- Cisco BGP Overview
- Configuring a Basic BGP Network
- Connecting to a Service Provider Using External BGP
- Configuring BGP Neighbor Session Options
- Configuring Internal BGP Features
- Configuring Advanced BGP Features
- BGP Link Bandwidth
- iBGP Multipath Load Sharing
- BGP Multipath Load Sharing for Both eBGP and iBGP in an MPLS-VPN
- Loadsharing IP Packets Over More Than Six Parallel Paths
- BGP Policy Accounting
- BGP Policy Accounting Output Interface Accounting
- BGP Cost Community
- BGP Support for IP Prefix Import from Global Table into a VRF Table
- Per-VRF Assignment of BGP Router ID
- BGP Next Hop Unchanged
BGP Policy Accounting
Border Gateway Protocol (BGP) policy accounting measures and classifies IP traffic that is sent to, or received from, different peers. Policy accounting is enabled on an input interface, and counters based on parameters such as community list, autonomous system number, or autonomous system path are assigned to identify the IP traffic.
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites
Before using the BGP Policy Accounting feature, you must enable BGP and CEF or dCEF on the router.
Information About BGP Policy Accounting
BGP Policy Accounting Overview
Border Gateway Protocol (BGP) policy accounting measures and classifies IP traffic that is sent to, or received from, different peers. Policy accounting is enabled on an input interface, and counters based on parameters such as community list, autonomous system number, or autonomous system path are assigned to identify the IP traffic.
Using the BGP table-map command, prefixes added to the routing table are classified by BGP attribute, autonomous system number, or autonomous system path. Packet and byte counters are incremented per input interface. A Cisco IOS policy-based classifier maps the traffic into one of eight possible buckets, representing different traffic classes.
Using BGP policy accounting, you can account for traffic according to the route it traverses. Service providers (SPs) can identify and account for all traffic by customer and bill accordingly. In the figure below, BGP policy accounting can be implemented in Router A to measure packet and byte volumes in autonomous system buckets. Customers are billed appropriately for traffic that is routed from a domestic, international, or satellite source.
Figure 1 | Sample Topology for BGP Policy Accounting |
BGP policy accounting using autonomous system numbers can be used to improve the design of network circuit peering and transit agreements between Internet service providers (ISPs).
Benefits of BGP Policy Accounting
Account for IP Traffic Differentially
BGP policy accounting classifies IP traffic by autonomous system number, autonomous system path, or community list string, and increments packet and byte counters. Service providers can account for traffic and apply billing, according to the route specific traffic traverses.
Efficient Network Circuit Peering and Transit Agreement Design
Implementing BGP policy accounting on an edge router can highlight potential design improvements for peering and transit agreements.
How to Configure BGP Policy Accounting
- Specifying the Match Criteria for BGP Policy Accounting
- Classifying the IP Traffic and Enabling BGP Policy Accounting
- Verifying BGP Policy Accounting
- Monitoring and Maintaining BGP Policy Accounting
Specifying the Match Criteria for BGP Policy Accounting
The first task in configuring BGP policy accounting is to specify the criteria that must be matched. Community lists, autonomous system paths, or autonomous system numbers are examples of BGP attributes that can be specified and subsequently matched using a route map.
To specify the BGP attribute to use for BGP policy accounting and create the match criteria in a route map, use the following commands in global configuration mode:
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
|
Creates a community list for BGP and controls access to it. This step must be repeated for each community to be specified. |
|
|
Enters route-map configuration mode and defines the conditions for policy routing. The map-name argument identifies a route map. The optional permit and deny keywords work with the match and set criteria to control how the packets are accounted for. The optional sequence-number argument indicates the position a new route map is to have in the list of route maps already configured with the same name. |
|
|
Matches a BGP community. |
|
|
Indicates where to output packets that pass a match clause of a route map for BGP policy accounting. |
Classifying the IP Traffic and Enabling BGP Policy Accounting
After a route map has been defined to specify match criteria, you must configure a way to classify the IP traffic before enabling BGP policy accounting.
Using the table-map command, BGP classifies each prefix it adds to the routing table based on the match criteria. When the bgp-policy accounting command is configured on an interface, BGP policy accounting is enabled.
To classify the IP traffic and enable BGP policy accounting, use the following commands beginning in global configuration mode:
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
|
Configures a BGP routing process and enters router configuration mode for the specified routing process. |
|
|
Classifies BGP prefixes entered in the routing table. |
|
|
Specifies a network to be advertised by the BGP routing process. |
|
|
Specifies a BGP peer by adding an entry to the BGP routing table. |
|
|
Exits to global configuration mode. |
|
|
Specifies the interface type and number and enters interface configuration mode. |
|
|
Configures the interface to drop directed broadcasts destined for the subnet to which that interface is attached, rather than being broadcast. This is a security issue. |
|
|
Configures the interface with an IP address. |
|
|
Enables BGP policy accounting for the interface. |
Verifying BGP Policy Accounting
To verify that BGP policy accounting is operating, perform the following steps:
DETAILED STEPS
Step 1 | Enter the show ip cef EXEC command with the detail keyword to learn which accounting bucket is assigned to a specified prefix. In this example, the output is displayed for the prefix 192.168.5.0. It shows that the accounting bucket number 4 (traffic_index 4) is assigned to this prefix. Example: Router# show ip cef 192.168.5.0 detail 192.168.5.0/24, version 21, cached adjacency to POS7/2 0 packets, 0 bytes, traffic_index 4 via 10.14.1.1, 0 dependencies, recursive next hop 10.14.1.1, POS7/2 via 10.14.1.0/30 valid cached adjacency |
Step 2 | Enter the show ip bgp EXEC command for the same prefix used in Step 1--192.168.5.0-- to learn which community is assigned to this prefix. In this example, the output is displayed for the prefix 192.168.5.0. It shows that the community of 100:197 is assigned to this prefix. Example: Router# show ip bgp 192.168.5.0 BGP routing table entry for 192.168.5.0/24, version 2 Paths: (1 available, best #1) Not advertised to any peer 100 10.14.1.1 from 10.14.1.1 (32.32.32.32) Origin IGP, metric 0, localpref 100, valid, external, best Community: 100:197 |
Step 3 | Enter the show cef interface policy-statistics EXEC command to display the per-interface traffic statistics. In this example, the output shows the number of packets and bytes that have been assigned to each accounting bucket: Example: LC-Slot7# show cef interface policy-statistics POS7/0 is up (if_number 8) Bucket Packets Bytes 1 0 0 2 0 0 3 50 5000 4 100 10000 5 100 10000 6 10 1000 7 0 0 8 0 0 |
Monitoring and Maintaining BGP Policy Accounting
To monitor and maintain the BGP Policy Accounting feature, use the following commands in EXEC mode, as needed:
Command |
Purpose |
---|---|
Router# show cef interface [type number] policy-statistics |
Displays detailed CEF policy statistical information for all interfaces. |
Router# show ip bgp [network] [network mask] [longer-prefixes] |
Displays entries in the BGP routing table. |
Router# show ip cef [network [mask]] [detail] |
Displays entries in the Forwarding Information Base (FIB) or FIB summary information. |
Configuration Examples
- Specifying the Match Criteria for BGP Policy Accounting Example
- Classifying the IP Traffic and Enabling BGP Policy Accounting Example
Specifying the Match Criteria for BGP Policy Accounting Example
In the following example, BGP communities are specified in community lists, and a route map named set_bucket is configured to match each of the community lists to a specific accounting bucket using the set traffic-index command:
ip community-list 30 permit 100:190 ip community-list 40 permit 100:198 ip community-list 50 permit 100:197 ip community-list 60 permit 100:296 ! route-map set_bucket permit 10 match community 30 set traffic-index 2 ! route-map set_bucket permit 20 match community 40 set traffic-index 3 ! route-map set_bucket permit 30 match community 50 set traffic-index 4 ! route-map set_bucket permit 40 match community 60 set traffic-index 5
Classifying the IP Traffic and Enabling BGP Policy Accounting Example
In the following example, BGP policy accounting is enabled on POS interface 7/0 and the table-map command is used to modify the bucket number when the IP routing table is updated with routes learned from BGP:
router bgp 65000 table-map set_bucket network 10.15.1.0 mask 255.255.255.0 neighbor 10.14.1.1 remote-as 65100 ! ip classless ip bgp-community new-format ! interface POS7/0 ip address 10.15.1.2 255.255.255.0 no ip directed-broadcast bgp-policy accounting no keepalive crc 32 clock source internal
Additional References
Related Documents
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
BGP commands |
Cisco IOS IP Routing: BGP Command Reference |
Cisco Express Forwarding (CEF) and distributed CEF (dCEF) commands |
Cisco IOS IP Switching Command Reference |
Cisco Express Forwarding (CEF) and distributed CEF (dCEF) configuration information |
"Cisco Express Forwarding Overview" module of the Cisco IOS Switching Services Configuration Guide |
MIBs
Technical Assistance
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for BGP Policy Accounting
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1 | Feature Information for BGP Policy Accounting |
Feature Name |
Releases |
Feature Information |
---|---|---|
BGP Policy Accounting |
12.0(9)S 12.0(17)ST 12.2(13)T 15.0(1)S 12.2(50)SY |
Border Gateway Protocol (BGP) policy accounting measures and classifies IP traffic that is sent to, or received from, different peers. Policy accounting is enabled on an input interface, and counters based on parameters such as community list, autonomous system number, or autonomous system path are assigned to identify the IP traffic. The following commands were introduced or modified: |
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.