1、实验测试拓扑

2、实验目的

验证MED本地有效,不可传递

3、实验配置

R1:

<r1>display current-configuration  

[V200R003C00]

#

sysname r1

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 10.1.1.1 255.255.255.0  

#

interface GigabitEthernet0/0/1

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

interface LoopBack0

ip address 192.168.1.1 255.255.255.0  

#

bgp 100

peer 10.1.1.2 as-number 200  

peer 10.1.1.2 ebgp-max-hop 2  

#

ipv4-family unicast

 undo synchronization

 network 192.168.1.0  

 peer 10.1.1.2 enable

#

ipv6-family unicast

 undo synchronization

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<r1>

R2:

<r2>display current-configuration  

[V200R003C00]

#

sysname r2

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

isis 100

is-level level-2

cost-style wide

network-entity 49.0001.0020.0200.2002.00

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 10.1.1.2 255.255.255.0  

isis enable 100

#

interface GigabitEthernet0/0/1

ip address 20.1.1.1 255.255.255.0  

isis enable 100

#

interface GigabitEthernet0/0/2

ip address 30.1.1.1 255.255.255.0  

isis enable 100

#

interface NULL0

#

interface LoopBack0

ip address 2.2.2.2 255.255.255.255  

isis enable 100

#

bgp 200

peer 5.5.5.5 as-number 200  

peer 5.5.5.5 connect-interface LoopBack0

peer 10.1.1.1 as-number 100  

#

ipv4-family unicast

 undo synchronization

 peer 5.5.5.5 enable

 peer 10.1.1.1 enable

 peer 10.1.1.1 next-hop-local  

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<r2>

R3:

<r3>display current-configuration  

[V200R003C00]

#

sysname r3

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

isis 100

is-level level-2

cost-style wide

network-entity 49.0001.0030.0300.3003.00

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 20.1.1.2 255.255.255.0  

isis enable 100

#

interface GigabitEthernet0/0/1

ip address 40.1.1.1 255.255.255.0  

isis enable 100

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

interface LoopBack0

ip address 3.3.3.3 255.255.255.255  

isis enable 100

#

bgp 200

router-id 3.3.3.3

peer 5.5.5.5 as-number 200  

peer 5.5.5.5 connect-interface LoopBack0

#

ipv4-family unicast

 undo synchronization

 peer 5.5.5.5 enable

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<r3>

R4:

<r4>display current-configuration  

[V200R003C00]

#

sysname r4

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

isis 100

is-level level-2

cost-style wide

network-entity 49.0001.0040.0400.4004.00

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 40.1.1.2 255.255.255.0  

isis enable 100

#

interface GigabitEthernet0/0/1

ip address 50.1.1.2 255.255.255.0  

isis enable 100

#

interface GigabitEthernet0/0/2

ip address 60.1.1.1 255.255.255.0  

isis enable 100

#

interface NULL0

#

interface LoopBack0

ip address 4.4.4.4 255.255.255.255  

isis enable 100

#

bgp 200

peer 5.5.5.5 as-number 200  

peer 5.5.5.5 connect-interface LoopBack0

peer 60.1.1.2 as-number 300  

#

ipv4-family unicast

 undo synchronization

 peer 5.5.5.5 enable

 peer 60.1.1.2 enable

 peer 60.1.1.2 next-hop-local  

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<r4>

R5:

<r5>display current-configuration  

[V200R003C00]

#

sysname r5

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

isis 100

is-level level-2

cost-style wide

network-entity 49.0001.0050.0500.5005.00

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 30.1.1.2 255.255.255.0  

isis enable 100

#

interface GigabitEthernet0/0/1

ip address 50.1.1.1 255.255.255.0  

isis enable 100

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

interface LoopBack0

ip address 5.5.5.5 255.255.255.255  

isis enable 100

#

bgp 200

router-id 5.5.5.5

peer 2.2.2.2 as-number 200  

peer 2.2.2.2 connect-interface LoopBack0

peer 3.3.3.3 as-number 200  

peer 3.3.3.3 connect-interface LoopBack0

peer 4.4.4.4 as-number 200  

peer 4.4.4.4 connect-interface LoopBack0

#

ipv4-family unicast

 undo synchronization

 peer 2.2.2.2 enable

 peer 2.2.2.2 reflect-client

 peer 3.3.3.3 enable

 peer 3.3.3.3 reflect-client

 peer 4.4.4.4 enable

 peer 4.4.4.4 reflect-client

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<r5>

R6

<r6>display current-configuration  

[V200R003C00]

#

sysname r6

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 60.1.1.2 255.255.255.0  

#

interface GigabitEthernet0/0/1

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

interface LoopBack0

ip address 172.16.1.1 255.255.255.0  

#

bgp 300

router-id 6.6.6.6

peer 60.1.1.1 as-number 200  

peer 60.1.1.1 ebgp-max-hop 2  

#

ipv4-family unicast

 undo synchronization

 network 172.16.1.0 255.255.255.0  

 peer 60.1.1.1 enable

 peer 60.1.1.1 route-policy in export

#

route-policy in permit node 10  

if-match ip-prefix MED  

apply cost 100  

#

ip ip-prefix MED index 10 permit 172.16.1.0 24

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<r6>

4、核心配置

第一步:筛选感应兴趣流

ip ip-prefix MED index 10 permit 172.16.1.0 24

第二步:匹配路由策略

route-policy in permit node 10  

if-match ip-prefix MED  

apply cost 100  

第三步:应用路由策略

bgp 300

router-id 6.6.6.6

peer 60.1.1.1 as-number 200  

peer 60.1.1.1 ebgp-max-hop 2  

#

ipv4-family unicast

 undo synchronization

 network 172.16.1.0 255.255.255.0  

 peer 60.1.1.1 enable

 peer 60.1.1.1 route-policy in export

5、实验结果

MED验证,本地有效_ci

MED验证,本地有效_Standard_02

MED验证,本地有效_Time_03

MED属性只在本区域和相邻区域有效,并非全局有效