configuration mode in order for this OSPF router configuration command to become topology-aware.
Examples
In the following example, EIGRP process 1 is configured to accept two networks, network 0.0.0.0 and network 10.108.0.0:
In the following EIGRP named configuration example, the address-family external route has a tag. The value of the tag is examined before the prefix is installed in the routing table. All address-family external addresses that have the tag value of 777 are filtered (prevented from being installed in the routing table). The permit statement with sequence number 20 has no match conditions, and there are no other route-map statements after sequence number 20, so all other conditions are permitted.
Device(config)# route-map tag-filter deny 10
Device(config-route-map)# match tag 777
Device(config-route-map)# route-map tag-filter permit 20
Device(config-route-map)# exit
Device(config)# router eigrp virtual-name
!
Device(config-router)# address-family ipv4 autonomous-system 4453
Device(config-router-af)# network 10.108.0.0
Device(config-router-af)# network 10.0.0.0
Device(config-router-af)# topology base
Device(config-router-af-topology)# distribute-list route-map tag-filter in
In the following example, OSPF external LSAs have a tag. The value of the tag is examined before the prefix is installed in the routing table. All OSPF external prefixes that have the tag value of 777 are filtered (prevented from being installed in the routing table). The permit statement with sequence number 20 has no match conditions, and there are no other route-map statements after sequence number 20, so all other conditions are permitted.
Device(config)# route-map tag-filter deny 10
Device(config-route-map)# match tag 777
Device(config-route-map)# route-map tag-filter permit 20
!
Device(config)# router ospf 1
Device(config-router)# router-id 10.0.0.2
Device(config-router)# log-adjacency-changes
Device(config-router)# network 172.16.2.1 0.0.0.255 area 0
Device(config-router)# distribute-list route-map tag-filter in
The following example shows how to filter three IS-IS routes from the routing table using a specified access list:
Device(config)# access-list 101 deny ip any 192.168.4.0 0.0.0.127
Device(config)# access-list 101 deny ip any 192.168.4.128 0.0.0.63
Device(config)# access-list 101 deny ip any 192.168.4.192 0.0.0.63
!
Device(config)# interface fastethernet 0/0
Device(config-if)# ip router isis 121
Device(config-if)# router isis 121
Device(config-router)# distribute-list 101 in
The following example shows how to filter three IS-IS routes from the routing table using a specified prefix list. Only a single command is required.
Device(config)# ip prefix-list List1 seq 3 deny 192.0.2.1/24
Device(config)# ip prefix-list List1 seq 5 deny 192.168.4.0/24 ge 25 le 26
Device(config)# ip prefix-list List1 seq 10 permit 0.0.0.0/le 32
!
Device(config)# interface fastethernet 0/0
Device(config-if)# ip router isis 122
Device(config-if)# router isis 122
Device(config-router)# distribute-list prefix List1 in
The following example shows how to filter IS-IS routes from the routing table using next hop:
Device(config)# ip prefix-list List2 seq 5 deny 198.51.100.31/24
!
Device(config)# interface fastethernet 0/0
Device(config-if)# ip router isis 125
Device(config-if)# router isis 125
Device(config-router)# distribute-list gateway List2 in
The following example shows how to filter IS-IS routes from the routing table using a specified route map:
Device(config)# route-map Map1 deny 10
Device(config-route-map)# match tag 200
Device(config-route-map)# exit
!
Device(config)# interface fastethernet 0/0
Device(config-if)# ip router isis 150
Device(config-if)# router isis 150
Device(config-router)# distribute-list route-map Map1 in
The following example shows how to enable IS-IS inbound filtering for routes that use standard IPv6 address prefixes:
Configures routing sessions and enters address family configuration mode.
distribute-listout(IP)
Suppresses networks from being advertised in updates.
iprouterisis
Configures an IS-IS routing process for IP on an interface and attaches an area designator to the routing process.
redistribute(IP)
Redistributes routes from one routing domain into another routing domain.
distribute-list out (IP)
To suppress networks from being advertised in updates, use the
distribute-listout command in the appropriate configuration mode.To cancel this function, use the
no form of this command.
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SRB
Address-family topology configuration mode was added.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
When networks are redistributed, a routing process name can be specified as an optional trailing argument to the
distribute-list command. Specifying this option causes the access list to be applied to only those routes derived from the specified routing process. After the process-specific access list is applied, any access list specified by a
distribute-list command without a process name argument will be applied. Addresses not specified in thedistribute-listcommand will not be advertised in outgoing routing updates.
The
interface-nameargument cannot be used in address-family configuration mode.
Note
To filter networks that are received in updates, use the
distribute-listin command.
Release 12.2(33)SRB
If you plan to configure the Multi-Topology Routing (MTR) feature, you must enter the
distribute-listoutcommand in address-family topology configuration mode in order for this OSPF router configuration command to become topology-aware.
Examples
The following example would cause only one network to be advertised by a RIP routing process, network 10.108.0.0:
The following example applies access list 1 to outgoing routing updates. Only network 10.10.101.0 will be advertised in outgoing EIGRP routing updates.
The following EIGRP named configuration example applies access list 1 to outgoing routing updates and enables EIGRP address-family on Ethernet interface 0/0. Only network 10.0.0.0 will be advertised in outgoing EIGRP routing updates:
Enters address-family configuration mode to configure an EIGRP routing instance.
distribute-listin(IP)
Filters networks received in updates.
network (EIGRP)
Specifies the network for an EIGRP routing process.
redistribute(IP)
Redistributes routes from one routing domain into another routing domain.
router eigrp
Configures the EIGRP address-family process.
topology (EIGRP)
Configures an EIGRP process to route IP traffic under the specified topology instance and enters router address-family topology configuration mode.
fast-reroute load-sharing disable
To disable Fast Reroute (FRR) load sharing of prefixes, use the
fast-rerouteload-sharingdisable command in router configuration mode. To restore the default setting, use the
no form of this command.
This command was integrated into Cisco IOS XE Release 3.4S.
Usage Guidelines
You must configure the
routerisis command before you can configure the
fast-rerouteload-sharingdisable command.
Load sharing equally distributes the prefixes that use the same protected primary path over the available loop-free alternates (LFAs). An LFA is a next hop that helps a packet reach its destination without looping back.
Examples
The following example shows how to disable load sharing of Level 2 prefixes:
Router(config)# router isis
Router(router-config)# fast-reroute load-sharing level-2 disable
Router(router-config)# end
Related Commands
Command
Description
routerisis
Enables the IS-IS routing protocol and specifies an IS-IS process.
fast-reroute per-prefix
To enable Fast Reroute (FRR) per prefix, use the
fast-rerouteper-prefix command in router configuration mode. To disable the configuration, use the
no form of this command.
Specifies the route map for selecting primary paths for protection.
route-map-name
Route map name.
Command Default
Fast Reroute per prefix is disabled.
Command Modes
Router configuration (config-router)
Command History
Release
Modification
15.1(2)S
This command was introduced.
Cisco IOS XE Release 3.4S
This command was integrated into Cisco IOS XE Release 3.4S.
15.2(2)SNI
This command was implemented on the Cisco ASR 901 Series Aggregation Services Routers.
Usage Guidelines
You must configure the
routerisis command before you can configure the
fast-rerouteper-prefix command.
You must configure the
all keyword to protect all prefixes or configure the
route-maproute-map-name keyword and argument pair to protect a selected set of prefixes. When you specify the
all keyword, all paths are protected, except paths that use interfaces, which are not supported, or interfaces, which are not enabled for protection. Using the
route-maproute-map-name keyword and argument pair to specify protected routes provides you with the flexibility to select protected routes, including using administrative tags.
Repair paths forward traffic during a routing transition. Repair paths are precomputed in anticipation of failures so that they can be activated when a failure is detected.
Examples
The following example shows how to enable FRR for all Level 2 prefixes:
Router(config)# router isis
Router(router-config)# fast-reroute per-prefix level-2 all
Router(router-config)# end
Related Commands
Command
Description
routerisis
Enables the IS-IS routing protocol and specifies an IS-IS process.
fast-reroute tie-break
To configure the Fast Reroute (FRR) tiebreaking priority, use the
fast-reroutetie-break command in router configuration mode. To disable the configuration, use the
no form of this command.
Configures loop-free alternates (LFAs) whose metric to the protected destination is lower than the metric of the protecting node to the destination.
linecard-disjoint
Configures LFAs that use interfaces that do not exist on the line card of the interface used by the primary path. The default is 40.
lowest-backup-path-metric
Configures LFAs with the lowest metric to the protected destination. The default is 30.
node-protecting
Configures LFAs that protect the primary next hop. The default is 50.
primary-path
Configures the repair path from the Equal Cost Multipath (ECMP) set. The default is 20.
secondary-path
Configures the non-ECMP repair path.
srlg-disjoint
Configures LFAs that do not share the same Shared Risk Link Group (SRLG) ID as the primary path. The default is 10.
priority-number
Priority number. Valid values are from 1 to 255.
Command Default
Tiebreaking is enabled by default.
Command Modes
Router configuration (config-router)
Command History
Release
Modification
15.1(2)S
This command was introduced.
Cisco IOS XE Release 3.4S
This command was integrated into Cisco IOS XE Release 3.4S.
Usage Guidelines
You must configure the
routerisis command before you can configure the
fast-reroutetie-break command.
Tiebreaking configurations are applied per IS-IS instance per address family. The lower the configured priority value, the higher the priority of the rule. The same attribute cannot be configured more than once in the same address family.
The default tiebreaking rules have a priority value of 256. Hence, the tiebreaking rules that you configure will always have a higher priority than the default rule.
Load sharing equally distributes the prefixes that use the same protected primary path over the available LFAs. An LFA is a next hop that helps a packet reach its destination without looping back.
Examples
The following example shows how to set a tiebreaking priority of 5 for Level 2 packets:
Enables the IS-IS routing protocol and specifies an IS-IS process.
echo
To enable Bidirectional Forwarding Detection (BFD) echo mode under a BFD template, use the
echo command in BFD configuration mode. To disable BFD echo mode, use the
no form of this command.
echo
noecho
Syntax Description
This command has no arguments or keywords.
Command Default
BFD echo mode is disabled.
Command Modes
BFD configuration (config-bfd)
Command History
Release
Modification
15.2(4)S
This command was introduced.
Cisco IOS XE Release 3.7S
This command was integrated into Cisco IOS XE Release 3.7S.
Usage Guidelines
Echo mode is disabled by default. Entering the
echo command enables the sending of echo packets and signifies that the device is can forward echo packets received from BFD neighbor devices.
When echo mode is enabled, the desired minimum echo transmit interval and required minimum transmit interval values are derived from the values configured through the
intervalmilliseconds min-rxmilliseconds command.
Note
If you configure the
noiproute-cachesame-interface command, the echo command is rejected.
Note
Before using
echo mode, you must disable the sending of Internet Control Message Protocol (ICMP) redirect messages by entering the
noipredirects command, in order to avoid high CPU utilization.
When echo mode is enabled on both BFD neighbors, the echo mode is described as without asymmetry.
Examples
The following example shows how to enable a BFD echo mode under a BFD template:
Configures the transmit and receive intervals between BFD packets.
ipredirects
Enables the sending of ICMP redirect messages if the Cisco software is forced to resend a packet through the same interface on which it was received.
iproute-cache
Controls the use of switching methods for forwarding IP packets.
interval (BFD)
To configure the transmit and receive intervals betweenBidirectional Forwarding Detection (BFD) packets, and to specify the number of consecutive BFD control packets that must be missed before BFD declares that a peer is unavailable, use the
intervalcommand in BFD configuration mode. To disable interval values use the
no form of this command.
(Optional) Specifies the min-tx and min-rx timers in microseconds.
bothmilliseconds
Specifies the rate, in milliseconds, at which BFD control packets are sent to BFD peers and the rate at which BFD control packets are received from BFD peers. The valid range for the
milliseconds argument is from 50 to 999.
min-txmilliseconds
Specifies the rate, in milliseconds, at which BFD control packets are sent to BFD peers. The valid range for the
milliseconds argument is from 50 to 999.
min-rxmilliseconds
Specifies the rate, in milliseconds, at which BFD control packets are received from BFD peers. The valid range for the
milliseconds argument is from 50 to 999..
multipliermultiplier-value
(Optional) Specifies the number of consecutive BFD control packets that must be missed from a BFD peer before BFD declares that the peer is unavailable and the Layer 3 BFD peer is informed of the failure. The valid range is from 3 to 50. Default is 3.
Command Default
No session parameters are set.
Command Modes
BFD configuration (config-bfd)
Command History
Release
Modification
15.0(1)S
This command was introduced.
15.1(3)S
This command was modified. The microseconds keyword was added. ntroduced.
Cisco IOS XE 3.5S
This command was modified. Support for BDI interfaces was added.
Usage Guidelines
The
interval command allows you to configure the session parameters for a BFD template.
Examples
The following example shows how to configure interval settings for the node1 BFD template:
Configures authentication in BFD multihop sessions.
bfd
Set the baseline BFD session parameters on an interface.
bfdall-interfaces
Enables BFD for all interfaces participating in the routing process.
bfdecho
Enables BFD echo mode.
bfdinterface
Enables BFD on a per-interface basis for a BFD peer.
bfdslow-timer
Configures the BFD slow timer value.
bfd-template
Creates a BFD template and enters BFD configuration mode.
ip default-network
To select a network as a candidate route for computing the gateway of last resort, use the
ipdefault-network command in global configuration mode. To remove a route, use the
no form of this command.
ipdefault-networknetwork-number
noipdefault-networknetwork-number
Syntax Description
network-number
Number of the network.
Command Default
If the router has a directly connected interface to the specified network, the dynamic routing protocols running on that router will generate (or source) a default route. For the Routing Information Protocol (RIP), this route flagged as the pseudo network 0.0.0.0.
Command Modes
Global configuration (config#)
Command History
Release
Modification
10.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command was integrated into Cisco IOS Release 12.2SX. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
15.1(3)T
This command was integrated into Cisco IOS Release 15.1(3)T.
Usage Guidelines
The Cisco IOS software uses both administrative distance and metric information to determine the default route. Multiple
ipdefault-network commands can be used. All candidate default routes, both static (that is, flagged by the
ipdefault-networkcommand) and dynamic, appear in the routing table preceded by an asterisk.
If the IP routing table indicates that the specified network number is subnetted with a nonzero subnet number, the system will automatically configure a static summary route instead of a default route. The static summary route uses the specified subnet to route traffic destined for subnets that are not explicitly listed in the IP routing table to be routed.
The
ipdefault-network command is a classful command. It is effective only if the network mask of the network that you wish to configure as a candidate route for computing the gateway of last resort matches the network mask in the Routing Information Base (RIB).
For example, if you configure
ip default-network 10.0.0.0, then the mask considered by the routing protocol is 10.0.0.0/8, as it is a Class A network. The gateway of last resort is set only if the RIB contains a 10.0.0.0/8 route.
If you need to use the
ipdefault-network command, ensure that the RIB contains a network route that matches the major mask of the network class.
Examples
The following example defines a static route to network 10.0.0.0 as the static default route:
ip route 10.0.0.0 255.0.0.0 10.108.3.4
ip default-network 10.0.0.0
If the following command is issued on a router that is not connected to network 10.140.0.0, the software might choose the path to that network as the default route when the network appears in the routing table:
ip default-network 10.140.0.0
Related Commands
Command
Description
showiproute
Displays the current state of the routing table.
ip gdp
To configure the router discovery mechanism, use the ipgdp command in global configuration mode. To disable the configuration, use the no form of this command.
ipgdp
{ eigrp | irdp [multicast] | rip }
noipgdp
{ eigrp | irdp [multicast] | rip }
Syntax Description
eigrp
Configures a gateway to discover routers transmitting Enhanced Interior Gateway Routing Protocol (EIGRP) router updates.
irdp
Configures a gateway to discover routers transmitting ICMP Router Discovery Protocol (IRDP) router updates.
multicast
(Optional) Specifies the router to multicast IRDP solicitations.
rip
Configures a gateway to discover routers transmitting Routing Information Protocol (RIP) router updates.
Command Default
The router discovery mechanism is not configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
15.0(1)M
This command was introduced in a release earlier than Cisco IOS Release 15.0(1)M.
Usage Guidelines
You must disable IP routing to configure the ipgdp command.
Examples
The following example shows how to configure the RIP router discovery mechanism:
Router# configure terminal
Router(config)# ip gdp rip
Related Commands
Command
Description
iphost
Defines static hostname-to-address mappings in the DNS hostname cache for a DNS view.
iproute
Establishes static routes.
ip local policy route-map
To identify a route map to use for local
policy routing, use the iplocalpolicyroute-map command in global configuration mode. Todisable local policy routing, use the noform of this command.
Name of the route map to use for local policy routing. The name must match a map-tag value specified by a route-map command.
Command Default
Packets that are generated by the router are not policy routed.
Command Modes
Global configuration
Command History
Release
Modification
11.1
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Packets that are generated by the router are not normally policy routed. However, you can use this command to policy route such packets. You might enable local policy routing if you want packets originated at the router to take a route other than the obvious shortest path.
The iplocalpolicyroute-map command identifies a route map to use for local policy routing. Each route-map command has a list of matchand set commands associated with it. The match commands specify the matchcriteria--the conditions under which packets should be
policy routed. The set commands specify the setactions--the particular
policy routing actions to perform if the criteria enforced by the match commands are met. The noiplocalpolicyroute-mapcommand deletes the reference to the route map and disables local policy routing.
Examples
The following example sends packets with a destination IP address matching that allowed by extended access list 131 to the router at IP address 172.30.3.20:
ip local policy route-map xyz
!
route-map xyz
match ip address 131
set ip next-hop 172.30.3.20
Related Commands
Command
Description
matchipaddress
Distributes any routes that have a destination network number address that is permitted by a standard or extended access list, and performs policy routing on packets.
matchlength
Bases policy routing on the Level 3 length of a packet.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing.
setdefaultinterface
Indicates where to output packets that pass a match clause of a route map for policy routing and have no explicit route to the destination.
setinterface
Indicates where to output packets that pass a match clause of route map for policy routing.
setipdefaultnext-hop
Indicates where to output packets that pass a match clause of a route map for policy routing and for which the Cisco IOS software has no explicit route to a destination.
setipnext-hop
Indicates where to output packets that pass a match clause of a route map for policy routing.
showiplocalpolicy
Displays the route map used for local policy routing.
ip policy route-map
To identify a route
map to use for policy routing on an interface, use the
ip policy route-map
command in interface configuration mode. Todisable policy routing on the
interface, use the
noform of this
command.
ippolicyroute-mapmap-tag
noippolicyroute-map
Syntax Description
map-tag
Name of
the route map to use for policy routing. The name must match a
map-tag value
specified by a
route-map
command.
Command Default
No policy routing
occurs on the interface.
Command Modes
Interface
configuration (config-if)
Command History
Release
Modification
11.0
This
command was introduced.
12.2(33)SRA
This
command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This
command is supported in the Cisco IOS Release 12.2SX train. Support in a
specific 12.2SX release of this train depends on your feature set, platform,
and platform hardware.
Cisco IOS
XE Release 2.2
This
command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines
You might enable
policy routing if you want your packets to take a route other than the obvious
shortest path.
The
ip policy
route-map command identifies a route map to use
for policy routing. Eachroute-mapcommand has a list of
match and
set commands
associated with it. The
match commands
specify the
matchc riteria--the
conditions under which policy routing is allowed for the interface, based on
the destination IP address of the packet. The
set commands
specify the
setactions--the
particular policy routing actions to perform if the criteria enforced by the
match commands
are met. The
no
ip
policy route-map command deletes the pointer to the
route map.
Policy routing
can be performed on any match criteria that can be defined in an extended IP
access list when using thematch
ip
addresscommand and referencing an extended IP access
list.
The policy route map needs to reconfigured in an interface in the
following scenarios:
When a policy route map is
applied to an interface with VRF configuration, the route map is removed and
this information is sent to the CEF.
When an interface is
configured with a policy route map and VRF, the route map is removed whenever
the VRF value changes.
Examples
The following
example sends packets with the destination IP address of 172.21.16.18 to a
router at IP address 172.30.3.20:
interface serial 0
ip policy route-map wethersfield
!
route-map wethersfield
match ip address 172.21.16.18
set ip next-hop 172.30.3.20
Related Commands
Command
Description
matchipaddress
Distributes any routes that have a destination network number address that is
permitted by a standard or extended access list, and performs policy routing on
packets.
matchlength
Bases
policy routing on the Level 3 length of a packet.
route-map(IP)
Defines
the conditions for redistributing routes from one routing protocol into
another, or enables policy routing.
setdefaultinterface
Indicates where to output packets that pass a match clause of a route map for
policy routing and have no explicit route to the destination.
setinterface
Indicates where to output packets that pass a match clause of route map for
policy routing.
setipdefaultnext-hop
Indicates where to output packets that pass a match clause of a route map for
policy routing and for which the Cisco IOS software has no explicit route to a
destination.
setipnext-hop
Indicates where to output packets that pass a match clause of a route map for
policy routing.
ip route
To establish static routes, use theiproute command in global configuration mode. Toremove static routes, use the
noform of this command.
(Optional) Specifies name of the VRF for which static routes are configured.
prefix
IP route prefix for the destination.
mask
Prefix mask for the destination.
ip-address
IP address of the next hop that can be used to reach that network.
interface-typeinterface-number
Network interface type and interface number.
dhcp
(Optional) Enables a Dynamic Host Configuration Protocol (DHCP) server to assign a static route to a default gateway (option 3).
Note
Specify the
dhcp keyword for each routing protocol.
global
(Optional) Specifies that the next hop address is global.
Note
This keyword is valid with the
vrfvrf-name keyword and argument combination only and must be configured before any other keyword.
multicast
(Optional) Specifies that the static route being configured is a multicast route.
distance
(Optional) Administrative distance. The range is 1 to 255. The default administrative distance for a static route is 1.
namenext-hop-name
(Optional) Applies a name to the next hop route.
permanent
(Optional) Specifies that the route will not be removed, even if the interface shuts down.
tracknumber
(Optional) Associates a track object with this route. Valid values for the
number argument range from 1 to 500.
tagtag
(Optional) Tag value that can be used as a “match” value for controlling redistribution via route maps.
Command Default
No static routes are established.
Command Modes
Global configuration (config)
Command History
Release
Modification
10.0
This command was introduced.
12.3(2)XE
The
track keyword and
number argument were added.
12.3(8)T
The
track keyword and
number argument were integrated into Cisco IOS Release 12.3(8)T. The
dhcp keyword was added.
12.3(9)
The changes made in Cisco IOS Release 12.3(8)T were added to Cisco IOS Release 12.3(9).
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH
This command was integrated into Cisco IOS Release 12.2(33)SXH.
12.4(1)T
This command was modified. The
dhcp keyword was removed and the
global keyword was added.
15.0(1)M
This command was modified. The
multicast keyword was added.
Usage Guidelines
The establishment of a static route is appropriate when the Cisco IOS software cannot dynamically build a route to the destination.
When you specify a DHCP server to assign a static route, the interface type and number and administrative distance may be configured also. In Cisco IOS Release 12.4(1)T and later releases, this keyword is removed.
For Cisco IOS Release 12.4(1)T and later releases, use the
global keyword with the
vrfvrf-name keyword and argument combination to specify that the next hop address is global.
If you specify an administrative distance, you are flagging a static route that can be overridden by dynamic information. For example, routes derived with Enhanced Interior Gateway Routing Protocol (EIGRP) have a default administrative distance of 100. To have a static route that would be overridden by an EIGRP dynamic route, specify an administrative distance greater than 100. Static routes have a default administrative distance of 1.
Static routes that point to an interface on a connected router will be advertised by way of Routing Information Protocol (RIP) and EIGRP regardless of whether
redistributestatic commands are specified for those routing protocols. This situation occurs because static routes that point to an interface are considered in the routing table to be connected and hence lose their static nature. Also, the target of the static route should be included in the
network(DHCP) command. If this condition is not met, no dynamic routing protocol will advertise the route unless a
redistributestaticcommand is specified for these protocols. With the following configuration:
RIP and EIGRP redistribute the route if the route is pointing to the Fast Ethernet interface:
ip route 172.16.188.252 255.255.255.252 FastEthernet 0/0
RIP and EIGRP do not redistribute the route with the followingiproutecommand because of the split horizon algorithm:
ip route 172.16.188.252 255.255.255.252 serial 2/1
EIGRP redistributes the route with both of the following commands:
ip route 172.16.188.252 255.255.255.252 FastEthernet 0/0
ip route 172.16.188.252 255.255.255.252 serial 2/1
With the Open Shortest Path First (OSPF) protocol, static routes that point to an interface are not advertised unless a
redistributestaticcommand is specified.
Adding a static route to an Ethernet or other broadcast interface (for example, ip route 0.0.0.0 0.0.0.0 Ethernet 1/2) will cause the route to be inserted into the routing table only when the interface is up. This configuration is not generally recommended. When the next hop of a static route points to an interface, the router considers each of the hosts within the range of the route to be directly connected through that interface, and therefore it will send Address Resolution Protocol (ARP) requests to any destination addresses that route through the static route.
A logical outgoing interface, for example, a tunnel, needs to be configured for a static route. If this outgoing interface is deleted from the configuration, the static route is removed from the configuration and hence does not show up in the routing table. To have the static route inserted into the routing table again, configure the outgoing interface once again and add the static route to this interface.
The practical implication of configuring the
iproute0.0.0.00.0.0.0ethernet1/2 command is that the router will consider all of the destinations that the router does not know how to reach through some other route as directly connected to Ethernet interface 1/2. So the router will send an ARP request for each host for which it receives packets on this network segment. This configuration can cause high processor utilization and a large ARP cache (along with memory allocation failures). Configuring a default route or other static route that directs the router to forward packets for a large range of destinations to a connected broadcast network segment can cause your router to reload.
Specifying a numerical next hop that is on a directly connected interface will prevent the router from using proxy ARP. However, if the interface with the next hop goes down and the numerical next hop can be reached through a recursive route, you may specify both the next hop and interface (for example, ip route 0.0.0.0 0.0.0.0 ethernet 1/2 10.1.2.3) with a static route to prevent routes from passing through an unintended interface.
Note
Configuring a default route that points to an interface, such as
iproute0.0.0.00.0.0.0ethernet1/2,displays a warning message. This command causes the router to consider all the destinations that the router cannot reach through an alternate route, as directly connected to Ethernet interface 1/2. Hence, the router sends an ARP request for each host for which it receives packets on this network segment. This configuration can cause high processor utilization and a large ARP cache (along with memory allocation failures). Configuring a default route or other static route that directs the router to forward packets for a large range of destinations to a connected broadcast network segment can cause the router to reload.
The
namenext-hop-name keyword and argument combination allows you to associate static routes with names in your running configuration. If you have several static routes, you can specify names that describe the purpose of each static route in order to more easily identify each one.
The
tracknumber keyword and argument combination specifies that the static route will be installed only if the state of the configured track object is up.
Recursive Static Routing
In a recursive static route, only the next hop is specified. The output interface is derived from the next hop.
For the following recursive static route example, all destinations with the IP address prefix address prefix 192.168.1.1/32 are reachable via the host with address 10.0.0.2:
ip route 192.168.1.1 255.255.255.255 10.0.0.2
A recursive static route is valid (that is, it is a candidate for insertion in the IPv4 routing table) only when the specified next hop resolves, either directly or indirectly, to a valid IPv4 output interface, provided the route does not self-recurse, and the recursion depth does not exceed the maximum IPv4 forwarding recursion depth.
The following example defines a valid recursive IPv4 static route:
interface serial 2/0
ip address 10.0.0.1 255.255.255.252
exit
ip route 192.168.1.1 255.255.255.255 10.0.0.2
The following example defines an invalid recursive IPv4 static route. This static route will not be inserted into the IPv4 routing table because it is self-recursive. The next hop of the static route, 192.168.1.0/30, resolves via the first static route 192.168.1.0/24, which is itself a recursive route (that is, it only specifies a next hop). The next hop of the first route, 192.168.1.0/24, resolves via the directly connected route via the serial interface 2/0. Therefore, the first static route would be used to resolve its own next hop.
interface serial 2/0
ip address 10.0.0.1 255.255.255.252
exit
ip route 192.168.1.0 255.255.255.0 10.0.0.2
ip route 192.168.1.0 255.255.255.252 192.168.1.100
It is not normally useful to manually configure a self-recursive static route, although it is not prohibited. However, a recursive static route that has been inserted in the IPv4 routing table may become self-recursive as a result of some transient change in the network learned through a dynamic routing protocol. If this situation occurs, the fact that the static route has become self-recursive will be detected and the static route will be removed from the IPv4 routing table, although not from the configuration. A subsequent network change may cause the static route to no longer be self-recursive, in which case it will be re-inserted in the IPv4 routing table.
Note
IPv4 recursive static routes are checked at one-minute intervals. Therefore, a recursive static route may take up to a minute to be inserted into the routing table once its next hop becomes valid. Likewise, it may take a minute or so for the route to disappear from the table if its next hop becomes invalid.
Examples
The following example shows how to choose an administrative distance of 110. In this case, packets for network 10.0.0.0 will be routed to a router at 172.31.3.4 if dynamic information with an administrative distance less than 110 is not available.
ip route 10.0.0.0 255.0.0.0 172.31.3.4 110
Note
Specifying the next hop without specifying an interface when configuring a static route can cause traffic to pass through an unintended interface if the default interface goes down.
The following example shows how to route packets for network 172.31.0.0 to a router at 172.31.6.6:
ip route 172.31.0.0 255.255.0.0 172.31.6.6
The following example shows how to route packets for network 192.168.1.0 directly to the next hop at 10.1.2.3. If the interface goes down, this route is removed from the routing table and will not be restored unless the interface comes back up.
ip route 192.168.1.0 255.255.255.0 Ethernet 0 10.1.2.3
The following example shows how to install the static route only if the state of track object 123 is up:
ip route 0.0.0.0 0.0.0.0 Ethernet 0/1 10.1.1.242 track 123
The following example shows that using the
dhcp keyword in a configuration of Ethernet interfaces 1 and 2 enables the interfaces to obtain the next-hop router IP addresses dynamically from a DHCP server:
ip route 10.165.200.225 255.255.255.255 ethernet1 dhcp
ip route 10.165.200.226 255.255.255.255 ethernet2 dhcp 20
The following example shows that using the
namenext-hop-name keyword and argument combination for each static route in the configuration helps you remember the purpose for each static route.
ip route 172.0.0.0 255.0.0.0 10.0.0.1 name Seattle2Detroit
The name for the static route will be displayed when the
showrunning-configuration command is entered:
Router# show running-config
| include ip route
ip route 172.0.0.0 255.0.0.0 10.0.0.1 name Seattle2Detroit
Related Commands
Command
Description
network(DHCP)
Configures the subnet number and mask for a DHCP address pool on a Cisco IOS DHCP server.
redistribute(IP)
Redistributes routes from one routing domain into another routing domain.
ip route profile
To enable IP routing table statistics collection, use the iprouteprofile command in global configuration mode. To disable collection of routing table statistics, use the no form of the command.
iprouteprofilecommandprouteprofile
noiprouteprofile
Syntax Description
This command has no arguments or keywords.
Command Default
The time interval for each sample, or sampling interval, is a fixed value and is set at 5 seconds.
Command Modes
Global configuration
Command History
Release
Modification
12.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The iprouteprofile command helps you to monitor routing table fluctuations that can occur as the result of route flapping, network failure, or network restoration.
This command identifies route flapping over brief time intervals. The time interval for each sample, or sampling interval, is a fixed value and is set at 5 seconds.
Two sets of statistics are collected. The per-interval statistics are collected over a sampling interval, while the routing table change statistics are the result of aggregating the per-interval statistics. The per-interval statistics are collected as a single set of counters, with one counter tracking one event. All counters are initialized at the beginning of each sampling interval; counters are incremented as corresponding events occur anywhere in the routing table.
At the end of a sampling interval, the per-interval statistics for that sampling interval are integrated with the routing table change statistics collected from the previous sampling intervals. The counters holding the per-interval statistics are reset and the process is repeated.
Routing table statistics are collected for the following events:
Forward-Path Change. This statistic is the number of changes in the forwarding path, which is the accumulation of prefix-add, next-hop change, and pathcount change statistics.
Prefix-Add. A new prefix was added to the routing table.
Next-Hop Change. A prefix is not added or removed, but the next hop changes. This statistic is only seen with recursive routes that are installed in the routing table.
Pathcount Change. The number of paths in the routing table has changed. This statistic is the result of an increase in the number of paths for an Interior Gateway Protocol (IGP) prefix in the routing table.
Prefix Refresh. Standard routing table maintenance; the forwarding behavior is not changed.
Use the showiprouteprofile command to display the routing table change statistics.
Examples
The following example enables the collection of routing table statistics:
ip route profile
Related Commands
Command
Description
showiprouteprofile
Displays routing table change statistics.
ip route static adjust-time
To ch
ange the time interval for IP static route adjustments during convergence, use the iproutestaticadjust-timecommand in global configuration mode. To reinstate the default adjustment time of 60 seconds, use the no form of this command.
iproutestaticadjust-timeseconds
noiproutestaticadjust-timeseconds
Syntax Description
seconds
Time of delay, in seconds, for convergence time during which the background process that monitors next-hop reachability is performed. The delay in convergence occurs when the route that covers the next hop is removed. The range is from 1 to 60. The default is 60.
Command Default
seconds: 60
Command Modes
Global configuration
Command History
Release
Modification
12.0(29)S
This command was introduced.
12.3(10)
This command was integrated into Cisco IOS Release 12.3(10).
12.3(11)T
This command was integrated into Cisco IOS Release 12.3(11)T.
Usage Guidelines
By default, static route adjustments are made every 60 seconds. To adjust the timer to any interval from 1 to 60 seconds, enter the ip route static adjust-time command.
The benefit of reducing the timer from the 60-second default value is to increase the convergence when static routes are used. However, reducing the interval can be CPU intensive if the value is set very low and a large number of static routes are configured.
Examples
In the following example, the adjustment time for static routes has been changed from the default 60 seconds to 30 seconds:
Router(config)# ip route static adjust-time 30
To remove the 30-second adjusted time interval and reinstate the default 60-second value, enter the norouteipstaticadjust-time command:
Router(config)# no ip route static adjust-time 30
Related Commands
Command
Description
showiproute
Displays the current state of the routing table.
ip route static bfd
To specify static route bidirectional forwarding detection (BFD) neighbors, use the
iproutestaticbfd command in global configuration mode. To remove a static route BFD neighbor, use the
no form of this command.
(Optional) Assigns a BFD group. The group-name is a character string of up to 32 characters specifying the BFD group name.
unassociate
(Optional) Unassociates the static route configured for a BFD.
Command Default
No static route BFD neighbors are specified.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(33)SRC
This command was introduced.
15.1(2)S
This command was integrated into Cisco IOS Release 15.1(2)S.
This command was modified. The
groupgroup-name keyword and argument pair and the
passive keyword were added.
15.1(1)SG
This command was integrated into Cisco IOS Release 15.1(1)SG.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
15.1(2)SNG
This command was implemented on the Cisco ASR 901 Series.
Cisco IOS XE Release 3.8S
This command was integrated into a release prior to Cisco IOS XE Release 3.8S.
15.3(2)S
This command was modified. The unassociate keyword was added.
Usage Guidelines
Use the iproutestaticbfd command to specify static route BFD neighbors. All static routes that have the same interface and gateway specified in the configuration share the same BFD session for reachability notification.
All static routes that specify the same values for the
interface-type,
interface-number, and
ip-address arguments will automatically use BFD to determine gateway reachability and take advantage of fast failure detection.
The
interface-type, interface-number, and
ip-address arguments are required because BFD supports only directly connected neighbors for the Cisco IOS 12.2(33)SRC,15.1(2)S and 15.1(2)SNG releases.
If the interface-type, interface-number, and
ip-address arguments are used to configure a BFD session, it is a single hop BFD configuration. If vrf, multihop-destination-address or multihop-source-address arguments are used to configure a BFD session, it is a multihop BFD configuration.
The
group keyword assigns a BFD group. The static BFD configuration is added to the VPN routing and forwarding (VRF) instance with which the interface is associated. The
passive keyword specifies the passive member of the group. Adding static BFD in a group without the
passive keyword makes the BFD an active member of the group. A static route should be tracked by the active BFD configuration in order to trigger a BFD session for the group. To remove all the static BFD configurations (active and passive) of a specific group, use the
noiproutestaticbfd command and specify the BFD group name.
The unassociate keyword specifies that a BFD neighbor is not associated with static route, and the BFD sessions are requested if an interface has been configured with BFD. This is useful in bringing up a BFDv4 session in the absence of an IPv4 static route. If the unassociate keyword is not provided, then the IPv4 static routes are associated with BFD sessions.
BFD requires that BFD sessions are initiated on both endpoint devices. Therefore, this command must be configured on each endpoint device.
The BFD static session on a switch virtual interface (SVI) is established only after the bfd intervalmillisecondsmin_rxmillisecondsmultipliermultiplier-value command is disabled and enabled on that SVI.
To enable the static BFD sessions, perform the following steps:
Enable BFD timers on the SVI.
bfd intervalmillisecondsmin_rxmillisecondsmultipliermultiplier-value
Enable BFD for the static IP route
ip route static bfdinterface-typeinterface-numberip-address
Disable and enable the BFD timers on the SVI again.
no bfd intervalmillisecondsmin_rxmillisecondsmultipliermultiplier-valuebfd intervalmillisecondsmin_rxmillisecondsmultipliermultiplier-value
Examples
The following example shows how to configure BFD for all static routes through a specified neighbor, group, and active member of the group:
Device# configure terminal
Device(config)# ip route static bfd GigabitEthernet 1/1 10.1.1.1 group group1
The following example shows how to configure BFD for all static routes through a specified neighbor, group, and passive member of the group:
Device# configure terminal
Device(config)# ip route static bfd GigabitEthernet 1/2 10.2.2.2 group group1 passive
The following example shows how to configure BFD for all static routes in an unassociated mode without the group and passive keywords:
Specifies the baseline BFD session parameters on an interface.
debugiproutingstaticbfd
Enables debugging output on IP static BFD neighbor events.
showipstaticroutebfd
Displays IPv4 static BFD configuration information from specific configured BFD groups and non-group entries.
ip route static install-routes-recurse-via-nexthop
To enable the installation of recursive static routes into the Routing Information Base (RIB), use the ip route static install-routes-recurse-via-nexthop command in global configuration mode. To remove this configuration, use the no form of this command.
ip route static install-routes-recurse-via-nexthop [ all | [ multicast ]
[ route-mapmap-name ]
[ topologytopology-name ]
[ vrfvrf-name ] ]
no ip route static install-routes-recurse-via-nexthop
[ all | [ multicast ]
[ route-mapmap-name ]
[ topologytopology-name ] [ vrfvrf-name ] ]
Syntax Description
all
(Optional) Installs all recursive static routes into the RIB.
multicast
(Optional) Installs recursive static routes into multicast topologies.
route-mapmap-name
(Optional) Installs recursive static routes defined by the specified route map into the RIB.
topologytopology-name
(Optional) Installs recursive static routes into the specified topology.
vrfvrf-name
(Optional) Installs recursive static routes into the specified virtual routing and forwarding (VRF) instance.
Command Default
No recursive static routes are installed in the RIB.
Command Modes
Global configuration (config)
Command History
Release
Modification
15.3(2)S
This command was introduced.
Cisco IOS XE Release 3.9S
This command was integrated into Cisco IOS XE Release 3.9S.
15.3(3)M
This command was integrated into Cisco IOS Release 15.3(3)M.
Usage Guidelines
Use the ip route static install-routes-recurse-via-nexthop command to install recursive static routes into the RIB. You can install recursive static routes in selected VRFs or topologies. You can use the route-map keyword to specify a route map for a specific VRF. The multicast keyword enables you to install recursive static routes in multicast topologies. If this command is used without any of the optional keywords, recursive static routes will be enabled only for the global VRF or topology. The ip route static install-routes-recurse-via-nexthop command is disabled by default.
Examples
The following example shows how to install recursive static routes into the RIB of a specific virtual routing and forwarding instance. This example is based on the assumption that a 10.0.0.0/8 route is already installed statically or dynamically in the RIB of vrf1.
Specifies an address family type for a VRF instance.
ip route
Configures static routes to a network.
rd(IP)
Specifies a route distinguisher for a VRF instance.
vrf definition
Configures a VRF instance.
ip routing
To enable
IP routing, use theiprouting command in global configuration mode. To disable IP routing, use the noform of this command.
iprouting
noiprouting
Syntax Description
This command has no arguments or keywords.
Command Default
IP routing is enabled.
Command Modes
Global configuration (config)
Command History
Release
Modification
10.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
To bridge IP, the noiprouting command must be configured to disable IP routing. However, you need not specify noiprouting in conjunction with concurrent routing and bridging to bridge IP.
The ip routing command is disabled on the Cisco VG200 voice over IP gateway.
Disabling IP routing is not allowed if you are running Cisco IOS Release 12.2SX on a Catalyst 6000 platform. The workaround is to not assign an IP address to the SVI.
Examples
The following example enables IP routing:
Router# configure terminal
Router(config
)
# ip routing
ip routing protocol purge interface
To purge the routes of the routing protocols when an interface goes down, use the iproutingprotocolpurgeinterface command in global configuration mode. To disable the purging of the routes, use the no form of this command.
iproutingprotocolpurgeinterface
noiproutingprotocolpurgeinterface
Syntax Description
This command has no arguments or keywords.
Command Default
Routing protocols purge the routes by default when an interface goes down.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.0(26)S
This command was introduced.
12.0(27)SV
This command was integrated into Cisco IOS Release 12.0(27)SV.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.2(25)S
This command was integrated into Cisco IOS Release 12.2(25)S.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
15.1(2)S
This command was modified. The command behavior was enabled by default.
Usage Guidelines
The iproutingprotocolpurgeinterface command allows the Routing Information Base (RIB) to ignore interface events for protocols that can respond to interface failures, thus eliminating any unnecessary deletion by the RIB. This in turn results in a single modify event to the Cisco Express Forwarding plane.
If the noiproutingprotocolpurgeinterface command is executed and a link goes down, the RIB process is automatically triggered to delete all prefixes that have the next hop on this interface from the RIB. The protocols on all the routers are notified, and if there is a secondary path, the protocols will update the RIB with the new path. When the process works through a large routing table, the process can consume many CPU cycles and increase the convergence time.
Examples
The following example shows how to disable the purge interface function for a routing protocol:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# no ip routing protocol purge interface
Router(config)# end
ipv6 local policy route-map
To enable local policy-based routing (PBR) for IPv6 packets, use the
ipv6localpolicyroute-map command in global configuration mode. To disable local policy-based routing for IPv6 packets, use the
no form of this command.
ipv6localpolicyroute-maproute-map-name
noipv6localpolicyroute-maproute-map-name
Syntax Description
route-map-name
Name of the route map to be used for local IPv6 PBR. The name must match a
route-map-name value specified by the
route-map command.
Command Default
IPv6 packets are not policy routed.
Command Modes
Global configuration (config#)
Command History
Release
Modification
12.3(7)T
This command was introduced.
12.2(30)S
This command was integrated into Cisco IOS Release 12.2(30)S.
12.2(33)SXI4
This command was integrated into Cisco IOS Release 12.2(33)SXI4.
Cisco IOS XE Release 3.2S
This command was integrated into Cisco IOS XE Release 3.2S.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
Usage Guidelines
Packets originating from a router are not normally policy routed. However, you can use the
ipv6localpolicyroute-map command to policy route such packets. You might enable local PBR if you want packets originated at the router to take a route other than the obvious shortest path.
Theipv6localpolicyroute-map command identifies a route map to be used for local PBR. The
route-map commands each have a list of
match and
set commands associated with them. The
match commands specify the match criteria, which are the conditions under which packets should be policy routed. The
set commands specify set actions, which are particular policy routing actions to be performed if the criteria enforced by the
match commands are met. The
noipv6localpolicyroute-map command deletes the reference to the route map and disables local policy routing.
Examples
In the following example, packets with a destination IPv6 address matching that allowed by access list pbr-src-90 are sent to the router at IPv6 address 2001:DB8::1:
ipv6 access-list src-90
permit ipv6 host 2001::90 2001:1000::/64
route-map pbr-src-90 permit 10
match ipv6 address src-90
set ipv6 next-hop 2001:DB8::1
ipv6 local policy route-map pbr-src-90
Related Commands
Command
Description
ipv6policyroute-map
Configures IPv6 PBR on an interface.
matchipv6address
Specifies an IPv6 access list to be used to match packets for PBR for IPv6.
matchlength
Bases policy routing on the Level 3 length of a packet.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing.
setdefaultinterface
Specifies the default interface to output packets that pass a match clause of a route map for policy routing and have no explicit route to the destination.
setinterface
Specifies the default interface to output packets that pass a match clause of a route map for policy routing.
setipv6defaultnext-hop
Specifies an IPv6 default next hop to which matching packets will be forwarded.
setipv6next-hop(PBR)
Indicates where to output IPv6 packets that pass a match clause of a route map for policy routing.
setipv6precedence
Sets the precedence value in the IPv6 packet header.
ipv6 policy route-map
To configure IPv6 policy-based routing (PBR) on an interface, use the
ipv6policyroute-map command in interface configuration mode. To disable IPv6 PBR on an interface, use the
no form of this command.
ipv6policyroute-maproute-map-name
noipv6policyroute-maproute-map-name
Syntax Description
route-map-name
Name of the route map to be used for PBR. The name must match the
map-tag value specified by a
route-map command.
Command Default
Policy-based routing does not occur on the interface.
Command Modes
Interface configuration (config-if)
Command History
Release
Modification
12.3(7)T
This command was introduced.
12.2(30)S
This command was integrated into Cisco IOS Release 12.2(30)S.
12.2(33)SXI4
This command was integrated into Cisco IOS Release 12.2(33)SXI4.
Cisco IOS XE Release 3.2S
This command was integrated into Cisco IOS XE Release 3.2S.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
Usage Guidelines
You can enable PBR if you want your packets to take a route other than the obvious shortest path.
The
ipv6policyroute-map command identifies a route map to be used for policy-based routing. The
route-map commands each have a list of
match and
set commands associated with them. The
match commands specify the match criteria, which are the conditions under which PBR is allowed for the interface. The
set commands specify set actions, which are the PBR actions to be performed if the criteria enforced by the
match commands are met. The
noipv6policyroute-map command deletes the pointer to the route map.
Policy-based routing can be performed on any match criteria that can be defined in an IPv6 access list.
Examples
In the following example, a route map named pbr-dest-1 is created and configured, specifying the packet match criteria and the desired policy-route action. Then, PBR is enabled on the interface Ethernet0/0.
ipv6 access-list match-dest-1
permit ipv6 any 2001:DB8::1
route-map pbr-dest-1 permit 10
match ipv6 address match-dest-1
set interface Ethernet0/0
interface Ethernet0/0
ipv6 policy-route-map pbr-dest-1
Related Commands
Command
Description
ipv6localpolicyroute-map
Identifies the route map to be used for local IPv6 PBR.
matchipv6address
Specifies an IPv6 access list to be used to match IPv6 packets for PBR.
matchlength
Bases policy routing on the Level 3 length of a packet.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing.
setdefaultinterface
Specifies the default interface to output packets that pass a match clause of a route map for policy routing and have no explicit route to the destination.
setinterface
Specifies the default interface to output packets that pass a match clause of a route map for policy routing.
setipv6defaultnext-hop
Specifies an IPv6 default next hop to which matching packets will be forwarded.
setipv6next-hop
Specifies the default interface to output IPv6 packets that pass a match clause of a route map for policy routing.
setipv6precedence
Sets the precedence value in the IPv6 packet header.
ipv6 route static bfd
To specify static route Bidirectional Forwarding Detection for IPv6 (BFDv6) neighbors, use the
ipv6routestaticbfd command in global configuration mode. To remove a static route BFDv6 neighbor, use the
no form of this command.
(Optional) Name of the virtual routing and forwarding (VRF) instance by which static routes should be specified.
interface-typeinterface-number
Interface type and number.
ipv6-address
IPv6 address of the neighbor.
unassociated
(Optional) Moves a static BFD neighbor from associated mode to unassociated mode.
Command Default
No static route BFDv6 neighbors are specified.
Command Modes
Global configuration (config)
Command History
Release
Modification
Cisco IOS XE Release 2.1
This command was introduced.
15.1(2)T
This command was integrated into Cisco IOS Release 15.1(2)T.
15.1(1)SG
This command was integrated into Cisco IOS Release 15.1(1)SG.
15.1(1)SY
This command was modified. Support for IPv6 was added to Cisco IOS Release 15.1(1)SY.
15.2(2)SNG
This command was implemented on the Cisco ASR 901 Series Aggregation Services Routers.
Usage Guidelines
Use the
ipv6routestaticbfd command to specify static route neighbors. All of the static routes that have the same interface and gateway specified in the configuration share the same BFDv6 session for reachability notification. BFDv6 requires that BFDv6 sessions are initiated on both endpoint routers. Therefore, this command must be configured on each endpoint router. An IPv6 static BFDv6 neighbor must be fully specified (with the interface and the neighbor address) and must be directly attached.
All static routes that specify the same values for
vrf vrf-name,
interface-type interface-number , and
ipv6-address will automatically use BFDv6 to determine gateway reachability and take advantage of fast failure detection.
Examples
The following example creates a neighbor on Ethernet interface 0/0 with an address of 2001::1:
Displays the current contents of the IPv6 routing table.
ipv6 route static resolve default
To allow a recursive IPv6 static route to resolve using the default IPv6 static route, use the ipv6routestaticresolvedefaultcommand in global configuration mode. To remove this function, use the no form of this command.
ipv6routestaticresolvedefault
noipv6routestaticresolvedefault
Syntax Description
This command has no arguments or keywords.
Command Default
Recursive IPv6 static routes do not resolve via the default route.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(33)XNE
This command was introduced.
Usage Guidelines
By default, a recursive IPv6 static route will not resolve using the default route (::/0). The ipv6routestaticresolvedefault command restores legacy behavior and allows resolution using the default route.
Examples
The following example enables an IPv6 recursive static route to be resolved using a IPv6 static default route:
Router(config)# ipv6 route static resolve default
key
To identify an
authentication key on a key chain, use the key command in key-chain configuration mode. To remove the key from the key chain, use the no form of this command.
keycommandkeykey-id
nokeykey-id
Syntax Description
key-id
Identification number of an authentication key on a key chain. The range of keys is from 0 to 2147483647. The key identification numbers need not be consecutive.
Command Default
No key exists on the key chain.
Command Modes
Key-chain configuration (config-keychain)
Command History
Release
Modification
11.1
This command was introduced.
12.4(6)T
Support for IPv6 was added.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Only DRP Agent, Enhanced Interior Gateway Routing Protocol (EIGRP), and
Routing Information Protocol (RIP) Version 2 use key chains.
It is useful to have multiple keys on a key chain so that the software can sequence through the keys as they become invalid after time, based on the accept-lifetime and send-lifetime key chain key command settings.
Each key has its own key identifier, which is stored locally. The combination of the key identifier and the interface associated with the message uniquely identifies the authentication algorithm and Message Digest 5 (MD5) authentication key in use. Only one authentication packet is sent, regardless of the number of valid keys. The software starts looking at the lowest key identifier number and uses the first valid key.
If the last key expires, authentication will continue and an error message will be generated. To disable authentication, you must manually delete the last valid key.
To remove all keys, remove the key chain by using the nokeychain command.
Examples
The following example configures a key chain named chain1. The key named key1 will be accepted from 1:30 p.m. to 3:30 p.m. and be sent from 2:00 p.m. to 3:00 p.m. The key named key2 will be accepted from 2:30 p.m. to 4:30 p.m. and be sent from 3:00 p.m. to 4:00 p.m. The overlap allows for migration of keys or a discrepancy in the set time of the router. There is a 30-minute leeway on each side to handle time differences.
The following named configuration example configures a key chain named chain1 for EIGRP address-family. The key named key1 will be accepted from 1:30 p.m. to 3:30 p.m. and be sent from 2:00 p.m. to 3:00 p.m. The key named key2 will be accepted from 2:30 p.m. to 4:30 p.m. and be sent from 3:00 p.m. to 4:00 p.m. The overlap allows for migration of keys or a discrepancy in the set time of the router. There is a 30-minute leeway on each side to handle time differences.
The following named configuration example configures a key chain named chain1 for EIGRP service-family. The key named key1 will be accepted from 1:30 p.m. to 3:30 p.m. and be sent from 2:00 p.m. to 3:00 p.m. The key named key2 will be accepted from 2:30 p.m. to 4:30 p.m. and be sent from 3:00 p.m. to 4:00 p.m. The overlap allows for migration of keys or a discrepancy in the set time of the router. There is a 30-minute leeway on each side to handle time differences.
Sets the time period during which the authentication key on a key chain is received as valid.
ipauthenticationkey-chaineigrp
Enables authentication of EIGRP packets.
keychain
Defines an authentication key chain needed to enable authentication for routing protocols.
key-string(authentication)
Specifies the authentication string for a key.
send-lifetime
Sets the time period during which an authentication key on a key chain is valid to be sent.
showkeychain
Displays authentication key information.
key chain
To define an authentication key chain needed to enable
authentication for
routing protocols and enter key-chain configuration mode, use the keychain command in global configuration mode. To remove the key chain, use the no form of this command.
keychaincommandkeychainname-of-chain
nokeychainname-of-chain
Syntax Description
name-of-chain
Name of a key chain. A key chain must have at least one key and can have up to 2147483647 keys.
Command Default
No key chain exists.
Command Modes
Global configuration (config)
Command History
Release
Modification
11.1
This command was introduced.
12.4(6)T
Support for IPv6 was added.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Only DRP Agent, Enhanced Interior Gateway Routing Protocol (EIGRP), and
Routing Information Protocol (RIP) Version 2 use key chains.
You must configure a key chain with keys to enable authentication.
Although you can identify multiple key chains, we recommend using one key chain per interface per routing protocol. Upon specifying the keychain command, you enter key chain configuration mode.
Examples
The following example configures a key chain named chain1. The key named key1 will be accepted from 1:30 p.m. to 3:30 p.m. and be sent from 2:00 p.m. to 3:00 p.m. The key named key2 will be accepted from 2:30 p.m. to 4:30 p.m. and be sent from 3:00 p.m. to 4:00 p.m. The overlap allows for migration of keys or a discrepancy in the set time of the router. There is a 30-minute leeway on each side to handle time differences.
The following named configuration example configures a key chain named chain1 for EIGRP address-family. The key named key1 will be accepted from 1:30 p.m. to 3:30 p.m. and be sent from 2:00 p.m. to 3:00 p.m. The key named key2 will be accepted from 2:30 p.m. to 4:30 p.m. and be sent from 3:00 p.m. to 4:00 p.m. The overlap allows for migration of keys or a discrepancy in the set time of the router. There is a 30-minute leeway on each side to handle time differences.
The following named configuration example configures a key chain named trees for service-family. The key named chestnut will be accepted from 1:30 pm to 3:30 pm and be sent from 2:00 pm to 3:00 pm. The key birch will be accepted from 2:30 pm to 4:30 pm and be sent from 3:00 pm to 4:00 pm. The overlap allows for migration of keys or a discrepancy in the set time of the router. There is a 30-minute leeway on each side to handle time differences.
Sets the time period during which the authentication key on a key chain is received as valid.
ipripauthenticationkey-chain
Enables authentication for RIP Version 2 packets and specifies the set of keys that can be used on an interface.
ipauthenticationkey-chaineigrp
Enables authentication of EIGRP packets.
key
Identifies an authentication key on a key chain.
key-string(authentication)
Specifies the authentication string for a key.
send-lifetime
Sets the time period during which an authentication key on a key chain is valid to be sent.
showkeychain
Displays authentication key information.
key-string (authentication)
To specify the authentication string for a key, use the
key-string(authentication) command in key chain key configuration mode. To remove the authentication string, use the
no form of this command.
key-stringcommandkey-stringtext
nokey-stringtext
Syntax Description
text
Authentication string that must be sent and received in the packets using the routing protocol being authenticated. The string can contain from 1 to 80 uppercase and lowercase alphanumeric characters.
Command Default
No authentication string for a key exists.
Command Modes
Key chain key configuration (config-keychain-key)
Command History
Release
Modification
11.1
This command was introduced.
12.4(6)T
Support for IPv6 was added.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Only DRP Agent, Enhanced Interior Gateway Routing Protocol (EIGRP), and Routing Information Protocol ( RIP) Version 2 use key chains. Each key can have only one key string.
If password encryption is configured (with the
servicepassword-encryptioncommand), the software saves the key string as encrypted text. When you write to the terminal with the
moresystem:running-config command, the software displays key-string 7 encrypted text.
Examples
The following example configures a key chain named chain1. The key named key1 will be accepted from 1:30 p.m. to 3:30 p.m. and be sent from 2:00 p.m. to 3:00 p.m. The key named key2 will be accepted from 2:30 p.m. to 4:30 p.m. and be sent from 3:00 p.m. to 4:00 p.m. The overlap allows for migration of keys or a discrepancy in the set time of the router. There is a 30-minute leeway on each side to handle time differences.
The following example configures a key chain named chain1 for EIGRP address-family. The key named key1 will be accepted from 1:30 p.m. to 3:30 p.m. and be sent from 2:00 p.m. to 3:00 p.m. The key named key2 will be accepted from 2:30 p.m. to 4:30 p.m. and be sent from 3:00 p.m. to 4:00 p.m. The overlap allows for migration of keys or a discrepancy in the set time of the router. There is a 30-minute leeway on each side to handle time differences.
Sets the time period during which the authentication key on a key chain is received as valid.
ipauthenticationkey-chaineigrp
Enables authentication of EIGRP packets.
key
Identifies an authentication key on a key chain.
keychain
Defines an authentication key-chain needed to enable authentication for routing protocols.
send-lifetime
Sets the time period during which an authentication key on a key chain is valid to be sent.
servicepassword-encryption
Encrypts passwords.
showkeychain
Displays authentication key information.
match interface (IP)
To distribute any routes that have their next hop out one of the interfaces specified, use the
matchinterface command in route-map configuration mode. To remove the
matchinterface entry, use the
no form of this command.
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
15.1(2)S
This command was integrated into Cisco IOS Release 15.1(2)S.
Usage Guidelines
An ellipsis (...) in the command syntax indicates that your command input can include multiple values for the
interface-typeinterface-number arguments .
Use the
route-map global configuration command, and the
match and
set route-map configuration commands, to define the conditions for redistributing routes from one routing protocol into another. Each
route-map command has a list of
match and
set commands associated with it. The
match commands specify the
matchcriteria--the conditions under which redistribution is allowed for the current
route-map command. The
set commands specify the
setactions--the particular redistribution actions to perform if the criteria enforced by the
match commands are met. The
noroute-map command deletes the route map.
The
match route-map configuration command has multiple formats. The
match commands may be given in any order, and all
match commands must “pass” to cause the route to be redistributed according to the
setactionsgiven with the
set commands. The
no forms of the
match commands remove the specified match criteria.
A route map can have several parts. Any route that does not match at least one
match clause relating to a
route-map command will be ignored; that is, the route will not be advertised for outbound route maps and will not be accepted for inbound route maps. If you want to modify only some data, you must configure a second route map section with an explicit match specified.
Examples
In the following example, routes that have their next hop out Ethernet interface 0 will be distributed:
route-map name
match interface ethernet 0
Related Commands
Command
Description
matchas-path
Matches a BGP autonomous system path access list.
matchcommunity
Matches a BGP community.
matchipaddress
Distributes any routes that have a destination network number address that is permitted by a standard or extended access list, and performs policy routing on packets.
matchipnext-hop
Redistributes any routes that have a next hop router address passed by one of the access lists specified.
matchiproute-source
Redistributes routes that have been advertised by routers and access servers at the address specified by the access lists.
matchmetric(IP)
Redistributes routes with the metric specified.
matchroute-type(IP)
Redistributes routes of the specified type.
matchtag
Redistributes routes in the routing table that match the specified tags.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing.
setas-path
Modifies an autonomous system path for BGP routes.
setautomatic-tag
Automatically computes the tag value.
setcommunity
Sets the BGP communities attribute.
setlevel(IP)
Indicates where to import routes.
setlocal-preference
Specifies a preference value for the autonomous system path.
setmetric(BGP,OSPF,RIP)
Sets the metric value for a routing protocol.
setmetric-type
Sets the metric type for the destination routing protocol.
setnext-hop
Specifies the address of the next hop.
settag(IP)
Sets a tag value of the destination routing protocol.
setweight
Specifies the BGP weight for the routing table.
match ip address
To distribute any routes that have a destination network number address that is permitted by a standard access list, an extended access list, or a prefix list, or to perform policy routing on packets, use the
matchipaddress command in route-map configuration mode. To remove the
matchipaddress entry, use the
no form of this command.
Number of a standard or extended access list. It can be an integer from 1 to 199. The ellipsis indicates that multiple values can be entered.
access-list-name...
Name of a standard or extended access list. It can be an integer from 1 to 199. The ellipsis indicates that multiple values can be entered.
prefix-list
Distributes routes based on a prefix list.
prefix-list-name...
Name of a specific prefix list. The ellipsis indicates that multiple values can be entered.
Command Default
No access list numbers or prefix lists are specified.
Command Modes
Route-map configuration (config-route-map)
Command History
Release
Modification
10.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
15.1(2)S
This command was integrated into Cisco IOS Release 15.1(2)S.
Usage Guidelines
An ellipsis (...) in the command syntax indicates that your command input can include multiple values for the
access-list-number,access-list-name,orprefix-list-namearguments .
Like matches in the same route map subblock are filtered with “or” semantics. If any one match clause is matched in the entire route map subblock, this match is treated as a successful match. Dissimilar match clauses are filtered with “and” semantics. So dissimilar matches are filtered logically. If the first set of conditions is not met, the second match clause is filtered. This process continues until a match occurs or there are no more match clauses.
Use route maps to redistribute routes or to subject packets to policy routing. Both purposes are described in this section.
Redistribution
Use the
route-map global configuration command, and the
match and
set route-map configuration commands, to define the conditions for redistributing routes from one routing protocol into another. Each
route-map command has a list of
match and
set commands associated with it. The
match commands specify the
matchcriteria--the conditions under which redistribution is allowed for the current
route-mapcommand. Theset commands specify the
setactions--the particular redistribution actions to perform if the criteria enforced by the
match commands are met. The
noroute-map command deletes the route map.
The
match route-map configuration command has multiple formats. The
match commands can be given in any order, and all
match commands must “pass” to cause the route to be redistributed according to the
setactionsgiven with the
set commands. The
no forms of the
match commands remove the specified match criteria.
When you are passing routes through a route map, a route map can have several sections that contain specific
match clauses. Any route that does not match at least one
match clause relating to a
route-map command will be ignored; that is, the route will not be advertised for outbound route maps and will not be accepted for inbound route maps. If you want to modify only some data, you must configure a second route map section with an explicit match specified.
Policy Routing
Another purpose of route maps is to enable policy routing. The match ip address command allows you to policy route packets based on criteria that can be matched with an extended access list; for example, a protocol, protocol service, and source or destination IP address. To define the conditions for policy routing packets, use the
ippolicyroute-map interface configuration command, in addition to the
route-map global configuration command, and the
match and
set route-map configuration commands. Each
route-map command has a list of
match and
set commands associated with it. The
match commands specify the
matchcriteria--the conditions under which policy routing occurs. The
set commands specify the
setactions--the particular routing actions to perform if the criteria enforced by the
matchcommands are met. You might want to policy route packets based on their source, for example, using an access list.
Examples
In the following example, routes that have addresses specified by access list numbers 5 or 80 will be matched:
Router(config)# route-map name
Router(config-route-map)# match ip address 5 80
Route maps that use prefix lists can be used for route filtering, default origination, and redistribution in other routing protocols. In the following example, a default route 0.0.0.0/0 is conditionally originated when there exists a prefix 10.1.1.0/24 in the routing table:
Router(config)# ip prefix-list cond permit 10.1.1.0/24
!
Router(config)# route-map default-condition permit 10
Router(config-route-map)# match ip address prefix-list cond
!
Router(config)# router rip
Router(config-router)# default-information originate route-map default-condition
In the following policy routing example, packets that have addresses specified by access list numbers 6 or 25 will be routed to Ethernet interface 0:
Router(config)# interface serial 0
Router(config-if)# ip policy route-map chicago
!
Router(config)# route-map chicago
Router(config-route-map)# match ip address 6 25
Router(config-route-map)# set interface ethernet 0
Related Commands
Command
Description
iplocalpolicyroute-map
Identifies a route map to use for policy routing on an interface.
ippolicyroute-map
Identifies a route map to use for policy routing on an interface.
matchas-path
Matches a BGP autonomous system path access list.
matchcommunity
Matches a BGP community.
matchinterface(IP)
Distributes any routes that have their next hop out one of the interfaces specified.
matchipnext-hop
Redistributes any routes that have a next hop router address passed by one of the access lists specified.
matchiproute-source
Redistributes routes that have been advertised by routers and access servers at the address specified by the access lists.
matchlength
Bases policy routing on the Level 3 length of a packet.
matchmetric(IP)
Redistributes routes with the metric specified.
matchroute-type(IP)
Redistributes routes of the specified type.
matchtag
Redistributes routes in the routing table that match the specified tags.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing.
setas-path
Modifies an autonomous system path for BGP routes.
setautomatic-tag
Automatically computes the tag value.
setcommunity
Sets the BGP communities attribute.
setdefaultinterface
Indicates where to output packets that pass a match clause of a route map for policy routing and have no explicit route to the destination.
setinterface
Indicates where to output packets that pass a match clause of a route map for policy routing.
setipdefaultnext-hop
Indicates where to output packets that pass a match clause of a route map for policy routing and for which the Cisco IOS software has no explicit route to a destination.
setipnext-hop
Indicates where to output packets that pass a match clause of a route map for policy routing.
setlevel(IP)
Indicates where to import routes.
setlocal-preference
Specifies a preference value for the autonomous system path.
setmetric(BGP,OSPF,RIP)
Sets the metric value for a routing protocol.
setmetric-type
Sets the metric type for the destination routing protocol.
setnext-hop
Specifies the address of the next hop.
settag(IP)
Sets a tag value of the destination routing protocol.
setweight
Specifies the BGP weight for the routing table.
match ip next-hop
To redistribute any routes that have a next hop router address passed by one of the access lists specified, use the
matchipnext-hop command in route-map configuration mode. To remove the next hop entry, use the
no form of this command.
Number or name of a standard or extended access list. It can be an integer from 1 to 199.
Command Default
Routes are distributed freely, without being required to match a next hop address.
Command Modes
Route-map configuration (config-route-map)
Command History
Release
Modification
10.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
15.1(2)S
This command was integrated into Cisco IOS Release 15.1(2)S.
Usage Guidelines
An ellipsis (...) in the command syntax indicates that your command input can include multiple values for the
access-list-numberoraccess-list-name argument .
Use the route-map global configuration command, and the
match and
set route-map configuration commands, to define the conditions for redistributing routes from one routing protocol into another. Each
route-map command has a list of
match and
set commands associated with it. The
match commands specify the
matchcriteria--the conditions under which redistribution is allowed for the current route-mapcommand. The
set commands specify the
setactions--the particular redistribution actions to perform if the criteria enforced by the
match commands are met. The
noroute-map command deletes the route map.
The
match route-map configuration command has multiple formats. The
match commands can be given in any order, and all
match commands must “pass” to cause the route to be redistributed according to the
setactionsgiven with the
set commands. The
no forms of the
match commands remove the specified match criteria.
When you are passing routes through a route map, a route map can have several parts. Any route that does not match at least one
match clause relating to a
route-map command will be ignored; that is, the route will not be advertised for outbound route maps and will not be accepted for inbound route maps. If you want to modify only some data, you must configure a second route map section with an explicit match specified.
Examples
The following example distributes routes that have a next hop router address passed by access list 5 or 80 will be distributed:
Router(config)# route-map name
Router(config-route-map)# match ip next-hop 5 80
Related Commands
Command
Description
matchas-path
Matches a BGP autonomous system path access list.
matchcommunity
Matches a BGP community.
matchinterface(IP)
Distributes any routes that have their next hop out one of the interfaces specified.
matchipaddress
Distributes any routes that have a destination network number address that is permitted by a standard or extended access list, and performs policy routing on packets.
matchiproute-source
Redistributes routes that have been advertised by routers and access servers at the address specified by the access lists.
matchmetric(IP)
Redistributes routes with the metric specified.
matchroute-type(IP)
Redistributes routes of the specified type.
matchtag
Redistributes routes in the routing table that match the specified tags.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing.
setas-path
Modifies an autonomous system path for BGP routes.
setautomatic-tag
Automatically computes the tag value.
setcommunity
Sets the BGP communities attribute.
setlevel(IP)
Indicates where to import routes.
setlocal-preference
Specifies a preference value for the autonomous system path.
setmetric(BGP,OSPF,RIP)
Sets the metric value for a routing protocol.
setmetric-type
Sets the metric type for the destination routing protocol.
setnext-hop
Specifies the address of the next hop.
settag(IP)
Sets a tag value of the destination routing protocol.
setweight
Specifies the BGP weight for the routing table.
match ip redistribution-source
To match the external Enhanced Interior Gateway Routing Protocol (EIGRP) routes that have been advertised by routers and access servers at the address specified by the access lists, use the
matchipredistribution-source command in route-map configuration mode. To remove the redistribution-source entry, use the
no form of this command.
(Optional) Number of a standard access list. The range is from 1 to 199.
expanded-access-list
(Optional) Number of an expanded access list. The range is from from 1300 to 1999.
access-list-name
(Optional) Name of a standard access list.
prefix-listname
(Optional) Specifies the match entries of a specified prefix list.
Command Default
No filtering of the routes is applied on the redistribution source.
Command Modes
Route-map configuration (config-route-map)
Command History
Release
Modification
15.1(3)T
This command was introduced in Cisco IOS Release 15.1(3)T.
Cisco IOS XE Release 3.2S
This command was integrated into Cisco IOS XE Release 3.2S and implemented on Cisco ASR 1000 Series Aggregation Services Routers.
Usage Guidelines
An ellipsis (...) in the command syntax indicates that your command input can include multiple values for the
access-list-numberargument, theexpanded-access-listargument, theaccess-list-nameargument,and the
prefix-listnamekeyword and argument pair.
Use the
route-map global configuration command, and the
match andset route-map configuration commands, to define the conditions for redistributing routes from one routing protocol into another. Each
route-map command has a list of
match and
set commands associated with it. The
match commands specify the match criteria--the conditions under which redistribution is allowed for the current
route-mapcommand. The
set commands specify the set actions--the particular redistribution actions to perform if the criteria enforced by the
match commands are met. The
noroute-map command deletes the route map.
The
match route-map configuration command has multiple formats. The
match commands can be given in any order, and all
match commands must “pass” to cause the route to be redistributed according to the set actionsgiven with the
set commands. The
no forms of the
match commands remove the specified match criteria.
Any route that does not match at least one
match clause relating to a
route-map command will be ignored; that is, the route will not be advertised for outbound route maps and will not be accepted for inbound route maps. If you want to modify only some data, you must configure the second route map section with an explicit match specified.
Examples
The following example shows how to filter the EIGRP routes that are advertised by routers and access servers at the address specified by access list 5 and expanded access list 1335:
Router(config)# route-map R1
Router(config-route-map)# match ip redistribution-source 5 1335
Related Commands
Command
Description
matchas-path
Matches a BGP autonomous system path access list.
matchcommunity
Matches a BGP community.
matchinterface(IP)
Distributes any routes that have their next hop from one of the interfaces specified.
matchipaddress
Distributes any routes that have a destination network number address that is permitted by a standard or extended access list, and performs policy routing on packets.
matchiproute-source
Matches routes that have been advertised by routers and access servers at the address specified by the access lists.
matchipnext-hop
Redistributes any routes that have a next hop router address passed by one of the access lists specified.
matchmetric(IP)
Redistributes routes with the metric specified.
matchroute-type(IP)
Redistributes routes of the specified type.
matchtag
Redistributes routes in the routing table that match the specified tags.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing.
setas-path
Modifies an autonomous system path for BGP routes.
setautomatic-tag
Automatically computes the tag value.
setcommunity
Sets the BGP communities attribute.
setlevel(IP)
Indicates where to import routes.
setlocal-preference
Specifies a preference value for the autonomous system path.
setmetric(BGP,OSPF,RIP)
Sets the metric value for a routing protocol.
setmetric-type
Sets the metric type for the destination routing protocol.
setnext-hop
Specifies the address of the next hop.
settag(IP)
Sets a tag value for the destination routing protocol.
setweight
Specifies the BGP weight for the routing table.
match ip route-source
To match routes that have been advertised by routers and access servers at the address specified by the access lists, use the
matchiproute-source command in route-map configuration mode. To remove the route-source entry, use the
no form of this command.
(Optional) Number of a standard access list. The range is from 1 to 199.
expanded-access-list
(Optional) Number of an expanded access list. The range is from 1300 to 1999.
access-list-name
(Optional) Name of a standard access list.
prefix-listname
(Optional) Configures the match entries of a specified prefix list.
redistribution-source
(Optional) Specifies the route redistribution source for Enhanced Interior Gateway Routing Protocol (EIGRP).
Command Default
No filtering of the routes is applied on the route source.
Command Modes
Route-map configuration (config-route-map)
Command History
Release
Modification
10.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1 and implemented on Cisco ASR 1000 Series Aggregation Services Routers.
Usage Guidelines
An ellipsis (...) in the command syntax indicates that your command input can include multiple values for the
access-list-numberargument,theexpanded-access-listargument, theaccess-list-nameargument,and the
prefix-listnamekeyword and argument pair.
Use the
route-map global configuration command, and the
match andset route-map configuration commands, to define the conditions for redistributing routes from one routing protocol into another. Each
route-map command has a list of
match and
set commands associated with it. The
match commands specify the match criteria--the conditions under which redistribution is allowed for the current
route-mapcommand. The
set commands specify the set actions--the particular redistribution actions to perform if the criteria enforced by the
match commands are met. The
noroute-map command deletes the route map.
The
match route-map configuration command has multiple formats. The
match commands can be given in any order, and all
match commands must “pass” to cause the route to be redistributed according to the set actionsgiven with the
set commands. The
no forms of the
match commands remove the specified match criteria.
A route map can have several parts. Any route that does not match at least one
match clause relating to a
route-map command will be ignored; that is, the route will not be advertised for outbound route maps and will not be accepted for inbound route maps. If you want to modify only some data, you must configure the second route map section with an explicit match specified.
Examples
The following example shows how to match routes that are advertised by routers and access servers at the address specified by access list 5 and expanded access list 1335:
Router(config)# route-map R1
Router(config-route-map)# match ip route-source 5 1335
Related Commands
Command
Description
matchas-path
Matches a BGP autonomous system path access list.
matchcommunity
Matches a BGP community.
matchinterface(IP)
Distributes any routes that have their next hop from one of the interfaces specified.
matchipaddress
Distributes any routes that have a destination network number address that is permitted by a standard or extended access list, and performs policy routing on packets.
match ip redistribution-source
Filters the external EIGRP routes that have been advertised by routers and access servers at the address specified by the access lists.
matchipnext-hop
Redistributes any routes that have a next hop router address passed by one of the access lists specified.
matchmetric(IP)
Redistributes routes with the metric specified.
matchroute-type(IP)
Redistributes routes of the specified type.
matchtag
Redistributes routes in the routing table that match the specified tags.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing.
setas-path
Modifies an autonomous system path for BGP routes.
setautomatic-tag
Automatically computes the tag value.
setcommunity
Sets the BGP communities attribute.
setlevel(IP)
Indicates where to import routes.
setlocal-preference
Specifies a preference value for the autonomous system path.
setmetric(BGP,OSPF,RIP)
Sets the metric value for a routing protocol.
setmetric-type
Sets the metric type for the destination routing protocol.
setnext-hop
Specifies the address of the next hop.
settag(IP)
Sets a tag value for the destination routing protocol.
setweight
Specifies the BGP weight for the routing table.
match ipv6 address
To distribute IPv6 routes that have a prefix permitted by a prefix list or to specify an IPv6 access list to be used to match packets for policy-based routing (PBR) for IPv6, use the
matchipv6address command in route-map configuration mode. To remove the
matchipv6address entry, use the
no form of this command.
Name of the IPv6 access list. Names cannot contain a space or quotation mark or begin with a numeric.
Command Default
No routes are distributed based on the destination network number or an access list.
Command Modes
Route-map configuration (config-route-map)
Command History
Release
Modification
12.2(2)T
This command was introduced.
12.0(21)ST
This command was integrated into Cisco IOS Release 12.0(21)ST.
12.0(22)S
This command was integrated into Cisco IOS Release 12.0(22)S.
12.3(7)T
This command was modified. The
access-list-name argument was added.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(25)SG
This command was integrated into Cisco IOS Release 12.2(25)SG.
12.2(33)SXI4
This command was modified. The
prefix-listprefix-list-name keyword-argument pair argument is not supported in Cisco IOS Release 12.2(33)SXI4.
Cisco IOS XE Release 3.2S
This command was integrated into Cisco IOS XE Release 3.2S.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
Cisco IOS XE Release 3.2SE
This command was integrated into Cisco IOS XE Release 3.2SE.
Usage Guidelines
Use the
route-map command and the
match and
set commands to define the conditions for redistributing routes from one routing protocol to another. Each
route-map command has a list of
match and
set commands associated with it. The
match commands specify the match criteria--the conditions under which redistribution is allowed for the current
route-map command. Theset commands specify the set actions, which are the particular redistribution actions to be performed if the criteria enforced by the
match commands are met.
The
matchipv6address command can be used to specify either an access list or a prefix list. When using PBR, you must use the
access-list-name argument; the
prefix-listprefix-list-name keyword-argument pair argument will not work.
Examples
In the following example, IPv6 routes that have addresses specified by the prefix list named marketing are matched:
Device(config)# route-map name
Device(config-route-map)# match ipv6 address prefix-list marketing
In the following example, IPv6 routes that have addresses specified by an access list named marketing are matched:
Device(config)# route-map
Device(config-route-map)# match ipv6 address marketing
Related Commands
Command
Description
matchas-path
Matches a BGP autonomous system path access list.
matchcommunity
Matches a BGP community.
matchipv6address
Specifies an IPv6 access list to be used to match packets for PBR for IPv6.
matchipv6next-hop
Distributes IPv6 routes that have a next-hop prefix permitted by a prefix list.
matchipv6route-source
Distributes IPv6 routes that have been advertised by routers at an address specified by a prefix list.
matchlength
Bases policy routing on the Level 3 length of a packet.
matchmetric
Redistributes routes with the specified metric.
matchroute-type
Redistributes routes of the specified type.
route-map
Defines conditions for redistributing routes from one routing protocol into another.
setas-path
Modifies an autonomous system path for BGP routes.
setcommunity
Sets the BGP community attribute.
setdefaultinterface
Specifies the default interface to output packets that pass a match clause of a route map for policy routing and have no explicit route to the destination.
setinterface
Specifies the default interface to output packets that pass a match clause of a route map for policy routing.
setipv6defaultnext-hop
Specifies an IPv6 default next hop to which matching packets will be forwarded.
setipv6next-hop(PBR)
Indicates where to output IPv6 packets that pass a match clause of a route map for policy routing.
setipv6precedence
Sets the precedence value in the IPv6 packet header.
setlevel
Indicates where to import routes.
setlocalpreference
Specifies a preference value for the autonomous system path.
setmetric
Sets the metric value for a routing protocol.
setmetric-type
Sets the metric type for the destination routing protocol.
settag
Sets a tag value of the destination routing protocol.
setweight
Specifies the BGP weight for the routing table.
match length
To base policy routing on the Level 3 length of a packet, use the
match
length command in route-map configuration mode. To remove the entry, use the
no form of this command.
matchlengthminimum-lengthmaximum-length
nomatchlengthminimum-lengthmaximum-length
Syntax Description
minimum-length
Minimum Level 3 length of the packet allowed for a match. The range is from 0 to 0x7FFFFFFF.
maximum-length
Maximum Level 3 length of the packet allowed for a match. The range is from 0 to 0x7FFFFFFF.
Command Default
No policy routing occurs on the length of a packet.
Command Modes
Route-map configuration (config-route-map)
Command History
Release
Modification
10.0
This command was introduced.
12.3(7)T
This command was modified. This command was updated for use in configuring IPv6 policy-based routing (PBR).
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Cisco IOS XE Release 3.2S
This command was integrated into Cisco IOS XE Release 3.2S.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
Usage Guidelines
In IPv4, use the
ip policy route-map interface configuration command, the
route-map global configuration command, and the
match and
set route-map configuration commands to define the conditions for policy routing packets. The
ip
policy
route-map command identifies a route map by name. Each
route-map command has a list of
match and
set commands associated with it. The
match commands specify the
matchcriteria—the conditions under which policy routing occurs. The
set commands specify the
setactions—the particular routing actions to perform if the criteria enforced by the
match commands are met.
In PBR for IPv6, use the
ipv6
policy
route-map or
ipv6
local
policy
route-map command to define conditions for policy routing packets.
In IPv4, the
match route-map configuration command has multiple formats. The
match commands can be issued in any order, and all
match commands must “pass” to cause the packet to be routed according to the
setactions given with the
set commands. The
no forms of the
match commands remove the specified match criteria.
In IPv4, you might want to base your policy routing on the length of packets so that your interactive traffic and bulk traffic are directed to different routers.
Examples
In the following example, packets 3 to 200 bytes long, inclusive, will be routed to FDDI interface 0:
interface serial 0
ip policy route-map interactive
!
route-map interactive
match length 3 200
set interface fddi 0
In the following example for IPv6, packets 3 to 200 bytes long, inclusive, will be routed to FDDI interface 0:
interface Ethernet0/0
ipv6 policy-route-map interactive
!
route-map interactive
match length 3 200
set interface fddi 0
Related Commands
Command
Description
iplocalpolicyroute-map
Identifies a route map to be used for policy routing on an interface.
ipv6localpolicyroute-map
Configures IPv6 PBR for IPv6 originated packets.
ipv6policyroute-map
Configures IPv6 PBR on an interface.
matchipaddress
Distributes any routes that have a destination network number address that is permitted by a standard or extended access list, and performs policy routing on packets.
matchipv6address
Specifies an IPv6 access list to be used to match packets for IPv6 PBR.
matchlength
Bases policy routing on the Level 3 length of a packet.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol to another, or enables policy routing.
setdefaultinterface
Indicates where to output packets that pass a match clause of a route map for policy routing and have no explicit route to the destination.
setinterface
Indicates where to output packets that pass a match clause of route map for policy routing.
setipdefaultnext-hop
Indicates where to output packets that pass a match clause of a route map for policy routing and for which the Cisco software has no explicit route to a destination.
setipv6defaultnext-hop
Specifies an IPv6 default next hop to which matching packets will be forwarded.
setipnext-hop
Indicates where to output packets that pass a match clause of a route map for policy routing.
setipv6next-hop(PBR)
Indicates where to output IPv6 packets that pass a match clause of a route map for policy routing.
setipv6precedence
Sets the precedence value in the IPv6 packet header.
match metric (IP)
To redistribute r outes with the specified metric, use the
matchmetric command in route-map configuration mode. To remove the entry for the redistributed route from the routing table, use the
no form of this command.
Internal route metric, which can be an Enhanced Interior Gateway Routing Protocol (EIGRP) five-part metric. The range is from 1 to 4294967295.
external
External protocol associated with a route and interpreted by a source protocol.
+-deviation-number
(Optional) A standard deviation number that will offset the number configured for the metric-value argument. The deviation-number argument can be any number. There is no default.
Note
When you specify a deviation of the metric with the
+ and
- keywords, the router will match any metric that falls inclusively in that range.
Command Default
No filtering is performed on a metric value.
Command Modes
Route-map configuration (config-route-map)
Command History
Release
Modification
11.2
This command was introduced.
12.3(8)T
The
external and
+-keywords and
deviation-number argument were added.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH
This command was integrated into Cisco IOS Release 12.2(33)SXH.
Usage Guidelines
Use the
route-map global configuration command and the
match and
set route-map configuration commands to define the conditions for redistributing routes from one routing protocol into another. Each
route-map command has a list of
match and
set commands associated with it. The
match commands specify the
matchcriteria--the conditions under which redistribution is allowed for the current
route-mapcommand. The
set commands specify the
setactions--the particular redistribution actions to perform if the criteria enforced by the
match commands are met. The
noroute-map command deletes the route map.
The
match route-map configuration command has multiple formats. The
match commands can be given in any order, and all
match commands must “pass” to cause the route to be redistributed according to the set actionsgiven with the
set commands. The
no forms of the
match commands remove the specified match criteria.
A route map can have several parts. Any route that does not match at least one
match clause relating to a
route-mapcommand will be ignored; that is, the route will not be advertised for outbound route maps and will not be accepted for inbound route maps. If you want to modify only some data, you must configure a second route map section with an explicit match specified.
Note
An external protocol route metric is not the same as the EIGRP assigned route metric which is a figure computed using EIGRP vectorized metric components (delay, bandwidth, reliability, load, and MTU).
Examples
In the following example, routes with the metric 5 will be redistributed:
Router(config)# route-map name
Router(config-route-map)# match metric 5
In the following example, any metric that falls inclusively in the range from 400 to 600 is matched:
Router(config)# route-map name
Router(config-route-map)# match metric 500 +- 100
The following example shows how to configure a route map to match an EIGRP external protocol metric route with an allowable deviation of 100, a source protocol of BGP, and an autonomous system 45000. When the two match clauses are true, the tag value of the destination routing protocol is set to 5. The route map is used to distribute incoming packets for an EIGRP process.
Router(config)# route-map metric_range
Router(config-route-map)# match metric external 500 +- 100
Router(config-route-map)# match source-protocol bgp 45000
Router(config-route-map)# set tag 5
!
Router(config)# router eigrp 45000
Router(config-router)# network 172.16.0.0
Router(config-router)# distribute-list route-map metric_range in
Related Commands
Command
Description
matchas-path
Matches a BGP autonomous system path access list.
matchcommunity
Matches a BGP community.
matchinterface(IP)
Distributes any routes that have their next hop out one of the interfaces specified.
matchipaddress
Distributes any routes that have a destination network number address that is permitted by a standard or extended access list, and performs policy routing on packets.
matchipnext-hop
Redistributes any routes that have a next hop router address passed by one of the access lists specified.
matchiproute-source
Redistributes routes that have been advertised by routers and access servers at the address specified by the access lists.
matchroute-type(IP)
Redistributes routes of the specified type.
matchtag
Redistributes routes in the routing table that match the specified tags.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing.
setas-path
Modifies an autonomous system path for BGP routes.
setautomatic-tag
Automatically computes the tag value.
setcommunity
Sets the BGP communities attribute.
setlevel(IP)
Indicates where to import routes.
setlocal-preference
Specifies a preference value for the autonomous system path.
setmetric(BGP,OSPF,RIP)
Sets the metric value for a routing protocol.
setmetric-type
Sets the metric type for the destination routing protocol.
setnext-hop
Specifies the address of the next hop.
settag(IP)
Sets a tag value of the destination routing protocol.
match route-type (IP)
To redistribute routes of the specified type, use the
matchroute-type command in route-map configuration mode. To remove the route type entry, use the
no form of this command.
Open Shortest Path First (OSPF) intra-area and interarea routes or Enhanced Interior Gateway Routing Protocol (EIGRP) internal routes.
external [type-1|type-2
OSPF external routes, or EIGRP external routes. For OSPF, the
externaltype-1 keyword matches only Type 1 external routes and the
externaltype-2 keyword matches only Type 2 external routes.
level-1
Intermediate System-to-Intermediate System (IS-IS) Level 1 routes.
level-2
IS-IS Level 2 routes.
Command Default
This command is disabled by default.
Command Modes
Route-map configuration
Command History
Release
Modification
10.0
This command was introduced.
11.2
The
local and
external [type-1 |
type-2] keywords were added.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the
route-map global configuration command, and the
match and
set route-map configuration commands, to define the conditions for redistributing routes from one routing protocol into another. Each
route-map command has a list of
match and
set commands associated with it. The
match commands specify the
matchcriteria--the conditions under which redistribution is allowed for the current
route-mapcommand. The
set commands specify the
setactions--the particular redistribution actions to perform if the criteria enforced by the
match commands are met. The
noroute-map command deletes the route map.
The
match route-map configuration command has multiple formats. The
match commands can be given in any order, and all
match commands must “pass” to cause the route to be redistributed according to the
setactionsgiven with the
set commands. The
no forms of the
match commands remove the specified match criteria.
A route map can have several parts. Any route that does not match at least one
match clause relating to a
route-map command will be ignored; that is, the route will not be advertised for outbound route maps and will not be accepted for inbound route maps. If you want to modify only some data, you must configure second route map section with an explicit match specified.
Examples
The following example redistributes internal routes:
route-map name
match route-type internal
Related Commands
Command
Description
matchas-path
Matches a BGP autonomous system path access list.
matchcommunity
Matches a BGP community.
matchinterface(IP)
Distributes any routes that have their next hop out one of the interfaces specified.
matchipaddress
Distributes any routes that have a destination network number address that is permitted by a standard or extended access list, and performs policy routing on packets.
matchipnext-hop
Redistributes any routes that have a next hop router address passed by one of the access lists specified.
matchiproute-source
Redistributes routes that have been advertised by routers and access servers at the address specified by the access lists.
matchmetric(IP)
Redistributes routes with the metric specified.
matchtag
Redistributes routes in the routing table that match the specified tags.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing.
setas-path
Modifies an autonomous system path for BGP routes.
setautomatic-tag
Automatically computes the tag value.
setcommunity
Sets the BGP communities attribute.
setlevel(IP)
Indicates where to import routes.
setlocal-preference
Specifies a preference value for the autonomous system path.
setmetric(BGP,OSPF,RIP)
Sets the metric value for a routing protocol.
setmetric-type
Sets the metric type for the destination routing protocol.
setnext-hop
Specifies the address of the next hop.
settag(IP)
Sets a tag value of the destination routing protocol.
setweight
Specifies the BGP weight for the routing table.
match tag
To filter routes that match specific route tags, use the
matchtag command in route-map configuration mode. To remove the tag entry, use the
no form of this command.
match tag
{ tag-value | tag-value-dotted-decimal }
[ ... tag-value
|
... tag-value-dotted-decimal ]
no match tag
{ tag-value | tag-value-dotted-decimal }
[ ... tag-value
|
... tag-value-dotted-decimal ]
Syntax Description
tag-value
Route tag value in plain decimals. The valid range is from 0 to 4294967295.
tag-value-dotted-decimal
Route tag value in dotted decimals. The valid range is from 0.0.0.0 to 255.255.255.255.
Command Default
No match tag values are defined.
Command Modes
Route-map configuration (config-route-map)
Command History
Release
Modification
10.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Cisco IOS XE Release 2.1
This command was implemented on Cisco ASR 1000 Series Aggregation Services Routers.
15.1(2)S
This command was integrated into Cisco IOS Release 15.1(2)S.
15.2(2)S
This command was modified. The
tag-value-dotted-decimal argument was added to support tag values in dotted-decimal format.
Cisco IOS XE Release 3.6S
This command was modified. The
tag-value-dotted-decimal argument was added to support tag values in dotted-decimal format.
Usage Guidelines
Ellipses (...) in the command syntax indicate that your command input can include multiple values for the
tag-value and the
tag-value-dotted-decimal arguments.
Examples
The following example shows how to match a route with a tag value of 5:
Device(config)# route-map name
Device(config-route-map)# match tag 5
The following example shows how to match a route with a tag value of 10.10.10.10:
Device(config)# route-map name
Device(config-route-map)# match tag 10.10.10.10
Related Commands
Command
Description
matchas-path
Matches a BGP autonomous system path specified by an access list.
matchcommunity
Matches a BGP community.
matchipaddress
Distributes any route that has a destination address that performs policy routing on packets and is permitted by a standard or extended access list.
route-map(IP)
Defines conditions for redistributing routes from one routing protocol into another, or enables policy routing.
setautomatic-tag
Automatically computes the tag value.
setlevel(IP)
Indicates where to import routes.
setlocal-preference
Specifies a preference value for autonomous system paths that pass a route map.
setmetric(BGP-OSPF-RIP)
Sets the metric value for a routing protocol.
setmetric-type
Sets the metric type for the destination routing protocol.
setnext-hop
Specifies the address of the next hop.
settag(IP)
Sets a tag value for a route.
match tag list
To filter routes that match a specified route tag list, use the
match tag list command in route-map configuration mode. To remove the route tag list entry, use the
no form of this command.
match tag listlist-name
[ ... list-name ]
no match tag listlist-name
[ ... list-name ]
Syntax Description
list-name
Name of route tag lists.
Command Default
No match tag lists are defined.
Command Modes
Route-map configuration (config-route-map)
Command History
Release
Modification
15.2(2)S
This command was introduced.
Cisco IOS XE Release 3.6S
This command was integrated into Cisco IOS XE Release 3.6S.
15.2(4)M
This command was integrated into Cisco IOS Release 15.2(4)M.
Usage Guidelines
The ellipsis (...) in the command syntax indicates that the command input can include multiple values for the
list-name argument. Route tag lists are used to filter routes. A single list can have multiple criteria for routes. Only routes that match all criteria specified in the route tag list are filtered.
The function of the
match tag list command is similar to the
match tag command; the
match tag command specifies individual tag values and not tag lists.
Note
You can use either the
match tag command or the
match tag list command but not both together within a single route-map sequence.
Examples
The following example shows how to filter routes from the route tag list named list1 by using the
match tag list
command:
Device(config)# route-map map1
Device(config-route-map)# match tag list list1
Related Commands
Command
Description
match tag
Filters routes that match specified route tags.
route-tag list
Creates a route tag list.
route-tag notation
Enables the display of route tag values in dotted decimal format.
maximum-paths
To control the maximum number of parallel routes that an IP routing protocol can support, use the
maximum-paths command in router address family topology or router configuration mode. To restore the default number of parallel routes, use the
no form of this command.
maximum-pathsnumber-of-paths
nomaximum-pathsnumber-of-paths
Syntax Description
number-of-paths
Maximum number of parallel routes that an IP routing protocol installs in a routing table. Valid values vary by Cisco IOS release and platform. For more information on valid values, use the question mark (?) online help function.
Command Default
The default number of parallel routes vary by Cisco IOS release and platform.
Command Modes
Router address family topology configuration (config-router-af-topology)
Router configuration (config-router)
Command History
Release
Modification
12.2(8)T
This command was introduced.
12.2(14)SX
This command was implemented on the Supervisor Engine 720.
12.2(17d)SXB
Support for this command on the Supervisor Engine 2 was extended to Cisco IOS Release 12.2(17d)SXB.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SRB
This command was modified. This command was made available in router address family topology configuration mode.
12.2(33)SXH
This command was modified. The maximum number of paths was changed from 8 to 16 for Cisco IOS Release 12.2(33)SXH.
Cisco IOS XE Release 3.5S
In Cisco IOS XE Release 3.5S, support was added for the Cisco ASR 903 Router.
Usage Guidelines
Release 12.2(33)SRB
If you plan to configure the Multi-Topology Routing (MTR) feature, you need to enter the
maximum-paths command in router address family topology configuration mode for this Open Shortest Path First (OSPF) router configuration command to become aware of the topology.
Examples
The following example shows how to allow a maximum of 16 paths to a destination in an OSPF routing process:
To enable pseudowire fast-failure detection capability in a bidirectional forwarding detection (BFD) configuration, use the
monitorpeerbfdcommand in the appropriate configuration mode. To disable pseudowire fast-failure detection, use the
no form of this command.
monitorpeerbfd
[ localinterfaceinterface-type ]
nomonitorpeerbfd
[ localinterface ]
Syntax Description
localinterfaceinterface-type
(Optional) Specifies the local interface for the source address to use when locating a BFD configuration.
Command Default
Pseudowire fast-failure detection is disabled.
Command Modes
Interface configuration (config-if)
Pseudowire class configuration (config-pw-class)
Template configuration (config-template)
Command History
Release
Modification
15.1(3)S
This command was introduced.
Cisco IOS XE Release 3.6S
This command was integrated into a release prior to Cisco IOS XE Release 3.6S.
Cisco IOS XE Release 3.7S
This command was modified as part of the MPLS-based Layer 2 VPN (L2VPN) command modifications for cross-OS support. This command was made available in interface configuration and template configuration modes.
Examples
The following example shows how to enable pseudowire fast-failure detection capability:
(Optional) Cancels OSPF NSF restart when non-NSF-aware
neighbors are detected.
cisco
Specifies the Cisco proprietary IS-IS NSF method of
checkpointing if the active RP fails over.
ietf
Specifies the IETF IS-IS NSF method of protocol
modification if the active RP fails over.
interfacewaitseconds
(Optional) Specifies how long to wait for an interface to
come up after failover before it proceeds with the Cisco NSF process; valid
values are from 1 to 60 seconds.
intervalminutes
(Optional) Specifies how long to wait after a route
processor stabilizes before restarting; valid values are from 0 to 1440
minutes.
t3adjacency
(Optional) Specifies that the time that IETF NSF waits for
the LSP database to synchronize is determined by the adjacency holdtime
advertised to the neighbors of the specified RP before switchover.
t3manualseconds
(Optional) Specifies the time to wait after the NSF
database synchronizes before informing other nodes to remove the restarting
node from consideration as a transit; valid values are from 5 to 3600 seconds.
Command Default
The default settings are as follows:
NSF is disabled.
enforceglobal--Enabled.
interval
minutes--5 minutes.
interface
waitseconds--10
seconds.
t3 manual
seconds--30 seconds.
Command Modes
Router configuration
Command History
Release
Modification
12.2(18)SXD
Support for this command was introduced on the Supervisor
Engine 720.
12.2(33)SRA
This command was integrated into Cisco IOS Release
12.2(33)SRA.
15.2(1)E
This command was integrated into Cisco IOS Release 15.2(1)E.
Usage Guidelines
The
nsf command is not supported on Cisco 7600
series routers that are configured with a Supervisor Engine 2.
The
nsfinterfacewaitcommand can be used if Cisco proprietary IS-IS NSF is
configured or if the Internet Engineering Task Force (IETF) IS-IS NSF is
enabled using the
nsft3 manual command. You can use this command if an
interface is slow to come up.
Note
Cisco NSF is required only if the Cisco 7600 series router is
expected to perform Cisco NSF during a restart. If the Cisco 7600 series router
is expected to cooperate with a neighbor that is doing a Cisco NSF restart
only, the switch must be NSF capable by default (running a version of code that
supports Cisco NSF), but Cisco NSF does not have to be configured on the
switch.
The
nsf commands are a subset of the
router command and affects all the interfaces
that are covered by the designated process. Cisco NSF supports the BGP, OSPF,
IS-IS, and EIGRP protocols. The configuration commands that enable NSF
processing are as follows:
nsf under
the
routerospf command
nsfietf under the
routerisis command
bgpgraceful-restart under the
routerbgp command
These commands must be issued as part of the router’s running
configuration. During the restart, these commands are restored to activate the
NSF processing.
The [{cisco | ietf } | interface
waitseconds |
interval
minutes | t3 [ adjacency | manual
seconds] keywords and arguments apply to
IS-IS only.
The {enforceglobal} keywords apply to OSPF only.
BGP NSF Guidelines
BGP support in NSF requires that neighbor networking devices be
NSF-aware devices; that is, they must have the graceful restart capability and
advertise that capability in the OPEN message during session establishment. If
an NSF-capable router discovers that a particular BGP neighbor does not have
the graceful restart capability enabled, it will not establish an NSF-capable
session with that neighbor. All other neighbors that have a graceful restart
capability will continue to have NSF-capable sessions with this NSF-capable
networking device. Enter the
bgpgraceful-restart router configuration command to
enable the graceful restart capability.
EIRGP NSF Guidelines
A router may be an NSF-aware router but may not be participating in
helping out the NSF restarting neighbor because it is coming up from a cold
start.
IS-IS NSF Guidelines
If you configure IETF on the networking device, but neighbor routers
are not IETF-compatible, NSF will abort after the switchover.
Use these two keywords when configuring IS-IS NSF:
ietf--Internet
Engineering Task Force IS-IS--After a supervisor engine switchover, the
NSF-capable router sends the IS-IS NSF restart requests to the neighboring
NSF-aware devices.
cisco--Cisco
IS-IS. Full adjacency and LSP information is saved (checkpointed) to the
standby supervisor engine. After a switchover, the newly active supervisor
engine maintains its adjacencies using the checkpointed data to quickly rebuild
its routing tables.
OSPF NSF Guidelines
OSPF NSF requires that all neighbor networking devices be NSF-aware
devices. If an NSF-capable router discovers that it has non-NSF aware neighbors
on a particular network segment, it will disable the NSF capabilities for that
segment. The other network segments that are composed entirely of NSF-capable
or NSF-aware routers will continue to provide NSF capabilities.
OSPF NSF supports NSF/SSO for IPv4 traffic only. OSPFv3 is not
supported with NSF/SSO. Only OSPFv2 is supported with NSF/SSO.
Examples
This example shows how to enable NSF for all OSPF-process interfaces:
This example shows how to disable NSF for all OSPF-process
interfaces:
Router(config)# router ospf 109
Router(config-router)# no nsf
Related Commands
Command
Description
router
Enables a routing process.
passive-interface
To disable sending routing updates on an interface,
use the passive-interface command in router configuration mode. To re-enable the sending of routing updates, use the no form of this command.
(Optional) Causes all interfaces to become passive.
interface-type
Interface type.
interface-number
Interface number.
Command Default
Routing updates are sent on the interface.
Command Modes
Router configuration (config-router)
Command History
Release
Modification
10.0
This command was introduced.
12.0
This command was modified. The default keyword was added.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
15.1(2)S
This command was integrated into Cisco IOS Release 15.1(2)S.
Usage Guidelines
If you disable the sending of routing updates on an interface, the particular subnet will continue to be advertised to other interfaces, and updates from other routers on that interface continue to be received and processed.
The default keyword sets all interfaces as passive by default. You can then configure individual interfaces where adjacencies are desired using the nopassive-interface command. The default keyword is useful in Internet service provider (ISP) and large enterprise networks where many of the distribution routers have more than 200 interfaces.
For the Open Shortest Path First (OSPF) protocol, OSPF routing information is neither sent nor received through the specified router interface. The specified interface address appears as a stub network in the OSPF domain.
For the Intermediate System-to-Intermediate System (IS-IS) protocol, this command instructs IS-IS to advertise the IP addresses for the specified interface without actually running IS-IS on that interface. The no form of this command for IS-IS disables advertising IP addresses for the specified address.
Note
For IS-IS you must keep at least one active interface and configure the interface with the iprouterisis command.
The use of the passive-interface command in Enhanced Interior Gateway Routing Protocol (EIGRP) suppresses the exchange of hello packets on the interface and thus stops routing updates from being advertised, and it also suppresses incoming routing updates. For more information on passive interfaces, see
http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f0a.shtml
.
Examples
The following example sends EIGRP updates to all interfaces on network 10.108.0.0 except Ethernet interface 1:
The following configuration enables IS-IS on Ethernet interface 1 and serial interface 0 and advertises the IP addresses of Ethernet interface 0 in its link-state protocol data units (PDUs):
router isis Finance
passive-interface Ethernet 0
interface Ethernet 1
ip router isis Finance
interface serial 0
ip router isis Finance
The following example sets all interfaces as passive and then activates Ethernet interface 0:
router ospf 100
passive-interface default
no passive-interface ethernet0
network 10.108.0.1 0.0.0.255 area 0
platform bfd allow-svi
To allow Bidirectional Forwarding Detection (BFD) configuration on a VLAN Switched Virtual Interface (SVI), use the platform bfd allow-svi command in global configuration mode. To disable BFD configuration on a VLAN SVI, use the no form of this command.
platformbfd
allow-svi
Syntax Description
This command has no arguments or keywords.
Command Default
BFD configuration on VLAN SVIs is not allowed.
Command Modes
Global configuration (config)#
Command History
Release
Modification
15.0(1)S
This command was introduced.
15.1(1)SG
This command was integrated into Cisco IOS 15.1(1)SG.
Usage Guidelines
BFD over SVI configuration is allowed only when the platform bfd allow-svi hidden command has been configured. When this command is first issued, the system displays a warning message stating that BFD over SVI is not generically supported.
The no form of the command can be issued even if BFD over SVI configuration is present on the router. After the no form of the command is issued, no further BFD over SVI configuration is allowed.
Note
You should unconfigure all BFD over SVI sessions before you issue the no platform allow-svi command.
Examples
The following example shows how to allow BFD configuration on a VLAN SVI:
Sets the baseline BFD session parameters on an interface.
bfd all-interfaces
Enables BFD for all interfaces for a BFD peer.
bfd interface
Enables BFD on a per-interface basis for a BFD peer.
interface
Configures an interface type and enters interface configuration mode.
platform bfd enable-offload
To enable a BFD session offload on a system, use the
platformbfdenable-offload command in the global configuration mode. To disable the BFD session offload use the
no form of this command.
platformbfdenable-offload
noplatformbfdenable-offload
Syntax Description
This command has no arguments or keywords
Command Default
Command is disabled.
Command Modes
Global configuration (config)#
Command History
Release
Modification
15.1(2)S
This command was introduced.
Cisco IOS XE Release 3.6S
This command was integrated.
Usage Guidelines
The BFD sessions running in IOS prior to configuring this command are not affected. All the BFD sessions initialized after you use this command are offloaded to the ES+ line card provided all the required parameters are met. For more information about BFD, see
Configuring Layer 1 and Layer 2 Features .
Examples
This example shows how to enable BFD session offload to the ES+ line card:
Router(config)# platform bfd enable-offload
redistribute (IP)
To redistribute routes from one routing domain into another routing domain, use the
redistribute command in the appropriate configuration mode. To disable all or some part of the redistribution (depending on the protocol), use the
no form of this command. See the “Usage Guidelines” section for detailed, protocol-specific behaviors.
Source protocol from which routes are being redistributed. It can be one of the following keywords: bgp,
connected,
eigrp, isis,
mobile,
ospf, rip, or static [ip].
The
static [ip] keyword is used to redistribute IP static routes. The optional
ip keyword is used when redistributing into the Intermediate System-to-Intermediate System (IS-IS) protocol.
The
connected keyword refers to routes that are established automatically by virtue of having enabled IP on an interface. For routing protocols such as Open Shortest Path First (OSPF) and IS-IS, these routes will be redistributed as external to the autonomous system.
process-id
(Optional) For the
bgp or
eigrp keyword, this is an autonomous system number, which is a 16-bit decimal number.
For the
isis keyword, this is an optional
tag value that defines a meaningful name for a routing process. You can specify only one IS-IS process per router. Creating a name for a routing process means that you use names when configuring routing.
For the
ospf keyword, this is an appropriate OSPF process ID from which routes are to be redistributed. This identifies the routing process. This value takes the form of a nonzero decimal number.
For the
rip keyword, no
process-id value is needed.
By default, no process ID is defined.
level-1
Specifies that, for IS-IS, Level 1 routes are redistributed into other IP routing protocols independently.
level-1-2
Specifies that, for IS-IS, both Level 1 and Level 2 routes are redistributed into other IP routing protocols.
level-2
Specifies that, for IS-IS, Level 2 routes are redistributed into other IP routing protocols independently.
autonomous-system-number
(Optional) Autonomous system number for the redistributed route. The range is from 1 to 65535.
In Cisco IOS Release 12.0(32)SY8, 12.0(33)S3, 12.2(33)SRE, 12.2(33)XNE, 12.2(33)SXI1, Cisco IOS XE Release 2.4, and later releases, 4-byte autonomous system numbers are supported in the range from 65536 to 4294967295 in asplain notation and in the range from 1.0 to 65535.65535 in asdot notation.
In Cisco IOS Release 12.0(32)S12, 12.4(24)T, and Cisco IOS XE Release 2.3, 4-byte autonomous system numbers are supported in the range from 1.0 to 65535.65535 in asdot notation only.
For more details about autonomous system number formats, see the
routerbgp command.
metricmetric-value
(Optional) When redistributing from one OSPF process to another OSPF process on the same router, the metric will be carried through from one process to the other if no metric value is specified. When redistributing other processes to an OSPF process, the default metric is 20 when no metric value is specified. The default value is 0.
metrictransparent
(Optional) Causes Routing Information Protocol (RIP) to use the routing table metric for redistributed routes as the RIP metric.
metric-typetype value
(Optional) For OSPF, specifies the external link type associated with the default route advertised into the OSPF routing domain. It can be one of two values:
1—Type 1 external route
2—Type 2 external route
If a
metric-type is not specified, the Cisco IOS software adopts a Type 2 external route.
For IS-IS, it can be one of two values:
internal—IS-IS metric that is < 63.
external—IS-IS metric that is > 64 < 128.
The default is
internal.
match {internal |
external1 |
external2}
(Optional) Specifies the criteria by which OSPF routes are redistributed into other routing domains. It can be one of the following:
internal—Routes that are internal to a specific autonomous system.
external1—Routes that are external to the autonomous system, but are imported into OSPF as Type 1 external routes.
external2—Routes that are external to the autonomous system, but are imported into OSPF as Type 2 external routes.
The default is
internal.
tagtag-value
(Optional) Specifies the 32-bit decimal value attached to each external route. This is not used by OSPF itself. It may be used to communicate information between Autonomous System Boundary Routers (ASBRs). If none is specified, the remote autonomous system number is used for routes from Border Gateway Protocol (BGP) and Exterior Gateway Protocol (EGP); for other protocols, zero (0) is used.
route-map
(Optional) Specifies the route map that should be interrogated to filter the importation of routes from this source routing protocol to the current routing protocol. If not specified, all routes are redistributed. If this keyword is specified, but no route map tags are listed, no routes will be imported.
map-tag
(Optional) Identifier of a configured route map.
subnets
(Optional) For redistributing routes into OSPF, the scope of redistribution for the specified protocol. By default, no subnets are defined.
nssa-only
(Optional) Sets the nssa-only attribute for all routes redistributed into OSPF.
Command Default
Route redistribution is disabled.
Command Modes
Router configuration (config-router)
Address family configuration (config-af)
Address family topology configuration (config-router-af-topology)
Command History
Release
Modification
10.0
This command was introduced.
12.0(5)T
This command was modified. Address family configuration mode was added.
12.0(22)S
This command was modified. Address family support under EIGRP was added.
12.2(15)T
This command was modified. Address family support under EIGRP was added.
12.2(18)S
This command was modified. Address family support under EIGRP was added.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SRB
This command was modified. Address family topology support under EIGRP was added.
12.2(14)SX
This command was integrated into Cisco IOS Release 12.2(14)SX.
12.0(32)S12
This command was modified. Support for 4-byte autonomous system numbers in asdot notation only was added.
12.0(32)SY8
This command was modified. Support for 4-byte autonomous system numbers in asplain and asdot notation was added.
12.4(24)T
This command was modified. Support for 4-byte autonomous system numbers in asdot notation only was added.
Cisco IOS XE Release 2.3
This command was modified. Support for 4-byte autonomous system numbers in asdot notation only was added.
12.2(33)SXI1
This command was modified. Support for 4-byte autonomous system numbers in asplain and asdot notation was added.
12.0(33)S3
This command was modified. Support for asplain notation was added, and the default format for 4-byte autonomous system numbers is asplain.
Cisco IOS XE Release 2.4
This command was modified. Support for asplain notation was added, and the default format for 4-byte autonomous system numbers is asplain.
15.0(1)M
This command was modified. The
nssa-only keyword was added.
12.2(33)SRE
This command was modified. Support for 4-byte autonomous system numbers in asplain and asdot notation was added.
15.1(1)SG
This command was modified. Support for 4-byte autonomous system numbers in asplain and asdot notation was added.
Cisco IOS XE Release 3.3SG
This command was modified. Support for 4-byte autonomous system numbers in asplain and asdot notation was added.
15.1(2)SNG
This command was implemented on the Cisco ASR 901 Series Aggregation Services Routers
15.2(1)E
This command was integrated into Cisco IOS Release 15.2(1)E.
Usage Guidelines
Using the no Form of the redistribute Command
Caution
Removing options that you have configured for the
redistribute command requires careful use of the
no form of the
redistribute command to ensure that you obtain the result that you are expecting. Changing or disabling any keyword may or may not affect the state of other keywords, depending on the protocol.
It is important to understand that different protocols implement the
no version of the
redistribute command differently:
In BGP, OSPF, and RIP configurations, the
no redistribute command removes only the specified keywords from the
redistribute commands in the running configuration. They use the
subtractive keyword method when redistributing from other protocols. For example, in the case of BGP, if you configure
no redistribute static route-map interior,
only the route map is removed from the redistribution, leaving
redistribute static in place with no filter.
The
no redistribute isis command removes the IS-IS redistribution from the running configuration. IS-IS removes the entire command, regardless of whether IS-IS is the redistributed or redistributing protocol.
EIGRP used the subtractive keyword method prior to EIGRP component version rel5. Starting with EIGRP component version rel5, the
no redistribute command removes the entire
redistribute command when redistributing from any other protocol.
Additional Usage Guidelines for the redistribute Command
A router receiving a link-state protocol with an internal metric will consider the cost of the route from itself to the redistributing router plus the advertised cost to reach the destination. An external metric only considers the advertised metric to reach the destination.
Routes learned from IP routing protocols can be redistributed at Level 1 into an attached area or at Level 2. The
level-1-2 keyword allows both Level 1 and Level 2 routes in a single command.
Redistributed routing information must be filtered by the
distribute-listout router configuration command. This guideline ensures that only those routes intended by the administrator are passed along to the receiving routing protocol.
Whenever you use the
redistribute or the
default-information router configuration commands to redistribute routes into an OSPF routing domain, the router automatically becomes an ASBR. However, an ASBR does not, by default, generate a
default route into the OSPF routing domain.
When routes are redistributed into OSPF from protocols other than OSPF or BGP, and no metric has been specified with the
metric-type keyword and
type-value argument, OSPF will use 20 as the default metric. When routes are redistributed into OSPF from BGP, OSPF will use 1 as the default metric. When routes are redistributed from one OSPF process to another OSPF process, autonomous system external and not-so-stubby-area (NSSA) routes will use 20 as the default metric. When intra-area and inter-area routes are redistributed between OSPF processes, the internal OSPF metric from the redistribution source process is advertised as the external metric in the redistribution destination process. (This is the only case in which the routing table metric will be preserved when routes are redistributed into OSPF.)
When routes are redistributed into OSPF, only routes that are not subnetted are redistributed if the
subnets keyword is not specified.
On a router internal to an NSSA area, the
nssa-only keyword causes the originated type-7 NSSA LSAs to have their propagate (P) bit set to zero, which prevents area border routers from translating these LSAs into type-5 external LSAs. On an area border router that is connected to an NSSA and normal areas, the
nssa-only keyword causes the routes to be redistributed only into the NSSA areas.
Routes configured with the
connected keyword affected by this
redistribute command are the routes not specified by the
network router configuration command.
You cannot use the
default-metric command to affect the metric used to advertise connected routes.
Note
The
metric value specified in the
redistribute command supersedes the
metric value specified using the
default-metric command.
The default redistribution of interior gateway protocol (IGP) or Exterior Gateway Protocol (EGP) into BGP is not allowed unless the
default-information originate router configuration command is specified.
Release 12.2(33)SRB
If you plan to configure the Multi-Topology Routing (MTR) feature, you need to enter the
redistribute command in address family topology configuration mode in order for this OSPF configuration command to become topology-aware.
4-Byte Autonomous System Number Support
In Cisco IOS Release 12.0(32)SY8, 12.0(33)S3, 12.2(33)SRE, 12.2(33)XNE, 12.2(33)SXI1, Cisco IOS XE Release 2.4, and later releases, the Cisco implementation of 4-byte autonomous system numbers uses asplain—65538 for example—as the default regular expression match and output display format for autonomous system numbers, but you can configure 4-byte autonomous system numbers in both the asplain format and the asdot format as described in RFC 5396. To change the default regular expression match and output display of 4-byte autonomous system numbers to asdot format, use the
bgp asnotation dot command.
In Cisco IOS Release 12.0(32)S12, 12.4(24)T, and Cisco IOS XE Release 2.3, the Cisco implementation of 4-byte autonomous system numbers uses asdot—1.2, for example—as the only configuration format, regular expression match, and output display, with no asplain support.
Examples
The following example shows how OSPF routes are redistributed into a BGP domain:
The following example shows how to redistribute the specified EIGRP process routes into an OSPF domain. The EIGRP-derived metric will be remapped to 100 and RIP routes to 200.
The following example shows how to configure BGP routes to be redistributed into IS-IS. The link-state cost is specified as 5, and the metric type is set to external, indicating that it has lower priority than internal metrics.
The following example shows how BGP routes are redistributed into OSPF and assigned the local 4-byte autonomous system number in asplain format. This example requires Cisco IOS Release 12.0(32)SY8, 12.0(33)S3, 12.2(33)SRE, 12.2(33)SXI1, Cisco IOS XE Release 2.4, or a later release.
The following example shows how to remove the
connected metric 1000 subnets options from the
redistribute connected metric 1000 subnets command and leave the
redistribute connected command in the configuration:
Router(config-router)# no redistribute connected metric 1000 subnets
The following example shows how to remove the metric 1000
options from the
redistribute connected metric 1000 subnets command and leave the redistribute connected subnets command in the configuration:
Router(config-router)# no redistribute connected metric 1000
The following example shows how to remove the
subnets option from the
redistribute connected metric 1000 subnets command and leave the
redistribute connected metric 1000 command in the configuration:
Router(config-router)# no redistribute connected subnets
The following example shows how to remove the
redistribute connected command, and any of the options that were configured for the
redistribute connected command, from the configuration:
Router(config-router)# no redistribute connected
The following example shows how EIGRP routes are redistributed into an EIGRP process in a named EIGRP configuration:
The following example shows how to set and disable the redistributions in EIGRP configuration. Note that,in the case of EIGRP, the
no form of the commands removes the entire set of
redistribute commands from the running configuration.
Router(config)# router eigrp 1
Router(config-router)# network 0.0.0.0
Router(config-router)# redistribute eigrp 2 route-map x
Router(config-router)# redistribute ospf 1 route-map x
Router(config-router)# redistribute bgp 1 route-map x
Router(config-router)# redistribute isis level-2 route-map x
Router(config-router)# redistribute rip route-map x
Router(config)# router eigrp 1
Router(config-router)# no redistribute eigrp 2 route-map x
Router(config-router)# no redistribute ospf 1 route-map x
Router(config-router)# no redistribute bgp 1 route-map x
Router(config-router)# no redistribute isis level-2 route-map x
Router(config-router)# no redistribute rip route-map x
Router(config-router)# end
Router# show running-config | section router eigrp 1
router eigrp 1
network 0.0.0.0
The following example shows how to set and disable the redistributions in OSPF configuration. Note that the
no form of the commands removes only the specified keywords from the
redistribute command in the running configuration.
Router(config)# router ospf 1
Router(config-router)# network 0.0.0.0
Router(config-router)# redistribute eigrp 2 route-map x
Router(config-router)# redistribute ospf 1 route-map x
Router(config-router)# redistribute bgp 1 route-map x
Router(config-router)# redistribute isis level-2 route-map x
Router(config-router)# redistribute rip route-map x
Router(config)# router ospf 1
Router(config-router)# no redistribute eigrp 2 route-map x
Router(config-router)# no redistribute ospf 1 route-map x
Router(config-router)# no redistribute bgp 1 route-map x
Router(config-router)# no redistribute isis level-2 route-map x
Router(config-router)# no redistribute rip route-map x
Router(config-router)# end
Router# show running-config | section router ospf 1
router ospf 1
redistribute eigrp 2
redistribute ospf 1
redistribute bgp 1
redistribute rip
network 0.0.0.0
The following example shows how to remove only the route map filter from the redistribution in BGP; redistribution itself remains in force without a filter:
Router(config)# router bgp 65000
Router(config-router)# no redistribute eigrp 2 route-map x
The following example shows how to remove the EIGRP redistribution to BGP:
Router(config)# router bgp 65000
Router(config-router)# no redistribute eigrp 2
Related Commands
Command
Description
address-family(EIGRP)
Enters address family configuration mode to configure an EIGRP routing instance.
address-familyipv4(BGP)
Places the router in address family configuration mode for configuring routing sessions such as BGP, RIP, or static routing sessions that use standard IPv4 address prefixes.
address-familyvpnv4
Places the router in address family configuration mode for configuring routing sessions such as BGP, RIP, or static routing sessions that use standard VPNv4 address prefixes.
bgpasnotationdot
Changes the default display and the regular expression match format of BGP 4-byte autonomous system numbers from asplain (decimal values) to dot notation.
default-informationoriginate(BGP)
Allows the redistribution of network 0.0.0.0 into BGP.
default-informationoriginate(IS-IS)
Generates a default route into an IS-IS routing domain.
default-informationoriginate(OSPF)
Generates a default route into an OSPF routing domain.
distribute-listout(IP)
Suppresses networks from being advertised in updates.
route-map(IP)
Defines the conditions for redistributing routes from one routing protocol into another, or enables policy routing.
routerbgp
Configures the BGP routing process.
routereigrp
Configures the EIGRP address-family process.
showroute-map
Displays all route maps configured or only the one specified.
topology(EIGRP)
Configures an EIGRP process to route IP traffic under the specified topology instance and enters address family topology configuration mode.
route-map
To define conditions for redistributing routes from one routing protocol to another routing protocol, or to enable policy routing, use the
route-map command in global configuration mode. To delete an entry, use the
no form of this command.
(Optional) Permits only routes matching the route map to be forwarded or redistributed.
deny
(Optional) Blocks routes matching the route map from being forwarded or redistributed.
sequence-number
(Optional) Number that indicates the position a new route map will have in the list of route maps already configured with the same name.
Command Default
Policy routing is not enabled and conditions for redistributing routes from one routing protocol to another routing protocol are not configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
10.0
This command was introduced.
12.3(7)T
This command was updated for use in configuring IPv6 policy-based routing (PBR).
12.2(25)SG
This command was integrated into Cisco IOS Release 12.2(25)SG.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
Cisco IOS XE Release 2.1
This command was implemented on Cisco ASR 1000 Series Aggregation Services Routers.
12.2(33)SXI4
This command was modified. It was integrated into Cisco IOS Release 12.2(33)SXI4.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
Usage Guidelines
Use the
route-map command to enter route-map configuration mode.
Use route maps to redistribute routes or to subject packets to policy routing. Both purposes are described in this section.
Redistribution
Use the
route-map global configuration command and the
match and
set route-map configuration commands to define the conditions for redistributing routes from one routing protocol to another. Each
route-map command has a list of
match and
set commands associated with it. The
match commands specify the
matchcriteria--the conditions under which redistribution is allowed for the current
route-mapcommand. The
set commands specify the
setactions--the particular redistribution actions to be performed if the criteria enforced by the
match commands are met. The
noroute-map command deletes the route map.
The
match route-map configuration command has multiple formats. The
match commands can be given in any order, and all
match commands must “pass” to cause the route to be redistributed according to the
setactions given with the
set commands. The
no forms of the
match commands remove the specified match criteria.
Use route maps when you want detailed control over how routes are redistributed between routing processes. The destination routing protocol is the one you specify with the
router global configuration command. The source routing protocol is the one you specify with the
redistribute router configuration command. See the “Examples” section for an illustration of how route maps are configured.
When you are passing routes through a route map, a route map can have several parts. Any route that does not match at least one
match clause relating to a
route-map command will be ignored; that is, the route will not be advertised for outbound route maps and will not be accepted for inbound route maps. If you want to modify only some data, you must configure a second route map section with an explicit match specified.
The
redistribute router configuration command uses the name specified by the
map-tag argument to reference a route map. Multiple route maps may share the same map tag name.
If the match criteria are met for this route map, and the
permit keyword is specified, the route is redistributed as controlled by the set actions. In the case of policy routing, the packet is policy routed. If the match criteria are not met, and the
permit keyword is specified, the next route map with the same map tag is tested. If a route passes none of the match criteria for the set of route maps sharing the same name, it is not redistributed by that set.
If the match criteria are met for the route map and the
deny keyword is specified, the route is not redistributed. In the case of policy routing, the packet is not policy routed, and no further route maps sharing the same map tag name will be examined. If the packet is not policy routed, the normal forwarding algorithm is used.
Policy Routing
Another purpose of route maps is to enable policy routing. Use the
ippolicyroute-map or
ipv6policyroute-map command, in addition to the
route-map command, and the
match and
set commands to define the conditions for policy routing packets. The
match commands specify the conditions under which policy routing occurs. The
set commands specify the routing actions to be performed if the criteria enforced by the
match commands are met. You might want to policy route packets some way other than the obvious shortest path.
The
sequence-number argument works as follows:
If no entry is defined with the supplied tag, an entry is created with the
sequence-number argument set to 10.
If only one entry is defined with the supplied tag, that entry becomes the default entry for the following
route-map command. The
sequence-number argument of this entry is unchanged.
If more than one entry is defined with the supplied tag, an error message is printed to indicate that the
sequence-number argument is required.
If the
noroute-mapmap-tag command is specified (with no
sequence-number argument), the whole route map is deleted.
Examples
The following example shows how to redistribute Routing Information Protocol (RIP) routes with a hop count equal to 1 to Open Shortest Path First (OSPF). These routes will be redistributed to OSPF as external link-state advertisements (LSAs) with a metric of 5, metric type of Type 1, and a tag equal to 1.
Device(config)# router ospf 109
Device(config-router)# redistribute rip route-map rip-to-ospf
Device(config-router)# exit
Device(config)# route-map rip-to-ospf permit
Device(config-route-map)# match metric 1
Device(config-route-map)# set metric 5
Device(config-route-map)# set metric-type type1
Device(config-route-map)# set tag 1
The following example for IPv6 shows how to redistribute RIP routes with a hop count equal to 1 to OSPF. These routes will be redistributed into OSPF as external LSAs with a tag equal to 42 and a metric type equal to type1.
Device(config)# ipv6 router ospf 1
Device(config-router)# redistribute rip one route-map rip-to-ospfv3
Device(config-router)# exit
Device(config)# route-map rip-to-ospfv3
Device(config-route-map)# match tag 42
Device(config-route-map)# set metric-type type1
The following named configuration example shows how to redistribute Enhanced Interior Gateway Routing Protocol (EIGRP) addresses with a hop count equal to 1. These addresses are redistributed to EIGRP as external with a metric of 5 and a tag equal to 1:
Device(config)# router eigrp virtual-name1
Device(config-router)# address-family ipv4 autonomous-system 4453
Device(config-router-af)# topology base
Device(config-router-af-topology)# redistribute eigrp 6473 route-map virtual-name1-to-virtual-name2
Device(config-router-af-topology)# exit-address-topology
Device(config-router-af)# exit-address-family
Device(config-router)# router eigrp virtual-name2
Device(config-router)# address-family ipv4 autonomous-system 6473
Device(config-router-af)# topology base
Device(config-router-af-topology)# exit-af-topology
Device(config-router-af)# exit-address-family
Device(config)# route-map virtual-name1-to-virtual-name2
Device(config-route-map)# match tag 42
Device(config-route-map)# set metric 5
Device(config-route-map)# set tag 1
Related Commands
Command
Description
ippolicyroute-map
Identifies a route map to use for policy routing on an interface.
ipv6policyroute-map
Configures IPv6 PBR on an interface.
matchas-path
Matches a BGP autonomous system path access list.
matchcommunity
Matches a BGP community.
matchinterface(IP)
Distributes any routes that have their next hop on one of the specified interfaces.
matchipaddress
Distributes any routes that have a destination network number address that is permitted by a standard or extended access list, and performs policy routing on packets.
matchipv6address
Distributes IPv6 routes that have a prefix permitted by a prefix list or specifies an IPv6 access list to use to match packets for PBR for IPv6.
matchipnext-hop
Redistributes any routes that have a next-hop router address passed by one of the specified access lists.
matchiproute-source
Redistributes routes that have been advertised by routers and access servers at the address specified by the access lists.
matchlength
Bases policy routing on the Level 3 length of a packet.
matchmetric(IP)
Redistributes routes with the metric specified.
matchroute-type(IP)
Redistributes routes of the specified type.
matchtag
Redistributes routes in the routing table that match the specified tags.
routereigrp
Configures the EIGRP address-family process.
setas-path
Modifies an autonomous system path for BGP routes.
setautomatic-tag
Automatically computes the tag value.
setcommunity
Sets the BGP communities attribute.
setdefaultinterface
Indicates where to output packets that pass a match clause of a route map for policy routing and have no explicit route to the destination.
setinterface
Indicates where to output packets that pass a match clause of a route map for policy routing.
setipv6defaultnext-hop
Specifies an IPv6 default next hop to which matching packets will be forwarded.
setipdefaultnext-hopverify-availability
Indicates where to output packets that pass a match clause of a route map for policy routing and for which the Cisco IOS software has no explicit route to a destination.
setipnext-hop
Indicates where to output packets that pass a match clause of a route map for policy routing.
setipv6next-hop(PBR)
Indicates where to output IPv6 packets that pass a match clause of a route map for PBR for IPv6.
setlevel(IP)
Indicates where to import routes.
setlocalpreference
Specifies a preference value for the autonomous system path.
setmetric(BGP,OSPF,RIP)
Sets the metric value for a routing protocol.
setmetrictype
Sets the metric type for the destination routing protocol.
setnext-hop
Specifies the address of the next hop.
settag(IP)
Sets a tag value of the destination routing protocol.
setweight
Specifies the BGP weight for the routing table.
showroute-map
Displays all route maps configured or only the one specified.
route-tag list
To create a route tag list, use the
route-tag list command in global configuration mode. To remove the route tag list, use the
no form of this command.
Sequence number. The valid range is from 1 to 4294967294.
tag-value-dotted-decimal
Route tag value in dotted-decimal format.
mask
Wildcard mask.
Command Default
No route tag list is configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
15.2(2)S
This command was introduced.
Cisco IOS XE Release 3.6S
This command was integrated into Cisco IOS XE Release 3.6S.
15.2(4)M
This command was integrated into Cisco IOS Release 15.2(4)M.
Usage Guidelines
Use the
route-tag list command to create route tag lists that will be used by route maps to match routes based on the criteria specified in the lists.
Examples
The following example shows how to configure a route tag list:
Device(config)# route-tag list list1 permit 1.1.1.1 0.0.0.1
Device(config)# route-tag list list1 sequence 5 permit 10.10.10.0 0.0.0.0
Related Commands
Command
Description
match tag list
Filters routes that match a specific route tag list.
route-tag notation
Enables the display of route tag values in dotted-decimal format.
route-tag notation
To enable the display of route tag values in dotted-decimal format, use the
route-tag notation command in global configuration mode. To disable this functionality, use the
no form of this command.
route-tag notation dotted-decimal
no route-tag notation dotted-decimal
Syntax Description
dotted-decimal
Enables the display of route tag values in dotted-decimal format.
Command Default
Tag values are displayed as plain decimals.
Command Modes
Global configuration (config)
Command History
Release
Modification
15.2(2)S
This command was introduced.
Cisco IOS XE Release 3.6S
This command was integrated into Cisco IOS XE Release 3.6S.
15.2(4)M
This command was integrated into Cisco IOS Release 15.2(4)M.
Usage Guidelines
Configure the
route-tag notation command to display route tag values in dotted-decimal format. When you configure this command, route tags are displayed as dotted decimals, irrespective of whether or not the route tags were configured as dotted decimals.
Examples
The following example shows how to configure the
route-tag notation command:
Device(config)# route-tag notation dotted-decimal
Related Commands
Command
Description
eigrp default-route-tag
Sets a default route tag for all internal EIGRP routes.
match tag
Filters routes that match specified route tags.
set tag (IP)
Sets a tag value for routes.
show ip route
Displays contents of the IPv4 routing table.
show ipv6 route
Displays contents of the IPv6 routing table.
show route-map
Displays information about static and dynamic route maps.
show route-tag list
Displays information about route tag lists configured on the device.
routing dynamic
To enable the router to pass
routing updates to other routers through an interface, use the routingdynamiccommand in interface configuration mode. To disable the passing of routing updates through an interface, use the no form of this command.
routingdynamic
noroutingdynamic
Syntax Description
This command has no arguments or keywords.
Command Default
Asynchronous interfaces: No routing updates are passed.
All other interface types: Routing updates are passed.
Command Modes
Interface configuration
Command History
Release
Modification
12.3(11)T
This command was introduced. This command replaces the asyncdefaultrouting command.
Usage Guidelines
Use the routingdynamiccommand to control the passing of routing updates over an interface.
Issuing the noroutingdynamiccommand flags the interface to indicate that routing updates should not be sent out of it.
The routing protocol must recognize the flag for this command to work as intended. The routingdynamiccommand sets and clears the flag; it does not enforce routing protocol conformance.
Examples
The following example enables routing over asynchronous interface 0:
interface async 0
routing dynamic
The following example disables routing over serial interface 2/0:
interface serial 2/0
no routing dynamic
Related Commands
Command
Description
asyncdynamicrouting
Enables manually configured routing on an asynchronous interface.