You need:
1. To make sure that you are in the /md tree above or at where your controllers are located when you create everything. (you should not create anything directly in the md folder).
2. the ip address of the "router" that you want to handle the next hop. This goes into the next hop list. The format is slightly different for a VPN connection that is terminated on the controller, however.
3. to create a Route ACL that defines what traffic is to be routed to the next hop vs routed the normal way.
4. Assign that route ACL to the user role.
In the example below, I will send https traffic to the next hop, and all the other traffic the regular way for the user role "myuserrole". I am currently in the MD/<blah blah/ folder:
config t
ip nexthop-list myrouter
ip 192.168.1.3 <--ip address of the router path you want the traffic to take
exit
**The nexthop list needs to be created before it is referenced below***
ip access-list route routeacl
any any tcp 443 route next-hop-list myrouter <---sending https to that next hop
any any any forward <------all other traffic takes normal routing
exit
routing-policy-map role myuserrole access-list routeacl
exit
^^^Assigned the route-acl called "routeacl" to the user role myuserrole
write mem
That is all that is necessary.
show ip nexthop-list on the md will show that you have created a nexthop list and the ip address in that list
show ip health-check on the md will determine if that next hop ip address is alive. The controller periodically reaches out to ip addresses in the next hop list to determine if they are valid destinations. You could have more than one ip address in the next hop list and the controller needs to know which path is actually available.
show datapath session table <ip address of client> will have a "r" route nexthop flag on the line that is being routed using the route acl.
I hope that makes sense.