After IPv6 route recursion to remotely leaked VPN routes is enabled, the labels and Tunnel IDs of the remotely leaked VPN routes can be inherited, which ensures correct traffic forwarding.
A route needs recursion if its next hop is unreachable. To allow IPv6 routes to recurse to remotely leaked VPN routes, run the ipv6 route recursive-lookup inherit-label-route enable command. After the command is run, IPv6 routes inherit the labels and tunnel IDs of the remotely leaked VPN routes, which ensures correct traffic forwarding. This command mainly applies to BGP/MPLS IPv6 VPN scenarios.
In Figure 1, PE1 and PE2 are IBGP peers, and CE1 and PE1 are IGP neighbors. PE2 learns the IP address of CE1's loopback interface, and an EBGP peer relationship is established between CE1 and PE2 using loopback interface IP addresses. By default, the BGP routes that PE2 learns from CE1 through the EBGP peer connection cannot recurse to remotely leaked VPN routes. As a result, traffic fails to be forwarded. To address this problem, run the ipv6 route recursive-lookup inherit-label-route enable command to allow the BGP4+ routes to recurse to remotely leaked VPN routes. After the BGP4+ routes inherit the labels and tunnel IDs of the remotely leaked VPN routes, traffic can be correctly forwarded.
Before configuring IPv6 route recursion to remotely leaked VPN routes, configure basic BGP/MPLS IPv6 VPN.
The system view is displayed.
Recursion of all IPv6 routes to remotely leaked VPN routes is enabled.
The configuration is committed.
Run the display current-configuration command in the system view to check whether IPv6 route recursion to remotely leaked VPN routes is enabled.