Internet Reachability between VRFs
Load nat44.vpn.lab3.init.cfg
#IOS-XE
config replace flash:nat44.vpn.lab3.init.cfg
#IOS-XR
configure
load bootflash:nat44.vpn.lab3.init.cfg
commit replace
y
The R2-R1 link is now in the INET VRF. R8, the CE for VPN_A, has been given 100.8.8.8/32 as a public address it can use to reach the internet. This is already set on R8 as loopback100.
Configure route leaking so that R8 can ping 8.8.8.8 sourced from 100.8.8.8/32.
Answer
Explanation
This lab does not use NAT, but instead demonstrates how a customer can use public address space to reach the internet within their L3VPN.
First R2 configures and originates a 0/0 into the INET VRF so that other PEs can import this into their customer VRFs.
Next, R2 imports the public 100.8.8.8/32 route into the INET VRF. To do this, we must use an import map to control which prefixes are imported. We only want to import this one /32 from the VPN_A VRF, and we still need to import all other INET prefixes (with a 100:0 RT).
On R5, we do the opposite. We import only the 0/0 route from the INET VRF into the customer VRF.
R8 now has a 0/0 route in its BGP table:

On R5, this points to R2 in the INET VRF:

R2 routes back to 100.8.8.8/32 via the VPN_A route that it is importing into the INET VRF.

The end result is that R8 can ping 8.8.8.8, but only if sourced from Lo100.

Conclusion
This lab shows a basic example of extranets. VPN routes can be leaked between VRFs by importing the RT of the remote VRF. Import route-maps control which routes are imported from each VPN.
Last updated