BRKDCN-3040 Troubleshooting Vxlan Evpn 2019
BRKDCN-3040 Troubleshooting Vxlan Evpn 2019
BRKDCN-3040 Troubleshooting Vxlan Evpn 2019
Troubleshooting
VXLAN BGP EVPN
Shridhar V. Dhodapkar CCIE#6367
Technical Leader-Customer
Experience
Twitter - shridhardh
Agenda
• Introduction
• VXLAN Overview
• VXLAN Packet Flow
• Configuration
• Nexus 9000 Components
• Control Plane Troubleshooting
• Troubleshooting BUM Traffic
• Troubleshooting Tenant Routed Multicast
• Troubleshooting Tools
• Conclusion
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
VxLAN Overview
VXLAN Concepts
• VXLAN Overlay
- A VXLAN Overlay or VXLAN segment is a Layer-2 broadcast domain identified by
the VNID that extends or tunnels traffic from one VTEP to another.
• VXLAN Tunnel End Point (VTEP)
- A VTEP is a device that provides both encapsulation and de-capsulation of
classical Ethernet and VXLAN packets to and from a VXLAN segment
- Each VTEP may have the following types of interfaces:
Switchport interfaces on the local LAN segment to support local endpoints
Layer-3 interfaces to the transport IP network
SVI interfaces
• VXLAN Gateway
- A VTEP that bridges traffic between VXLAN segments
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
VXLAN Encapsulation
Ethernet
Payload FCS
Header
Rsvd Rsvd
Outer UDP Destination Port = VXLAN (originally 8472, recently updated to 4789)
1
Outer UDP Source Port = Hash of Inner Frame Headers (optional)
• The outer IP header has the source IP and destination IP of the VTEP
endpoints
• The outer Ethernet header has the source MAC of the source VTEP
and the destination MAC of the immediate Layer-3 next hop
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
VxLAN Packet Structure
F
Outer MAC Outer UDP VxLAN
Outer IP Header Original Layer 2 Frame C
Header Header Header
S
14 Bytes
(4 bytes optional) 8 Bytes Hash of inner L2/l3/L4 headers
Destination NH MAC Source Port
of original frame. Enables
16 entropy for ECMP Load
48 Address Addr
16 VxLAN Port UDP 4789 balancing
48 Source Address
16 UDP Length
16 VLAN Type
0x8100 16 Checksum
16 VLAN ID Tag
Src and Dst
16 Ether Type 20 Bytes Addresses of 8 Bytes
0x0800 16M possible
VTEP
72 IP Header Misc. VxLAN
Data 8 RRRR1RRR segments
8 Protocol 0x11 Reserved
24
Src VTEP MAC Addr
16 Header
24 VNI
32 Checksum
Source IP 8 Reserved
32
Destination IP
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
VxLAN Overview
VxLAN Gateway Types
• Layer 2 Gateway
− The layer 2 gateway is required when the layer 2 traffic (IEEE 802.1q
tagged traffic) comes from VLAN into VxLAN segment (encapsulation) or
− The Ingress VxLAN packet egresses out an 802.1q tagged interface (de-
encapsulation), where the packet is bridged to a new VLAN.
• Layer 3 Gateway
− A layer 3 gateway is used when there is a VxLAN to VxLAN routing
− The ingress packet is a VxLAN packet on a routed segment but the
packet egresses out on a tagged 802.1q interface and the packet is
routed to a new VLAN
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
End System End System
VxLAN Overview 3
ARP Request for IP B
VxLAN - Flood and Learn Src MAC: MAC-A
Dst MAC: FF:FF:FF:FF:FF:FF
MAC-3
IP- 192.168.3.3
VTEP 3
S-MAC: MAC-1
D-MAC: MAC VxLAN Remote
VTEP-3
00:01:5E:01:01:01 Address ID VTEP
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
VxLAN Overview
VxLAN – Flood and Learn
• Data Plane learning technique for VxLAN
• VNI’s are mapped to a multicast group on a VTEP
• Local MACs are learnt over a VLAN (VNI) on a VTEP
• Broadcast, Unknown Unicast, Multicast (BUM Traffic) is flooded to
the delivery multicast group for that VNI
• Remote VTEPs part of same multicast group learn host MAC, VNI
and source VTEP as the next-hop for the host MAC from flooded
traffic
• Unicast packets to the host MAC are sent directly to source VTEP
as VxLAN encapsulated packet
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
VxLAN Overview
Ingress Replication
• Some customers not comfortable deploying multicast in their core
• With Ingress Replication (IR), BUM traffic ingress access side is
replicated to remote VTEP as unicast
• Static IR VETP tunnel is kept alive as long as the route to the VTEP
is available.
• Support multiple VTEPs per VNI and a VTEP in multiple VNIs
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
VxLAN Overview
Tenant
Tenant 1 (VRF 1)
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
VxLAN Overview
VxLAN EVPN
BGP-EVPN BGP-EVPN
L3 VNI L3 VNI
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
VxLAN Overview
Distributed Anycast Gateway
Spine1 Spine2
L3 Underlay
Unicast / Multicast Routing
Host-A Host-B
Host-C
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
VxLAN Overview
Distributed Anycast Gateway - Configuration
• All VTEPs has same IP address for an L2 VNI
• Anycast Gateway MAC is global to each VTEP for all VNI’s for all Tenants
• One virtual MAC / VTEP
• All VTEPs should have same virtual MAC address
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
VxLAN Overview
ARP Suppression
• Hosts send out G-ARP when they
come online
IP Multicast Core
• Local leaf node receives G-ARP, 2 +
creates local ARP cache and VTEP-1 VxLAN EVPN VTEP-2
advertises to other leaf by BGP as 3 V V
route type 2 VRF VRF
A A
• Remote leaf node puts IP-MAC info
into remote ARP cache and supresses 4 MAC_H1
1 MAC_H2
incoming ARP request for this IP IP_H1 IP_H2
VNI1 VNI1
• If IP info not found in ARP suppression Vlan-100 Vlan-100
L3 Underlay
Unicast / Multicast Routing
VTEP-3
192.168.100.100
VPC
Host-C
Host-A Host-B
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Configuration
Feature Enablement
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Underlay Configuration
Leaf Spine
router bgp 65000 router bgp 65001
router-id 192.168.1.1 router-id 192.168.10.10
address-family ipv4 unicast address-family ipv4 unicast
network 1.1.1.1/32 network 10.10.10.10/32
network 192.168.1.1/32 network 192.168.10.10/32
neighbor 10.1.101.10 neighbor 10.1.201.1
remote-as 65001 remote-as 65000
address-family ipv4 unicast address-family ipv4 unicast
allowas-in 3 allowas-in 3
disable-peer-as-check disable-peer-as-check
neighbor 10.1.201.20 neighbor 10.1.202.2
remote-as 65001 remote-as 65000
address-family ipv4 unicast address-family ipv4 unicast
allowas-in 3 allowas-in 3
disable-peer-as-check disable-peer-as-check
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Spine Node Configuration
router bgp 65001
address-family l2vpn evpn
nexthop route-map permitall
interface loopback1 retain route-target all
ip address 192.168.10.10/32 neighbor 1.1.1.1
ip pim sparse-mode remote-as 65000
update-source loopback0
!
ebgp-multihop 3
interface loopback2 address-family l2vpn evpn
ip address 192.168.50.50/32 disable-peer-as-check
ip pim sparse-mode send-community extended
! route-map permitall out
ip pim rp-add 192.168.50.50 group-list 239.1.1.0/24 neighbor 2.2.2.2
remote-as 65000
ip pim anycast-rp 192.168.50.50 192.168.10.10
update-source loopback0
ip pim anycast-rp 192.168.50.50 192.168.20.20 ebgp-multihop 3
address-family l2vpn evpn
disable-peer-as-check
send-community extended
route-map permitall out
!
route-map permitall permit 10
set ip next-hop unchanged
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Leaf Node Configuration – L2 VNI
vlan 100 fabric forwarding anycast-gateway-mac 0001.0001.0001
vn-segment 10000 interface Vlan100
no shutdown
! Create L2 VNI vrf member EVPN-TENANT
ip address 100.1.1.254/24
evpn fabric forwarding mode anycast-gateway
vni 10000 l2 !
rd 10000:1 router bgp 65000
route-target import 10000:1 neighbor 10.10.10.10
route-target export 10000:1 remote-as 65001
! update-source loopback0
interface nve1 ebgp-multihop 3
no shutdown address-family l2vpn evpn
source-interface loopback1 allowas-in 3
host-reachability protocol bgp disable-peer-as-check
member vni 10000 send-community extended
mcast-group 239.1.1.1 vrf EVPN-TENANT
suppress-arp address-family ipv4 unicast
advertise l2vpn evpn
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Leaf Node Configuration – L3 VNI
vlan 500 interface nve1
vn-segment 50000 no shutdown
! source-interface loopback0
vrf context EVPN-TENANT host-reachability protocol bgp
vni 50000 member vni 50000 associate-vrf
rd 50000:1 !
address-family ipv4 unicast interface loopback200
route-target import 50000:1 vrf member EVPN-TENANT
route-target import 50000:1 evpn ip address 200.1.1.1/32
route-target export 50000:1 !
route-target export 50000:1 evpn router bgp 65000
! vrf EVPN-TENANT
interface Vlan500 address-family ipv4 unicast
no shutdown network 200.1.1.1/32
vrf member EVPN-TENANT advertise l2vpn evpn
ip forward
!
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Leaf Node with VPC Configuration
vpc domain 10
peer-switch
peer-keepalive destination 10.1.34.4 source
10.1.34.3 VTEP IP. The secondary
delay restore 60 IP is same on both Leaf3
peer-gateway and Leaf 4 running VPC
ipv6 nd synchronize
ip arp synchronize
!
interface loopback0
ip address 192.168.3.3/32 Backup Routing SVI
ip address 192.168.100.100/32 secondary
ip router ospf 100 area 0.0.0.0 vlan 5
ip pim sparse-mode interface vlan 5
ip add 10.5.1.1/24
ip router ospf 100 area 0.0.0.0
Backup Routing SVI ip pim sparse-mode
Configured on both vPC
peers and part of global
routing table.
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Leaf Node Configuration – L2 & L3 VNI for IPv6
vlan 100 fabric forwarding anycast-gateway-mac 0001.0001.0001
vn-segment 10000 interface Vlan100
vlan 500 no shutdown
vn-segment 50000 vrf member EVPN-TENANT
evpn ip address 100.1.1.254/24
vni 10000 l2 ipv6 address 2001::1/64
rd 10000:1 fabric forwarding mode anycast-gateway
route-target import 10000:1 !
route-target export 10000:1 interface nve1
! no shutdown
vrf context EVPN-TENANT source-interface loopback0
vni 20000 host-reachability protocol bgp
rd 20000:1 member vni 10000
address-family ipv4 unicast mcast-group 239.1.1.1
route-target both 50000:1 suppress-arp
route-target both 50000:1 evpn member vni 50000 associate-vrf
address-family ipv6 unicast !
route-target both 50000:1 router bgp 65000
route-target both 50000:1 evpn vrf EVPN-TENANT
! address-family ipv4 unicast
interface Vlan500 advertise l2vpn evpn
no shutdown address-family ipv6 unicast
vrf member EVPN-TENANT advertise l2vpn evpn
ip forward !
ipv6 address use-link-local-only vpc domain 10
ipv6 nd synchronize
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
VxLAN EVPN Configuration
Host Learning and Peer Discovery
Host Learning Data Plane Control Plane
CORE
Multicast Flood and Learn EVPN-Multicast
Peer Learning: Data Plane Peer Learning: BGP-RnH
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
VXLAN BGP EVPN
Control-Plane
Verification
Nexus 9000 VxLAN Architecture
BGP
URIB, VxLAN
U6RIB Manager L2RIB
(PI)
HMM
MRIB
VxLAN
Manager Adj. Mgr
(PD)
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Troubleshooting VxLAN EVPN
EVPN Prefix Types
BGP EVPN uses 5 different route types for IP
prefixes and advertisement
Type 1 - Ethernet Auto-Discovery (A-D) route
Type 2 - MAC advertisement route L2 VNI MAC/MAC-IP
Type 3 - Inclusive Multicast Route EVPN IR, Peer Discovery
Type 4 - Ethernet Segment Route
Type 5 - IP Prefix Route L3 VNI Route
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Troubleshooting VxLAN EVPN
NVE Interface
Leaf1# show nve interface
Interface: nve1, State: Up, encapsulation: VXLAN
VPC Capability: VPC-VIP-Only [not-notified]
Local Router MAC: f40f.1b6f.926f
Host Learning Mode: Control-Plane
Source-Interface: loopback0 (primary: 192.168.1.1, secondary: 0.0.0.0)
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Troubleshooting VxLAN EVPN
Local MAC Routes Learning
L2FM
Mac Learnt on Vlan 100
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Troubleshooting VxLAN EVPN
L2FM installs the MAC in the L2RIB
L2FM L2RIB Leaf1#show l2route evpn mac evi 100
Mac Address Prod Next Hop (s)
-------------- ------ ---------------
523d.e706.ae1b Local Eth1/15
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Troubleshooting VxLAN EVPN
L2 VNI, MAC
L2FM L2RIB BGP L2VPN
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Troubleshooting VxLAN EVPN
Local MAC Address in BGP L2VPN
L2FM L2RIB BGP L2VPN
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Troubleshooting VxLAN EVPN
Remote L2 MAC Route Installation via BGP EVPN
Leaf2# show bgp l2vpn evpn 523d.e706.ae1b
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 192.168.1.1:32867
BGP routing table entry for [2]:[0]:[0]:[48]:[523d.e706.ae1b]:[0]:[0.0.0.0]/216,
Paths: (2 available, best #1)
Flags: (0x000202) (high32 00000000) on xmit-list, is not in l2rib/evpn, is not in HW
Advertised path-id 1
Path type: external, path is valid, is best path
BGP L2VPN Imported to 1 destination(s)
AS-Path: 65001 65000 , path sourced external to AS
192.168.1.1 (metric 0) from 20.20.20.20 (192.168.20.20)
Origin IGP, MED not set, localpref 100, weight 0
Received label 10000
Extcommunity: RT:65000:10000 ENCAP:8
Path type: external, path is valid, not best reason: newer EBGP path
AS-Path: 65001 65000 , path sourced external to AS
192.168.1.1 (metric 0) from 10.10.10.10 (192.168.10.10)
Origin IGP, MED not set, localpref 100, weight 0
Received label 10000
Extcommunity: RT:65000:10000 ENCAP:8
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
EVPN BGP Route Type 2 Fields
Ethernet Tag ID, MAC Address Length, MAC Address, IP Address Length, and IP Address fields are
considered to be part of the prefix in the NLRI.
Ethernet Segment Identifier, MPLS Label1, and MPLS Label2 are treated as route attributes, not part
of the "route". Both the IP and MAC address lengths are in bits.
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Troubleshooting VxLAN EVPN
Remote L2 MAC Route Installation with BGP EPVN (Flow)
2a. Peer, VNI
Notification
BGP L2VPN
2b. Add (VNI, MAC-> Remote
VTEP IP)
VxLAN Mgr
VxLAN PD L2RIB
Lib.
5. Add (VNI,
3. Program data plane with
MAC -> Peer ID)
unicast encap/decap for VNI,
Allocate Peer ID
L2FM
UFDM
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Troubleshooting VxLAN EVPN
BGP to L2RIB
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Troubleshooting VxLAN EVPN
Remote L2 MAC Route Installation via BGP EVPN
Leaf2# show nve internal bgp rnh database VxLAN Mgr
--------------------------------------------
Showing BGP RNH Database, size : 2 vni 0
BGP L2VPN
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
VxLAN Manager
Leaf2# show forwarding nve l3 peers
NVE cleanup transaction-id 0
tunnel_id Peer_id Peer_address Interface rmac origin state del count
--------------------------------------------------------------------------------------
0xc0a80101 1 192.168.1.1 nve1 f40f.1b6f.926f NVE merge-done no 1
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Troubleshooting VxLAN EVPN
Host IP and Host MAC local route
4. Route add: VRF test, Host-IP, L3VNI
HMM L2RIB
3. Adj. Notification: Host-IP, Host- 5. Route add: VRF test, Host-IP, L3 Table
MAC, SVI interface ID. Per prefix: L2 Table ID, Host-MAC
AM BGP
2. Create Adjacency: Host-IP, Host- L3 + L2 NLRI
MAC, Server facing SVI interface Prefix = Host-IP
MAC = Host-MAC
1b. Add an adjacency in AM, if the Label1: L3-VNI
ARP VLAN is enabled for L3 processing Label2: L2-VNI
VRF RT
1a. ARP Request/Reply BD RT
NH = VTEP IP
RMAC
ENCAP_VXLAN
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Troubleshoot VxLAN EVPN
ARP from Host and ARP -> AM
Leaf1# show ip arp vrf EVPN-TENANT
IP ARP Table for context EVPN-TENANT
Total number of entries: 1
Address Age MAC Address Interface ARP
100.1.1.1 00:10:47 523d.e706.ae1b Vlan100
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Troubleshoot VxLAN EVPN AM
AM -> HMM -> L2RIB
Leaf1# show ip route vrf EVPN-TENANT
100.1.1.1/32, ubest/mbest: 1/0, attached
*via 100.1.1.1, Vlan100, [190/0], 02:41:57, hmm
100.1.1.254/32, ubest/mbest: 1/0, attached HMM
*via 100.1.1.254, Vlan100, [0/0], 02:59:46, local
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Troubleshooting VxLAN EVPN
L2RIB -> BGP
Leaf1# show bgp l2vpn evpn 100.1.1.1
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 10000:1 (L2VNI 10000)
BGP routing table entry for [2]:[0]:[0]:[48]:[523d.e706.ae1b]:[32]:[100.1.1.1]/272,
version 6
Paths: (1 available, best #1)
Flags: (0x00010a) on xmit-list, is not in l2rib/evpn
Advertised path-id 1
Path type: local, path is valid, is best path, no labeled nexthop
AS-Path: NONE, path locally originated
192.168.1.1 (metric 0) from 0.0.0.0 (192.168.1.1)
Origin IGP, MED not set, localpref 100, weight 32768
Received label 10000 50000
Extcommunity: RT:10000:1 RT:50000:1
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
L2 + L3 Remote Route Installation
L3 + L2 NLRI BGP-EVPN
Prefix = Host-IP
MAC = Host-MAC EVPN Table
Label1: L3-VNI VTEP_IP,
Label2: L2-VNI RCAM, L3VNI,
VRF RT VRF Import Tunnel Info
L2VNI, VxLAN
BD RT BD Import
NH = VTEP IP RNH DB
RMAC VxLAN Manager
ENCAP_VXLAN Tunnel_ID
VRF BD
Peer-Id RMAC, VNI-
notification >Peer ID
VRF, Host-IP,
L3VNI, VTEP-IP
BD L2RIB
URIB
RMAC, VNI->Peer ID
VRF Program data plane
(L2-BD, MAC-
H1)-> Peer-ID
with unicast
VRF, Host-IP, encap/decap for
L3VNI, VTEP-IP L3VNI, RMAC,
Allocate Peer-ID
UFDM
FIB L2FM
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Troubleshooting VxLAN EVPN
L2RIB and URIB Information
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Troubleshooting VxLAN EVPN
Remote Host Prefix - EVPN
Leaf2# show bgp l2vpn evpn 100.1.1.1
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 10000:1 (L2VNI 10000)
BGP routing table entry for [2]:[0]:[0]:[48]:[523d.e706.ae1b]:[32]:[100.1.1.1]/272,
version 5
Paths: (1 available, best #1)
Flags: (0x00021a) on xmit-list, is in l2rib/evpn, is not in HW, , is locked
Advertised path-id 1
Path type: internal, path is valid, imported same remote RD, is best path, no labeled
nexthop
AS-Path: NONE, path sourced internal to AS
192.168.1.1 (metric 5) from 10.10.10.10 (192.168.10.10)
Origin IGP, MED not set, localpref 100, weight 0
Received label 10000 50000
Extcommunity: RT:10000:1 RT:50000:1 ENCAP:8 Router MAC:f40f.1b6f.926f
Originator: 192.168.1.1 Cluster list: 10.10.10.10
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Troubleshooting VxLAN EVPN
Remote Host Prefix – contd…
...
Route Distinguisher: 50000:1 (L3VNI 50000)
BGP routing table entry for [2]:[0]:[0]:[48]:[523d.e706.ae1b]:[32]:[100.1.1.1]/272,
version 6
Paths: (1 available, best #1)
Flags: (0x00021a) on xmit-list, is in l2rib/evpn, is not in HW,
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported from 10000:1:[2]:[0]:[0]:[48]:[8c60.4f1b.e43c]:[32]:[100.1.1.1]/144
(VNI 10000)
AS-Path: NONE, path sourced internal to AS
192.168.1.1 (metric 5) from 192.168.10.10 (192.168.10.10)
Origin IGP, MED not set, localpref 100, weight 0
Received label 10000 50000
Extcommunity: RT:10000:1 RT:50000:1 ENCAP:8 Router MAC:f40f.1b6f.926f
Originator: 192.168.1.1 Cluster list: 10.10.10.10
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Troubleshooting VxLAN EVPN
NVE Internal Information for Leaf Nodes with VPC Peers
Leaf3# show nve internal platform interface nve 1 detail
Printing Interface ifindex 0x49000001 detail
|======|=========================|===============|===============|=====|=====|
|Intf |State |PriIP |SecIP |Vnis |Peers|
|======|=========================|===============|===============|=====|=====|
|nve1 |UP |192.168.3.3 |192.168.100.100|2 |2 |
|======|=========================|===============|===============|=====|=====|
SW_BD/VNIs of interface nve1:
================================================
|======|======|=========================|======|====|======|========
|Sw BD |Vni |State |Intf |Type|Vrf-ID|Notified
|======|======|=========================|======|====|======|========
|100 |10000 |UP |nve1 |CP |0 |Yes
|200 |20000 |UP |nve1 |CP |3 |Yes
|======|======|=========================|======|====|======|========
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Leaf Node with VPC Consistency Check
sh vpc consistency-parameters vni
Legend:
Type 1 : vPC will be suspended in case of mismatch
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Troubleshooting VxLAN EVPN
ARP Suppression Cache
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Troubleshooting VXLAN EVPN
Uplinks with SVI / Sub-Interfaces
• For SVI based uplinks, define the infra VLANs
• system nve infra-vlan <svi-vlan>
• Sub-Interfaces
• Not supported on ALE links (40G ports) (Documented)
• Check CCO documentation
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Troubleshooting BUM
Traffic
Troubleshooting BUM Traffic
BUM• Traffic over- Multicast
BUM Traffic Core (ARP and other broadcast packets), Multicast traffic from
Broadcast traffic
hosts, etc.
• Check the multicast group associated with the L2 VNI
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Troubleshooting BUM Traffic
Step 1 – Check if the BUM Traffic is making it to the source VTEP
LEAF45# ethanalyzer local interface inband capture-fil "arp" limit-captured-frames 0
Capturing on inband
2018-05-21 14:52:36.289960 20:20:00:00:00:aa -> 54:7f:ee:07:e1:41 ARP 10.150.1.254 is
at 20:20:00:00:00:aa
2018-05-21 14:52:36.295037 54:7f:ee:07:e1:41 -> ff:ff:ff:ff:ff:ff ARP Who has
10.150.1.35? Tell 10.150.1.36
2018-05-21 14:52:36.295425 2c:54:2d:f6:0f:bc -> 54:7f:ee:07:e1:41 ARP 10.150.1.35 is at
2c:54:2d:f6:0f:bc
2018-05-21 14:52:38.127594 54:7f:ee:07:e1:41 -> ff:ff:ff:ff:ff:ff ARP Who has
10.150.1.38? Tell 10.150.1.36
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Troubleshooting BUM Traffic
Step 2 – Check the Mroute Entry – Src VTEP
LEAF45# show ip mroute 231.1.150.1 10.0.0.204 detail
IP Multicast Routing Table for VRF "default"
Total number of routes: 8
Total number of (*,G) routes: 2
Total number of (S,G) routes: 5
Total number of (*,G-prefix) routes: 1
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Troubleshooting BUM Traffic
Step 3.1 – Check the Mroute Entry – Dest VTEP
LEAF43# show ip mroute 231.1.150.1 10.0.0.204 detail
IP Multicast Routing Table for VRF "default"
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Troubleshooting BUM Traffic
Step 3.2 – Check the Mroute Entry – Dest VTEP
LEAF44# show ip mroute 231.1.150.1 10.0.0.204 detail
IP Multicast Routing Table for VRF "default"
Total number of routes: 8
Total number of (*,G) routes: 2
Total number of (S,G) routes: 5
Total number of (*,G-prefix) routes: 1
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Troubleshooting BUM Traffic
Step 4 – Capturing BUM Traffic in Core
LEAF45(config)# monitor session 1
LEAF45(config-monitor)# source interface ethernet 1/50
LEAF45(config-monitor)# destination interface sup-eth 0
LEAF45(config-monitor)# no shut
LEAF45(config-monitor)# end
Capturing on inband
2018-05-21 16:21:01.985236 10.0.0.204 -> 231.1.150.1 UDP Source port: 41316
Destination port: 4789
Use the detail option with ethanalyzer to see the whole packet
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Demo
Troubleshooting Tenant
Routed Multicast (TRM)
Tenant Routed Multicast (TRM)
Overview
• A BGP based solution for allowing multicast routing and snooping over
VXLAN EVPN fabric
• Sources and Receivers are connected to the VTEPs
• Modes:
• L3 Mode
• L2/L3 Mixed Mode
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Tenant Routed Multicast (TRM)
EVPN – L3 Anycast
S S
V V V V
S R R R
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Configuring Layer 3 Tenant Routed Multicast
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Tenant Routed Multicast (TRM)
Show bgp internal mvpn detail
Leaf1# show bgp internal mvpn detail
*************************************************
NGMVPN feature/server/role: VxLAN/1/VxLAN
NGMVPN registered: Yes (Jun 9 00:56:59.297696/never)
NGMVPN TRM mode: L3 (0x000002)
NGMVPN down: in-prg/up-defer: 0/0
NGMVPN register/failures: 1/0
NGMVPN deregister/failures: 0/0
NGMVPN Convergence sent: 0
NGMVPN local-req sent/skipped: 7/3
NGMVPN local-req sent: 4 (L2VNI)/ 2 (L3VNI)/ 1 (All VNIs)
NGMVPN remote-req rcvd: 0 (L2VNI)/ 0 (L3VNI)/ 1 (All VNIs)
NGMVPN del remote: 0 (L2VNI)/ 0 (L3VNI)/ 0 (All VNIs)
NGMVPN msgs sent/acks rcvd: 9/9
NGMVPN msgs rcvd/acks sent: 24/14
NGMVPN msg err/ack err/drops: 0/0/0
Last xid sent to NGMVPN: 9
Last xid ack by NGMVPN: 9
. . . .
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Tenant Routed Multicast (TRM)
Show bgp internal mvpn detail (contd…)
++++++++++++++++++++++++++++++++++++++++++
BGP MVPN RD Information for 192.168.1.1:4 (0xd625952c)
VNI ID : 50000
VRF : EVPN-TENANT
Global NGMVPN mode : L3 (1 L3 VRFs)
VRF L3 Mode : Yes Jun 9 00:57:00.203673
Enabled : Yes
Delete Pending : No
Cleanup Pending : No
Import Pending : No
Import In Progress : No
Created : Jan 9 00:56:55.570427
Enabled At : Jan 9 00:56:55.570471
. . .
Is Auto RT : No
Config VRF Import RT : 1
Import RT cfg list: 192.168.1.1:500
Active VRF Import RT : 1
Active VRF Import RT list : 192.168.1.1:500
VRF Import RT chg/chg-pending : 0/0
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Tenant Routed Multicast (TRM)
Join from Receiver
Leaf3# show ip mroute 239.0.0.1 detail vrf EVPN-TENANT
IP Multicast Routing Table for VRF ”EVPN-TEANT"
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Tenant Routed Multicast (TRM)
FHR VTEP sends SA-AD (Type-5 Route) using BGP to other VTEPs
Leaf1# show bgp ipv4 mvpn sa-ad detail vrf EVPN-TENANT
BGP routing table information for VRF default, address family IPv4 MVPN
Route Distinguisher: 192.168.1.1:4 (L3VNI 50000)
BGP routing table entry for [5][10.0.0.1][239.0.0.1]/64, version 34
Paths: (1 available, best #1)
Flags: (0x000002) (high32 00000000) on xmit-list, is not in mvpn
Advertised path-id 1
Path type: local, path is valid, is best path
AS-Path: NONE, path locally originated
0.0.0.0 (metric 0) from 0.0.0.0 (192.168.1.1)
Origin IGP, MED not set, localpref 100, weight 32768
Extcommunity: RT:65000:50000
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Tenant Routed Multicast (TRM)
LHR / Remote VTEPs build (S, G)
Leaf3# show ip mroute 239.0.0.1 10.0.0.1 detail vrf EVPN-TENANT
IP Multicast Routing Table for VRF ”EVPN-TEANT"
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Tenant Routed Multicast (TRM)
VTEP3/4 sends Type-7 back to FHR on L3VNI
Leaf3# show bgp ipv4 mvpn route-type 7 detail
BGP routing table information for VRF default, address family IPv4 MVPN
Route Distinguisher: 192.168.1.1:33767 (Local VNI: 50000)
BGP routing table entry for [7][10.0.0.1][239.0.0.1][65000]/96, version 43
Paths: (1 available, best #1)
Flags: (0x000002) (high32 00000000) on xmit-list, is not in mvpn
Advertised path-id 1
Path type: local, path is valid, is best path
AS-Path: NONE, path locally originated
0.0.0.0 (metric 0) from 0.0.0.0 (192.168.3.3)
Origin IGP, MED not set, localpref 100, weight 32768
Extcommunity: RT:192.168.1.1:500
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Tenant Routed Multicast (TRM)
VTEP1 Receives the Type-7 route
Leaf1# show bgp ipv4 mvpn route-type 7 detail
BGP routing table information for VRF default, address family IPv4 MVPN
Route Distinguisher: 192.168.1.1:4 (L3VNI 50000)
BGP routing table entry for [7][10.0.0.1][239.0.0.1][65000]/96, version 36
Paths: (1 available, best #1)
Flags: (0x00001a) (high32 00000000) on xmit-list, is in mvpn, is not in HW
Advertised path-id 1
Path type: external, path is valid, is best path, in rib
Imported from 192.168.1.1:33767:[7][10.0.0.1][239.0.0.1][65000]/96
AS-Path: 65001 65000 , path sourced external to AS
192.168.100.100 (metric 0) from 10.10.10.10 (192.168.10.10)
Origin IGP, MED not set, localpref 100, weight 0
Extcommunity: RT:192.168.1.1:500
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Tenant Routed Multicast (TRM)
VTEP1 adds L3VNI in the OIF List
Leaf1# show ip mroute 239.0.0.1 10.0.0.1 detail vrf EVPN-TENANT
IP Multicast Routing Table for VRF ”EVPN-TENANT"
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Tenant Routed Multicast (TRM)
VTEP3 adds Receiver Vlan in the OIF List
Leaf3# show ip mroute 239.0.0.1 10.0.0.1 detail vrf EVPN-TENANT
IP Multicast Routing Table for VRF "TRM"
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Tenant Routed Multicast (TRM)
MFDM (Validate this info on both FHR and LHR)
Leaf1# show forwarding distribution multicast route vrf EVPN-TENANT group 239.0.0.1
source 10.0.0.1
MFIB Database
Show forwarding multicast outgoing-interface-list l3 <index>
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Troubleshooting Tools
Troubleshooting Tools
VXLAN OAM
• VXLAN OAM feature introduced in 7.0(3)I5(2) – NGOAM
• Need a feature for Path verification and Path tracking with Telemetry
data
• Similar to Fabric Path OAM Enable NGOAM
Feature
• Provides 3 features
feature ngoam
• VxLAN Ping Create Profile
ngoam profile 1
• VxLAN Traceroute oam-channel 2
! Install ACL
• VxLAN PathTrace
ngoam install acl
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
VXLAN OAM
Usability
• Helps diagnose underlay / overlay reachability of VMs
• Covers exact path as Data Packet
• Path verification for all ECMP paths in Overlay
• Path tracking – Exact path host traffic takes in overlay and underlay
network
• Layer 2 – Traceroute / Ping to VM host from Leaf
• Layer 3 – Traceroute / Ping to Vm host from Leaf
• Flexible OAM channel supporting multiple drafts
• Tissa draft – nvo3
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
VXLAN OAM
VXLAN PING
• VxLAN Ping checks connectivity to the destination, where the destination
can be VM’s IP address or routed loopback addresses on the leaf switch
• Since there are multiple paths, only one path is followed based on the flow
parameters
• Ping for both VM / Host MAC and IP
• Default ping support – Ping based on just destination address and VNI
segment
• Allow users to specify flow parameters such as UDP port, destination and
source address
• This helps VxLAN ping follow the specific path the unicast ping will take to reach
the destination
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
VxLAN OAM
PING NVE MAC
Leaf1# ping nve mac 0050.56b3.bcef 200 port-channel 101 profile 1 vni 20000
verbose
Codes: '!' - success, 'Q' - request not sent, '.' - timeout,
'D' - Destination Unreachable, 'X' - unknown return code,
'm' - malformed request(parameter problem)
,'c' - Corrupted Data/Test, '#' - Duplicate response
Sender handle: 21
! sport 51932 size 39,Reply from 192.168.100.100,time = 5 ms
! sport 51932 size 39,Reply from 192.168.100.100,time = 4 ms
! sport 51932 size 39,Reply from 192.168.100.100,time = 4 ms
! sport 51932 size 39,Reply from 192.168.100.100,time = 4 ms
! sport 51932 size 39,Reply from 192.168.100.100,time = 4 ms
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
VxLAN OAM
VxLAN Traceroute
• VxLAN Traceroute – Used to trace the path a packet takes between source
and destination
• Only one path is traced based on the given flow parameters
• Trace will show uni-directional path the packet takes to the destination, but the
return path may be different
• Should be able to trace VTEPs, access switch and end-host. For the
default mode, the user should be able to trace the tunnel endpoint IP
address and the segment ID
• Actual path taken by a packet is dependent on all the L2/L3/L4 header
fields and network topology at the time the packet is sent
• Users can specify the flow parameters
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
VxLAN OAM
VxLAN PathTrace
• Similar to Traceroute, but uses Nvo3 channel
• Carries additional ingress / egress and load information of the path
• Provides additional information if the device supports nvo3 channel else its
same as traceroute
• Actual path taken by a packet is dependent on all the L2/L3/L4
header fields and network topology at the time the packet is sent
•
Leaf1# Users can specify the flow parameters
pathtrace nve mac 0050.56b3.bcef 200 port-channel 101 vni 20000
<snip>
Path trace Request to peer ip 192.168.100.100 source ip 192.168.99.99
Sender handle: 35Hop Code ReplyIP IngressI/f EgressI/f State
====================================================
1 !Reply from 10.101.1.10, Eth2/1 Eth1/17 UP / UP
2 !Reply from 192.168.100.100, Eth1/17 Unknown UP / DOWN
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Troubleshooting Tools
ELAM
• Embedded Logic Analyzer module (ELAM) – tool used to capture a packet
processed by a Cisco ASIC
• Depending on the N9k platform,
• ELAM on NS ASIC
• ELAM on TAHOE ASIC
• Useful in scenario’s where packet forwarding is impacted
• Can perform capture for raw packet from the host and even VxLAN
encapsulated packet towards the VxLAN Core
• Useful for Cisco TAC and Cisco Engineering for understanding the cause of
packet loss or impacted forwarding
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
ELAM on N9k Platform
TAHOE ELAM Steps
• Attach module X
• Debug platform internal tah elam asic [0 | 1]
• Trigger [init | reset] asic [num] slice [num] lu-a2d [0 | 1] in-
select [3-7] out-select [0-5] use-src-id [src-id]
• Lu-a2d 0 – used for reverse ELAM, where trigger is based on result
• Lu-a2d 1 – used for ELAM where trigger is based on packet attributes
• Set outer [ipv4 | l2 | l4] . . . .
• Start
• Status {Can be Armed / Triggered}
• Report [detail]
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
ELAM on N9k Platform
TAHOE ELAM
Spine
att mod 1
debug platform internal tah elam asic 0
trigger init asic 0 slice 0 lu-a2d 1 in-select 7 out-select 0 use-src-id 52
reset VxLAN Encapsulated Packet
set inner ipv4 src_ip 100.1.1.1 dst_ip 100.1.1.5
start
report
Leaf1
att mod 1
debug platform internal tah elam asic 0
trigger init asic 0 slice 0 lu 1 in-select 6 out-select 0
reset Host IP Packet
set outer ipv4 src_ip 100.1.1.1 dst_ip 100.1.1.5
start
report
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
ELAM on N9k Platform
Partial Output
• Dot1Q Header
module-1(TAH-elam-insel6)# report detail | grep pr_lu_vec_l2v.qtag0
GBL_C++: [MSG] pr_lu_vec_l2v.qtag0_vld: 0x1 << dot1q yes? 0x1
GBL_C++: [MSG] pr_lu_vec_l2v.qtag0_cos: 0x0
GBL_C++: [MSG] pr_lu_vec_l2v.qtag0_de: 0x0
GBL_C++: [MSG] pr_lu_vec_l2v.qtag0_vlan: 0x64 << VL 100
• VLAN
module-1(TAH-elam-insel6)# report detail | grep -1 fpx_lookup_vec.lkup.macsakey.key.fid
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.vld: 0x1
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.fid_type: 0x0
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.fid_vld: 0x0
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.fid: 0x64 << dec 0xa = VL 10
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
ELAM on N9k Platform
Partial Output
• Src & Dst IP
module-1(TAH-elam-insel6)# report detail | grep vec_l3v.ip.*a
GBL_C++: [MSG] pr_lu_vec_l3v.ip.da: 0x0000000000000000064010101 << 100.1.1.1
GBL_C++: [MSG] pr_lu_vec_l3v.ip.sa: 0x0000000000000000064010105 << 100.1.1.5
• Src MAC
module-1(TAH-elam-insel6)# report detail | grep -i fpx_lookup_vec.lkup.macsakey.key.mac
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715 << 00fe.c80e.2715
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Great works and great Folly
may be indistinguishable at
the outset
- Adam Steltzner
ELAM Wrapper - Demo
debug platform internal tah elam
trigger init
set outer ipv4 src-ip ip-address dst-ip
ip-address
start
report [detail]
Demo – Consistency
Checker (CC)
- test consistency-checker forwarding
[ipv4 unicast | vrf vrf-name] [module
slot] [stop]
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKDCN-3040
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Complete your online
session survey
• Please complete your Online Session
Survey after each session
• Complete 4 Session Surveys & the Overall
Conference Survey (available from
Thursday) to receive your Cisco Live T-
shirt
• All surveys can be completed via the Cisco
Events Mobile App or the Communication
Stations
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Continue Your Education
BRKDCN-3040 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Thank you