How to Decipher Cisco Route Maps

Home > Blogs > Cisco > How to Decipher Cisco Route Maps

How to Decipher Cisco Route Maps

Like This Blog 1 Mark Jacob
Added by January 9, 2013

In my last blog How to interpret Cisco IP prefix lists, I mentioned that I would discuss using prefix lists to filter routes. Before we can go there, there is another piece of the puzzle which must be addressed. That piece is the topic of route maps. Let’s take a look at the concept of route maps and their importance in the network admin arena.

First of all, if you are already familiar with Access Control Lists (ACL), route maps won’t be such a giant leap. Secondly, there are some similarities between ACLs and route maps. Like ACLs, route maps are an ordered list of statements which are analyzed in sequence. If a matching statement occurs, processing of the list ceases and whatever the match says to do is done. You might wonder then why route maps exist if ACLs do the same thing. The answer to this rests on the meaning of the word ‘similar.’ While ACLs and route maps are similar, there are some crucial differences. While both may permit (or deny) certain routes being redistributed, route maps can actually modify certain aspects of the redistributed routes. This cannot be accomplished with ACLs.

The format of route maps is actually quite simple. Each statement typically consists of a match and a set command. I think of it as the tennis command!

It might make more sense to actually see an example of a route map and its consequences.

Test-rtr (config)# route-map RM-BGP permit 10

Test-rtr (config-route-map)# match ip address 125

Test-rtr (config-route-map)# set tag 5

Test-rtr (config)# route-map RM-BGP permit 20

Test-rtr (config-route-map)# set tag 10

Test-rtr (config)#router bgp 1

Test-rtr (config-router)# neighbor 1.2.3.4 remote-as 2

Test-rtr (config-router)# neighbor 1.2.3.4 route-map RM-BGP in

The first part of the route map command applies tag '5' to any route which matches the statements in ACL 125 (not shown) and tag '10' to any other route. The reason for the setting of tag '10' on everything else rests in deciphering the logic of the second part of the command. Notice that there is no 'match' statement prior to the second 'set' statement. This means 'match everything else.' The last statement also indicates that the route map affects inbound traffic. It turns out that route maps are always used to modify inbound traffic. They have no effect on outbound traffic. For reference, see Route-Maps for IP Routing Protocol Redistribution Configuration.

This is just a brief overview of route maps. I am trying to build, using small pieces, an overall picture of the use of prefix lists, route maps, and redistribution, to influence, modify, and control routing traffic on your router. I hope you stay tuned for the complete picture. Next time I will discuss the use of the redistribute command and try to tie together all these pieces.

Happy routing!

Mark Jacob
Cisco Instructor – Interface Technical Training
Phoenix, AZ

Videos You May Like

A Simple Introduction to Cisco CML2

0 3877 0

Mark Jacob, Cisco Instructor, presents an introduction to Cisco Modeling Labs 2.0 or CML2.0, an upgrade to Cisco’s VIRL Personal Edition. Mark demonstrates Terminal Emulator access to console, as well as console access from within the CML2.0 product. Hello, I’m Mark Jacob, a Cisco Instructor and Network Instructor at Interface Technical Training. I’ve been using … Continue reading A Simple Introduction to Cisco CML2

Cable Testers and How to Use them in Network Environments

0 724 1

This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader demonstrates how to use cable testers in network environments. Let’s look at some tools that we can use to test our different cables in our environment. Cable Testers Properly Wired Connectivity … Continue reading Cable Testers and How to Use them in Network Environments

Government Edition – Encrypting a USB Flash Drive in Windows 10

0 276 2

In this video, Security Instructor Mike Danseglio demonstrates how to use BitLocker in Window 10 to secure files on a USB Flash drive that adhere to stricter data protection requirements as found inside Government entities. BitLocker 2-day instructor-led training is now available at Interface: BITLOCK: Planning and Deploying BitLocker Drive Encryption Training Video Transcription: Hi. … Continue reading Government Edition – Encrypting a USB Flash Drive in Windows 10

Write a Comment

See what people are saying...

  1. Pingback: How to redistribute routes using Cisco route maps and IP prefix lists

Share your thoughts...

Please fill out the comment form below to post a reply.