No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Importance of Route-tag in OSPF using VPN-instance

Publication Date:  2017-05-26 Views:  4514 Downloads:  0

Issue Description

S6720-30C-EI-24S-AC / V200R008C00SPC500

The problem is that all the external routes (imported/redistributed) are in LSDB of S6720 but not installed in vpn-instance routing table.

We configured OSPF in VPN-instance between the 2 switches. On LSW2 we configured a static-route to null0 interface and imported in OSPF. 

Here is the LSDB and routing table of vpn-instance of LSW1:





Using router-tag is the solution in this scenario:

ROUTE-TAG - is a tool to avoid routing loop,  but when we receive the lsdb with same
route-tag, the switch thinks that there may be a loop. So , it will not be delivered to ip routing-table.

We configured route-tag 999 on LSW2.


After we configured route-tag 999 , the route towards is installed in routing-table


Please note that all external routes will be checked by route-loop-prevent mechanism.

Routes which satisfy the condition

1)      Type is External

2)       Ls id  and  Adv rtr are private address

Are seen as potential route loop, even if there are no loop actually.


To conclude , if we will have configured the same route-tag on both switches (default route-tag is 0) will prevent to put the route in routing table due to loop prevention mechanism.

If we will configure the route-tag(different than default value) just on LSW2 the route will be installed in routing-table of LSW1.