• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

BGP Routing Issue: Traffic Still Preferring Default Route Despite Prepending and MED Adjustments

FRR
4
31
2.5k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    michmoor LAYER 8 Rebel Alliance @Kevin S Pare
    last edited by Feb 6, 2025, 11:43 PM

    @Kevin-S-Pare

    If you have the Netgate 8200 or 8300 I forget which one you said, I would seriously reach out to Netgate sales and ask for TNSR. It’s close to Cisco syntax and it’s better suited for your task

    Firewall: NetGate,Palo Alto-VM,Juniper SRX
    Routing: Juniper, Arista, Cisco
    Switching: Juniper, Arista, Cisco
    Wireless: Unifi, Aruba IAP
    JNCIP,CCNP Enterprise

    1 Reply Last reply Reply Quote 0
    • M
      marcosm Netgate @Kevin S Pare
      last edited by marcosm Feb 7, 2025, 1:06 AM Feb 7, 2025, 12:57 AM

      @Kevin-S-Pare said in BGP Routing Issue: Traffic Still Preferring Default Route Despite Prepending and MED Adjustments:

      @michmoor
      I actually have that enabled….i forced the gateway down but it still didn’t reset the states until it was actually down…

      The "force gateway down feature" is a bit misleading and could probably use better wording and or further consideration. Forcing the gateway down doesn't trigger the same action as a link/packet issue hence why it doesn't kill states. If the gateway is forced down, it shouldn't be getting used so the states that already exist on it won't come back once they expire. If you want to immediately kill the states on top of preventing the gateway from being used, then you can force it down then separately kill states for that gateway from either Status > Gateways or Diagnostics > States.

      FWIW it sounds like you may have TAC. They are a great resource and ultimately would have been able to explain/resolve both the state policy and gateway issue.

      @michmoor brings up some good points about stateful filtering for routing. It does sound like TNSR would be better suited in your environment but that's not to say pfSense couldn't be made to work either. There have been times I've made the same decision to try an alternative product to then later on learn more about the issue and realize how it could have been solved. At the same time for better and worse the alternative brought its own challenges. Those kinds of things keep you humble.

      M 1 Reply Last reply Feb 7, 2025, 11:53 PM Reply Quote 1
      • A
        amithb @Kevin S Pare
        last edited by amithb Feb 7, 2025, 12:16 PM Feb 7, 2025, 12:16 PM

        @Kevin-S-Pare said in BGP Routing Issue: Traffic Still Preferring Default Route Despite Prepending and MED Adjustments:

        @amithb we host hundreds of citrix sessions, and with the states low we are getting complaints about disconnects so we've change the settings back and will be looking to replace pfsense as our bgp router....just isn't working how we need it.

        @Kevin-S-Pare - No worries. I think I got some ideas to try from the conversation here.

        1 Reply Last reply Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @marcosm
          last edited by Feb 7, 2025, 11:53 PM

          @marcosm The FRR with stateful handling is a big deal. Will there be any incoming fix? Redmine was noted a few posts above

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          M 1 Reply Last reply Feb 10, 2025, 4:23 PM Reply Quote 0
          • M
            marcosm Netgate @michmoor
            last edited by Feb 10, 2025, 4:23 PM

            @michmoor If you're referring to #14630, I can't say for sure but it may be something I could look at for 25.07.

            M 2 Replies Last reply Feb 10, 2025, 5:11 PM Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @marcosm
              last edited by Feb 10, 2025, 5:11 PM

              @marcosm Yes if that can be reviewed that would be great. As outlined in the ticket, dynamic routing just plainly doesn't work and there are no workable in-place solutions. As of now FRR would only work with a single routing adjacency.

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @marcosm
                last edited by Feb 11, 2025, 12:20 AM

                @marcosm
                Curious but is the only way to have dynamic failover with BGP/OSPF is to manually kill states? Looking for confirmation for the best path forward.

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                M 1 Reply Last reply Feb 11, 2025, 7:41 PM Reply Quote 0
                • M
                  marcosm Netgate @michmoor
                  last edited by marcosm Feb 28, 2025, 6:59 PM Feb 11, 2025, 7:41 PM

                  @michmoor I don't know. I have a lab set up for BGP/OSPF but I need to spend time testing and understanding what exactly is happening.

                  Edit: See https://forum.netgate.com/topic/196577.

                  M 1 Reply Last reply Feb 14, 2025, 6:05 PM Reply Quote 1
                  • M
                    michmoor LAYER 8 Rebel Alliance @marcosm
                    last edited by Feb 14, 2025, 6:05 PM

                    @marcosm
                    I saw your change of the clarification of killing states in the gateway group (redmine). I think the wording is better as it makes reference to states formed using POLICY. Should you put something like "POLICY ONLY" or "POLICY ONLY not FRR" or something to that affect?

                    To me at least it tells me that for sure states created due to FRR is omitted.

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    M 1 Reply Last reply Feb 14, 2025, 10:00 PM Reply Quote 0
                    • M
                      marcosm Netgate @michmoor
                      last edited by Feb 14, 2025, 10:00 PM

                      @michmoor It's not specific to FRR so I don't it warrants mentioning that specifically on those options. To clarify, I updated the description for the global options, though looking at the gateway groups themselves they could use clarification as well.

                      M 1 Reply Last reply Feb 14, 2025, 10:04 PM Reply Quote 1
                      • M
                        michmoor LAYER 8 Rebel Alliance @marcosm
                        last edited by Feb 14, 2025, 10:04 PM

                        @marcosm understood. i was just adding unsolicited feedback :)

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        1 Reply Last reply Reply Quote 0
                        30 out of 31
                        • First post
                          30/31
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.