Enarsi Chapter 14
Enarsi Chapter 14
Enarsi Chapter 14
BGP
Instructor Materials
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Troubleshooting BGP Neighbor Adjacencies
Verifying IPv4 Unicast BGP Neighbors
To verify IPv4 unicast BGP neighbors, you can use two show commands: show bgp ipv4 unicast
summary and show bgp ipv4 unicast neighbors.
• For initial verification of neighbors, use show bgp ipv4 unicast summary because it provides
condensed output.
• Example 14-1 shows sample output of the show bgp ipv4 unicast summary command, which
indicates that R1 has two BGP neighbors: 10.1.12.2 and 10.1.13.3.
• Focus your attention on the State/PfxRcd column. If there is a number in this column (as there is
in Example 14-1), it means you have successfully established a BGP neighbor relationship. If you
see Idle or Active, there is a problem in the formation of the neighbor relationship.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Troubleshooting BGP Neighbor Adjacencies
Verifying IPv4 Unicast BGP Neighbors (Cont.)
The following are some of the reasons a BGP neighbor relationship might not form:
• Interface is down - The interface must be up/up.
• Layer 3 connectivity is broken - You need to be able to reach the IP address you are trying to
form the adjacency with.
• Path to the neighbor is through the default route - You must be able to reach the neighbor
using a route other than the default route.
• Neighbor does not have a route to the local router - The two routers forming a BGP peering
must have routes to each other.
• Incorrect neighbor statement - The IP address and ASN in the neighbor ip_address remote-as
as_number statement must be accurate.
• ACLs - An access control list (ACL) or a firewall may be blocking TCP (Transmission Control
Protocol) port 179.
• BGP packets sourced from the wrong IP address - The source IP (Internet Protocol) address
of an inbound BGP packet must match the local neighbor statement.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Troubleshooting BGP Neighbor Adjacencies
Verifying IPv4 Unicast BGP Neighbors (Cont.)
• The TTL (time-to-live) of the BGP packet expires - The peer may be further away than
is permitted.
• Mismatched authentication - The two routers must agree on the authentication
parameters.
• Misconfigured peer group - Peer groups simplify repetitive BGP configurations;
however, if not carefully implemented, they can prevent neighbor relationships from
forming or routes from being learned.
• Timers - Timers do not have to match; however, if the minimum holddown from neighbor
option is set, it could prevent a neighbor adjacency.
When troubleshooting BGP neighbor adjacencies, you need to be able to identify these
issues and understand why they occur.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Troubleshooting BGP Neighbor Adjacencies
Interface is Down or No Layer 3 Connectivity
Interface is Down - The physical or logical interface with the IP address that is being used to form
BGP neighbor relationships must be up/up. Use show ip interface brief to verify the status of
the interface.
Layer 3 Connectivity is Broken – BGP neighbors do not have to be directly connected or in the
same subnet to form a neighbor relationship, but you do need to have Layer 3 connectivity. Use
the ping command in order to determine if you have Layer 3 connectivity. When reviewing the
output of show bgp ipv4 unicast summary in Example 14-2, notice that the State/PfxRcd field
says Idle. This state occurs when the local router is not able to make a TCP connection with the
neighbor.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Troubleshooting BGP Neighbor Adjacencies
Path to the Neighbor is Through Default Route
When a ping is successful, but no specific route to the neighbor exists in the routing table, the ping
may have used the default route to reach the neighbor. Even though you can reach the neighbor
using the default route, BGP does not consider a default route valid for forming an adjacency. In the
output of show bgp ipv4 unicast summary on R5 in Example 14-6, notice that the state is idle,
which indicates that a TCP session cannot be formed.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Troubleshooting BGP Neighbor Adjacencies
Neighbor Does Not Have a Route to Local Router
The local router displays the
state Idle when it does not have
a route to the IP address it is
trying to peer with. However, Idle
also appears on a router when
the neighbor does not have a
route back to the local router.
In Example 14-7, you can see
that R2, which is trying to form a
BGP peering with R5, also
displays the state Idle even
though it has a route to 5.5.5.5.
The Idle state appears because
the routers cannot form the TCP
session.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Troubleshooting BGP Neighbor Adjacencies
Incorrect Neighbor Statement
To form a BGP peering, you use the neighbor ip_address remote-as as_number command in
BGP configuration mode. Example 14-8 displays two neighbor remote-as commands on R2. The
neighbor 5.5.5.5 remote-as 65502 command forms an iBGP peering, and neighbor 10.1.12.1
remote-as 65501 forms an eBGP peering.
There are two very important parts to this
command: the address of the peer with
which you form the peering and the
autonomous system that the peer is in. If
you make a mistake with either of these,
you see either the Active or Idle state. You
can verify the state of the TCP session on
the routers by using the show tcp brief all
command, shown in Example 14-9 .
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Troubleshooting BGP Neighbor Adjacencies
BGP Packets Sourced from Wrong IP Address
In a redundant topology, a BGP router has multiple active IP addresses configured across its various
interfaces. Figure 14-1 shows two BGP autonomous systems. Notice that R2, R3, and R4 could form a
BGP peering with each other, using any physical interface, because of the multiple paths.
When you issue the neighbor ip_address remote-as as_number command on a router, the address
specified is used by the router to determine whether the BGP open message came from a router it
should establish a BGP peering with. The BGP open message has a source IP address, and the
source IP address is compared with the address in the local neighbor ip_address remote-as
as_number command. If they match, a BGP peering is formed; if not, no BGP peering is formed. By
default, the source address is based on the exit interface of the router sending the BGP open
message.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Troubleshooting BGP Neighbor Adjacencies
BGP Packets Sourced from Wrong IP Address (Cont.)
To control the IP address that is
used when sending BGP
messages, you use the neighbor
ip_address update-source
interface_type interface_number
command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Troubleshooting BGP Neighbor Adjacencies
ACLs
BGP uses TCP port 179 to
establish TCP sessions. If an
access control list (ACL) is
blocking TCP port 179 anywhere
in the path between the routers
attempting to form a BGP
peering, the peering does not
happen.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Troubleshooting BGP Neighbor Adjacencies
ACLs (Cont.)
BGP sessions are server/client relationships. One router is using port 179 (server), and the other router is
using an ephemeral port (client). By default, both routers try to establish a TCP session using the three-
way handshake because both routers send a TCP syn packet sourced from an ephemeral port and
destined to port 179. When both routers respond with an ACK to the request on port 179, two BGP
sessions are created. This situation is called a BGP connection collision and the router with the higher
BGP RID becomes the server.
To avoid BGP connection collisions, control the
server and client roles right from the start by
using the neighbor ip_address transport
connection-mode {active | passive}
command. In this command, active means
client, passive means server.
In Example 14-13, the command show bgp
ipv4 unicast neighbors | i ^BGP neighbor|
Local port|Foreign port is used to display
R2’s neighbors along with the local port
number and the foreign port number.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Troubleshooting BGP Neighbor Adjacencies
The TTL of the BGP Packet Expires
By default, an eBGP peering occurs between directly connected routers. With an iBGP peering, the
routers can be up to 255 router hops from each other and still form a peering. Example 14-14 shows
the output of show bgp ipv4 unicast neighbors | include BGP neighbor|TTL, which indicates that
the eBGP neighbor at 10.1.12.1 must be reachable in 1 router hop, and the iBGP neighbor at 5.5.5.5
can be up to 255 hops away. If the TTL is not large enough to support the distance required to form a
BGP peering, the packet is discarded and no neighbor relationship is formed.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Troubleshooting BGP Neighbor Adjacencies
The TTL of the BGP Packet Expires (Cont.)
Example 14-15 shows the configuration of R1 and R2. Notice that R1 is peering with R2, using the
neighbor address 2.2.2.2 (R2 loopback) and the source address of Loopback 0 (1.1.1.1). R2 is peering
with R1 using the neighbor address 1.1.1.1 (R1 loopback) and source address of Loopback 0
(2.2.2.2). Note that these loopback interfaces are not directly connected (one hop away), and because
it is an eBGP neighbor relationship, you can expect the peering to fail.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Troubleshooting BGP Neighbor Adjacencies
The TTL of the BGP Packet Expires (Cont.)
Example 14-15 shows the configuration of R1 and R2. Notice that R1 is peering with R2, using the
neighbor address 2.2.2.2 (R2 loopback) and the source address of Loopback 0 (1.1.1.1). R2 is peering
with R1 using the neighbor address 1.1.1.1 (R1 loopback) and source address of Loopback 0
(2.2.2.2). Note that these loopback interfaces are not directly connected (one hop away), and because
it is an eBGP neighbor relationship, you can expect the peering to fail.
To solve this issue with eBGP
neighbors, you can modify the TTL of
eBGP packets by using the neighbor
ip_address ebgp-multihop [TTL]
command. In this case, 2 would be
enough to solve the issue. Therefore, on
R1, you can type neighbor 2.2.2.2
ebgp-multihop 2, and on R2, you can
type neighbor 1.1.1.1 ebgp-multihop 2.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Troubleshooting BGP Neighbor Adjacencies
Mismatched Authentication
BGP supports Message Digest 5 (MD5) authentication between peers. As is typical with
authentication, if any of the parameters do not match, a peering does not form, as shown in Example
14-18.
A BGP authentication mismatch generates a syslog message like the following from the TCP facility:
%TCP-6-BADAUTH: No MD5 digest from 2.2.2.2(179) to 1.1.1.1(45577) tableid – 0
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Troubleshooting BGP Neighbor Adjacencies
Misconfigured Peer Groups
When troubleshooting peer group issues, you need to look for the following possible culprits:
• You forgot to associate the neighbor ip address with the peer group - After the peer
group is created, you need to use the neighbor ip_address peer-group peer_group_ name
command to associate the neighbor with the configurations in the peer group.
• The peer group is not configured correctly - It is possible that you overlooked the fact that
what works for one neighbor might not work for the other.
• The route filter applied to the group is not appropriate for all the peers - Be careful with
filters and make sure they produce the desired results for all neighbors in the peer group.
• Order of operations produces undesired results - If there are conflicting entries between
the peer group and a specific neighbor statement, the neighbor statement wins.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Troubleshooting BGP Neighbor Adjacencies
Timers
BGP timers do not have to match. This is because BGP uses the lowest timers set between the two
neighbors. Notice in Example 14-20 that R3 is configured with a minimum hold time of 90 seconds; if a
neighbor is using more aggressive timers, those timers will not be used. The situation is far worse than
the timers simply not being used. The neighbor relationship does not form at all.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Troubleshooting BGP Neighbor Adjacencies
Timers (Cont.)
Refer to Example 14-21. In this case, R1 has a hello interval set to 10 and hold time set to 30. R3 has
the minimum hold time set to 90 seconds. Therefore, R3 does not agree with the 30-second hold time
set by R1, and the neighbor relationship fails. You can see in the output that a BGP notification states
that the hold time is not acceptable.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Troubleshooting BGP Routes
• After a BGP adjacency is formed, BGP routers exchange their BGP routes with each
other. For various reasons, BGP routes might be missing from either the BGP table or
the routing table.
• This section explains those reasons and how to identify and troubleshoot them.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Troubleshooting BGP Routes
Missing Routes
Some common reasons BGP routes might be missing from either the BGP table or the routing
table:
• Missing or bad network mask command - An accurate network command is needed to
advertise routes.
• Next-hop router not reachable - To use a BGP route, the next hop must be reachable.
• BGP split-horizon rule - A router that learns BGP routes through an iBGP peering does not
share those routes with another iBGP peer.
• Better source of information - If exactly the same network is learned from a more reliable
source, it is used instead of the BGP-learned information.
• Route filtering - A filter might be preventing a route from being shared with neighbors or
learned from neighbors.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Troubleshooting BGP Routes
Missing Routes (Cont.)
To verify the IPv4 unicast BGP-learned routes or routes locally injected into the BGP table, you
use the show bgp ipv4 unicast command as shown in Example 14-22. Routes appear in this
table for the following reasons:
• Another BGP router advertises them
to the local router.
• The network mask command
matches a route in the local routing
table.
• A redistribute command is used to
import the route from another local
source.
• The summary-address command is
used to create a summary route.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Troubleshooting BGP Routes
Missing Routes (Cont.)
To display the routing table, you use the show ip route command. To view only the BGP routes,
you issue the command show ip route bgp, as shown in Example 14-23. All BGP routes appear
with the code B at the beginning of each entry.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Troubleshooting BGP Routes
Bad or Missing Network Mask
The network mask command is used to
advertise routes into BGP. If you only
remember one thing about this command,
remember that it is extremely picky:
• The network/prefix you want to advertise
with BGP must be in the routing table
from some other source (connected,
static, or some other routing protocol).
• The network mask command must be a
perfect match to the network/prefix listed
in the routing table.
• It is important that you be able to
recognize a bad or missing network
mask command as being the reason for
missing routes.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Troubleshooting BGP Routes
Next-Hop Router Not Reachable
For a BGP router to install a BGP route in the routing table, it must be able to reach the next-hop
address listed for the network. A ping 1.1.1.1 command issued on router R5 fails, proving that the
next hop to the 10.1.1.0/26 is not reachable.
There are many different ways to solve this
problem. The key is to train R5 about how to get to
the next hop. The following are a few examples:
• Create a static default route on R2 and R3 and
advertise it into the Interior Gateway Protocol
(IGP) routing protocol.
• Create a static default route on R5.
• Create a static route on R5.
• Advertise the next-hop address into the IGP
routing protocol.
• In addition, BGP has a built-in option. It is the
neighbor ip_address next-hop-self
command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Troubleshooting BGP Routes
BGP Split-Horizon Rule
The BGP split-horizon rule states that a BGP router that receives a BGP route from an iBGP peering
shall not advertise that route to another router that is an iBGP peer. For R5 to learn about the
10.1.1.0/26 network, it has to be an iBGP peer with the router that learned about the route from an
eBGP peer or it has to be a peer with a route reflector.
Figure 14-5 indicates what the iBGP peerings should be to ensure that both R4 and R5 learn about
10.1.1.0/26 (as well as the other networks). This setup also ensures that redundancy is optimized in
the BGP AS.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Troubleshooting BGP Routes
Better Source of Information
Example 14-30 shows the output of the IPv4 unicast
BGP table on R5, using the show bgp ipv4 unicast
command.
A RIB failure means that the BGP route was not able
to be installed in the routing table; however, you can
clearly see that the route is in the routing table
because of the > symbol. In this case, the route in the
routing table is from a better source.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Troubleshooting BGP Routes
Better Source of Information (Cont.)
With regard to the 10.1.12.0/24 network, the
output of show bgp ipv4 unicast 10.1.12.0
in Example 14-32 indicates that it was
learned from R2 and R3 using iBGP
(internal), which has an AD of 200, much
higher than EIGRP’s AD.
You can verify why a route is experiencing a
RIB failure by using the show bgp ipv4
unicast rib-failure command, as shown in
Example 14-33. In this example, all three
RIB failures are due to the BGP route having
a higher AD.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Troubleshooting BGP Routes
Route Filtering
When troubleshooting missing routes, you want to
be able to determine whether a route filter is applied
and whether it is the cause of the missing routes.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Troubleshooting BGP Routes
Route Filtering (Cont.)
The show ip protocols command, as shown in Example 14-37, displays the incoming filter applied to
the BGP autonomous system. It is a distribute list using the prefix list called FILTER_10.1.13.0/24.
The prefix list is denying 10.1.13.0/24 and permitting all other routes.
This example focuses on a filter that applies to the
entire BGP process. No matter which router the
route 10.1.13.0/24 is received from, it is denied. You
can apply a filter directly to a neighbor by using any
one of the following commands:
• neighbor ip_address distribute-list
access_list_number {in | out}
• neighbor ip_address prefix-list prefix_list_name
{in | out}
• neighbor ip_address route-map map_name {in |
out}
• neighbor ip_address filter-list access_list_number
{in | out}
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Troubleshooting BGP Routes
Route Filtering (Cont.)
In Example 14-38, an inbound distribute list is applied directly to the neighbor 2.2.2.2, as shown in the
show ip protocols output. Notice that only the first six characters of the ACL are identified.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Troubleshooting BGP Path
Selection
• Unlike OSPF and EIGRP, BGP does not consider a link’s bandwidth when making a
route decision.
• BGP uses various attributes when deciding which path is the best.
• This section discusses the BGP best-path decision-making process. In addition, it
examines private ASNs.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Troubleshooting BGP Path Selection
The Best-Path Decision-Making Process
Cisco routers review BGP attributes in the following order when deciding which path is the best:
1. Prefer the highest weight
2. Prefer the highest local preference
3. Prefer the route originated by the local router
4. Prefer the path with the shorter Accumulated Interior Gateway Protocol (AIGP) metric attribute
5. Prefer the shortest AS_Path
6. Prefer the lowest origin code
7. Prefer the lowest multi-exit discriminator (MED)
8. Prefer an external path over an internal path
9. Prefer the path through the closest IGP neighbor
10. Prefer the oldest route for eBGP paths
11. Prefer the path with the lowest neighbor BGP RID
12. Prefer the path with the lowest neighbor IP address
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Troubleshooting BGP Path Selection
The Best-Path Decision-Making Process (Cont.)
When BGP finds a match, it stops and uses that attribute as the reason for choosing the path as the
best—and it looks no further. In addition, if the next-hop IP address is not reachable, the router does
not even go through the following process because it considers the next hop inaccessible:
Step 1. BGP first looks at weight. Higher is better. If the weight is tied, the next attribute is checked.
Step 2. Local preference is checked next. Higher is better. If local preference is tied, the next attribute
is checked.
Step 3. The router checks whether it generated the BGP route. If it did, it is preferred. If it did not
generate any of the routes, the next attribute is checked.
Step 4. AIGP is checked next only if it’s configured to be used, if not, then the next attribute is
checked.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Troubleshooting BGP Path Selection
The Best-Path Decision-Making Process (Cont.)
Step 5. AS_Path is checked next. The shortest path is preferred. If the AS_Path is tied, the next
attribute is checked.
Step 6. The origin code is checked next. IGP is better than EGP (the predecessor to BFP), which is
better than incomplete. IGP means the route was generated with the network mask or summary-
address, incomplete means the route was redistributed into BGP. If the origin code is the same, the
next attribute is checked.
Step 7. MED (metric) is next. Lower is better. If the MED (metric) is the same for both, the next
attribute has to be checked.
Step 8. Now eBGP is preferred over iBGP. If this attribute is tied as well, and the next has to be
checked.
Step 9. The IGP path to the neighbor is compared now. If the metrics are the same, the next attribute
has to be checked.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Troubleshooting BGP Path Selection
The Best-Path Decision-Making Process (Cont.)
Step 10. If they are eBGP paths, the ages of the routes are checked. If both paths are iBGP
paths, the next attribute is checked.
Step 11. The BGP RIDs are now compared. Lower is better. If the RID is tied, the path through the
neighbor with the lower IP address wins.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Troubleshooting BGP Path Selection
Private Autonomous System Numbers
• Like IPv4 addresses, BGP ASNs also have a private range. The 2-byte AS range is 64,512
to 65,534, and the 4-byte AS range is 4,200,000,000 to 4,294,967,294.
• These ASNs can be used for networks that are single-homed or dual-homed to the same
ISP, thereby preserving the public ASNs for networks that are multihomed to multiple ISPs.
• It is imperative that the private ASN not be in the AS_Path attribute when the routes are
advertised to the Internet (in the global BGP table) because multiple ASs could be using
the same private ASN, which would cause issues on the Internet.
• If private ASNs are being sent into the global BGP table, they need to be stopped. You can
accomplish this by using the neighbor ip_address remove-private-as command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Troubleshooting BGP Path Selection
Using debug Commands
The majority of changes that occur with BGP generate syslog messages in real time.
Therefore, you are notified through syslog if any neighbor issues occur. Avoid using the large
number of debugs that are available because they place a lot of pressure on the routers’
resources.
Here are a few debug commands that may be useful:
• debug ip routing – The output from this command shows updates to a router’s IP routing
table.
• debug ip bgp - This command can be useful in watching real-time state changes for IPv4
BGP peering relationships.
• debug ip bgp updates - This command produces more detailed output than the debug ip
bgp command. Specifically, you can see the content of IPv4 BGP updates.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Troubleshooting BGP for IPv6
• BGP for IPv4 and BGP for IPv6 are configured in the same BGP autonomous
system configuration mode, known as Multiprotocol BGP (MP-BGP).
• Implementing BGP for IPv4 and IPv6 on the same router requires the use of address
families and the activation of neighbors for those address families.
• This section examines the additional issues that you might encounter when using MP-
BGP with IPv4 and IPv6 unicast routes.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Troubleshooting BGP for IPv6
MP-BGP
There are two different ways to exchange IPv6 routes with BGP. You can exchange them over IPv4
TCP sessions or over IPv6 TCP sessions. Example 14-45 shows a sample BGP configuration in
which IPv6 routes are exchanged over an IPv4 TCP session. Notice that there are two address
families: one for IPv4 unicast, and one for IPv6 unicast.
Example 14-45 MP-BGP Configuration for IPv6 Routes over an IPv4 TCP Session
The neighbors and remote ASNs are identified
outside the address family (AF) configuration. You
then activate the neighbor within the AF with the
neighbor ip_address activate command.
In this example, the IPv6 AF is using an IPv4
neighbor address to establish the TCP session.
Therefore, the TCP session is IPv4 based.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Troubleshooting BGP for IPv6
MP-BGP (Cont.)
To verify the IPv6 unicast routes that have been learned from all neighbors, you can issue the show
bgp ipv6 unicast command, as shown in Example 14-47. Its output displays the IPv6 BGP table.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Troubleshooting BGP for IPv6
MP-BGP (Cont.)
As shown in Example 14-50, to form the IPv6
TCP session, define the neighbor by using the
neighbor ipv6_address remote-as
autonomous_system_number command
outside the AF configuration, and then you
activate the neighbor in the IPv6 AF
configuration by using the neighbor
ipv6_address activate command.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Troubleshooting BGP for IPv6
MP-BGP (Cont.)
The output of show bgp ipv6 unicast
summary, as shown in Example 14-51,
indicates that R1 has formed an IPv6 BGP
neighbor adjacency with the device at
2001:db8:12::2 using an IPv6 TCP session,
and one prefix has been received.
The IPv6 BGP table, as displayed in the
output of the show bgp ipv6 unicast
command in Example 14-52, indicates that
2001:DB8:2::/64 can be reached with a next
hop of 2001:DB8:12::2 and that it is installed
in the routing table, as indicated by the *>.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
BGP Trouble Tickets
• This section presents trouble tickets related to the topics discussed earlier
in this chapter.
• The purpose of these trouble tickets is to show a process that you can use
when troubleshooting in the real world or in an exam environment.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
BGP Trouble Tickets
Trouble Ticket 14-1: BGP Routes
Problem: You are the administrator for BGP AS
65502. While you were away on vacation, the
link between R1 and R2 failed. When the link
between R1 and R2 fails, the link between R1
and R3 is supposed to forward traffic to BGP
AS 65501. However, that did not occur while
you were away. Your co-worker had to restore
connectivity between R1 and R2, and
complaints kept flowing in from the users in
10.1.5.0/24 about connectivity to the
10.1.1.0/24
networks being down.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
BGP Trouble Tickets
Trouble Ticket 14-2: Layer 3 Connectivity
Problem: You are the administrator for BGP
AS 65501. Users in the 10.1.1.0/26 and
10.1.1.64/26 networks have indicated that
they are not able to access resources located
at 10.1.5.5. However, they can access
resources locally.
You begin troubleshooting by issuing two
pings on R1 to 10.1.5.5 and sourcing them
from 10.1.1.1 and 10.1.1.65.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
BGP Trouble Tickets
Trouble Ticket 14-3: Backup Link
Problem: You are the administrator for BGP
AS 65502. Traffic reports indicate that all
traffic out of the autonomous system is
flowing through R3 and across the backup
link. This is undesirable unless the link
between R2 and R1 fails.
To verify the issue, you use traceroute from
R5.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
MP-BGP Trouble Ticket
• This section presents trouble tickets related to the topics discussed earlier
in this chapter.
• The purpose of these trouble tickets is to show a process that you can use
when troubleshooting in the real world or in an exam environment.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
MP-BGP Trouble Tickets
Trouble Ticket 14-4: MP-eBGP
Problem: You are an administrator of BGP AS
65501. Another administrator in your AS has
asked you for help. The default route from
your ISP is not being learned by your router
(R1) using BGP. As a result, no one in your
AS is able to reach the Internet.
You start by confirming the issue by using the
show ipv6 route command on R1.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Prepare for the Exam
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Prepare for the Exam
Key Topics for Chapter 14
Description
Verifying BGP neighbors with show bgp ipv4 unicast summary
How BGP TCP sessions are formed and how you can control the server and client
for the TCP session
Manipulating the TTL of an eBGP packet
How the minimum hold time parameter can prevent BGP neighbor relationships
The reasons a BGP route might be missing from the BGP table or the routing table
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Prepare for the Exam
Key Topics for Chapter 14 (Cont.)
Description
Examining the BGP table
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Prepare for the Exam
Key Terms for Chapter 14
Terms
BGP TTL
iBGP Weight
ISP AS_Path
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Prepare for the Exam
Command Reference for Chapter 14
Task Command Syntax
Display a router’s BGP RID, ASN, information about the BGP’s show bgp {ipv4 | ipv6} unicast summary
memory usage, and summary information about IPv4/IPv6 unicast
BGP neighbors
Display detailed information about all the IPv4/IPv6 BGP neighbors show bgp {ipv4 | ipv6} unicast neighbors
of a router
Display the IPv4/IPv6 network prefixes present in the IPv4/IPv6 show bgp {ipv4 | ipv6} unicast
BGP table
Show routes known to a router’s IPv4/IPv6 routing table that were show {ipv4 | ipv6} route bgp
learned from BGP
Show real-time information about BGP events, such as the debug ip bgp
establishment of a peering relationship
Show real-time information about BGP updates sent and received debug ip bgp updates
by a BGP router
Display updates that occur in a router’s IP routing table debug ip routing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56