M09 - Routing L3 To External Networks
M09 - Routing L3 To External Networks
www.lumoscloud.com
[email protected]
Agenda
Overview of Layer 3 Connectivity
Shared L3 Out
Overview of Layer 3
Connectivity
What is an L3out
VRF
BD BD
10.1.1.1/24 10.1.2.1/24
EPG EPG
Servers Contract
Servers
What is an L3out
VRF
BD L3out
10.1.1.1/24
External
External EPG Router
EPG (L3out network)
Servers 123.1.1.0/24
Contract
123.456.789.0/24
......
ACI Routing Keys
• Re-using EPG-Contract model
• IP address based classification
• L3extSubnet != Route
• No endpoint learning on L3out
• MB-BGP is used for redistribution within the fabric
• Route-map is the key for cross protocol redistribution
– Pervasive (static) L3out
– Different protocols
– Same protocol, cross border leafs
Connecting ACI via Layer 3
A subnet is routed internally as
host routes. Externally, a subnet Leafs connected to outside
is summarized to its configured networks are referred to as
netmask to external devices. “border leafs”. Any leaf can
be a border leaf.
Route learned:
2.2.2.0/24
VM: 2.2.2.10
Inside the fabric
Supported routing
protocols (ACI 3.0) Outside the fabric
• OSPF (v2/v3) Router External routes are distributed
• EIGRP internally via MP-BGP and route
• eBGP reflectors
• iBGP
• Static routes
Router Connections: ECMP and vPC
Layer 3 vPC is
Router Router supported Router
Checklist for Layer 3 Connectivity
• Bridge Domain subnet is
marked as “advertised
externally”
• Create Routed Outside (OSPF,
e/iBGP, EIGRP, Static)
• Assign Router IDs to any border
leafs (for dynamic protocols)
• Configure border leaf interface
profiles (SVI, L3, L3 sub-
interface)
• Create an L3 External EPG
Mark Subnet for Routing Externally
Tenant -> (Tenant Name) ->
Networking -> Bridge
Domain -> Subnets
BD L3out
10.1.1.1/24
L3 Network 1 External
Or Router
EPG 2
External EPG
123.1.1.0/24
Contract
123.456.789.0/24
3 ......
Layer 3 Connectivity Topology
Leaf 101 and 102 will
both need a router ID
each for each VRF
Tenant: Coke
Router-ID: 10.254.0.101 Router-ID: 10.254.0.102
VRF: Coke-VRF
Protocol: OSPF
Primary IP: 10.202.0.1 leaf101 leaf102
Primary IP: 10.202.0.1
Secondary IP: 10.202.0.2 Secondary IP: 10.202.0.2
vPC
Select routing
protocol
MP-BGP
Route Redistribution between internal
BGP and ‘outside’ occurs on border
leaves
External Tenant and Infra Routes
exchanged with external routers
Fabric leverages MP-BGP for distributing external routes, “outside EPG’s” to leaf switches
• Border leaf switch can peer with external networks and redistribute routing information about external networks into the internal
MP-BGP
o OSPF, Static, iBGP (FCS)
o MP-BGP w EVPN AF, EIGRP, IS-IS, OSPFv3 (Post FCS)
• Only “Public Subnet”(under Bridge Domain configuration) are announced to external network
ACI Layer 3 – BGP Route Reflector Configuration
ACI Layer 3 – OSPFv2 Peering Consideration
BGP Route Reflector interface Ethernet1/1.1000
encapsulation dot1q 1000
vrf member Tenant2
ip address 200.200.200.2/30
ip ospf network point-to-point
ip router ospf 1 area 0.0.0.1
router ospf 1
vrf Tenant2
area 0.0.0.1 nssa
default-information originate always
Sub-interface vrf Tenant3
area 0.0.0.1 nssa
OSPF peering in NSSA area default-information
Leaf 6
ExtEPG1
WEB 100.1.1.0/24
100.1.2.0/24
10.1.3.11 EPG 10.1.3.3
5 ExtEPG2
200.1.1.0/24
200.1.2.0/24
ACI L3 Outside Connection – IP Multicast Traffic
ACI supports IGMP snooping and L2 bridging for IP
multicast traffic
• L2 multicast bridging within Bridge
Domain based on IGMP snooping entries.
• Need external PIM router for L3 routing
across Bridge Domain boundary
• L2 outside connection to the external PIM
router for source and receiver bridge
domain
EPG
Bridge
EPG 1 2
Domain
Bridge Domain 1 2
PIM Router
ACI Transit Routing
Transit Routing
VRF
redistributing subnet-A
L3out-1 L3out-2
redistributing subnet-B
L3out-1 L3out-2
Advertise this
transit route to
external routers.
Select aggregate
route import and Use this prefix for the NEW
export if using 0/0 external EPG classifier
network, or use across VRF instances
specific routes
Transit Routing VRF
redistributing Area 0 and Area 1
L3out-1 L3out-2
Contract
External Router 1 (Area 0): External Router 2 (Area 1):
•Loopback0: 2.2.2.2/32 •Loopback0: 3.3.3.3/32
•Loopback1: 4.4.4.4/32 •Loopback1: 5.5.5.5/32
•Transits: 192.168.0.0/29 •Transits: 172.16.0.0/29
Transit Routing Example
Select aggregate
route import and
export if using 0/0
network, or use
External Router 1 (Area 0):
specific routes
External Router 2 (Area 1):
•Loopback0: 2.2.2.2/32 •Loopback0: 3.3.3.3/32
•Loopback1: 4.4.4.4/32 •Loopback1: 5.5.5.5/32
•Transits: 192.168.0.0/29 •Transits: 172.16.0.0/29
Transit Routing Example
No routes being learned
across fabric from
router-2
In the L3Out navigation pane select Now the Import and Export options
the “Route Control Enforcement:” are selectable from the L3Out EPG…
import checkbox…
Transit Routing Example
Select aggregate
Did you notice that we are
route import and using a catch all 0.0.0.0/0?
export if using 0/0
This would require usortousealso select the aggregate export
network,
and import features on the subnet/network epg we have
specific routes
Select aggregate
route import and
export if using 0/0
network, or use
specific routes
Transit Routing Example
Select aggregate
route import and
export if using 0/0
network, or use
specific routes
Select aggregate
route import and
export if using 0/0
network, or use
specific routes
Select aggregate
Prior to checking Import/Export features
route import and
export if using 0/0
network, or use
specific routes
After to checking Import/Export features
These checkboxes are updating route-maps and prefix-lists within ACI
Shared L3 Out
Shared Layer 3 Out
Options for Connecting Tenants to Network
• VRF-Lite (each Tenant with its own routing sessions)
• Shared Common-owned VRF, Bridge Domains in
Common Tenant, Shared L3 Out
• Shared Common-owned VRF, Bridge Domains in each
Tenant, Shared L3 Out
• Individual Tenant VRFs and Bridge Domains, Leaked to
Common Tenant, Shared L3 Out
Sharing VRF and L3Out Among Tenants
Bridge Domain, Subnet, and L3Out Under Tenant Common
Dynamic protocol
Static route
VRF
Tenant-Pepsi Tenant-Coke Tenant-Common
L3Out
Web APP DB Web APP DB
C C BD-Coke BD-Pepsi
C C 192.168.102.1/24 192.168.101.1/24
• No overlapping IP addresses among tenants, VRF instances shared among tenants, and traffic isolation through contract
• Bridge domain and subnet and L3Out defined under tenant common
• EPG, contract, and application profile under individual tenants
• Dynamic routing protocol with external routers
Sharing VRF and L3Out Among Tenants
Bridge Domain and Subnet Under Tenant
Static route now dynamic protocol with
Release 11.1(3x) or later
VRF
Tenant-Pepsi Tenant-Coke Tenant-Common
BD-Pepsi BD-Coke
192.168.101.1/24 192.168.102.1/24
L3Out
Web APP DB Web APP DB
C C C C
• External routes are learned by the border leaf. The border leaf leaks routes to the tenant VRF instance through multiprotocol
Border Gateway Protocol (MP-BGP).
• Tenant subnets that are marked as public and shared are leaked to the tenant common VRF instance and advertised to
external routers.
Sharing L3Out Across VRF Instances
with Cisco ACI 1.2(x)
Tenant 1
VRF1
External
EPG
EPG 1 (Consumer)
(Provider or L3Out 1
Consumer) Tenant-Common
VRF-Common
External EPG
(Shared
Tenant 2 L3Out Shared Service Provider)
VRF2
External
EPG
EPG 2 (Consumer)
(Provider or L3Out 2 Consumer Provider
Consumer)
Consumer Provider
or Provider or Consumer
Consumer Provider
or Provider or Consumer
C External EPG
Under Shared L3Out
• Normally policy is applied on the border leaf for traffic leaving the fabric.
• With a shared L3Out solution, policy for traffic destined for a shared service EPG is applied on ingress on the leaf itself.
• The same external EPG definition is used for all tenants for shared services.
Sharing L3Out Across VRF Instances
Sample Design
Tenant-SharedService Tenant-Consumer
VRF-Service VRF-Consumer
BD-Service BD-Consumer
40.40.40.1/24 50.50.50.1/24
(public and shared) (public and shared)
EPG-Storage
L3Out- EPG-Consumer L3Out-
40.40.40.1/24
SharedService Consumer
(public+shared)
External EPG
External EPG
50.50.51.0/24
0.0.0.0 50.50.52.0/24
EPG-Storage
L3Out- 40.40.40.1/24 L3Out-
EPG-Consumer
SharedService (public Consumer
and shared)
External EPG
External EPG
50.50.51.0/24
0.0.0.0 50.50.52.0/24
• Provider: The same subnet needs to be configured under EPG and bridge domain. Mark the subnet as “public” and “shared.”
• Consumer: The subnet is required only under the bridge domain. Mark the subnet as “public” and “shared.”
• Subnet of external EPG under Tenant-Consumer: Select all three options.
Shared Service Provider Bridge Domain and EPG
Configuration
• Subnet Under Bridge Domain: For advertising routes to L3Out and leaking routes to other VRF instances
• Subnet Under EPG: Required for policy reasons
Shared Service Consumer Configuration
• The subnet under the external EPG needs to be marked with Shared Route Control and Shared Security Import Subnet.
• After the Shared Security Import Subnet option is selected, the subnet is used as the external EPG classifier for all VRF instances. When defining
the external EPG in such way from multiple VRF instances, make sure there are no overlapping subnets.