July 2015 - Reading Time: ~9 minutes
Route redistribution can be a powerful technique for connecting different routing domains, protocols, or administrative boundaries. However, when improperly configured, it can introduce severe problems such as routing loops, suboptimal paths, and even black holes that silently drop traffic. This post explores how redistribution works, the risks involved, and techniques to ensure safe, efficient route redistribution in your enterprise network.
What Is Route Redistribution?
Route redistribution allows routes learned by one routing protocol to be advertised into another. This is useful when transitioning from one protocol to another (e.g., EIGRP to OSPF), or when integrating networks acquired during a merger.
Consider a network that uses EIGRP internally but must share connectivity with a provider running OSPF. Redistribution makes this possible—but not without introducing risk. Each protocol calculates metrics differently, lacks awareness of the other's internal topologies, and may create asymmetric paths.
Common Redistribution Scenarios
- Mutual Redistribution: Injecting routes in both directions (e.g., OSPF ↔ EIGRP)
- Partial Redistribution: One-way sharing of routes (e.g., static → OSPF)
- Multiple AS Integration: Combining domains with different protocols during M&A or inter-domain peering
Mutual redistribution, while common, is particularly susceptible to routing loops.
Pitfall 1: Routing Loops
Loops often result when redistributed routes are re-learned and re-advertised in a circular fashion across protocol boundaries. Consider this scenario:
- Route A exists in EIGRP
- It is redistributed into OSPF
- OSPF advertises Route A back into EIGRP (now as external)
- EIGRP prefers the new external route over the internal, due to metric manipulation or administrative distance
This loop creates instability and traffic misdirection. Without proper filtering and tagging, the router cannot differentiate between the original and redistributed versions of the same route.
Solution: Route Tagging
To prevent loops, apply route tags during redistribution. Tags act as metadata that inform the receiving protocol about the route’s origin.
router ospf 10
redistribute eigrp 100 subnets tag 100
router eigrp 100
redistribute ospf 10 metric 10000 100 255 1 1500 route-map BLOCK_OSPF_TAG
route-map BLOCK_OSPF_TAG deny 10
match tag 100
route-map BLOCK_OSPF_TAG permit 20
In this example, OSPF routes tagged with 100 will be filtered out by EIGRP, preventing re-injection of external routes.
Pitfall 2: Metric Mismatches
Protocols use different metrics: OSPF uses cost, EIGRP uses bandwidth and delay. Without careful planning, redistributed routes may have absurd metrics, causing poor path selection or path flapping.
Solution: Define Metrics Explicitly
Always define metrics during redistribution. Relying on defaults may result in inconsistent behavior or loops. Consider using route-maps to apply metrics and selectively filter undesirable routes.
router ospf 1
redistribute eigrp 1 subnets metric-type 1 metric 10
Pitfall 3: Subnet Inconsistencies
Redistribution without including subnet information can collapse multiple prefixes into a single advertisement, causing reachability issues or loss of granularity.
Use the subnets
keyword to ensure all routes are properly advertised:
redistribute eigrp 100 subnets
Design Best Practices
- Use route tagging religiously
- Implement route-maps to control what is redistributed
- Monitor redistributed routes with logging and route tracking
- Avoid mutual redistribution unless absolutely necessary
- Use summarization to reduce route churn
Lab Simulation: OSPF-EIGRP Redistribution
Set up a small lab with two routers: R1 running EIGRP and R2 running OSPF. Connect them via a common interface and configure mutual redistribution. Tag routes from EIGRP with tag 100, then apply a route-map on R2 to block those tagged routes from being redistributed back.
This exercise reinforces tagging and filtering while visualizing how loops may emerge without protection.
Conclusion
Redistribution is not a set-and-forget tool—it demands careful planning, deep understanding of routing behavior, and continuous monitoring. Use route-maps, tagging, metric definition, and thorough testing to protect your network from inadvertent instability. A clean, loop-free redistribution design can make multi-protocol integration seamless and secure.
No comments:
Post a Comment