Troubleshooting VXLAN BGP VPN
Troubleshooting VXLAN BGP VPN
Troubleshooting
VXLAN BGP EVPN
Vinit Jain
Technical Leader, Services
Twitter - @vinugenie
BRKDCN-3040
#CLUS
Agenda • Introduction
• VXLAN Overview
• VXLAN Packet Flow
• Configuration
• Nexus 9000 Components
• Control Plane Troubleshooting
• Troubleshooting BUM Traffic
• Troubleshooting Tenant Routed
Multicast
• Troubleshooting Tools
• Conclusion
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
VxLAN Overview
VXLAN Concepts
• VXLAN Overlay
- A VXLAN Overlay or VXLAN segment is a Layer-2 broadcast domain identified by
the VNID that extends or tunnels traffic from one VTEP to another.
• VXLAN Tunnel End Point (VTEP)
- A VTEP is a device that provides both encapsulation and de-capsulation of
classical Ethernet and VXLAN packets to and from a VXLAN segment
- Each VTEP may have the following types of interfaces:
Switchport interfaces on the local LAN segment to support local endpoints
Layer-3 interfaces to the transport IP network
SVI interfaces
• VXLAN Gateway
- A VTEP that bridges traffic between VXLAN segments
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
VXLAN Encapsulation
Ethernet
Payload FCS
Header
Rsvd Rsvd
Outer UDP Destination Port = VXLAN (originally 8472, recently updated to 4789)
1
Outer UDP Source Port = Hash of Inner Frame Headers (optional)
• The outer IP header has the source IP and destination IP of the VTEP
endpoints
• The outer Ethernet header has the source MAC of the source VTEP
and the destination MAC of the immediate Layer-3 next hop
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
VxLAN Packet Structure
F
Outer MAC Outer UDP VxLAN
Outer IP Header Original Layer 2 Frame C
Header Header Header
S
14 Bytes
(4 bytes optional) 8 Bytes Hash of inner L2/l3/L4
Destination NH MAC Source Port
headers of original frame.
16 Enables entropy for ECMP
48 Address Addr
16 VxLAN Port UDP 4789 Load balancing
48 Source Address
16 UDP Length
16 VLAN Type
0x8100 16 Checksum
16 VLAN ID Tag
Src and Dst
16 Ether Type 20 Bytes Addresses of 8 Bytes
0x0800
VTEP 16M possible
72 IP Header Misc. VxLAN
Data 8 RRRR1RRR segments
8 Protocol 0x11 Reserved
Src VTEP MAC Addr 24
16 Header
24 VNI
32 Checksum
Source IP 8 Reserved
32
Destination IP
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
VxLAN Overview
VxLAN Gateway Types
• Layer 2 Gateway
− The layer 2 gateway is required when the layer 2 traffic (IEEE 802.1q
tagged traffic) comes from VLAN into VxLAN segment (encapsulation) or
− The Ingress VxLAN packet egresses out an 802.1q tagged interface (de-
encapsulation), where the packet is bridged to a new VLAN.
• Layer 3 Gateway
− A layer 3 gateway is used when there is a VxLAN to VxLAN routing
− The ingress packet is a VxLAN packet on a routed segment but the
packet egresses out on a tagged 802.1q interface and the packet is
routed to a new VLAN
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
End System End System
VxLAN Overview 3
ARP Request for IP B
VxLAN - Flood and Learn Src MAC: MAC-A
Dst MAC: FF:FF:FF:FF:FF:FF
MAC-3
IP- 192.168.3.3
VTEP 3
S-MAC: MAC-1
D-MAC: MAC VxLAN Remote
VTEP-3
00:01:5E:01:01:01 Address ID VTEP
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
VxLAN Overview
VxLAN – Flood and Learn
• Data Plane learning technique for VxLAN
• VNI’s are mapped to a multicast group on a VTEP
• Local MACs are learnt over a VLAN (VNI) on a VTEP
• Broadcast, Unknown Unicast, Multicast (BUM Traffic) is flooded to
the delivery multicast group for that VNI
• Remote VTEPs part of same multicast group learn host MAC, VNI
and source VTEP as the next-hop for the host MAC from flooded
traffic
• Unicast packets to the host MAC are sent directly to source VTEP
as VxLAN encapsulated packet
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
VxLAN Overview
Ingress Replication
• Some customers not comfortable deploying multicast in their core
• With Ingress Replication (IR), BUM traffic ingress access side is
replicated to remote VTEP as unicast
• Static IR VETP tunnel is kept alive as long as the route to the VTEP
is available.
• Support multiple VTEPs per VNI and a VTEP in multiple VNIs
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
VxLAN Overview
Tenant
Tenant 1 (VRF 1)
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
VxLAN Overview
VxLAN EVPN
BGP-EVPN BGP-EVPN
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
VxLAN Overview
Distributed Anycast Gateway
Spine1 Spine2
L3 Underlay
Unicast / Multicast Routing
Host-A Host-B
Host-C
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
VxLAN Overview
Distributed Anycast Gateway - Configuration
• All VTEPs has same IP address for an L2 VNI
• Anycast Gateway MAC is global to each VTEP for all VNI’s for all Tenants
• One virtual MAC / VTEP
• All VTEPs should have same virtual MAC address
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
VxLAN Overview
ARP Suppression
• Hosts send out G-ARP when they
come online
IP Multicast Core
• Local leaf node receives G-ARP, 2 +
creates local ARP cache and VTEP-1 VxLAN EVPN VTEP-2
advertises to other leaf by BGP as 3 V V
route type 2 VRF VRF
A A
• Remote leaf node puts IP-MAC info
into remote ARP cache and supresses 4 MAC_H1
1 MAC_H2
incoming ARP request for this IP IP_H1 IP_H2
VNI1 VNI1
• If IP info not found in ARP suppression Vlan-100 Vlan-100
L3 Underlay
Unicast / Multicast Routing
VTEP-3
192.168.100.100
VPC
Host-A
Host-B
Host-C
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Configuration
Feature Enablement
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Underlay Configuration
Leaf Spine
router bgp 65000 router bgp 65001
router-id 192.168.1.1 router-id 192.168.1.1
address-family ipv4 unicast address-family ipv4 unicast
network 1.1.1.1/32 network 10.10.10.10/32
network 192.168.1.1/32 network 192.168.10.10/32
address-family l2vpn evpn address-family l2vpn evpn
neighbor 10.1.101.10 neighbor 10.1.201.1
remote-as 65001 remote-as 65000
address-family ipv4 unicast address-family ipv4 unicast
allowas-in 3 allowas-in 3
disable-peer-as-check disable-peer-as-check
neighbor 10.1.201.20 neighbor 10.1.202.2
remote-as 65001 remote-as 65000
address-family ipv4 unicast address-family ipv4 unicast
allowas-in 3 allowas-in 3
disable-peer-as-check disable-peer-as-check
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Leaf Node Configuration – L2 VNI
vlan 100 fabric forwarding anycast-gateway-mac
vn-segment 10000 0001.0001.0001
interface Vlan100
! Create L2 VNI no shutdown
vrf member EVPN-TENANT
evpn ip address 100.1.1.254/24
vni 10000 l2 fabric forwarding mode anycast-gateway
rd 10000:1 !
route-target import 10000:1 router bgp 65000
route-target export 10000:1 neighbor 10.10.10.10
! remote-as 65001
interface nve1 update-source loopback0
no shutdown ebgp-multihop 3
source-interface loopback0 address-family l2vpn evpn
host-reachability protocol bgp allowas-in 3
member vni 10000 disable-peer-as-check
mcast-group 239.1.1.1 send-community extended
suppress-arp vrf EVPN-TENANT
address-family ipv4 unicast
advertiseBRKDCN-3040
#CLUS
l2vpn evpn© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Leaf Node Configuration – L3 VNI
vlan 500 interface nve1
vn-segment 50000 no shutdown
! source-interface loopback0
vrf context EVPN-TENANT host-reachability protocol bgp
vni 50000 member vni 50000 associate-vrf
rd 50000:1 !
address-family ipv4 unicast interface loopback200
route-target import 20000:1 vrf member EVPN-TENANT
route-target import 20000:1 evpn ip address 200.1.1.1/32
route-target export 20000:1 !
route-target export 20000:1 evpn router bgp 65000
! vrf EVPN-TENANT
interface Vlan500 address-family ipv4 unicast
no shutdown network 200.1.1.1/32
vrf member EVPN-TENANT advertise l2vpn evpn
ip forward
!
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Leaf Node with VPC Configuration
vpc domain 10
peer-switch
peer-keepalive destination 10.1.34.4 source
10.1.34.3 VTEP IP. The secondary
delay restore 60 IP is same on both Leaf3
peer-gateway and Leaf 4 running VPC
ipv6 nd synchronize
ip arp synchronize
!
interface loopback0
ip address 192.168.3.3/32 Backup Routing SVI
ip address 192.168.100.100/32 secondary
ip router ospf 100 area 0.0.0.0 vlan 5
ip pim sparse-mode interface vlan 5
ip add 10.5.1.1/24
ip router ospf 100 area 0.0.0.0
Backup Routing SVI ip pim sparse-mode
Configured on both vPC
peers and part of global
routing table.
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Spine Node Configuration
router bgp 65001
address-family l2vpn evpn
nexthop route-map permitall
interface loopback0 retain route-target all
ip address 192.168.10.10/32 neighbor 1.1.1.1
ip pim sparse-mode remote-as 65000
update-source loopback0
!
ebgp-multihop 3
interface loopback1 address-family l2vpn evpn
ip address 192.168.50.50/32 disable-peer-as-check
ip pim sparse-mode send-community extended
! route-map permitall out
ip pim rp-add 192.168.50.50 group-list neighbor 2.2.2.2
remote-as 65000
239.1.1.0/24
update-source loopback0
ip pim anycast-rp 192.168.50.50 192.168.10.10 ebgp-multihop 3
ip pim anycast-rp 192.168.50.50 192.168.20.20 address-family l2vpn evpn
disable-peer-as-check
send-community extended
route-map permitall out
!
route-map permitall permit 10
set ip next-hop unchanged
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Leaf Node Configuration – L2 & L3 VNI for IPv6
vlan 100 fabric forwarding anycast-gateway-mac 0001.0001.0001
vn-segment 10000 interface Vlan100
vlan 200 no shutdown
vn-segment 20000 vrf member EVPN-TENANT
evpn ip address 100.1.1.254/24
vni 10000 l2 ipv6 address 2001::1/64
rd 10000:1 fabric forwarding mode anycast-gateway
route-target import 10000:1 !
route-target export 10000:1 interface nve1
! no shutdown
vrf context EVPN-TENANT source-interface loopback0
vni 20000 host-reachability protocol bgp
rd 20000:1 member vni 10000
address-family ipv4 unicast mcast-group 239.1.1.1
route-target both 20000:1 suppress-arp
route-target both 20000:1 evpn member vni 20000 associate-vrf
address-family ipv6 unicast !
route-target both 20000:1 router bgp 100
route-target both 20000:1 evpn vrf EVPN-TENANT
! address-family ipv4 unicast
interface Vlan200 advertise l2vpn evpn
no shutdown address-family ipv6 unicast
vrf member EVPN-TENANT advertise l2vpn evpn
ip forward !
ipv6 address use-link-local-only vpc domain 10
ipv6 nd synchronize
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
VxLAN EVPN Configuration
Host Learning and Peer Discovery
Host Learning Data Plane Control Plane
CORE
Multicast Flood and Learn EVPN-Multicast
Peer Learning: Data Plane Peer Learning: BGP-RnH
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
VXLAN BGP EVPN Control-Plane
Verification
Nexus 9000 VxLAN Architecture
BGP
URIB, VxLAN
U6RIB Manager L2RIB
(PI)
HMM
MRIB
VxLAN
Manager Adj. Mgr
(PD)
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Troubleshooting VxLAN EVPN
VxLAN EVPN Prefix Types
Leaf1# show bgp l2vpn evpn
Network Next Hop Metric LocPrf Weight Path
Route Distinguisher: 10000:1 (L2VNI 10000)
*>l[2]:[0]:[0]:[48]:[523d.e706.ae1b]:[0]:[0.0.0.0]/216
192.168.1.1 100 32768 i
*>l[2]:[0]:[0]:[48]:[523d.e706.ae1b]:[32]:[100.1.1.1]/272
192.168.1.1 100 32768 i
*>l[3]:[0]:[32]:[192.168.1.1]/88
192.168.1.1 100 32768 i
*>e[3]:[0]:[32]:[192.168.2.2]/88
192.168.2.2 0 65001 65000 i
*>e[3]:[0]:[32]:[192.168.3.3]/88
192.168.3.3 0 65001 65000 I
Route Distinguisher: 192.168.2.2:32967
* e[3]:[0]:[32]:[192.168.2.2]/88
192.168.2.2 0 65001 65000 i
*>e 192.168.2.2 0 65001 65000 i
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Troubleshooting VxLAN EVPN
EVPN Prefix Types
BGP EVPN uses 5 different route types for IP
prefixes and advertisement Route TYPE - 8
Type 1 - Ethernet Auto-Discovery (A-D) route
Length - 10
Type 2 - MAC advertisement route L2 VNI MAC/MAC-IP
Type 3 - Inclusive Multicast Route EVPN IR, Peer Discovery Route Type Specific
Type 4 - Ethernet Segment Route
Type 5 - IP Prefix Route L3 VNI Route
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Troubleshooting VxLAN EVPN
NVE Interface
Leaf1# show nve interface
Interface: nve1, State: Up, encapsulation: VXLAN
VPC Capability: VPC-VIP-Only [not-notified]
Local Router MAC: f40f.1b6f.926f
Host Learning Mode: Control-Plane
Source-Interface: loopback0 (primary: 192.168.1.1, secondary: 0.0.0.0)
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Troubleshooting VxLAN EVPN
Local MAC Routes Learning
L2FM
Mac Learnt on Vlan 100
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Troubleshooting VxLAN EVPN
L2FM installs the MAC in the L2RIB Leaf1#show l2route evpn mac evi 100
Mac Address Prod Next Hop (s)
L2FM L2RIB -------------- ------ ---------------
523d.e706.ae1b Local Eth1/15
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Troubleshooting VxLAN EVPN
L2 VNI, MAC
L2FM L2RIB BGP L2VPN
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Troubleshooting VxLAN EVPN
Local MAC Address in BGP L2VPN
L2FM L2RIB BGP L2VPN
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Troubleshooting VxLAN EVPN
Remote L2 MAC Route Installation via BGP EVPN
Leaf2# show bgp l2vpn evpn 523d.e706.ae1b
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 192.168.1.1:32867
BGP routing table entry for [2]:[0]:[0]:[48]:[523d.e706.ae1b]:[0]:[0.0.0.0]/216,
Paths: (2 available, best #1)
Flags: (0x000202) (high32 00000000) on xmit-list, is not in l2rib/evpn, is not in HW
Advertised path-id 1
Path type: external, path is valid, is best path
BGP L2VPN Imported to 1 destination(s)
AS-Path: 65001 65000 , path sourced external to AS
192.168.1.1 (metric 0) from 20.20.20.20 (192.168.20.20)
Origin IGP, MED not set, localpref 100, weight 0
Received label 10000
Extcommunity: RT:65000:10000 ENCAP:8
Path type: external, path is valid, not best reason: newer EBGP path
AS-Path: 65001 65000 , path sourced external to AS
192.168.1.1 (metric 0) from 10.10.10.10 (192.168.10.10)
Origin IGP, MED not set, localpref 100, weight 0
Received label 10000
Extcommunity: RT:65000:10000 ENCAP:8
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
EVPN BGP Route Type 2 Fields
Ethernet Tag ID, MAC Address Length, MAC Address, IP Address Length, and IP Address fields are
considered to be part of the prefix in the NLRI.
Ethernet Segment Identifier, MPLS Label1, and MPLS Label2 are treated as route attributes, not part
of the "route". Both the IP and MAC address lengths are in bits.
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Troubleshooting VxLAN EVPN
Remote L2 MAC Route Installation with BGP EPVN (Flow)
2a. Peer,
VNI
Notification
BGP L2VPN
2b. Add (VNI, MAC->
VxLAN Remote VTEP IP)
Mgr
VxLAN PD L2RIB
Lib.
5. Add (VNI,
3. Program data plane with
MAC -> Peer
unicast encap/decap for
ID)
VNI, Allocate Peer ID
L2FM
UFDM
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Troubleshooting VxLAN EVPN
BGP to L2RIB
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Troubleshooting VxLAN EVPN
Remote L2 MAC Route Installation via BGP EVPN
Leaf2# show nve internal bgp rnh database VxLAN Mgr
--------------------------------------------
Showing BGP RNH Database, size : 2 vni 0
BGP L2VPN
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
VxLAN Manager
Leaf2# show forwarding nve l3 peers
NVE cleanup transaction-id 0
tunnel_id Peer_id Peer_address Interface rmac origin state del count
--------------------------------------------------------------------------------------
0xc0a80101 1 192.168.1.1 nve1 f40f.1b6f.926f NVE merge-done no 1
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Troubleshooting VxLAN EVPN
Host IP and Host MAC local route
4. Route add: VRF test, Host-IP, L3VNI
HMM L2RIB
3. Adj. Notification: Host-IP, Host- 5. Route add: VRF test, Host-IP, L3 Table
MAC, SVI interface ID. Per prefix: L2 Table ID, Host-MAC
AM BGP
2. Create Adjacency: Host-IP, L3 + L2 NLRI
Host-MAC, Server facing SVI Prefix = Host-IP
interface MAC = Host-MAC
1b. Add an adjacency in AM, if Label1: L3-VNI
ARP the VLAN is enabled for L3 Label2: L2-VNI
processing VRF RT
1a. ARP Request/Reply BD RT
NH = VTEP IP
RMAC
ENCAP_VXLAN
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Troubleshoot VxLAN EVPN
ARP from Host and ARP -> AM
Leaf1# show ip arp vrf EVPN-TENANT
IP ARP Table for context EVPN-TENANT
Total number of entries: 1
Address Age MAC Address Interface ARP
100.1.1.1 00:10:47 523d.e706.ae1b Vlan100
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Troubleshoot VxLAN EVPN AM
AM -> HMM -> L2RIB
Leaf1# show ip route vrf EVPN-TENANT
100.1.1.1/32, ubest/mbest: 1/0, attached
*via 100.1.1.1, Vlan100, [190/0], 02:41:57, hmm
100.1.1.254/32, ubest/mbest: 1/0, attached HMM
*via 100.1.1.254, Vlan100, [0/0], 02:59:46, local
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Troubleshooting VxLAN EVPN
L2RIB -> BGP
Leaf1# show bgp l2vpn evpn 100.1.1.1
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 10000:1 (L2VNI 10000)
BGP routing table entry for [2]:[0]:[0]:[48]:[523d.e706.ae1b]:[32]:[100.1.1.1]/272,
version 6
Paths: (1 available, best #1)
Flags: (0x00010a) on xmit-list, is not in l2rib/evpn
Advertised path-id 1
Path type: local, path is valid, is best path, no labeled nexthop
AS-Path: NONE, path locally originated
192.168.1.1 (metric 0) from 0.0.0.0 (192.168.1.1)
Origin IGP, MED not set, localpref 100, weight 32768
Received label 10000 50000
Extcommunity: RT:10000:1 RT:50000:1
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
L2 + L3 Remote Route Installation
L3 + L2 NLRI BGP-EVPN
Prefix = Host-IP
MAC = Host-MAC EVPN Table
Label1: L3-VNI VTEP_IP, RCAM,
Label2: L2-VNI L3VNI, L2VNI,
VRF RT VRF Import Tunnel Info
VxLAN
BD RT BD Import
NH = VTEP IP RNH DB VxLAN
RMAC
ENCAP_VXLAN Tunnel_ID Manager
VRF BD
Peer-Id RMAC,
notification VNI->Peer
VRF, Host-IP, ID
L3VNI, VTEP-IP
BD L2RIB
URIB
RMAC, VNI->Peer ID
VRF Program data
(L2-BD, MAC-
H1)-> Peer-ID
plane with unicast
VRF, Host-IP, encap/decap for
L3VNI, VTEP-IP L3VNI, RMAC,
Allocate Peer-ID
UFDM
FIB L2FM
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Troubleshooting VxLAN EVPN
L2RIB and URIB Information
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Troubleshooting VxLAN EVPN
Remote Host Prefix - EVPN
Leaf2# show bgp l2vpn evpn 100.1.1.1
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 10000:1 (L2VNI 10000)
BGP routing table entry for [2]:[0]:[0]:[48]:[523d.e706.ae1b]:[32]:[100.1.1.1]/272,
version 5
Paths: (1 available, best #1)
Flags: (0x00021a) on xmit-list, is in l2rib/evpn, is not in HW, , is locked
Advertised path-id 1
Path type: internal, path is valid, imported same remote RD, is best path, no labeled
nexthop
AS-Path: NONE, path sourced internal to AS
192.168.1.1 (metric 5) from 10.10.10.10 (192.168.10.10)
Origin IGP, MED not set, localpref 100, weight 0
Received label 10000 50000
Extcommunity: RT:10000:1 RT:50000:1 ENCAP:8 Router MAC:f40f.1b6f.926f
Originator: 192.168.1.1 Cluster list: 10.10.10.10
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Troubleshooting VxLAN EVPN
Remote Host Prefix – contd…
...
Route Distinguisher: 50000:1 (L3VNI 20000)
BGP routing table entry for [2]:[0]:[0]:[48]:[523d.e706.ae1b]:[32]:[100.1.1.1]/272,
version 6
Paths: (1 available, best #1)
Flags: (0x00021a) on xmit-list, is in l2rib/evpn, is not in HW,
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported from 10000:1:[2]:[0]:[0]:[48]:[8c60.4f1b.e43c]:[32]:[100.1.1.1]/144
(VNI 10000)
AS-Path: NONE, path sourced internal to AS
192.168.1.1 (metric 5) from 192.168.10.10 (192.168.10.10)
Origin IGP, MED not set, localpref 100, weight 0
Received label 10000 50000
Extcommunity: RT:10000:1 RT:50000:1 ENCAP:8 Router MAC:f40f.1b6f.926f
Originator: 192.168.1.1 Cluster list: 10.10.10.10
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Troubleshooting VxLAN EVPN
ARP Suppression Cache
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Troubleshooting VxLAN EVPN
NVE Internal Information for Leaf Nodes with VPC Peers
Leaf3# show nve internal platform interface nve 1 detail
Printing Interface ifindex 0x49000001 detail
|======|=========================|===============|===============|=====|=====|
|Intf |State |PriIP |SecIP |Vnis |Peers|
|======|=========================|===============|===============|=====|=====|
|nve1 |UP |192.168.3.3 |192.168.100.100|2 |2 |
|======|=========================|===============|===============|=====|=====|
SW_BD/VNIs of interface nve1:
================================================
|======|======|=========================|======|====|======|========
|Sw BD |Vni |State |Intf |Type|Vrf-ID|Notified
|======|======|=========================|======|====|======|========
|100 |10000 |UP |nve1 |CP |0 |Yes
|200 |20000 |UP |nve1 |CP |3 |Yes
|======|======|=========================|======|====|======|========
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Troubleshooting VxLAN EVPN
NVE Internal Information for Leaf Nodes on Non-VPC Peers
Leaf1# show nve internal platform interface nve1 detail
Printing Interface ifindex 0x49000001 detail
|======|=========================|===============|===============|=====|=====|
|Intf |State |PriIP |SecIP |Vnis |Peers|
|======|=========================|===============|===============|=====|=====|
|nve1 |UP |192.168.1.1 |0.0.0.0 |2 |2 |
|======|=========================|===============|===============|=====|=====|
SW_BD/VNIs of interface nve1:
================================================
|======|======|=========================|======|====|======|========
|Sw BD |Vni |State |Intf |Type|Vrf-ID|Notified
|======|======|=========================|======|====|======|========
|100 |10000 |UP |nve1 |CP |0 |Yes
|200 |20000 |UP |nve1 |CP |3 |Yes
|======|======|=========================|======|====|======|========
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Troubleshooting VXLAN EVPN
Uplinks with SVI / Sub-Interfaces
• For SVI based uplinks, define the infra VLANs
• system nve infra-vlan <svi-vlan>
• Sub-Interfaces
• Not supported on ALE links (40G ports) (Documented)
• Check CCO documentation
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Troubleshooting BUM
Traffic
Troubleshooting BUM Traffic
BUM Traffic over Multicast Core
• BUM Traffic - Broadcast traffic (ARP and other broadcast packets),
Multicast traffic from hosts, etc.
• Check the multicast group associated with the L2 VNI
• Get the Source VTEP IP and Router MAC
• Check if ARP Suppression is enabled or not
• Ask the right Questions:
• Check if the VTEP is a VPC VTEP or Standalone VTEP?
• Is the issue seen for IPv4 hosts or IPv6 hosts?
• Know the trigger and understand if the issue is continuously reproducible
or not?
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Troubleshooting BUM Traffic
Step 1 – Check if the BUM Traffic is making it to the source VTEP
LEAF45# ethanalyzer local interface inband capture-fil "arp" limit-captured-frames 0
Capturing on inband
2018-05-21 14:52:36.289960 20:20:00:00:00:aa -> 54:7f:ee:07:e1:41 ARP 10.150.1.254 is
at 20:20:00:00:00:aa
2018-05-21 14:52:36.295037 54:7f:ee:07:e1:41 -> ff:ff:ff:ff:ff:ff ARP Who has
10.150.1.35? Tell 10.150.1.36
2018-05-21 14:52:36.295425 2c:54:2d:f6:0f:bc -> 54:7f:ee:07:e1:41 ARP 10.150.1.35 is at
2c:54:2d:f6:0f:bc
2018-05-21 14:52:38.127594 54:7f:ee:07:e1:41 -> ff:ff:ff:ff:ff:ff ARP Who has
10.150.1.38? Tell 10.150.1.36
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Troubleshooting BUM Traffic
Step 2 – Check the Mroute Entry – Src VTEP
LEAF45# show ip mroute 231.1.150.1 10.0.0.204 detail
IP Multicast Routing Table for VRF "default"
Total number of routes: 8
Total number of (*,G) routes: 2
Total number of (S,G) routes: 5
Total number of (*,G-prefix) routes: 1
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Troubleshooting BUM Traffic
Step 3.1 – Check the Mroute Entry – Dest VTEP
LEAF43# show ip mroute 231.1.150.1 10.0.0.204 detail
IP Multicast Routing Table for VRF "default"
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Troubleshooting BUM Traffic
Step 3.2 – Check the Mroute Entry – Dest VTEP
LEAF44# show ip mroute 231.1.150.1 10.0.0.204 detail
IP Multicast Routing Table for VRF "default"
Total number of routes: 8
Total number of (*,G) routes: 2
Total number of (S,G) routes: 5
Total number of (*,G-prefix) routes: 1
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Troubleshooting BUM Traffic
Step 4 – Capturing BUM Traffic in Core
LEAF45(config)# monitor session 1
LEAF45(config-monitor)# source interface ethernet 1/50
LEAF45(config-monitor)# destination interface sup-eth 0
LEAF45(config-monitor)# no shut
LEAF45(config-monitor)# end
Capturing on inband
2018-05-21 16:21:01.985236 10.0.0.204 -> 231.1.150.1 UDP Source port: 41316
Destination port: 4789
Use the detail option with ethanalyzer to see the whole packet
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Demo
Troubleshooting Tenant
Routed Multicast (TRM)
Tenant Routed Multicast (TRM)
Overview
• A BGP based solution for allowing multicast routing and snooping over
VXLAN EVPN fabric
• Sources and Receivers are connected to the VTEPs
• Modes:
• L3 Mode
• L2/L3 Mixed Mode
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Tenant Routed Multicast (TRM)
EVPN – L3 Anycast
S S
V V V V
S R R R
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Tenant Routed Multicast (TRM)
TRM Verification
Leaf1# show fabric multicast vrf all
Fabric Multicast Enabled VRFs
VRF Name VRF Vprime VN-Seg
ID If ID
default 1 Null 0
TRM 4 Vlan1500 150000
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Tenant Routed Multicast (TRM)
Show bgp internal mvpn detail
Leaf1# show bgp internal mvpn detail
*************************************************
NGMVPN feature/server/role: VxLAN/1/VxLAN
NGMVPN registered: Yes (Jun 9 00:56:59.297696/never)
NGMVPN TRM mode: L3 (0x000002)
NGMVPN down: in-prg/up-defer: 0/0
NGMVPN register/failures: 1/0
NGMVPN deregister/failures: 0/0
NGMVPN Convergence sent: 0
NGMVPN local-req sent/skipped: 7/3
NGMVPN local-req sent: 4 (L2VNI)/ 2 (L3VNI)/ 1 (All VNIs)
NGMVPN remote-req rcvd: 0 (L2VNI)/ 0 (L3VNI)/ 1 (All VNIs)
NGMVPN del remote: 0 (L2VNI)/ 0 (L3VNI)/ 0 (All VNIs)
NGMVPN msgs sent/acks rcvd: 9/9
NGMVPN msgs rcvd/acks sent: 24/14
NGMVPN msg err/ack err/drops: 0/0/0
Last xid sent to NGMVPN: 9
Last xid ack by NGMVPN: 9
. . . .
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Tenant Routed Multicast (TRM)
Show bgp internal mvpn detail (contd…)
++++++++++++++++++++++++++++++++++++++++++
BGP MVPN RD Information for 192.168.1.1:4 (0xd625952c)
VNI ID : 150000
VRF : TRM
Global NGMVPN mode : L3 (1 L3 VRFs)
VRF L3 Mode : Yes Jun 9 00:57:00.203673
Enabled : Yes
Delete Pending : No
Cleanup Pending : No
Import Pending : No
Import In Progress : No
Created : Jun 9 00:56:55.570427
Enabled At : Jun 9 00:56:55.570471
. . .
Is Auto RT : No
Config VRF Import RT : 1
Import RT cfg list: 192.168.1.1:1500
Active VRF Import RT : 1
Active VRF Import RT list : 192.168.1.1:1500
VRF Import RT chg/chg-pending : 0/0
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Tenant Routed Multicast (TRM)
Join from Receiver
Leaf3# show ip mroute 239.0.0.1 detail vrf TRM
IP Multicast Routing Table for VRF "TRM"
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Tenant Routed Multicast (TRM)
FHR VTEP sends SA-AD (Type-5 Route) using BGP to other VTEPs
Leaf1# show bgp ipv4 mvpn sa-ad detail vrf TRM
BGP routing table information for VRF default, address family IPv4 MVPN
Route Distinguisher: 192.168.1.1:4 (L3VNI 150000)
BGP routing table entry for [5][10.0.0.1][239.0.0.1]/64, version 34
Paths: (1 available, best #1)
Flags: (0x000002) (high32 00000000) on xmit-list, is not in mvpn
Advertised path-id 1
Path type: local, path is valid, is best path
AS-Path: NONE, path locally originated
0.0.0.0 (metric 0) from 0.0.0.0 (192.168.1.1)
Origin IGP, MED not set, localpref 100, weight 32768
Extcommunity: RT:65000:150000
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Tenant Routed Multicast (TRM)
LHR / Remote VTEPs build (S, G)
Leaf3# show ip mroute 239.0.0.1 10.0.0.1 detail vrf TRM
IP Multicast Routing Table for VRF "TRM"
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Tenant Routed Multicast (TRM)
VTEP3/4 sends Type-7 back to FHR on L3VNI
Leaf3# show bgp ipv4 mvpn route-type 7 detail
BGP routing table information for VRF default, address family IPv4 MVPN
Route Distinguisher: 192.168.1.1:33767 (Local VNI: 150000)
BGP routing table entry for [7][10.0.0.1][239.0.0.1][65000]/96, version 43
Paths: (1 available, best #1)
Flags: (0x000002) (high32 00000000) on xmit-list, is not in mvpn
Advertised path-id 1
Path type: local, path is valid, is best path
AS-Path: NONE, path locally originated
0.0.0.0 (metric 0) from 0.0.0.0 (192.168.3.3)
Origin IGP, MED not set, localpref 100, weight 32768
Extcommunity: RT:192.168.1.1:1500
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Tenant Routed Multicast (TRM)
VTEP1 Receives the Type-7 route
Leaf1# show bgp ipv4 mvpn route-type 7 detail
BGP routing table information for VRF default, address family IPv4 MVPN
Route Distinguisher: 192.168.1.1:4 (L3VNI 150000)
BGP routing table entry for [7][10.0.0.1][239.0.0.1][65000]/96, version 36
Paths: (1 available, best #1)
Flags: (0x00001a) (high32 00000000) on xmit-list, is in mvpn, is not in HW
Advertised path-id 1
Path type: external, path is valid, is best path, in rib
Imported from 192.168.1.1:33767:[7][10.0.0.1][239.0.0.1][65000]/96
AS-Path: 65001 65000 , path sourced external to AS
192.168.100.100 (metric 0) from 10.10.10.10 (192.168.10.10)
Origin IGP, MED not set, localpref 100, weight 0
Extcommunity: RT:192.168.1.1:1500
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Tenant Routed Multicast (TRM)
VTEP1 adds L3VNI in the OIF List
Leaf1# show ip mroute 239.0.0.1 10.0.0.1 detail vrf TRM
IP Multicast Routing Table for VRF "TRM"
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Tenant Routed Multicast (TRM)
VTEP1 adds L3VNI in the OIF List
Leaf3# show ip mroute 239.0.0.1 10.0.0.1 detail vrf TRM
IP Multicast Routing Table for VRF "TRM"
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Tenant Routed Multicast (TRM)
MFDM (Validate this info on both FHR and LHR)
Leaf1# show forwarding distribution multicast route vrf TRM group 239.0.0.1 source
10.0.0.1
MFIB Database
Show forwarding multicast outgoing-interface-list l3 <index>
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Troubleshooting Tools
Troubleshooting Tools
VXLAN OAM
• VXLAN OAM feature introduced in 7.0(3)I5(2) – NGOAM
• Need a feature for Path verification and Path tracking with Telemetry
data
• Similar to Fabric Path OAM Enable NGOAM
Feature
• Provides 3 features
feature ngoam
• VxLAN Ping Create Profile
ngoam profile 1
• VxLAN Traceroute oam-channel 2
! Install ACL
• VxLAN PathTrace
ngoam install acl
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
VXLAN OAM
Usability
• Helps diagnose underlay / overlay reachability of VMs
• Covers exact path as Data Packet
• Path verification for all ECMP paths in Overlay
• Path tracking – Exact path host traffic takes in overlay and underlay
network
• Layer 2 – Traceroute / Ping to VM host from Leaf
• Layer 3 – Traceroute / Ping to Vm host from Leaf
• Flexible OAM channel supporting multiple drafts
• Tissa draft – nvo3
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
VXLAN OAM
VXLAN OAM Message
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. Circuit Header . (variable)
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ Transport Header + Technology dependent
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ VXLAN Header + 8 bytes
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. OAM Message Channel . Variable
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ Link Trailer + Variable
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
VXLAN OAM
VXLAN PING
• VxLAN Ping checks connectivity to the destination, where the destination
can be VM’s IP address or routed loopback addresses on the leaf switch
• Since there are multiple paths, only one path is followed based on the flow
parameters
• Ping for both VM / Host MAC and IP
• Default ping support – Ping based on just destination address and VNI
segment
• Allow users to specify flow parameters such as UDP port, destination and
source address
• This helps VxLAN ping follow the specific path the unicast ping will take to reach
the destination
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
VxLAN OAM
PING NVE MAC
Leaf1# ping nve mac 0050.56b3.bcef 200 port-channel 101 profile 1 vni 20000
verbose
Codes: '!' - success, 'Q' - request not sent, '.' - timeout,
'D' - Destination Unreachable, 'X' - unknown return code,
'm' - malformed request(parameter problem)
,'c' - Corrupted Data/Test, '#' - Duplicate response
Sender handle: 21
! sport 51932 size 39,Reply from 192.168.100.100,time = 5 ms
! sport 51932 size 39,Reply from 192.168.100.100,time = 4 ms
! sport 51932 size 39,Reply from 192.168.100.100,time = 4 ms
! sport 51932 size 39,Reply from 192.168.100.100,time = 4 ms
! sport 51932 size 39,Reply from 192.168.100.100,time = 4 ms
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
VxLAN OAM
VxLAN Traceroute
• VxLAN Traceroute – Used to trace the path a packet takes between source
and destination
• Only one path is traced based on the given flow parameters
• Trace will show uni-directional path the packet takes to the destination, but the
return path may be different
• Should be able to trace VTEPs, access switch and end-host. For the
default mode, the user should be able to trace the tunnel endpoint IP
address and the segment ID
• Actual path taken by a packet is dependent on all the L2/L3/L4 header
fields and network topology at the time the packet is sent
• Users can specify the flow parameters
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
VxLAN OAM
VxLAN PathTrace
• Similar to Traceroute, but uses Nvo3 channel
• Carries additional ingress / egress and load information of the path
• Provides additional information if the device supports nvo3 channel else its
same as traceroute
• Actual path taken by a packet is dependent on all the L2/L3/L4
header fields and network topology at the time the packet is sent
•
Leaf1# Users can specify the flow parameters
pathtrace nve mac 0050.56b3.bcef 200 port-channel 101 vni 20000
<snip>
Path trace Request to peer ip 192.168.100.100 source ip 192.168.99.99
Sender handle: 35Hop Code ReplyIP IngressI/f EgressI/f State
====================================================
1 !Reply from 10.101.1.10, Eth2/1 Eth1/17 UP / UP
2 !Reply from 192.168.100.100, Eth1/17 Unknown UP / DOWN
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Troubleshooting Tools
ELAM
• Embedded Logic Analyzer module (ELAM) – tool used to capture a
packet processed by a Cisco ASIC
• Depending on the N9k platform,
• ELAM on NS ASIC
• ELAM on TAHOE ASIC
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
ELAM on N9k Platform
TAHOE ELAM Steps
• Attach module X
Leaf1
att mod 1
debug platform internal tah elam asic 0
trigger init asic 0 slice 0 lu 1 in-select 6 out-select 0
reset Host IP Packet
set outer ipv4 src_ip 100.1.1.1 dst_ip 100.1.1.5
start
report
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
ELAM on N9k Platform
Partial Output
• Dot1Q Header
module-1(TAH-elam-insel6)# report detail | grep pr_lu_vec_l2v.qtag0
GBL_C++: [MSG] pr_lu_vec_l2v.qtag0_vld: 0x1 << dot1q yes? 0x1
GBL_C++: [MSG] pr_lu_vec_l2v.qtag0_cos: 0x0
GBL_C++: [MSG] pr_lu_vec_l2v.qtag0_de: 0x0
GBL_C++: [MSG] pr_lu_vec_l2v.qtag0_vlan: 0x64 << VL 100
• VLAN
module-1(TAH-elam-insel6)# report detail | grep -1 fpx_lookup_vec.lkup.macsakey.key.fid
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.vld: 0x1
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.fid_type: 0x0
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.fid_vld: 0x0
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.fid: 0x64 << dec 0xa = VL 10
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
ELAM on N9k Platform
Partial Output
• Src & Dst IP
module-1(TAH-elam-insel6)# report detail | grep vec_l3v.ip.*a
GBL_C++: [MSG] pr_lu_vec_l3v.ip.da: 0x0000000000000000064010101 << 100.1.1.1
GBL_C++: [MSG] pr_lu_vec_l3v.ip.sa: 0x0000000000000000064010105 << 100.1.1.5
• Src MAC
module-1(TAH-elam-insel6)# report detail | grep -i fpx_lookup_vec.lkup.macsakey.key.mac
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715 << 00fe.c80e.2715
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715
GBL_C++: [MSG] fpx_lookup_vec.lkup.macsakey.key.mac: 0xFEC80E2715
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
ELAM Wrapper - Demo
debug platform internal tah elam
trigger init
set outer ipv4 src-ip ip-address dst-ip ip-address
start
report [detail]
Demo – Consistency Checker (CC)
- test consistency-checker forwarding [ipv4 unicast | vrf vrf-name]
[module slot] [stop]
How
1 Find this session in the Cisco Events App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
#CLUS © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Complete your online session evaluation
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Continue
your Demos in
the Cisco
Walk-in
self-paced
Meet the
engineer
Related
sessions
education campus labs 1:1
meetings
#CLUS BRKDCN-3040 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Thank you
#CLUS
#CLUS