Hi.
This can be done by route-leaking. I dont have a SAR to test this with at the moment, but on SR, its done by the following:
1) Create the routing policy to enable VPRN to GRT leak:
Code: Select all
configure
router "Base"
policy-options
-------------------------------------------------------------------------------
*A:R1>config>router>policy-options# info
----------------------------------------------
prefix-list "VPRN2GRT"
prefix 192.168.1.0/24 exact
exit
policy-statement "VRPN2GRT"
entry 10
from
prefix-list "VPRN2GRT"
exit
action accept
exit
exit
exit
In the VPRN (1234 in my case), enable GRT lookup, create static route for the GRT route(s) and export the VPRN route(s) to GRT:
Code: Select all
configure
service
vprn "1234"
-------------------------------------------------------------------------------
*A:R1>config>service>vprn# info
----------------------------------------------
route-distinguisher 1234:1234
interface "vprn" create
address 192.168.1.1/24
sap 1/1/c3/1:1111 create
exit
exit
static-route-entry 10.0.0.0/16
grt
no shutdown
exit
exit
grt-lookup
enable-grt
allow-local-management
exit
export-grt "VRPN2GRT"
exit
no shutdown
So, I have a loopback for this test:
Code: Select all
*A:R1# show router interface "loop1"
===============================================================================
Interface Table (Router: Base)
===============================================================================
Interface-Name Adm Opr(v4/v6) Mode Port/SapId
IP-Address PfxState
MACSec Admin subport encap ca-name
-------------------------------------------------------------------------------
loop1 Up Up/Down Network loopback
10.0.0.1/32 n/a
- - - -
-------------------------------------------------------------------------------
Verify that the routes are visible in both GRT and VPRN routing table:
GRT:
Code: Select all
*A:R1# show router route-table protocol vpn-leak
===============================================================================
Route Table (Router: Base)
===============================================================================
Dest Prefix[Flags] Type Proto Age Pref
Next Hop[Interface Name] Metric
-------------------------------------------------------------------------------
192.168.1.0/24 Remote VPN Leak 00h04m39s 180
vprn 0
-------------------------------------------------------------------------------
No. of Routes: 1
VPRN:
Code: Select all
*A:R1# show router 1234 route-table
===============================================================================
Route Table (Service: 1234)
===============================================================================
Dest Prefix[Flags] Type Proto Age Pref
Next Hop[Interface Name] Metric
-------------------------------------------------------------------------------
10.0.0.0/16 Blackh* Static 00h17m29s 5
Black Hole 1
192.168.1.0/24 Local Local 00h12m20s 0
vprn 0
-------------------------------------------------------------------------------
No. of Routes: 2
Test:
Code: Select all
*A:R1# ping router 1234 10.0.0.1
PING 10.0.0.1 56 data bytes
64 bytes from 10.0.0.1: icmp_seq=1 ttl=64 time=0.575ms.
64 bytes from 10.0.0.1: icmp_seq=2 ttl=64 time=0.177ms.
64 bytes from 10.0.0.1: icmp_seq=3 ttl=64 time=0.342ms.
64 bytes from 10.0.0.1: icmp_seq=4 ttl=64 time=0.212ms.
64 bytes from 10.0.0.1: icmp_seq=5 ttl=64 time=0.212ms.
If this is not available on the 7705, I guess you need to loop some ports to create the link between GRT and VPRN.