Ocnos DC Vxlan Guide
Ocnos DC Vxlan Guide
November 2024
This documentation is subject to change without notice. The software described in this document and this documentation
are furnished under a license agreement or nondisclosure agreement. The software and documentation may be used or
copied only in accordance with the terms of the applicable agreement. No part of this publication may be reproduced,
stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and
recording for any purpose other than the purchaser's internal use without the written permission of IP Infusion Inc.
IP Infusion Inc.
3979 Freedom Circle
Suite 900
Santa Clara, California 95054
http://www.ipinfusion.com/
Trademarks:
IP Infusion and OcNOS are trademarks or registered trademarks of IP Infusion. All other trademarks, service marks,
registered trademarks, or registered service marks are the property of their respective owners.
Use of certain software included in this equipment is subject to the IP Infusion, Inc. End User License Agreement at http://
www.ipinfusion.com/license. By using the equipment, you accept the terms of the End User License Agreement.
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
IP Maestro Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Chapter Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Related Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Migration Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Feature Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
VxLAN - EVPN with Integrated Routing and Bridging Deployment Mode . . . 172
CHAPTER 1 VXLAN-EVPN with IRB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173
Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173
Base Configuration - L2 VXLAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .174
Centralized Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190
IRB Configuration for Centralized Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190
Anycast Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195
Distributed Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .216
VXLAN IRB ECMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .223
Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .302
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
Preface
This guide describes how to configure OcNOS.
IP Maestro Support
Monitor devices running OcNOS Release 6.3.4-70 and above using IP Maestro software.
Audience
This guide is intended for network administrators and other engineering professionals who configure OcNOS.
Conventions
Table P-1 shows the conventions used in this guide.
Convention Description
monospaced type Code elements such as commands, parameters, files, and directories
Chapter Organization
The chapters in command references are organized as described in Command Description Format.
The chapters in configuration guides are organized into these major sections:
• An overview that explains a configuration in words
• Topology with a diagram that shows the devices and connections used in the configuration
• Configuration steps in a table for each device where the left-hand side shows the commands you enter and the
right-hand side explains the actions that the commands perform
• Validation which shows commands and their output that verify the configuration
Related Documentation
For information about installing of OcNOS, see the Installation Guide for your platform.
Migration Guide
Check the Migration Guide for configuration changes to make when migrating from one version of OcNOS to another.
Feature Availability
The features described in this document that are available depend upon the OcNOS SKU that you purchased. See the
Application Notes for a description of the OcNOS SKUs.
Support
For support-related questions, contact [email protected].
Comments
If you have comments, or need to report a problem with the content, contact [email protected].
Overview
You use the CLI to configure, monitor, and maintain OcNOS devices. The CLI is text-based and each command is
usually associated with a specific task.
You can give the commands described in this manual locally from the console of a device running OcNOS or remotely
from a terminal emulator such as putty or xterm. You can also use the commands in scripts to automate
configuration tasks.
Command Completion
The CLI can complete the spelling of a command or a parameter. Begin typing the command or parameter and then
press the tab key. For example, at the CLI command prompt type sh:
> sh
Press the tab key. The CLI displays:
> show
If the spelling of a command or parameter is ambiguous, the CLI displays the choices that match the abbreviation. Type
show i and press the tab key. The CLI displays:
> show i
interface ip ipv6 isis
> show i
The CLI displays the interface and ip keywords. Type n to select interface and press the tab key. The CLI
displays:
> show in
> show interface
Type ? and the CLI displays the list of parameters for the show interface command.
> show interface
IFNAME Interface name
| Output modifiers
> Output redirection
<cr>
The CLI displays the only parameter associated with this command, the IFNAME parameter.
Command Abbreviations
The CLI accepts abbreviations that uniquely identify a keyword in commands. For example:
> sh int xe0
is an abbreviation for:
> show interface xe0
Command Negation
Many commands have a no form that resets a feature to its default value or disables the feature. For example:
• The ip address command assigns an IPv4 address to an interface
• The no ip address command removes an IPv4 address from an interface
Syntax Conventions
Table P-2 describes the conventions used to represent command syntax in this reference.
lowercase Keywords that you enter exactly as shown in the show ip ospf
command syntax.
. Repeatable parameter. The parameter that follows a set as-path prepend .<1-65535>
period can be repeated more than once. Do not
enter the period as part of the command.
Variable Placeholders
Table P-3 shows the tokens used in command syntax use to represent variables for which you supply a value.
Token Description
LINE A text string, including spaces; no other parameters can follow this parameter
IFNAME Interface name whose format varies depending on the platform; examples are: eth0,
Ethernet0, ethernet0, xe0
Section Description
Command Name The name of the command, followed by what the command does and when should it be used
Command Mode The mode in which the command runs; see Command Modes
Keyboard Operations
Table P-5 lists the operations you can perform from the keyboard.
Left arrow or Ctrl+b Moves one character to the left. When a command extends beyond a single line, you can press left
arrow or Ctrl+b repeatedly to scroll toward the beginning of the line, or you can press Ctrl+a to go
directly to the beginning of the line.
Right arrow or Ctrl-f Moves one character to the right. When a command extends beyond a single line, you can press right
arrow or Ctrl+f repeatedly to scroll toward the end of the line, or you can press Ctrl+e to go directly to
the end of the line.
Ctrl+y Pastes text previously deleted with Ctrl+k, Alt+d, Ctrl+w, or Ctrl+u at the cursor
Ctrl+c Ignores the current line and redisplays the command prompt
Begin Modifier
The begin modifier displays the output beginning with the first line that contains the input string (everything typed after
the begin keyword). For example:
# show running-config | begin xe1
...skipping
interface xe1
ipv6 address fe80::204:75ff:fee6:5393/64
!
interface xe2
ipv6 address fe80::20d:56ff:fe96:725a/64
!
line con 0
login
!
end
You can specify a regular expression after the begin keyword, This example begins the output at a line with either
“xe2” or “xe4”:
# show running-config | begin xe[3-4]
...skipping
interface xe3
shutdown
!
interface xe4
shutdown
!
interface svlan0.1
no shutdown
!
route-map myroute permit 3
!
route-map mymap1 permit 10
!
route-map rmap1 permit 3
!
line con 0
login
line vty 0 4
login
!
end
Include Modifier
The include modifier includes only those lines of output that contain the input string. In the output below, all lines
containing the word “input” are included:
# show interface xe1 | include input
input packets 80434552, bytes 2147483647, dropped 0, multicast packets 0
input errors 0, length 0, overrun 0, CRC 0, frame 0, fifo 1, missed 0
You can specify a regular expression after the include keyword. This examples includes all lines with “input” or
“output”:
#show interface xe0 | include (in|out)put
input packets 597058, bytes 338081476, dropped 0, multicast packets 0
input errors 0, length 0, overrun 0, CRC 0, frame 0, fifo 0, missed 0
output packets 613147, bytes 126055987, dropped 0
output errors 0, aborted 0, carrier 0, fifo 0, heartbeat 0, window 0
Exclude Modifier
The exclude modifier excludes all lines of output that contain the input string. In the following output example, all lines
containing the word “input” are excluded:
# show interface xe1 | exclude input
Interface xe1
Scope: both
Hardware is Ethernet, address is 0004.75e6.5393
index 3 metric 1 mtu 1500 <UP,BROADCAST,RUNNING,MULTICAST>
VRF Binding: Not bound
Administrative Group(s): None
DSTE Bandwidth Constraint Mode is MAM
inet6 fe80::204:75ff:fee6:5393/64
output packets 4438, bytes 394940, dropped 0
output errors 0, aborted 0, carrier 0, fifo 0, heartbeat 0, window 0
collisions 0
You can specify a regular expression after the exclude keyword. This example excludes lines with “output” or “input”:
# show interface xe0 | exclude (in|out)put
Interface xe0
Scope: both
Hardware is Ethernet Current HW addr: 001b.2139.6c4a
Physical:001b.2139.6c4a Logical:(not set)
index 2 metric 1 mtu 1500 duplex-full arp ageing timeout 3000
<UP,BROADCAST,RUNNING,MULTICAST>
VRF Binding: Not bound
Bandwidth 100m
DHCP client is disabled.
inet 10.1.2.173/24 broadcast 10.1.2.255
VRRP Master of : VRRP is not configured on this interface.
inet6 fe80::21b:21ff:fe39:6c4a/64
collisions 0
Redirect Modifier
The redirect modifier writes the output into a file. The output is not displayed.
# show cli history | redirect /var/frame.txt
The output redirection token (>) does the same thing:
# show cli history >/var/frame.txt
Last Modifier
The last modifier displays the output of last few number of lines (As per the user input). The last number ranges from
1 to 9999.
For example:
#show running-config | last 10
String Parameters
The restrictions in Table P-6 apply for all string parameters used in OcNOS commands, unless some other restrictions
are noted for a particular command.
Restriction Description
Command Modes
Commands are grouped into modes arranged in a hierarchy. Each mode has its own set of commands. Table P-7 lists
the command modes common to all protocols.
Name Description
Executive Also called view mode, this is the first mode to appear after you start the CLI. It is a base mode from where you
mode can perform basic commands such as show, exit, quit, help, and enable.
Privileged Also called enable mode, in this mode you can run additional basic commands such as debug, write, and
executive show.
mode
Configure Also called configure terminal mode, in this mode you can run configuration commands and go into other
mode modes such as interface, router, route map, key chain, and address family.
Configure mode is single user. Only one user at a time can be in configure mode.
Interface In this mode you can configure protocol-specific settings for a particular interface. Any setting you configure in
mode this mode overrides a setting configured in router mode.
Router This mode is used to configure router-specific settings for a protocol such as BGP or OSPF.
mode
Start in
executive
mode
enable (password)
Privileged
executive
mode
configure terminal
Configure
mode
Interface Router
mode mode
To change modes:
VxLAN
Virtual eXtensible Local Area Network (VxLAN) is widely used in Data Centers (DC) networks. VxLAN is an overlay
transport virtualization technology commonly used in cloud networks to support the ever-increasing Virtual LAN (VLAN)
and multi-tenant networks in data centers. It enables the "stretching" of a Layer 2 network over a physical Layer 3
network.
Overlay Network
VxLAN creates an overlay of virtual L2 LAN segments using a MAC address, and L4 UDP packets in IP encapsulation
on top of the physical underlay L3 infrastructure. Technically, it encapsulates L2 Ethernet frames received from a host
with L3 IP/UDP packets in a VxLAN header and sends it to the destination in the data center network using IP tunnels.
This allows for the extension of L2 networks across data center without changing the underlying physical infrastructure.
EVPN - VxLAN
VxLAN creates LAN segments using MAC-in-IP encapsulation. The encapsulation carries the original L2 frame
received from a host to the destination in another host using IP tunnels. The endpoints of the virtualized tunnel formed
using VxLAN are called VXLAN Tunnel End Points (VTEPs). The VxLAN segments carry tenant data in L3 tunnels over
the network which permits the network to support multiple tenants.The tenant data is not used in routing or switching.
This aids in tenant machine movement and allows the tenants to have the same IP or MAC addresses.
Ethernet Virtual Private Network (EVPN) is a protocol based on industry standards used for network virtualization in
multi-tenant data center and service provider networks. When used with VxLAN networks, it provides a control plane to
create L2 overlays across a L3 network. This enables seamless communication between virtual machines (VMs) or
containers across different physical locations as though they are on the same Ethernet segment. EVPN leverages BGP
for scalable routing information exchange and distribution of L2 and L3 reachability information across a large network.
It also tracks and updates the location of devices based on MAC and IP addresses as they move across the network. It
is a critical feature in virtualized environments where VMs or containers may frequently migrate.
Additionally, EVPN supports redundant and active-active multi-homing for robust failover and high availability, by
allowing a host to connect to multiple VTEPs. Thus, EVPN ensures, that the traffic is rerouted through an alternate
VTEP if a connection to VTEP fails. EVPN is essential for scalable, resilient, and efficient multi-tenant network
virtualization when deployed in conjunction with VxLAN in modern data center environments.
Underlay Network
The underlay network consists of a physical L3 infrastructure, which provides the foundation for communication in the
network. The underlay network is abstracted in the overlay network, allowing seamless communication of the large
virtualized L2 network.
VxLAN Architecture
Typically, VxLAN network operates as an overlay network over an IP underlay network based on a Spine-Leaf CLOS
architecture. The underlay network is often referred to as IP fabric or CLOS fabric.
VxLAN allows the network to support several tenants with minimum changes in the network. They carry tenant data in
virtual tunnels over the network. The tenant data is not used in routing or switching. This aids in tenant machine
movement and allows the tenants to have the same IP or MAC addresses on end devices, hosts, or VMs.
Each overlay tunnel is referred to as a VxLAN segment. VMs can only communicate with each other within the same
VxLAN segment, similar to how communication occurs within a traditional VLAN. Each VxLAN segment is identified
through a 24-bit segment ID termed the VxLAN Network Identifier (VNI). This allows up to 16 million VxLAN segments
to coexist within the same administrative domain. For VMs on different VxLAN segments to communicate, inter-VxLAN
routing can be performed on a VxLAN-enabled router or distributed gateway. This is similar to routing between VLANs
in a traditional L2 network.
The VNI determines the scope of the inner MAC frame originated from the individual VM. This ensures there can be
overlapping MAC addresses across segments, but traffic remains isolated due to the VNI preventing cross-segment
interference.
Features
• Leaf nodes act as VTEP for hosts to connect to the data center and provide VPN services
• With multihoming facility load distribution, link and node level redundancies of the CLOS fabric are extended to
hosts
• Hosts are identified using either the port number, port number with VLAN ID or VLAN range, or the port number
with a stacked VLAN ID.
• Any packets (including ARP-ND) that are uplifted to the VxLAN CPU queue from any port are rate limited to 500
packets per second. This is done to protect the system and CPU during an ARP storm.
• OcNOS supports VxLAN IPv4 tunnels, but both IPv4 and IPv6 hosts.
• VxLAN works over UDP, with destination port 4789. Source port can be randomized based on L2 frame information
carried, hence provides good hashing input for load-sharing on ECMP/LAG paths in the L3 fabric.
• EVPN uses multiprotocol BGP with AFI=25 (L2VPN) and SAFI=70 (EVPN).
• EVPN is used with VxLAN data-plane encapsulations in OcNOS Data Center.
• EVPN helps with discovering VTEPs and learning MAC and IP addresses of the connected hosts in a VxLAN
network.
• EVPN is used to implement Integrated routing and bridging (IRB), and E-Tree in OcNOS Data Center. It’s
becoming umbrella for multiple service types.
• EVPN provides multihoming service, with redundancy and more bandwidth with multihoming facility load
distribution, extends link and node level redundancies of the CLOS fabric to hosts.
Terminology
Terms related to VxLAN configuration are defined in the table below.
VM Virtual Machine
VTEP VxLAN Tunnel End Point. An entity that originates and/or terminates VxLAN tunnels
Port Mapping
In this example each VTEP (VTEP1 and VTEP2) is a multilayer switch where xe2 is an access port while xe1 is
network port.
After we start sending a packet (say untagged ipv4 packet) from VM1, it hits the VTEP1,VTEP1 does encapsulation
based on the VNID configured and send it on xe1. Now the packet reaches VTEP2 and it does decapsulation of the
packet. Now based on VNID packet is sent out on access port and it reaches destination VM, VM2.
Topology
The procedures in this section use the topology in Figure 1-2
VTEP1
VTEP2
Validation
VTEP1
VTEP1#show nvo vxlan tunnel
VVXLAN Network tunnel Entries
Source Destination Status Up/Down Update
====================================================================================
2.2.2.4 3.3.3.4 Installed 00:37:56 00:37:56
=======================================================================================
========================================================
======
VXLAN MAC Entries
=======================================================================================
========================================================
======
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
_______________________________________________________________________________________
________________________________________________________
______
RTR1
RTR1#show ip igmp groups
IGMP Connected Group Membership
Group Address Interface Uptime Expires State Last Reporter
VTEP2
VTEP2#show nvo vxlan tunnel
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
______
Topology
The procedures in this section use the topology in Figure 1-3
VTEP1
RTR1
VTEP2
Validation
VTEP1
VTEP1#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
====================================================================================
2.2.2.4 3.3.3.4 Installed 00:37:56 00:37:56
Total number of entries are 1
VTEP1#
VTEP1#
VTEP1#show nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
VTEP1#
VTEP1#
VTEP1#sh nvo vxlan mac-table vnid 3
=======================================================================================
========================================================
======
VXLAN MAC Entries
=======================================================================================
========================================================
======
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
_______________________________________________________________________________________
________________________________________________________
______
VTEP1#
VTEP2
VTEP2#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
====================================================================================
3.3.3.4 2.2.2.4 Installed 00:34:02 00:34:02
Total number of entries are 1
VTEP2#show nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
VTEP2#
Overview
OcNOS supports mapping Virtual Local Area Network Identifier (VLAN ID) to Virtual Extensible Local Area Network
Identifier (VNID) to extend the Layer 2 VLAN over to the Layer 3 VxLAN. The VLAN ID is a unique number assigned to
a specific VLAN, and the VNID is the same for a specific VxLAN. The Virtual Tunnel Endpoint (VTEP) is a network
device or a software component that encapsulates the ethernet frames from a specific VLAN ID into a VXLAN VxLAN
header that contains the VNID. This encapsulated frame is the VxLAN VxLAN packet, which is again encapsulated in
the UDP packet and wrapped in an outer IP header to transport it to the IP network.
Feature Characteristics
• The VLAN ID to VNID communication is regardless the physical and logical port.
• Each VNID is allowed to map with a single VLAN ID.
• VLAN is removed over the tunnel and re-added when egressing out of the host-connected port.
Benefits
The feature enhances the scalability and flexibility by extending the VLAN to VXLAN VxLAN boundaries.
Configuration
This section shows the procedure for configuring VxLAN VxLAN using VLAN to VNI mapping.
Topology
This topology demonstrates the configuration necessary to enable VxLAN VxLAN VLAN-to-VNID mapping. Leaf1 and
Leaf2 are VxLAN VxLAN VTEPs in the Autonomous System (ASN) 100, and the Spine1 resides in a different
Autonomous System (ASN) 200. The setup involves establishing eBGP IPv4 (underlay) neighborship between
interface addresses and L2VPN EVPN (overlay) neighborship between loopback interfaces.
Once the underlay and overlay neighborships are established, configure the VxLAN VxLAN tunnel between Leaf1 and
Leaf2. The global VTEP IP is the loopback address.
5. Create the MAC VRF and name it using mac vrf vrf10. Configure the VLAN-based service type using evpn-
vlan-service vlan-based command, assign a unique route distinguisher and route target value using rd
1.1.1.1:10 and route-target both 100:10 commands respectively.
(config)#mac vrf vrf10
(config-vrf)#evpn-vlan-service vlan-based
(config-vrf)#rd 1.1.1.1:10
(config-vrf)#route-target both 100:10
6. Configure a global IP to the VTEP. This IP address uniquely identifies the VTEP.
(config)#nvo vxlan VxLAN vtep-ip-global 1.1.1.1
7. Create a VNID and map it with the bridge VLAN using nvo vxlan VxLAN id 10 ingress-replication
bridge-vlan 10. Configure the host-reachability-protocol as BGP-EVPN and associate the MAC VRF.
(config)#nvo vxlan VxLAN id 10 ingress-replication bridge-vlan 10
(config-nvo)#vxlan VxLAN host-reachability-protocol evpn-bgp vrf10
8. Assign the IP addresses to the physical and loopback interfaces of the Leaf1 to connect to the Spine.
(config)#interface ce49
(config-if)#ip address 11.10.1.1/24
(config-if)#exit
(config)#interface lo
(config-if)#ip address 1.1.1.1/32 secondary
9. Configure the interface xe11 as a switchport. Use the command bridge-group 1 spanning-tree disable
to associate the bridge group to this interface and disable the Spanning Tree Protocol (STP) to avoid the port block.
Configure the switching characteristic of this interface to trunk mode using the switchport mode trunk
command and this allows multiple VLANs to run in the interface. Use the command switchport trunk
allowed vlan add 10 to enable VLAN 10 through this interface. Map this interface with the VXLAN VxLAN
using access-if-vxlan VxLAN command.
(config)#interface xe11
(config-if)#switchport
(config-if)# bridge-group 1 spanning-tree disable
(config-if)#switchport mode trunk
(config-if)#switchport trunk allowed vlan add 10
(config-if)#access-if-vxlan
10. Configure the BGP and specify the autonomous number (ASN).
(config)#router bgp 100
11. Configure the router ID.
(config-router)#bgp router-id 1.1.1.1
12. Configure the neighboring eBGP peers in a different ASN.
(config-router)#neighbor 11.10.1.2 remote-as 200
(config-router)#neighbor 11.11.11.11 remote-as 200
13. Configure eBGP multihop as the neighboring peer is not directly connected.
(config-router)#neighbor 11.11.11.11 ebgp-multihop
Running configurations
!
exit
end
Validation
Validate the show output after configuration as shown below.
Leaf1:
Spine1:
access-if-vxlan
Use this command to create a logical port per parent interface for egress VLAN translation.
Use no form of this command to unconfigure the access-if-vxlan.
Command Syntax
access-if-vxlan
no access-if-vxlan
Parameters
None
Default
None
Command Mode
Interface mode
Applicability
Introduced in OcNOS version 6.5.2.
Example
The below example shows how to configure a logical port per parent interface:
OcNOS#configure terminal
OcNOS(config)#interface xe1
OcNOS(config-if)#access-if-vxlan
Command Syntax
show nvo vxlan VxLAN vlan-vnid (bridge-vlan <VLAN ID> (summary |) | vnid <VNID> |
summary)
Parameters
Default
None
Command Mode
Exec mode
Applicability
Introduced in OcNOS version 6.5.2.
Example
The below examples show the output of VLAN to VNID mapping:
OcNOS#show nvo vxlan VxLAN vlan-vnid
VLAN VNID Interface
__________________________________________________________
10 10 xe11
Field Description
Glossary
The following provides definitions for key terms or abbreviations and their meanings used throughout this document:
Virtual Local Area Network Virtual Local Area Network Identifier is a 12-bit unique identifier assigned to a VLAN to identify it
Identifier (VLAN ID) in a network.
Virtual Extensible Local Virtual Extensible Local Area Network Identifier is a unique 24-bit identifier assigned to a VxLAN
Area Network Identifier VxLAN to identify it in a network.
(VNID)
Virtual Local Area Network Virtual Local Area Network in a network configuration creates a separate and isolated virtual
(VLAN) network with other virtual networks over a single physical interface.
Virtual Extensible Local Virtual Extensible Local Area Network (VxLAN) enables the creation of a virtualized Layer 2
Area Network (VxLAN) network over the Layer 3 infrastructure. This is an overlay network on Layer 3 designed to
overcome the limitations of VLANs.
Virtual Tunnel Endpoint Virtual Tunnel Endpoint is a significant component in VxLAN VxLAN that encapsulates
(VTEP) or decapsulates the VxLAN VxLAN traffic as it enters or leaves the VxLAN VxLAN
overlay network respectively.
Topology
The procedures in this section use the topology in Figure 1-5.
VTEP1
(config)#nvo vxlan access-if port-vlan xe1 Configure access-port xe1 and map vlan 2
2
(config-nvo-acc-if)#map vnid 100 Map VNID 100 to access-port xe1.
(config-nvo-acc-if)#exit Exit NVO access-if mode.
(config)#nvo vxlan id 200 ingress- Configure second VNID on this VTEP and enter NVO mode.
replication
(config-nvo)#vxlan host-reachability- Configure host-reachability-protocol as BGP-EVPN and
protocol evpn-bgp vrf_evpn_100 associate the VNID with vrf_evpn_100
(config-nvo)#exit Exit NVO mode.
(config)#nvo vxlan access-if port-vlan xe2 Configure access-port xe2 and map vlan 3
3
(config-nvo-acc-if)#map vnid 200 Map VNID 200 to access-port xe2.
(config-nvo-acc-if)#exit Exit NVO access-if mode.
(config)#commit Commit the configurations
RR
VTEP2
Validation
CE1 and CE2 have hosts configured with MAC addresses, IP addresses, and VLAN identifiers as shown below.
Perform a tagged ping of VLAN 2 from CE1 to CE2 and vice-versa. Also perform a tagged ping of VLAN 3 from CE1 to
CE2 and vice-versa.
RD[2.2.2.2:1]
ESI Eth-Tag Mac-Address IP-Address VNID L3VNID Nexthop GW-Type
0 100 0000:0000:cdcd 12.12.12.20 100 0 2.2.2.2 --
0 200 0000:0b60:25f3 13.13.13.20 200 0 2.2.2.2 --
RD[2.2.2.2:1] VRF[vrf_evpn_100]:
ESI Eth-Tag Mac-Address IP-Address VNID L3VNID Nexthop GW-Type
0 100 0000:0000:cdcd 12.12.12.20 100 0 2.2.2.2 --
0 100 0000:0b60:25f2 13.13.13.10 100 0 2.2.2.2 --
Topology
The procedures in this section use the topology in Figure 1-6.
SW-1
VTEP-1
(config)#nvo vxlan access-if port-vlan po1 Configure access-port po1 and map vlan 3
3
(config-nvo-acc-if)#map vnid 200001 Map VNID 200001 to access-port xe3.
(config-nvo-acc-if)#exit Exit NVO access-if mode.
(config)#commit Commit the configurations
RR-1
RR-2
VTEP-2
(config)#nvo vxlan access-if port-vlan xe3 Configure access-port xe3 and map vlan 3
3
(config-nvo-acc-if)#map vnid 200001 Map VNID 200001 to access-port xe3.
(config-nvo-acc-if)#exit-adress-family Exit NVO access-if mode.
(config)#commit Commit the configurations
VTEP-3
Validation
CE1, CE2, CE3, and CE4 have hosts configured with MAC addresses, IP addresses, and VLAN identifiers as shown
below.
Perform a tagged ping of VLAN 2 from CE1 to CE2,CE3 and CE4 and vice-versa. Also perform a tagged ping of VLAN
3 from CE1 to CE2, CE3 and CE4 and vice-versa.
================================================================================
================================================================================
VXLAN MAC Entries
================================================================================
================================================================================
RD[2.2.2.2:1]
ESI Eth-Tag Mac-Address IP-Address VNID L3VNID Nexthop
GW-Type
0 100 0000:0000:cdcd 12.12.12.20 100 0
2.2.2.2 --
0 200 0000:0b60:25f3 13.13.13.20 200 0
2.2.2.2 --
RD[1.1.1.1:1]
ESI Eth-Tag Mac-Address IP-Address VNID L3VNID
Nexthop GW-Type
0 100 0000:0000:abab 12.12.12.10 100 0
1.1.1.1 --
0 200 0000:0b60:25f2 13.13.13.10 200 0
1.1.1.1 --
RD[2.2.2.2:1] VRF[vrf_evpn_100]:
ESI Eth-Tag Mac-Address IP-Address VNID L3VNID
Nexthop GW-Type
0 100 0000:0000:cdcd 12.12.12.20 100 0
2.2.2.2 --
0 100 0000:0b60:25f2 13.13.13.10 100 0
2.2.2.2 --
RD[1.1.1.1:1] VRF[vrf_evpn_100]:
ESI Eth-Tag Mac-Address IP-Address
VNID L3VNID Nexthop GW-Type
0 100001 0000:0000:dddd --
100001 0 3.3.3.3 --
0 100001 0000:0000:dddd 12.12.12.40
100001 0 3.3.3.3 --
0 200001 0000:058e:2184 --
200001 0 3.3.3.3 --
0 200001 0000:058e:2184 14.14.14.40
200001 0 3.3.3.3 --
RD[1.1.1.1:1]
ESI Eth-Tag Mac-Address IP-Address
VNID L3VNID Nexthop GW-Type
0 100001 0000:0000:aaaa --
100001 0 1.1.1.1 --
0 100001 0000:0000:aaaa 12.12.12.10
100001 0 1.1.1.1 --
0 100001 0000:0000:bbbb --
100001 0 1.1.1.1 --
0 100001 0000:0000:bbbb 12.12.12.20
100001 0 1.1.1.1 --
0 100001 0000:0000:cccc --
100001 0 2.2.2.2 --
0 100001 0000:0000:cccc 12.12.12.30
100001 0 2.2.2.2 --
0 200001 0000:058e:2181 --
200001 0 1.1.1.1 --
0 200001 0000:058e:2181 14.14.14.10
200001 0 1.1.1.1 --
0 200001 0000:058e:2182 --
200001 0 1.1.1.1 --
0 200001 0000:058e:2182 14.14.14.20
200001 0 1.1.1.1 --
0 200001 0000:058e:2183 --
200001 0 2.2.2.2 --
Overview
VXLAN EVPN Multi-homing features enables to connect a CE/Host node to two VTEPs with all-active redundancy
mode.EVPN Multi-homing helps in VTEP to host failure and VTEP failure. If one VTEP goes down, other will forward
the entire traffic.
Below are Multi-homing concepts:
• Ethernet Segment: Set of links which connect host/CE to two active-active multi-homed VTEP (only two VTEPs are
supported) which appears as LACP link for host.
• Ethernet Segment Identifier: Ethernet Segment Identifier (ESI) which is an 10 octet-value, which can be configured
in two ways, system mac is configured as esi in case of Dynamic Lag and 10-octet ESI format config is used on
physical interface ES.
• Ethernet Segment Route (ES route): When a multi-homed CE is configured as an VXLAN access-port, Ethernet
segment route is sent. The main purpose of this route is to discover other VTEPs which share the ES and to
perform DF election.
• Ethernet A-D route per ESI: This route is used for Fast Convergence and Split Horizon.
• Ethernet A-D route per EVI: This route is used for load sharing between DF and NON-DF by the remote VTEPs
Topology
VXLAN-EVPN MH Configuration
ESI can be configured in below two ways
VTEP1
(Multi-homed group1) – Part of both Multi-homed with po1 (MH1)
Generic Configuration
#configure terminal Enter Configure mode.
(config)#evpn vxlan multihoming enable Enable Multihoming, save configs and reboot the board for
multihoming to be effective
(config)#qos enable Enabling QoS
(config)#commit Commit the candidate configuration to the running
configuration
OSPF Configuration
(config-router)#bfd all-interfaces Enabling BFD on all OSPF interface for fast convergence
(config-if)#exit Exit Interface mode and return to Configure mode.
(config)#commit Commit the candidate configuration to the running
configuration
BGP Configuration
(config)#router bgp 500 Enter into Router BGP mode
(config-router)#bgp router-id 1.1.1.1 Configure router-id as 1.1.1.1 (lo IP address)
(config-router)#neighbor 2.2.2.2 remote-as Specify a VTEP2 loopback IP address and remote-as defined
500
(config-router)#neighbor 2.2.2.2 update- Configure update as loopback for VTEP2
source lo
(config-router)#neighbor 2.2.2.2 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP2
(config-router)#neighbor 3.3.3.3 remote-as Specify a VTEP3 loopback IP address and remote-as defined
500
(config-router)#neighbor 3.3.3.3 update- Configure update as loopback for VTEP3
source lo
(config-router)#neighbor 3.3.3.3 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP3
(config-router)#address-family ipv4 unicast Enter into ipv4 unicast address family mode
(config-router-af)#network 1.1.1.1/32 Advertise loopback network into BGP for VTEP ID reachability
(config-router-af)#neighbor 2.2.2.2 activate Activate 2.2.2.2 (VTEP2) into ipv4 unicast address family
mode
(config-router-af)#neighbor 3.3.3.3 activate Activate 3.3.3.3 (VTEP2) into ipv4 unicast address family
mode
(config-router-af)#exit-address-family Exit from ipv4 unicast address family mode
(config-router)#address-family l2vpn evpn Enter into L2VPN EVPN address family mode
(config-router-af)#neighbor 2.2.2.2 activate Activate 2.2.2.2 (VTEP2) into L2VPN evpn address family
mode
(config-router-af)#neighbor 3.3.3.3 activate Activate 3.3.3.3 (VTEP3) into L2VPN evpn address family
mode
(config-router-af)#exit-address-family Exit from L2VPN address family mode
(config-router)#exit Exit from Router BGP mode and enter into config mode
(config)#commit Commit the candidate configuration to the running
configuration
VRF Configuration
(config)#mac vrf VRF1 Create mac routing/forwarding instance with VRF1 name and
enter into VRF mode
(config-vrf)#rd 1.1.1.1:11 Assign RD value
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for VRF1
(config-vrf)#exit Exit from VRF mode
(config)#mac vrf VRF2 Create MAC routing/forwarding instance with VRF1 name and
enter into VRF mode
(config-vrf)#rd 1.1.1.1:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#exit Exit from VRF mode
(config)#commit Commit the candidate configuration to the running
configuration
VxLAN Configuration
(config)#nvo vxlan enable Enable VxLAN
(config)#evpn esi hold-time 90 Configure ESI hold time to allow tunnel to come up at the time
of VxLAN initialization before making the ESI up
(config)#nvo vxlan vtep-ip-global 1.1.1.1 Configure Source VTEP-IP-global configuration
(config)#nvo vxlan id 10 ingress-replication Configure VxLAN Network identifier with/without inner-VID-
inner-vid-disabled disabled configure and enter into VxLAN tenant mode
(config-nvo)#vxlan host-reachability- Assign VRF for EVPN-BGP to carry EVPN route
protocol evpn-bgp VRF1
(config-nvo)#vni-name VNI-RED Configure VNI-name as VNI-RED
(config-nvo)#exit Exit from VxLAN tenant mode and enter into configuration
mode.
(config)#nvo vxlan id 20 ingress-replication Configure VxLAN Network identifier with/without inner-VID-
inner-vid-disabled disabled configure and enter into VxLAN tenant mode
(config-nvo)#vxlan host-reachability- Assign VRF for EVPN-BGP to carry EVPN route
protocol evpn-bgp VRF2
(config-nvo)#vni-name VNI-BLUE Configure VNI-name as VNI-BLUE
(config-nvo)#exit Exit from VxLAN tenant mode and enter into configuration
mode.
(config)#nvo vxlan access-if port-vlan po1 Enable port-VLAN mapping i.e. access port to outer-VLAN
1001 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vni-name VNI-RED Map VxLAN Identified to access-port for VxLAN
(config-nvo-acc-if)#exit Exit from VxLAN access-interface mode and enter into
configuration mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-VLAN mapping i.e. access port to outer-VLAN
1002 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vni-name VNI-RED Map VxLAN Identified to access-port for VxLAN
(config-nvo-acc-if)#exit Exit from VxLAN access-interface mode and enter into
configuration mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-VLAN mapping i.e. access port to outer-VLAN
3001 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vni-name VNI-BLUE Map VxLAN Identified to access-port for VxLAN
(config-nvo-acc-if)#exit Exit from VxLAN access-interface mode and enter into
configuration mode
(config)#commit Commit the candidate configuration to the running
configuration
(config)#exit Exit from configuration mode
VTEP2
(Multi-homed group1) – Part of both Multi-homed with p01. And it has xe32 as single home access-if port (SH2)
Generic Configuration
#configure terminal Enter Configure mode.
(config)#evpn vxlan multihoming enable Enable Multihoming, save configs and reboot the board for
multihoming to be effective
(config)#qos enable Enabling QoS
(config)#commit Commit the candidate configuration to the running
configuration
OSPF Configuration
(config)#router ospf 100 Enter into router OSPF mode
(config-router)#ospf router-id 2.2.2.2 Configure router-id as 2.2.2.2 (lo IP address)
(config-router)#network 2.2.2.2/32 area Add 2.2.2.2 (lo IP address) network into area 0
0.0.0.0
(config-router)#network 30.30.30.0/24 area Add 30.30.30.0 (Spine1) network into area 0
0.0.0.0
(config-router)#network 40.40.40.0/24 area Add 40.40.40.0 (Spine2) network into area 0
0.0.0.0
(config-router)#bfd all-interfaces Enabling BFD on all OSPF interface for fast convergence
(config-if)#exit Exit Interface mode and return to Configure mode.
(config)#commit Commit the candidate configuration to the running
configuration
BGP Configuration
(config)#router bgp 500 Enter into Router BGP mode
(config-router)#bgp router-id 2.2.2.2 Configure router-id as 2.2.2.2 (lo IP address)
(config-router)#neighbor 1.1.1.1 remote-as Specify a VTEP1 loopback IP address and remote-as defined
500
(config-router)#neighbor 1.1.1.1 update- Configure update as loopback for VTEP1
source lo
(config-router)#neighbor 1.1.1.1 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP1
(config-router)#neighbor 3.3.3.3 remote-as Specify a VTEP3 loopback IP address and remote-as defined
500
(config-router)#neighbor 3.3.3.3 update- Configure update as loopback for VTEP3
source lo
(config-router)#neighbor 3.3.3.3 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP3
(config-router)#address-family ipv4 unicast Enter into ipv4 unicast address family mode
(config-router-af)#network 2.2.2.2/32 Advertise loopback network into BGP for VTEP ID reachability
(config-router-af)#neighbor 1.1.1.1 activate Activate 1.1.1.1 (VTEP2) into ipv4 unicast address family
mode
(config-router-af)#neighbor 3.3.3.3 activate Activate 3.3.3.3 (VTEP2) into ipv4 unicast address family
mode
(config-router-af)#exit-address-family Exit from ipv4 unicast address family mode
(config-router)#address-family l2vpn evpn Enter into L2VPN EVPN address family mode
(config-router-af)#neighbor 1.1.1.1 activate Activate 1.1.1.1(VTEP1) into L2VPN evpn address family
mode
(config-router-af)#neighbor 3.3.3.3 activate Activate 3.3.3.3(VTEP3) into L2VPN evpn address family
mode
(config-router-af)#exit-address-family Exit from L2VPN address family mode
(config-router)#exit Exit from Router BGP mode and enter into config mode
(config)#commit Commit the candidate configuration to the running
configuration
VRF Configuration
(config)# mac vrf VRF1 Create mac routing/forwarding instance with VRF1 name and
enter into VRF mode
(config-vrf)#rd 2.2.2.2:11 Assign RD value
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for VRF1
(config-vrf)#exit Exit from VRF mode
(config)#mac vrf VRF2 Create MAC routing/forwarding instance with VRF1 name and
enter into VRF mode
(config-vrf)#rd 2.2.2.2:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#exit Exit from VRF mode
(config)#commit Commit the candidate configuration to the running
configuration
VxLAN Configuration
(config)#nvo vxlan enable Enable VxLAN
(config)#evpn esi hold-time 90 Configure ESI hold time to allow tunnel to come up at the time
of VxLAN initialization before making the ESI up
(config)#nvo vxlan vtep-ip-global 2.2.2.2 Configure Source VTEP-IP-global configuration
(config)#nvo vxlan id 10 ingress-replication Configure VxLAN Network identifier with/without inner-VID-
inner-vid-disabled disabled configure and enter into VxLAN tenant mode
(config-nvo)#vxlan host-reachability- Assign VRF for EVPN-BGP to carry EVPN route
protocol evpn-bgp VRF1
(config-nvo)#vni-name VNI-RED Configure VNI-name as VNI-RED
(config-nvo)#exit Exit from VxLAN tenant mode and enter into configuration
mode.
(config)#nvo vxlan id 20 ingress-replication Configure VxLAN Network identifier with/without inner-VID-
inner-vid-disabled disabled configure and enter into VxLAN tenant mode
(config-nvo)#vxlan host-reachability- Assign VRF for EVPN-BGP to carry EVPN route
protocol evpn-bgp VRF2
(config-nvo)#vni-name VNI-BLUE Configure VNI-name as VNI-BLUE
(config-nvo)#exit Exit from VxLAN tenant mode and enter into configuration
mode.
(config)#nvo vxlan access-if port-vlan po1 Enable port-VLAN mapping i.e. access port to outer-VLAN
1001 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vni-name VNI-RED Map VxLAN Identified to access-port for VxLAN
(config-nvo-acc-if)#exit Exit from VxLAN access-interface mode and enter into
configuration mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-VLAN mapping i.e. access port to outer-VLAN
1002 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vni-name VNI-RED Map VxLAN Identified to access-port for VxLAN
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-VLAN mapping i.e. access port to outer-VLAN
3001 (SVLAN) - Multihomed access port
VTEP3
It has xe48 as Single home access-if port (SH2)
Generic Configuration
#configure terminal Enter Configure mode.
(config)#evpn vxlan multihoming enable Enable Multihoming, save configs and reboot the board for
multihoming to be effective
(config)#qos enable Enabling QoS
(config)#commit Commit the candidate configuration to the running
configuration
OSPF Configuration
BGP Configuration
(config)#router bgp 500 Enter into Router BGP mode
(config-router)#bgp router-id 3.3.3.3 Configure router-ID as 3.3.3.3 (lo ip address)
(config-router)#neighbor 1.1.1.1 remote-as Specify a VTEP1 loopback IP address and remote-as defined
500
(config-router)#neighbor 1.1.1.1 update- Configure update as loopback for VTEP1
source lo
(config-router)#neighbor 1.1.1.1 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP1
(config-router)#neighbor 2.2.2.2 remote-as Specify a VTEP2 loopback IP address and remote-as defined
500
(config-router)#neighbor 2.2.2.2 update- Configure update as loopback for VTEP2
source lo
(config-router)#neighbor 2.2.2.2 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP3
(config-router)#address-family ipv4 unicast Enter into ipv4 unicast address family mode
(config-router-af)#network 3.3.3.3/32 Advertise loopback network into BGP for VTEP ID reachability
(config-router-af)#neighbor 1.1.1.1 activate Activate 1.1.1.1 (VTEP2) into ipv4 unicast address family
mode
(config-router-af)#neighbor 2.2.2.2 activate Activate 2.2.2.2 (VTEP2) into ipv4 unicast address family
mode
(config-router-af)#exit-address-family Exit from ipv4 unicast address family mode
(config-router)#address-family l2vpn evpn Enter into L2VPN EVPN address family mode
(config-router-af)#neighbor 1.1.1.1 activate Activate 1.1.1.1 (VTEP1) into L2VPN evpn address family
mode
(config-router-af)#neighbor 2.2.2.2 activate Activate 2.2.2.2 (VTEP2) into L2VPN evpn address family
mode
(config-router-af)#exit-address-family Exit from L2VPN address family mode
(config-router)#exit Exit from Router BGP mode and enter into config mode
(config)#commit Commit the candidate configuration to the running
configuration
VRF Configuration
(config)# mac vrf VRF1 Create MAC routing/forwarding instance with VRF1 name and
enter into VRF mode
(config-vrf)#rd 3.3.3.3:11 Assign RD value
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for VRF1
(config-vrf)#exit Exit from VRF mode
(config)#mac vrf VRF2 Create MAC routing/forwarding instance with VRF2 name and
enter into VRF mode
(config-vrf)#rd 3.3.3.3:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#exit Exit from VRF
(config)#commit Commit the candidate configuration to the running
configuration
VxLAN Configuration
(config)#nvo vxlan enable Enable VxLAN
(config)#nvo vxlan vtep-ip-global 3.3.3.3 Configure Source VTEP-IP-global configuration
(config)#nvo vxlan id 10 ingress-replication Configure VxLAN Network identifier with/without inner-VID-
inner-vid-disabled disabled configure and enter into VxLAN tenant mode
(config-nvo)#vxlan host-reachability- Assign VRF for EVPN-BGP to carry EVPN route
protocol evpn-bgp VRF1
(config-nvo)#vni-name VNI-RED Configure VNI-name as VNI-RED
(config-nvo)#exit Exit from VxLAN tenant mode and enter into configuration
mode.
(config)#nvo vxlan id 20 ingress-replication Configure VxLAN Network identifier with/without inner-VID-
inner-vid-disabled disabled configure and enter into VxLAN tenant mode
(config-nvo)#vxlan host-reachability- Assign VRF for EVPN-BGP to carry EVPN route
protocol evpn-bgp VRF2
(config-nvo)#vni-name VNI-BLUE Configure VNI-name as VNI-BLUE
(config-nvo)#exit Exit from VxLAN tenant mode and enter into configuration
mode.
(config)#nvo vxlan access-if port-vlan xe48 Enable port-VLAN mapping i.e. access port to outer-VLAN
1001 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vni-name VNI-RED Map VxLAN Identified to access-port for VxLAN
(config-nvo-acc-if)#exit Exit from VxLAN access-interface mode and enter into
configuration mode
(config)#nvo vxlan access-if port-vlan xe48 Enable port-VLAN mapping i.e. access port to outer-VLAN
1002 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vni-name VNI-RED Map VxLAN Identified to access-port for VxLAN
(config-nvo-acc-if)#exit Exit from VxLAN access-interface mode and enter into
configuration mode
(config)#nvo vxlan access-if port-vlan xe48 Enable port-VLAN mapping i.e. access port to outer-VLAN
3001 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vni-name VNI-BLUE Map VxLAN Identified to access-port for VxLAN
(config-nvo-acc-if)#exit Exit from VxLAN access-interface mode and enter into
configuration mode
(config)#commit Commit the candidate configuration to the running
configuration
(config)#exit Exit from configuration mode
Switch (CE2)
Multihomed to 2-VTEPs (VTEP1 and VTEP2)
Spine 1
Spine node where all VTEPs are connected
Generic Configuration
#configure terminal Enter Configure mode.
(config)#qos enable Enabling QoS
(config)#commit Commit the candidate configuration to the running
configuration
OSPF configuration
Spine 2
Spine node where all VTEPs are connected
Generic configuration
#configure terminal Enter Configure mode.
(config)#qos enable Enabling QoS
(config)#commit Commit the candidate configuration to the running
configuration
OSPF configuration
(config)#router ospf 100 Enter into router OSPF mode
(config-router)#ospf router-id 22.22.22.22 Configure router-id as 11.11.11.11 (lo IP address)
(config-router)#network 22.22.22.22/32 area Add 22.22.22.22 (lo IP address) network into area 0
0.0.0.0
(config-router)#network 20.20.20.0/24 area Add 20.20.20.0 (VTEP1) network into area 0
0.0.0.0
(config-router)#network 40.40.40.0/24 area Add 40.40.40.0 (VTEP2) network into area 0
0.0.0.0
(config-router)#network 60.60.60.0/24 area Add 60.60.60.0 (VTEP3) network into area 0
0.0.0.0
(config-router)#bfd all-interfaces Enabling BFD on all OSPF interface for fast convergence
(config-if)#exit Exit Interface mode and return to Configure mode.
(config)#commit Commit the candidate configuration to the running
configuration
Validation
VTEP1
RD[1.1.1.1:1] VRF[evpn-gvrf-1]:
ESI PE IP-Address Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 1.1.1.1 1.1.1.1 VXLAN
00:00:00:00:00:11:11:00:00:00 2.2.2.2 2.2.2.2 VXLAN
RD[2.2.2.2:1]
ESI PE IP-Address Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 2.2.2.2 2.2.2.2 VXLAN
RD[1.1.1.1:1] VRF[evpn-gvrf-1]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 4294967295 0 1.1.1.1 VXLAN
RD[1.1.1.1:11] VRF[VRF1]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 4294967295 0 2.2.2.2 VXLAN
RD[1.1.1.1:21] VRF[VRF2]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 4294967295 0 2.2.2.2 VXLAN
RD[2.2.2.2:1]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 4294967295 0 2.2.2.2 VXLAN
VTEP1#show bgp l2vpn evpn multihoming ethernet-ad-per-evi
RD[1.1.1.1:11] VRF[VRF1]:
RD[1.1.1.1:21] VRF[VRF2]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 20 20 2.2.2.2 VXLAN
00:00:00:00:00:11:11:00:00:00 20 20 1.1.1.1 VXLAN
RD[2.2.2.2:11]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 10 10 2.2.2.2 VXLAN
RD[2.2.2.2:21]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 20 20 2.2.2.2 VXLAN
RD[1.1.1.1:1] VRF[evpn-gvrf-1]:
*> [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 32768 i -------
--- VXLAN
*> [4]:[00:00:00:00:00:11:11:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i -------
--- VXLAN
* i [4]:[00:00:00:00:00:11:11:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
RD[1.1.1.1:11] VRF[VRF1]:
* i [1]:[00:00:00:00:00:11:11:00:00:00]:[10]:[10]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
*> 1.1.1.1 0 100 32768 i -------
--- VXLAN
* i [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
RD[1.1.1.1:21] VRF[VRF2]:
* i [1]:[00:00:00:00:00:11:11:00:00:00]:[20]:[20]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
*> 1.1.1.1 0 100 32768 i -------
--- VXLAN
* i [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
*> [3]:[20]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i -------
--- VXLAN
* i [3]:[20]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
* i [3]:[20]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3
VXLAN
RD[2.2.2.2:1]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
*>i [4]:[00:00:00:00:00:11:11:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
RD[2.2.2.2:11]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[10]:[10]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
*>i [3]:[10]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
RD[2.2.2.2:21]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[20]:[20]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
*>i [3]:[20]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
RD[3.3.3.3:11]
*>i [3]:[10]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3
VXLAN
RD[3.3.3.3:21]
*>i [3]:[20]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3
VXLAN
VTEP2
VTEP2#show nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
RD[1.1.1.1:1]
ESI PE IP-Address Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 1.1.1.1 1.1.1.1 VXLAN
RD[2.2.2.2:1] VRF[evpn-gvrf-1]:
ESI PE IP-Address Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 1.1.1.1 1.1.1.1 VXLAN
00:00:00:00:00:11:11:00:00:00 2.2.2.2 2.2.2.2 VXLAN
VTEP2#show bgp l2vpn evpn multihoming ethernet-ad-per-es
RD[1.1.1.1:1]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 4294967295 0 1.1.1.1 VXLAN
RD[2.2.2.2:1] VRF[evpn-gvrf-1]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
RD[2.2.2.2:11] VRF[VRF1]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 4294967295 0 1.1.1.1 VXLAN
RD[2.2.2.2:21] VRF[VRF2]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 4294967295 0 1.1.1.1 VXLAN
RD[1.1.1.1:11]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 10 10 1.1.1.1 VXLAN
RD[1.1.1.1:21]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 20 20 1.1.1.1 VXLAN
RD[2.2.2.2:11] VRF[VRF1]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 10 10 2.2.2.2 VXLAN
00:00:00:00:00:11:11:00:00:00 10 10 1.1.1.1 VXLAN
RD[2.2.2.2:21] VRF[VRF2]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 20 20 2.2.2.2 VXLAN
00:00:00:00:00:11:11:00:00:00 20 20 1.1.1.1 VXLAN
RD[1.1.1.1:1]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
*>i [4]:[00:00:00:00:00:11:11:00:00:00]:[32,1.1.1.1]
RD[1.1.1.1:11]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[10]:[10]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
*>i [3]:[10]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
RD[1.1.1.1:21]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[20]:[20]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
*>i [3]:[20]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
RD[2.2.2.2:1] VRF[evpn-gvrf-1]:
*> [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 32768 i -------
--- VXLAN
* i [4]:[00:00:00:00:00:11:11:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
*> [4]:[00:00:00:00:00:11:11:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 32768 i -------
--- VXLAN
RD[2.2.2.2:11] VRF[VRF1]:
*> [1]:[00:00:00:00:00:11:11:00:00:00]:[10]:[10]
2.2.2.2 0 100 32768 i -------
--- VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
* i [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
* i [3]:[10]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
*> [3]:[10]:[32,2.2.2.2]
2.2.2.2 0 100 32768 i -------
--- VXLAN
* i [3]:[10]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3
VXLAN
RD[2.2.2.2:21] VRF[VRF2]:
*> [1]:[00:00:00:00:00:11:11:00:00:00]:[20]:[20]
2.2.2.2 0 100 32768 i -------
--- VXLAN
RD[3.3.3.3:11]
*>i [3]:[10]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3
VXLAN
RD[3.3.3.3:21]
*>i [3]:[20]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3
VXLAN
VTEP3
VTEP3# show nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
RD[1.1.1.1:1]
ESI PE IP-Address Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 1.1.1.1 1.1.1.1 VXLAN
RD[2.2.2.2:1]
ESI PE IP-Address Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 2.2.2.2 2.2.2.2 VXLAN
RD[1.1.1.1:1]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 4294967295 0 1.1.1.1 VXLAN
RD[2.2.2.2:1]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 4294967295 0 2.2.2.2 VXLAN
RD[3.3.3.3:11] VRF[VRF1]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 4294967295 0 2.2.2.2 VXLAN
00:00:00:00:00:11:11:00:00:00 4294967295 0 1.1.1.1 VXLAN
RD[3.3.3.3:21] VRF[VRF2]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 4294967295 0 2.2.2.2 VXLAN
00:00:00:00:00:11:11:00:00:00 4294967295 0 1.1.1.1 VXLAN
RD[1.1.1.1:11]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 10 10 1.1.1.1 VXLAN
RD[1.1.1.1:21]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 20 20 1.1.1.1 VXLAN
RD[2.2.2.2:11]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 10 10 2.2.2.2 VXLAN
RD[2.2.2.2:21]
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 20 20 2.2.2.2 VXLAN
RD[3.3.3.3:11] VRF[VRF1]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 10 10 2.2.2.2 VXLAN
00:00:00:00:00:11:11:00:00:00 10 10 1.1.1.1 VXLAN
RD[3.3.3.3:21] VRF[VRF2]:
ESI Eth-Tag VNID/LABEL Nexthop IP Encap
00:00:00:00:00:11:11:00:00:00 20 20 2.2.2.2 VXLAN
00:00:00:00:00:11:11:00:00:00 20 20 1.1.1.1 VXLAN
l - labeled, S Stale
Origin codes: i - IGP, e - EGP, ? - incomplete
RD[1.1.1.1:1]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
*>i [4]:[00:00:00:00:00:11:11:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
RD[1.1.1.1:11]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[10]:[10]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
*>i [3]:[10]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
RD[1.1.1.1:21]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[20]:[20]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
*>i [3]:[20]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
RD[2.2.2.2:1]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
*>i [4]:[00:00:00:00:00:11:11:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
RD[2.2.2.2:11]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[10]:[10]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
*>i [3]:[10]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
RD[2.2.2.2:21]
*>i [1]:[00:00:00:00:00:11:11:00:00:00]:[20]:[20]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
*>i [3]:[20]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
RD[3.3.3.3:11] VRF[VRF1]:
* i [1]:[00:00:00:00:00:11:11:00:00:00]:[10]:[10]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
* i [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
* i [3]:[10]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
* i [3]:[10]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
*> [3]:[10]:[32,3.3.3.3]
3.3.3.3 0 100 32768 i -------
--- VXLAN
RD[3.3.3.3:21] VRF[VRF2]:
* i [1]:[00:00:00:00:00:11:11:00:00:00]:[20]:[20]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
* i [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
* i [3]:[20]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1
VXLAN
* i [3]:[20]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2
VXLAN
*> [3]:[20]:[32,3.3.3.3]
3.3.3.3 0 100 32768 i -------
--- VXLAN
VTEP1(MH1)
#configure terminal Enter Configure mode.
(config)# nvo vxlan access-if port-vlan po1 Enter into VxLAN MH po1 access-port with VLAN 1001
1001
(config-nvo-acc-if)#mac 0000.1111.1001 ip Configure static MAC IP
11.11.10.1
(config-nvo-acc-if)#exit Exit from VxLAN access-port config mode
(config)#commit Commit the candidate configuration to the running
configuration
(config)#exit Exit from configuration mode
VTEP2(MH1)
#configure terminal Enter Configure mode.
(config)#nvo vxlan access-if port-vlan po1 Enter into VxLAN MH po1 access-port with vlan 1001
1001
(config-nvo-acc-if)# mac 0000.1111.1001 ip Configure static MAC IP
11.11.10.1
(config-nvo-acc-if)#exit Exit from VxLAN access-port config mode
(config)#commit Commit the candidate configuration to the running
configuration
(config)#exit Exit from configuration mode
VTEP3(SH)
#configure terminal Enter Configure mode.
(config)# nvo vxlan access-if port-vlan xe48 Enter into single-homed access-port - xe48 with VLAN 1001
1001
(config-nvo-acc-if)#mac 0000.3333.1001 ip Configure static MAC IP
11.11.10.2
(config-nvo-acc-if)#exit Exit from VxLAN access-port config mode
(config)#commit Commit the candidate configuration to the running
configuration
(config)#exit Exit from configuration mode
Validation
Verify MAC-table in MH VTEPs and Single Home VTEP, MAC will be advertised through ESI value which is advertised
from VTEP1 and VTEP2 and VTEP IP from SH VTEP VTEP3.
Verify ARP-cache table in all VTEPs, VTEP1 and VTEP2 will learn VTEP3 IP.
Any ARP request comes for 11.11.10.2, VTEP1/VTEP2 will do proxy-ARP.
VTEP1
VTEP1#show nvo vxlan mac-table
=======================================================================================
=====================================
VXLAN MAC Entries
=======================================================================================
=====================================
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
_______________________________________________________________________________________
___________________________________________________
VTEP2
VTEP2#show nvo vxlan mac-table
=======================================================================================
=====================================
VXLAN MAC Entries
=======================================================================================
=====================================
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
_______________________________________________________________________________________
_____________________________________
VTEP3
VTEP3#show nvo vxlan mac-table
=======================================================================================
=====================================
VXLAN MAC Entries
=======================================================================================
=====================================
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
_______________________________________________________________________________________
_____________________________________
VTEP1
VTEP1#show nvo vxlan mac-table
=======================================================================================
=====================================
VXLAN MAC Entries
=======================================================================================
=====================================
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
_______________________________________________________________________________________
_____________________________________
VTEP2
VTEP2#show nvo vxlan mac-table
=======================================================================================
=====================================
VXLAN MAC Entries
=======================================================================================
=====================================
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
_______________________________________________________________________________________
_____________________________________
VTEP3
Note: When VTEP1 tunnel goes down, then traffic from VTEP3 will use VTEP2 for forwarding. But Traffic from Switch
to VTEP1 will be lost in VTEP1 itself.
When DUT is rebooted, access-if will be in hold down state until ESI hold timer value expiry. After ESI hold
timer expiry, access-if port will be up and started learning.
MAC Hold timer will not be applicable on ESI interface, because of mass-withdraw requirement.
A CE can connect to maximum two nodes for multihoming, more than two nodes in a multihoming group is not
supported.
All configuration (shutdown, disable learning, disable arp/nd cache, disable arp/nd flood, map vnid, qos
profiles, encapsulation) on a multihomed access port should be same on both VTEPs sharing the ESI for
multihoming functionalities to work properly.
Overview
A hybrid VXLAN access port is a Layer 2 port that is part of regular Layer 2 bridge (RSTP/MSTP/STP) and a VXLAN
bridge. The mapping between Layer 2 bridging and VxLAN untagged and tagged access interface is supported on the
same Layer 2 switch port interface. The same VLAN cannot be a part of both a VXLAN domain and a Layer 2 bridge.
If a port is created with “all” VLANS, then the port should not allow VXLAN access-port configurations. If a VXLAN with
a specific VLAN is mapped, then configuring VLAN “all” on the same port does not allow that specified VLAN in a Layer
2 bridge. If the VXLAN access-port configurations are removed, then the specified VLAN is added immediately in a
Layer 2 bridge.
Ingress traffic with a VXLAN VLAN does not receive Layer 2 traffic or vice-versa. STP states on the Port P1 do not
affect VXLAN traffic.
Topology
RTR1/VTEP1
(config)#vlan 2-5 bridge 32 Configure the vlans 2-5 for the configured bridge Id 32.
(config)#interface ce25/1 Enter interface mode for ce25/1.
(config-if)#ip address 20.20.20.0/31 Assign IP address 20.20.20.0 in /31 mask.
(config-if)#exit Exit interface mode.
(config)#interface ce25/2 Enter interface mode for ce25/2.
(config-if)#switchport Make it L2 interface.
(config-if)#bridge-group 32 Associate the bridge-group 32 to the interface.
(config-if)#switchport mode hybrid Configure the Hybrid mode.
(config-if)# switchport hybrid allowed vlan Configure hybrid allowed vlan add 4 to support the created
add 4 egress-tagged enable vlan in the L2 Bridge.
(config-if)#exit Exit interface mode.
(config)#interface ce31/1 Enter interface mode for ce31/1.
(config-if)#switchport Make it L2 interface.
(config-if)#bridge-group 32 Associate the bridge-group 32 to the interface.
(config-if)#switchport mode hybrid Configure the Hybrid mode.
(config-if)# switchport hybrid allowed vlan Configure hybrid allowed vlan add 4 to support the created
add 4 egress-tagged enable vlan in the L2 Bridge.
(config-if)#exit Exit interface mode.
(config)#router bgp 64512 Enter BGP router mode.
(config-router)# bgp router-id 1.1.1.1 Assign BGP router ID
(config-router)#neighbor 20.20.20.1 remote- Specify a neighbor router with peer ip address and remote-as
as 64513 defined.
(config-router)#address-family l2vpn evpn Enter l2vpn address family mode.
(config-router-af)#neighbor 20.20.20.1 Activate the peer into address family mode.
activate
(config-router)#address-family ipv4 unicast Enter into ipv4 unicast address family
(config-router-af)#network 10.10.10.10/32 Advertise loopback network into BGP for VTEP ID reachability
(config-router-af)#exit-address-family Exit ipv4 unicast address family mode
(config-router-af)#exit-address-family Exit l2vpn address family mode.
(config-router)#exit Exit BGP router mode.
(config)#nvo vxlan enable Enable Vxlan.
(config)#nvo vxlan vtep-ip-global Configure the source Vtep-ip.
10.10.10.10
(config)#nvo vxlan id 16777215 ingress- Configure Vxlan Network identifier with/without inner-vid-
replication inner-vid-disabled disabled configure and enter Vxlan tenant mode.
(config-nvo)#vxlan host-reachability- Assign VRF for evpn-bgp to carry evpn route.
protocol evpn-bgp vrf12345
(config-nvo)#exit Exit Vxlan tenant mode.
(config)#nvo vxlan access-if port-vlan ce31/ Enable port-vlan mapping i.e. access port to outer-vlan
1 3 (SVLAN) mapping.
(config-nvo-acc-if)#map vnid 16777215 Map Vxlan Identifier to access-port.
(config-nvo-acc-if)#exit Exit Vxlan access-interface mode.
(config)#commit Commit the candidate configuration to the running
configuration
RTR2
RTR3/VTEP2
Validation
VTEP1
#show running-config nvo vxlan
!
nvo vxlan enable
!
nvo vxlan vtep-ip-global 10.10.10.10
!
nvo vxlan id 16777215 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp vrf12345
!
nvo vxlan access-if port-vlan ce31/1 3
map vnid 16777215
!
VTEP1#show ip route
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2,
ia - IS-IS inter area, E - EVPN,
v - vrf leaked
* - candidate default
RD[1.1.1.1:1] VRF[vrf12345]:
* [2]:[0]:[16777215]:[48,0000.0744.4433]:[0]:[16777215]
40.40.40.40 0 100 0 64513 64514
i 20.20.20.1 VXLAN
*> [2]:[0]:[16777215]:[48,0000.2222.2222]:[0]:[16777215]
10.10.10.10 0 100 32768 i --------
-- VXLAN
*> [3]:[16777215]:[32,10.10.10.10]
10.10.10.10 0 100 32768 i --------
-- VXLAN
* [3]:[16777215]:[32,40.40.40.40]
40.40.40.40 0 100 0 64513 64514
i 20.20.20.1 VXLAN
RD[2.2.2.2:2]
*> [2]:[0]:[16777215]:[48,0000.0744.4433]:[0]:[16777215]
40.40.40.40 0 100 0 64513 64514
i 20.20.20.1 VXLAN
*> [3]:[16777215]:[32,40.40.40.40]
40.40.40.40 0 100 0 64513 64514
i 20.20.20.1 VXLAN
=======================================================================================
==============================================================
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
_______________________________________________________________________________________
______________________________________________________________
RTR2
RTR2#show ip route
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2,
ia - IS-IS inter area, E - EVPN,
v - vrf leaked
* - candidate default
VTEP2
#show running-config nvo vxlan
!
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
_______________________________________________________________________________________
________________________________________
16777215 ---- L2 NW ---- ------ ---- --
-- 40.40.40.40 10.10.10.10
16777215 ---- -- AC xe1 --- Single Homed Port --- 3 ----
---- ----
Total number of entries are 2
VTEP2#show ip route
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2,
ia - IS-IS inter area, E - EVPN,
v - vrf leaked
* - candidate default
RD[1.1.1.1:1]
*> [2]:[0]:[16777215]:[48,0000.2222.2222]:[0]:[16777215]
10.10.10.10 0 100 0 64513 64512
i 30.30.30.0 VXLAN
*> [3]:[16777215]:[32,10.10.10.10]
10.10.10.10 0 100 0 64513 64512
i 30.30.30.0 VXLAN
RD[2.2.2.2:2] VRF[vrf12345]:
*> [2]:[0]:[16777215]:[48,0000.0744.4433]:[0]:[16777215]
VTEP2#
Topology
The configurations used in this section use the topology in Figure 4-8.
OSPF configuration:
BGP configuration:
(config)#mac vrf L2VRF1 Create mac routing/forwarding instance with L2VRF1 name
and enter into vrf mode
(config-vrf)#rd 1.1.1.1:1 Assign RD value
(config-vrf)#route-target both 1:1 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from vrf mode
(config)#commit Committing the vrf configurations
L2 VXLAN configuration:
VTEP2
Hardware profile and generic configuration:
OSPF configuration:
BGP configuration:
(config)#mac vrf L2VRF1 Create mac routing/forwarding instance with L2VRF1 name
and enter into vrf mode
(config-vrf)#rd 2.2.2.2:1 Assign RD value
(config-vrf)#route-target both 1:1 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from vrf mode
(config)#commit Committing the vrf configurations
L2 VXLAN configuration:
SPINE
Spine node where all VTEPs are connected.
Generic configuration:
Interface configuration:
OSPF configuration:
VTEP1
(config)#nvo vxlan access-if port xe7 Configuring the vxlan access port as default to receive
default untagged, single and double tagged traffic
(config-nvo-acc-if)#map vnid 100 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)#arp-cache disable Disable arp-cache - mandatory
(config-nvo-acc-if)#nd-cache disable Disable nd-cache - mandatory
(config-nvo-acc-if)# mac 0000.1111.0001 Configure static mac-only
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#commit Committing the vxlan configuration
VTEP2
(config)#nvo vxlan access-if port xe23 Configuring the vxlan access port as default to receive
default untagged, single and double tagged traffic
(config-nvo-acc-if)#map vnid 100 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)#arp-cache disable Disable arp-cache - mandatory
(config-nvo-acc-if)#nd-cache disable Disable nd-cache - mandatory
(config-nvo-acc-if)# mac 0000.2222.0001 Configure static mac-only
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#commit Committing the vxlan configuration
Validation
VTEP1
_______________________________________________________________________________________
___________________________________________________
---------------------------------------------
VNID Total MACONLY MACIPv4 MACIPv6
---------------------------------------------
100 3 3 0 0
RD[1.1.1.1:1] VRF[L2VRF1]:
*> [2]:[0]:[100]:[48,0000:1111:0001]:[0]:[100]
1.1.1.1 0 100 32768 i ----------
VXLAN
* i [2]:[0]:[100]:[48,0000:2222:0001]:[0]:[100]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[100]:[48,b0da:1d10:6496]:[0]:[100]
1.1.1.1 0 100 32768 i ----------
VXLAN
*> [3]:[100]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i ----------
VXLAN
* i [3]:[100]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:1]
*>i [2]:[0]:[100]:[48,0000:2222:0001]:[0]:[100]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[100]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
VTEP2
=======================================================================================
===================================================
VXLAN MAC Entries
=======================================================================================
===================================================
VNID Interface VlanId Vlan-RangeId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status Time-out AccessPortDesc
_______________________________________________________________________________________
__________________________________________________
---------------------------------------------
VNID Total MACONLY MACIPv4 MACIPv6
---------------------------------------------
100 3 3 0 0
VTEP2#
VTEP2#sh bgp l2vpn evpn summary
BGP router identifier 2.2.2.2, local AS number 1
BGP table version is 2
1 BGP AS-PATH entries
0 BGP community entries
RD[1.1.1.1:1]
*>i [2]:[0]:[100]:[48,0000:1111:0001]:[0]:[100]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[100]:[48,b0da:1d10:6496]:[0]:[100]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[100]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[2.2.2.2:1] VRF[L2VRF1]:
* i [2]:[0]:[100]:[48,0000:1111:0001]:[0]:[100]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> [2]:[0]:[100]:[48,0000:2222:0001]:[0]:[100]
VTEP1
(config)#nvo vxlan access-if port-vlan xe7 Configuring the vxlan access port with vlan range 2-100
2-100 where traffic in the vlan range 2-100 are accepted
(config-nvo-acc-if)#map vnid 100 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)#arp-cache disable Disable arp-cache - mandatory
(config-nvo-acc-if)#nd-cache disable Disable nd-cache - mandatory
(config-nvo-acc-if)# mac 0000.1111.0001 Configure static mac-only
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#commit Committing the vxlan configuration
VTEP2
(config)#nvo vxlan access-if port-vlan xe23 Configuring the vxlan access port with vlan range 2-100
2-100 where traffic in the vlan range 2-100 are accepted
(config-nvo-acc-if)#map vnid 100 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)#arp-cache disable Disable arp-cache - mandatory
(config-nvo-acc-if)#nd-cache disable Disable nd-cache - mandatory
(config-nvo-acc-if)# mac 0000.2222.0001 Configure static mac-only
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#commit Committing the vxlan configuration
Validations
VTEP1
!
nvo vxlan enable
!
nvo vxlan vtep-ip-global 1.1.1.1
!
nvo vxlan id 100 ingress-replication
vxlan host-reachability-protocol evpn-bgp L2VRF1
!
nvo vxlan access-if port-vlan xe7 2-100
map vnid 100
arp-cache disable
nd-cache disable
mac 0000.1111.0001
!
!
VTEP1#
VTEP1#sh nvo vxlan tunnel summary
---------------------------------------------
VNID Total MACONLY MACIPv4 MACIPv6
---------------------------------------------
100 3 3 0 0
RD[1.1.1.1:1] VRF[L2VRF1]:
*> [2]:[0]:[100]:[48,0000:1111:0001]:[0]:[100]
1.1.1.1 0 100 32768 i ----------
VXLAN
* i [2]:[0]:[100]:[48,0000:2222:0001]:[0]:[100]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[100]:[48,b0da:1d10:6496]:[0]:[100]
1.1.1.1 0 100 32768 i ----------
VXLAN
*> [3]:[100]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i ----------
VXLAN
* i [3]:[100]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:1]
*>i [2]:[0]:[100]:[48,0000:2222:0001]:[0]:[100]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[100]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
VTEP2
---------------------------------------------
VNID Total MACONLY MACIPv4 MACIPv6
---------------------------------------------
100 3 3 0 0
RD[1.1.1.1:1]
*>i [2]:[0]:[100]:[48,0000:1111:0001]:[0]:[100]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[100]:[48,b0da:1d10:6496]:[0]:[100]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[100]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[2.2.2.2:1] VRF[L2VRF1]:
* i [2]:[0]:[100]:[48,0000:1111:0001]:[0]:[100]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> [2]:[0]:[100]:[48,0000:2222:0001]:[0]:[100]
2.2.2.2 0 100 32768 i ----------
VXLAN
* i [2]:[0]:[100]:[48,b0da:1d10:6496]:[0]:[100]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [3]:[100]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> [3]:[100]:[32,2.2.2.2]
2.2.2.2 0 100 32768 i ----------
VXLAN
Overview
This feature is to map VxLAN untagged and tagged (port+vlan) access interfaces on the same parent interface
(Physical, Dynamic and Static LAG). It also supports the Bridge vlan and vxlan untagged access on the same parent
interface.
Topology
The procedures in this section use the topology in Figure 5-9
OSPF Configuration
BGP Configuration
VRF Configuration
(config)#mac vrf VRF1 Create mac routing/forwarding instance with VRF1 name and
enter into VRF mode
(config-vrf)#rd 1.1.1.1:11 Assign RD value
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for VRF1
(config-vrf)#exit Exit from VRF mode
(config)#commit Commit the candidate configuration to the running
configuration
VxLAN Configuration
VTEP2
Interface and Loopback Configuration
OSPF Configuration
BGP Configuration
VRF Configuration
(config)# mac vrf VRF1 Create mac routing/forwarding instance with VRF1 name and
enter into VRF mode
(config-vrf)#rd 2.2.2.2:11 Assign RD value
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for VRF1
(config-vrf)#exit Exit from VRF mode
(config)#commit Commit the candidate configuration to the running
configuration
VxLAN Configuration
VTEP3
Interface and loopback configuration
OSPF Configuration
BGP Configuration
VRF Configuration
(config)# mac vrf VRF1 Create MAC routing/forwarding instance with VRF1 name and
enter into VRF mode
(config-vrf)#rd 3.3.3.3:11 Assign RD value
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for VRF1
(config-vrf)#exit Exit from VRF mode
(config)#commit Commit the candidate configuration to the running
configuration
VxLAN Configuration
Spine 1
Spine node where all VTEPs are connected
OSPF configuration
(config-router)#bfd all-interfaces Enabling BFD on all OSPF interface for fast convergence
(config-if)#exit Exit Interface mode and return to Configure mode.
(config)#commit Commit the candidate configuration to the running
configuration
Spine 2
Spine node where all VTEPs are connected
OSPF configuration
Validation
VTEP1
VTEP1#sh nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
RD[1.1.1.1:1] VRF[VRF1]:
*> [3]:[10]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i ----------
VXLAN
* i[3]:[10]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i[3]:[10]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*> [3]:[20]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i ----------
VXLAN
* i[3]:[20]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i[3]:[20]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
RD[2.2.2.2:1]
*>i[3]:[10]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i[3]:[20]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[3.3.3.3:1]
*>i[3]:[10]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i[3]:[20]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
VTEP2
VTEP2#sh nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
RD[1.1.1.1:1]
*>i [3]:[10]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[20]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[2.2.2.2:1] VRF[VRF1]:
* i [3]:[10]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> [3]:[10]:[32,2.2.2.2]
2.2.2.2 0 100 32768 i ----------
VXLAN
* i [3]:[10]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i [3]:[20]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> [3]:[20]:[32,2.2.2.2]
2.2.2.2 0 100 32768 i ----------
VXLAN
* i [3]:[20]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
RD[3.3.3.3:1]
*>i [3]:[10]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i [3]:[20]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
VTEP3
VTEP3#sh nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
RD[1.1.1.1:1]
*>i [3]:[10]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[20]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[2.2.2.2:1]
*>i [3]:[10]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[20]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[3.3.3.3:1] VRF[VRF1]:
* i [3]:[10]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [3]:[10]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [3]:[10]:[32,3.3.3.3]
3.3.3.3 0 100 32768 i ----------
VXLAN
* i [3]:[20]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [3]:[20]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [3]:[20]:[32,3.3.3.3]
3.3.3.3 0 100 32768 i ----------
VXLAN
Overview
VXLAN enables multiple tenants to operate in a data center. Each tenant is assigned a priority group to prioritize their
traffic. Cloud carriers want to use quality of service to differentiate different applications.
Data center networks are being increasingly used by telecommunications operators as well as by enterprises.
Currently these networks are organized as one large Layer 2 network in a single building. In some cases such a
network is extended geographically using Virtual Local Area Network (VLAN) technologies as an even larger Layer 2
network connecting the virtual machines (VM), each with its own MAC address.
Multiple tenants might want their own isolated network domain. In a data center hosting multiple tenants, each tenant
may independently assign MAC addresses and VLAN IDs and this might lead to duplication.
Cloud carriers wish to categorize the traffic based on the application such as voice, video, etc. Based on the type of the
application different traffic classes may be identified and different priority levels can be assigned to each. To do so,
quality of service marking is needed in VXLAN.
This chapter shows how to mark packet headers with the VXLAN tunnel end point (VTEP) when the frames are
introduced by the virtual machines. The (re)marking /setting of QoS field DSCP/TOS in the VXLAN IP header is done
with the two modes which are set globally.
Topology
COS-DSCP
RTR1/VTEP1
R2
(config-router)#network 46.1.1.0/30 area Configure ospf network address with respective area
0.0.0.0
(config-router)#exit Exit from router mode.
(config)#commit Commit the candidate configuration to the running
configuration
RTR3/VTEP2
(config-router)#neighbor 1.1.1.1 re-mote-as Specify a neighbor router with peer ip address and remote-as
100 defined
(config-router)#neighbor 1.1.1.1 up-date- Specify the neighbor to use loopback address as source
source lo
(config-router)#address-family l2vpn evpn Enter into l2vpn evpn address-family
(config-router-af)#neighbor 1.1.1.1 activate Activate the neighbor to address-family
(config)#nvo vxlan vtep-ip-global 6.6.6.6 Configure Source vtep-ip-global configuration
(config)#nvo vxlan tunnel qos-map-mode cos- Configure the mapping qos profile in to vxlan tunnel ingress
dscp ingress DSCP-QUE
(config)#nvo vxlan id 1 in-gress-replication Create vnid 1 and disable inner-vid
inner-vid-disabled
(config-nvo)#vxlan host-reachability- Assign vrf for evpn-bgp to carry EVPN route
protocol evpn-bgp vrf1
(config-nvo)#nvo vxlan access-if port-vlan Create vxlan access-if with vlan 1000
xe15 1000
(config-nvo-acc-if)#no shutdown No shut the vxlan access-if
(config-nvo-acc-if)#map vnid 1 Map vnid to the vxlan access-if
(config-nvo-acc-if)#map qos-profile queue- Map qos profile for vxlan access-if egress traffic to CE
color-to-cos QUE-COS
(config-nvo-acc-if)#exit Exit from VxLAN access-interface mode and enter into
configuration mode
(config)#commit Commit the candidate configuration to the running
configuration
Validation
As per the QoS configuration, when L2 traffic with cos value 2 sent to VTEP1 access-if, the packets forwarded to queue
3 and packets in queue 3 are mapped with overlay dscp value 16 while egress out of tunnel. At VTEP2, when packets
with overlay dscp value 16 ingresses at tunnel, it is forwarded to queue 4 and packets of queue 4 are remarked with
cos value 5.
RTR1/VTEP1
VTEP1#sh run nvo vxlan
!
nvo vxlan enable
!
nvo vxlan vtep-ip-global 1.1.1.1
!
nvo vxlan tunnel qos-map-mode cos-dscp egress QUE-DSCP
!
nvo vxlan id 1 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp vrf1
!
nvo vxlan access-if port-vlan po2 1001
map vnid 1
map qos-profile cos-to-queue COS-QUE
!
VTEP1#show run qos
qos enable
!
qos profile cos-to-queue COS-QUE
cos 2 dei all queue 3
!
qos profile queue-color-to-dscp QUE-DSCP
queue 3 color all dscp 16
!
_______________________________________________________________________________________
________________________________________
1 ---- L2 NW ---- ---- ---- ----
1.1.1.1 6.6.6.6
1 ---- AC po2 --- Single Homed port --- 1001 ---- ----
----
7 0 7 green | 7 1 7 yellow
RTR2/VTEP2
dscp 16 queue 4
!
VTEP2#show nvo vxlan mac-table
=======================================================================================
==============================================================
VXLAN MAC Entries
=======================================================================================
==============================================================
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
_______________________________________________________________________________________
______________________________________________________________
q1 (E) 12517376 0 0 0 0
q2 (E) 12517376 0 0 0 0
q3 (E) 12517376 0 0 0 0
q4 (E) 12517376 37895872 36455829826 0 0
q5 (E) 12517376 0 0 0 0
q6 (E) 12517376 0 0 0 0
q7 (E) 12517376 0 0 0 0
Overview
An EVPN-based Integrated Routing and Bridging solution used for forwarding of intra-subnets and inter-subnets traffic.
There are 2 modes of IRB.
Symmetric IRB
In this mode, both the ingress and egress VTEPs perform layer-2 and layer-3 lookups (switching and routing). In this
case, a given VTEP needs to learn the ARP and MAC-address entries only for tenant systems (TSs) across the tenant
VxLAN network belonging to VNIDs attached to that VTEP.
Asymmetric IRB
In this mode, the ingress VTEP perform layer-2 and layer-3 lookups and egress VTEPs perform layer-2 lookups only.
The disadvantage of this mode is the need for each VTEP in the tenant network to be configured with all the VNIDs for
that tenant irrespective of whether a given VTEP has TS attached for that VNID or not.
Three approaches are available to achieve IRB solution.
• Centralized Gateway
• Anycast Gateway
• Distributed Gateway
Topology
The procedures in this section use the topology in Figure 1-11.
Generic configuration:
OSPF configuration:
BGP configuration:
(config-router)#neighbor 4.4.4.4 remote-as Specify a VTEP4 loopback IP address and remote-as defined
5000
(config-router)#neighbor 4.4.4.4 update- Configure update as loopback for VTEP4
source lo
(config-router)#neighbor 4.4.4.4 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP4
(config-router)#neighbor 5.5.5.5 remote-as Specify a VTEP5 loopback IP address and remote-as defined
5000
(config-router)#neighbor 5.5.5.5 update- Configure update as loopback for VTEP5
source lo
(config-router)#neighbor 5.5.5.5 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP5
(config-router)#address-family l2vpn evpn Enter into L2VPN EVPN address family mode
(config-router-af)#neighbor 2.2.2.2 activate Activate 2.2.2.2(VTEP2) into L2VPN EVPN address family
mode
(config-router-af)#neighbor 4.4.4.4 activate Activate 3.3.3.3(VTEP4) into L2VPN EVPN address family
mode
(config-router-af)#neighbor 5.5.5.5 activate Activate 5.5.5.5(VTEP5) into L2VPN EVPN address family
mode
(config-router-af)#exit-address-family Exit from L2VPN address family mode
(config-router)#exit Exit from Router BGP mode and enter into config mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
(config)#mac vrf L2VRF1 Create MAC routing/forwarding instance with L2VRF1 name
and enter into VRF mode
(config-vrf)#rd 1.1.1.1:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from VRF mode
(config)#mac vrf L2VRF2 Create MAC routing/forwarding instance with L2VRF2 name
and enter into VRF mode
(config-vrf)#rd 1.1.1.1:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from VRF mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
L2 VXLAN configuration:
VTEP2
(Multi-homed group1) - Part of both Multi-homed with po1(MH1).
Generic configuration:
OSPF configuration:
BGP configuration:
VRF Configuration:
(config)#mac vrf L2VRF1 Create MAC routing/forwarding instance with L2VRF1 name
and enter into VRF mode
(config-vrf)#rd 2.2.2.2:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from VRF mode
(config)#mac vrf L2VRF2 Create MAC routing/forwarding instance with L2VRF2 name
and enter into VRF mode
(config-vrf)#rd 2.2.2.2:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from VRF mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
VXLAN configuration:
(config)#nvo vxlan access-if port-vlan po1 Enable port-VLAN mapping i.e. access port to outer-VLAN
20 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vnid 201 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)# mac 0000.2222.1020 ip Configure static MAC-IP
21.21.21.51
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#exit Exit from configuration mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
VTEP4
Single Home -SH5.
Generic configuration:
OSPF configuration:
BGP configuration:
VRF Configuration:
(config)#mac vrf L2VRF1 Create MAC routing/forwarding instance with L2VRF1 name
and enter into VRF mode
(config-vrf)#rd 4.4.4.4:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from VRF mode
(config)#mac vrf L2VRF2 Create MAC routing/forwarding instance with L2VRF2 name
and enter into VRF mode
(config-vrf)#rd 4.4.4.4:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from VRF mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
VXLAN configuration:
VTEP5
Single Home -SH3
Generic configuration:
OSPF configuration:
BGP configuration:
(config-router)#neighbor 1.1.1.1 remote-as Specify a VTEP1 loopback IP address and remote-as defined
5000
(config-router)#neighbor 1.1.1.1 update- Configure update as loopback for VTEP1
source lo
(config-router)#neighbor 1.1.1.1 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP1
(config-router)#neighbor 2.2.2.2 remote-as Specify a VTEP2 loopback IP address and remote-as defined
5000
(config-router)#neighbor 2.2.2.2 update- Configure update as loopback for VTEP2
source lo
(config-router)#neighbor 2.2.2.2 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP2
(config-router)#neighbor 4.4.4.4 remote-as Specify a VTEP4 loopback IP address and remote-as defined
5000
(config-router)#neighbor 4.4.4.4 update- Configure update as loopback for VTEP4
source lo
(config-router)#neighbor 4.4.4.4 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP4
(config-router)#address-family l2vpn evpn Enter into L2VPN EVPN address family mode
(config-router-af)#neighbor 1.1.1.1 activate Activate 1.1.1.1(VTEP1) into L2VPN EVPN address family
mode
(config-router-af)#neighbor 2.2.2.2 activate Activate 2.2.2.2(VTEP2) into L2VPN EVPN address family
mode
(config-router-af)#neighbor 4.4.4.4 activate Activate 4.4.4.4(VTEP4) into L2VPN EVPN address family
mode
(config-router-af)#exit-address-family Exit from L2VPN address family mode
(config-router)#exit Exit from Router BGP mode and enter into config mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
VRF Configuration:
(config)#mac vrf L2VRF1 Create MAC routing/forwarding instance with L2VRF1 name
and enter into VRF mode
(config-vrf)#rd 5.5.5.5:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from VRF mode
(config)#mac vrf L2VRF2 Create MAC routing/forwarding instance with L2VRF2 name
and enter into VRF mode
(config-vrf)#rd 5.5.5.5:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from VRF mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
VXLAN configuration:
Switch1 (MH2)
Multihomed to 2-VTEPs (VTEP1 and VTEP2). It acts as Tenant system for VLAN1.20.
Switch2 (SH5)
Spine-P3
Spine node where all VTEPs are connected.
Generic configuration:
OSPF configuration:
Centralized Gateway
In Centralized gateway approach, when two TS belonging to two different subnets connected to the same/different
VTEP node, wanted to communicate with each other, their traffic needed to be back hauled from the VTEP node to the
centralized gateway node where inter- subnet switching is performed and then back to the VTEP node.
VTEP5
Validation
VTEP5
TB2-VTEP5#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
5.5.5.5 2.2.2.2 Installed 00:26:30 00:26:30
5.5.5.5 4.4.4.4 Installed 00:26:30 00:26:30
5.5.5.5 1.1.1.1 Installed 00:26:30 00:26:30
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
___
101 VNI-101 L2 NW ---- ---- ---- ---- 5.5.5.5 2.2.2.2
101 VNI-101 L2 NW ---- ---- ---- ---- 5.5.5.5 4.4.4.4
101 VNI-101 L2 NW ---- ---- ---- ---- 5.5.5.5 1.1.1.1
101 VNI-101 -- AC xe48 --- Single Homed Port --- 10 ---- ---- ----
201 VNI-201 L2 NW ---- ---- ---- ---- 5.5.5.5 2.2.2.2
201 VNI-201 L2 NW ---- ---- ---- ---- 5.5.5.5 4.4.4.4
201 VNI-201 L2 NW ---- ---- ---- ---- 5.5.5.5 1.1.1.1
-----------------------------------------------
IP routing table name is Default-IP-Routing-Table(0)
-----------------------------------------------
IP routing table maximum-paths : 8
Total number of IPv4 routes : 12
Total number of IPv4 paths : 12
Pending routes (due to route max reached): 0
Route Source Networks
connected 3
ospf 9
Total 12
FIB 12
-----------------------------------------------
IPv6 routing table name is Default-IPv6-Routing-Table(0)
-----------------------------------------------
IPv6 routing table maximum-paths : 8
Total number of IPv6 routes : 2
Total number of IPv6 paths : 2
Pending routes (due to route max reached): 0
Route Source Networks
connected 2
Total 2
FIB 2
RD[1.1.1.1:1]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[1.1.1.1:11]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[1.1.1.1:21]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[201]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[2.2.2.2:1]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:11]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:21]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[4.4.4.4:11]
*>i [3]:[101]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
RD[4.4.4.4:21]
*>i [2]:[0]:[201]:[48,0000:4444:1020]:[32,21.21.21.101]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [3]:[201]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
RD[5.5.5.5:11] VRF[L2VRF1]:
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[101]:[48,0000:5555:1010]:[32,11.11.11.201]:[101]
5.5.5.5 0 100 32768 i ---------- VXLAN
*> [2]:[0]:[101]:[48,3c2c:99d6:167a]:[32,11.11.11.1]:[101]
5.5.5.5 0 100 32768 i ---------- VXLAN
*> [2]:[0]:[101]:[48,3c2c:99d6:167a]:[128,11:11::11:1]:[101]
5.5.5.5 0 100 32768 i ---------- VXLAN
* i [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [3]:[101]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*> [3]:[101]:[32,5.5.5.5]
5.5.5.5 0 100 32768 i ---------- VXLAN
RD[5.5.5.5:21] VRF[L2VRF2]:
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[201]:[48,0000:4444:1020]:[32,21.21.21.101]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*> [2]:[0]:[201]:[48,3c2c:99d6:167a]:[32,21.21.21.1]:[201]
5.5.5.5 0 100 32768 i ---------- VXLAN
*> [2]:[0]:[201]:[48,3c2c:99d6:167a]:[128,21:21::21:1]:[201]
5.5.5.5 0 100 32768 i ---------- VXLAN
* i [3]:[201]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [3]:[201]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*> [3]:[201]:[32,5.5.5.5]
5.5.5.5 0 100 32768 i ---------- VXLAN
Anycast Gateway
For today's large multi-tenant data center, centralized L3 gateway scheme is very inefficient and sometimes
impractical. In order to overcome the drawback of centralized L3GW approach, anycast mode is used.
In Anycast gateway approach, all the VTEPs acts as default gateway for all the VNIDs. We will configure same anycast
MAC in all VTEPs.
VTEP1
VTEP2
VTEP4
VTEP5
Validations
VTEP1
TB2-VTEP1#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
___
101 VNI-101 L2 NW ---- ---- ---- ---- 1.1.1.1 5.5.5.5
101 VNI-101 L2 NW ---- ---- ---- ---- 1.1.1.1 4.4.4.4
101 VNI-101 L2 NW ---- ---- ---- ---- 1.1.1.1 2.2.2.2
101 VNI-101 -- AC po1 00:00:00:00:00:22:22:00:00:00 10 DF ---- ----
201 VNI-201 L2 NW ---- ---- ---- ---- 1.1.1.1 5.5.5.5
201 VNI-201 L2 NW ---- ---- ---- ---- 1.1.1.1 4.4.4.4
201 VNI-201 L2 NW ---- ---- ---- ---- 1.1.1.1 2.2.2.2
201 VNI-201 -- AC po1 00:00:00:00:00:22:22:00:00:00 20 DF ---- ----
Timers: Uptime
-----------------------------------------------
IP routing table name is Default-IP-Routing-Table(0)
-----------------------------------------------
IP routing table maximum-paths : 8
Total number of IPv4 routes : 12
Total number of IPv4 paths : 12
Pending routes (due to route max reached): 0
Route Source Networks
connected 3
ospf 9
Total 12
FIB 12
-----------------------------------------------
IPv6 routing table name is Default-IPv6-Routing-Table(0)
-----------------------------------------------
IPv6 routing table maximum-paths : 8
Total number of IPv6 routes : 2
Total number of IPv6 paths : 2
Pending routes (due to route max reached): 0
Route Source Networks
connected 2
Total 2
FIB 2
RD[21000:11]
*>i [5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
2.2.2.2 0 100 0 ? 2.2.2.2 VXLAN
*>i [5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
2.2.2.2 0 100 0 ? 2.2.2.2 VXLAN
RD[41000:11]
*>i [5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
4.4.4.4 0 100 0 ? 4.4.4.4 VXLAN
*>i [5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
4.4.4.4 0 100 0 ? 4.4.4.4 VXLAN
RD[51000:11]
*>i [5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
5.5.5.5 0 100 0 ? 5.5.5.5 VXLAN
*>i [5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
RD[1.1.1.1:1] VRF[evpn-gvrf-1]:
*> [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 32768 i ---------- VXLAN
*> [4]:[00:00:00:00:00:22:22:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[1.1.1.1:11] VRF[L2VRF1]:
*> [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> 1.1.1.1 0 100 32768 i ---------- VXLAN
* i [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> 1.1.1.1 0 100 32768 i ---------- VXLAN
*> [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[101]:[48,0000:5555:1010]:[32,11.11.11.201]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*> [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [3]:[101]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i [3]:[101]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
RD[1.1.1.1:21] VRF[L2VRF2]:
*> [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> 1.1.1.1 0 100 32768 i ---------- VXLAN
* i [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> 1.1.1.1 0 100 32768 i ---------- VXLAN
*> [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[201]:[48,0000:4444:1020]:[32,21.21.21.101]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*> [3]:[201]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [3]:[201]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i [3]:[201]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
RD[2.2.2.2:1]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:11]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:21]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[4.4.4.4:11]
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [3]:[101]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
RD[4.4.4.4:21]
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[201]:[48,0000:4444:1020]:[32,21.21.21.101]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [3]:[201]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
RD[5.5.5.5:11]
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [2]:[0]:[101]:[48,0000:5555:1010]:[32,11.11.11.201]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [3]:[101]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
RD[5.5.5.5:21]
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [3]:[201]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
___
101 VNI-101 L2 NW ---- ---- ---- ---- 2.2.2.2 4.4.4.4
101 VNI-101 L2 NW ---- ---- ---- ---- 2.2.2.2 1.1.1.1
101 VNI-101 L2 NW ---- ---- ---- ---- 2.2.2.2 5.5.5.5
101 VNI-101 -- AC po1 00:00:00:00:00:22:22:00:00:00 10 NON-DF ---- ----
201 VNI-201 L2 NW ---- ---- ---- ---- 2.2.2.2 4.4.4.4
201 VNI-201 L2 NW ---- ---- ---- ---- 2.2.2.2 1.1.1.1
201 VNI-201 L2 NW ---- ---- ---- ---- 2.2.2.2 5.5.5.5
201 VNI-201 -- AC po1 00:00:00:00:00:22:22:00:00:00 20 NON-DF ---- ----
-----------------------------------------------
IP routing table name is Default-IP-Routing-Table(0)
-----------------------------------------------
IP routing table maximum-paths : 8
Total number of IPv4 routes : 12
Total number of IPv4 paths : 12
Pending routes (due to route max reached): 0
Route Source Networks
connected 3
ospf 9
Total 12
FIB 12
-----------------------------------------------
IPv6 routing table name is Default-IPv6-Routing-Table(0)
-----------------------------------------------
IPv6 routing table maximum-paths : 8
Total number of IPv6 routes : 2
Total number of IPv6 paths : 2
Pending routes (due to route max reached): 0
Route Source Networks
connected 2
Total 2
FIB 2
RD[11000:11]
*>i[5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
1.1.1.1 0 100 0 ? 1.1.1.1 VXLAN
*>i[5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
1.1.1.1 0 100 0 ? 1.1.1.1 VXLAN
RD[41000:11]
*>i[5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
4.4.4.4 0 100 0 ? 4.4.4.4 VXLAN
*>i[5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
4.4.4.4 0 100 0 ? 4.4.4.4 VXLAN
RD[51000:11]
*>i[5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
5.5.5.5 0 100 0 ? 5.5.5.5 VXLAN
*>i[5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
5.5.5.5 0 100 0 ? 5.5.5.5 VXLAN
RD[1.1.1.1:1]
*>i[1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i[4]:[00:00:00:00:00:22:22:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[1.1.1.1:11]
*>i[1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i[2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i[2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i[2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i[3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[1.1.1.1:21]
*>i[1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i[2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i[2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i[2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i[3]:[201]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[2.2.2.2:1] VRF[evpn-gvrf-1]:
*> [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 32768 i ---------- VXLAN
* i[4]:[00:00:00:00:00:22:22:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> [4]:[00:00:00:00:00:22:22:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 32768 i ---------- VXLAN
RD[2.2.2.2:11] VRF[L2VRF1]:
* i[1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> 2.2.2.2 0 100 32768 i ---------- VXLAN
* i[1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i[2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> 2.2.2.2 0 100 32768 i ---------- VXLAN
* i[2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> 2.2.2.2 0 100 32768 i ---------- VXLAN
* i[2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> 2.2.2.2 0 100 32768 i ---------- VXLAN
* i[2]:[0]:[101]:[48,0000:5555:1010]:[32,11.11.11.201]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i[3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 32768 i ---------- VXLAN
* i[3]:[101]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i[3]:[101]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
RD[2.2.2.2:21] VRF[L2VRF2]:
* i[1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> 2.2.2.2 0 100 32768 i ---------- VXLAN
* i[1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
RD[4.4.4.4:11]
*>i[2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i[2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i[3]:[101]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
RD[4.4.4.4:21]
*>i[2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i[2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i[2]:[0]:[201]:[48,0000:4444:1020]:[32,21.21.21.101]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i[3]:[201]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
RD[5.5.5.5:11]
*>i[2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i[2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i[2]:[0]:[101]:[48,0000:5555:1010]:[32,11.11.11.201]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i[3]:[101]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
RD[5.5.5.5:21]
*>i[2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i[2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i[3]:[201]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
VTEP4
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
___
101 VNI-101 L2 NW ---- ---- ---- ---- 4.4.4.4 2.2.2.2
101 VNI-101 L2 NW ---- ---- ---- ---- 4.4.4.4 1.1.1.1
101 VNI-101 L2 NW ---- ---- ---- ---- 4.4.4.4 5.5.5.5
201 VNI-201 L2 NW ---- ---- ---- ---- 4.4.4.4 2.2.2.2
201 VNI-201 L2 NW ---- ---- ---- ---- 4.4.4.4 1.1.1.1
201 VNI-201 L2 NW ---- ---- ---- ---- 4.4.4.4 5.5.5.5
201 VNI-201 -- AC sa1 --- Single Homed Port --- 20 ---- ---- ----
-----------------------------------------------
IP routing table name is Default-IP-Routing-Table(0)
-----------------------------------------------
IP routing table maximum-paths : 8
Total number of IPv4 routes : 12
Total number of IPv4 paths : 12
Pending routes (due to route max reached): 0
Route Source Networks
connected 3
ospf 9
Total 12
FIB 12
-----------------------------------------------
IPv6 routing table name is Default-IPv6-Routing-Table(0)
-----------------------------------------------
IPv6 routing table maximum-paths : 8
Total number of IPv6 routes : 2
Total number of IPv6 paths : 2
Pending routes (due to route max reached): 0
Route Source Networks
connected 2
Total 2
FIB 2
RD[11000:11]
*>i [5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
1.1.1.1 0 100 0 ? 1.1.1.1 VXLAN
*>i [5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
1.1.1.1 0 100 0 ? 1.1.1.1 VXLAN
RD[21000:11]
*>i [5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
2.2.2.2 0 100 0 ? 2.2.2.2 VXLAN
*>i [5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
2.2.2.2 0 100 0 ? 2.2.2.2 VXLAN
RD[51000:11]
*>i [5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
5.5.5.5 0 100 0 ? 5.5.5.5 VXLAN
*>i [5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
5.5.5.5 0 100 0 ? 5.5.5.5 VXLAN
RD[1.1.1.1:1]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[1.1.1.1:11]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[1.1.1.1:21]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[201]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[2.2.2.2:1]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:11]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:21]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[4.4.4.4:11] VRF[L2VRF1]:
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> 4.4.4.4 0 100 32768 i ---------- VXLAN
* i [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
RD[4.4.4.4:21] VRF[L2VRF2]:
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> 4.4.4.4 0 100 32768 i ---------- VXLAN
* i [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> 4.4.4.4 0 100 32768 i ---------- VXLAN
* i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[201]:[48,0000:4444:1020]:[32,21.21.21.101]:[201]
4.4.4.4 0 100 32768 i ---------- VXLAN
* i [3]:[201]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [3]:[201]:[32,4.4.4.4]
4.4.4.4 0 100 32768 i ---------- VXLAN
* i [3]:[201]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
RD[5.5.5.5:11]
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [2]:[0]:[101]:[48,0000:5555:1010]:[32,11.11.11.201]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [3]:[101]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
RD[5.5.5.5:21]
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [3]:[201]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
VTEP5
TB2-VTEP5#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
5.5.5.5 2.2.2.2 Installed 00:13:36 00:13:36
5.5.5.5 4.4.4.4 Installed 00:13:36 00:13:36
5.5.5.5 1.1.1.1 Installed 00:13:36 00:13:36
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
___
101 VNI-101 L2 NW ---- ---- ---- ---- 5.5.5.5 2.2.2.2
101 VNI-101 L2 NW ---- ---- ---- ---- 5.5.5.5 4.4.4.4
101 VNI-101 L2 NW ---- ---- ---- ---- 5.5.5.5 1.1.1.1
101 VNI-101 -- AC xe48 --- Single Homed Port --- 10 ---- ---- ----
201 VNI-201 L2 NW ---- ---- ---- ---- 5.5.5.5 2.2.2.2
201 VNI-201 L2 NW ---- ---- ---- ---- 5.5.5.5 4.4.4.4
201 VNI-201 L2 NW ---- ---- ---- ---- 5.5.5.5 1.1.1.1
-----------------------------------------------
IP routing table name is Default-IP-Routing-Table(0)
-----------------------------------------------
IP routing table maximum-paths : 8
Total number of IPv4 routes : 12
Total number of IPv4 paths : 12
Pending routes (due to route max reached): 0
Route Source Networks
connected 3
ospf 9
Total 12
FIB 12
-----------------------------------------------
IPv6 routing table name is Default-IPv6-Routing-Table(0)
-----------------------------------------------
IPv6 routing table maximum-paths : 8
Total number of IPv6 routes : 2
Total number of IPv6 paths : 2
Pending routes (due to route max reached): 0
Route Source Networks
connected 2
Total 2
FIB 2
RD[11000:11]
*>i [5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
1.1.1.1 0 100 0 ? 1.1.1.1 VXLAN
*>i [5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
1.1.1.1 0 100 0 ? 1.1.1.1 VXLAN
RD[21000:11]
*>i [5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
2.2.2.2 0 100 0 ? 2.2.2.2 VXLAN
*>i [5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
2.2.2.2 0 100 0 ? 2.2.2.2 VXLAN
RD[41000:11]
*>i [5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
4.4.4.4 0 100 0 ? 4.4.4.4 VXLAN
*>i [5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
4.4.4.4 0 100 0 ? 4.4.4.4 VXLAN
RD[1.1.1.1:1]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[1.1.1.1:11]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[1.1.1.1:21]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[201]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[2.2.2.2:1]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:11]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:21]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[4.4.4.4:11]
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [3]:[101]:[32,4.4.4.4]
RD[4.4.4.4:21]
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[201]:[48,0000:4444:1020]:[32,21.21.21.101]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [3]:[201]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
RD[5.5.5.5:11] VRF[L2VRF1]:
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[101]:[48,0000:0000:1111]:[32,11.11.11.1]:[101]
5.5.5.5 0 100 32768 i ---------- VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> [2]:[0]:[101]:[48,0000:0000:1111]:[128,11:11::11:1]:[101]
5.5.5.5 0 100 32768 i ---------- VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[101]:[48,0000:5555:1010]:[32,11.11.11.201]:[101]
5.5.5.5 0 100 32768 i ---------- VXLAN
* i [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [3]:[101]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*> [3]:[101]:[32,5.5.5.5]
5.5.5.5 0 100 32768 i ---------- VXLAN
RD[5.5.5.5:21] VRF[L2VRF2]:
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[201]:[48,0000:0000:1111]:[32,21.21.21.1]:[201]
5.5.5.5 0 100 32768 i ---------- VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> [2]:[0]:[201]:[48,0000:0000:1111]:[128,21:21::21:1]:[201]
5.5.5.5 0 100 32768 i ---------- VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i 1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[201]:[48,0000:4444:1020]:[32,21.21.21.101]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i [3]:[201]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [3]:[201]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*> [3]:[201]:[32,5.5.5.5]
5.5.5.5 0 100 32768 i ---------- VXLAN
Distributed Gateway
In distributed gateway approach, VTEP will act as default gateways for one or more VNIDs,
Each VTEP having its own default gateway IP and MAC configuration for a given VNID.
VTEP4
VTEP5
Unconfigure vnid 201 from nvo vxlan.
Validations
VTEP4
TB2-VTEP4#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
4.4.4.4 2.2.2.2 Installed 00:01:17 00:01:17
4.4.4.4 1.1.1.1 Installed 00:01:17 00:01:17
4.4.4.4 5.5.5.5 Installed 00:02:22 00:02:22
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
___
201 VNI-201 L2 NW ---- ---- ---- ---- 4.4.4.4 2.2.2.2
201 VNI-201 L2 NW ---- ---- ---- ---- 4.4.4.4 1.1.1.1
201 VNI-201 -- AC sa1 --- Single Homed Port --- 20 ---- ---- ----
1000 ---- L3 NW ---- ---- ---- ---- 4.4.4.4 5.5.5.5
-----------------------------------------------
IP routing table name is Default-IP-Routing-Table(0)
-----------------------------------------------
IP routing table maximum-paths : 8
Total number of IPv4 routes : 12
Total number of IPv4 paths : 12
Pending routes (due to route max reached): 0
Route Source Networks
connected 3
ospf 9
Total 12
FIB 12
RD[51000:11]
*>i [5]:[0]:[1000]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
5.5.5.5 0 100 0 ? 5.5.5.5 VXLAN
RD[1.1.1.1:1]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[1.1.1.1:11]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[1.1.1.1:21]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[201]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[2.2.2.2:1]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:11]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:21]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[4.4.4.4:11] VRF[L2VRF1]:
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[101]:[48,0000:5555:1010]:[32,11.11.11.201]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i [2]:[0]:[101]:[48,3c2c:99d6:167a]:[32,11.11.11.1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i [2]:[0]:[101]:[48,3c2c:99d6:167a]:[128,11:11::11:1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
* i [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [3]:[101]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
RD[4.4.4.4:21] VRF[L2VRF2]:
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[201]:[48,0000:4444:1020]:[32,21.21.21.101]:[201]
4.4.4.4 0 100 32768 i ---------- VXLAN
*> [2]:[0]:[201]:[48,3c2c:99c7:077a]:[32,21.21.21.1]:[201]
4.4.4.4 0 100 32768 i ---------- VXLAN
*> [2]:[0]:[201]:[48,3c2c:99c7:077a]:[128,21:21::21:1]:[201]
4.4.4.4 0 100 32768 i ---------- VXLAN
* i [3]:[201]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [3]:[201]:[32,4.4.4.4]
4.4.4.4 0 100 32768 i ---------- VXLAN
RD[5.5.5.5:11]
*>i [2]:[0]:[101]:[48,0000:5555:1010]:[32,11.11.11.201]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [2]:[0]:[101]:[48,3c2c:99d6:167a]:[32,11.11.11.1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [2]:[0]:[101]:[48,3c2c:99d6:167a]:[128,11:11::11:1]:[101]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
*>i [3]:[101]:[32,5.5.5.5]
5.5.5.5 0 100 0 i 5.5.5.5 VXLAN
VTEP5
TB2-VTEP5#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
5.5.5.5 2.2.2.2 Installed 00:34:13 00:34:13
5.5.5.5 4.4.4.4 Installed 00:01:26 00:01:26
5.5.5.5 1.1.1.1 Installed 00:34:13 00:34:13
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
___
101 VNI-101 L2 NW ---- ---- ---- ---- 5.5.5.5 2.2.2.2
101 VNI-101 L2 NW ---- ---- ---- ---- 5.5.5.5 1.1.1.1
101 VNI-101 -- AC xe48 --- Single Homed Port --- 10 ---- ---- ----
1000 ---- L3 NW ---- ---- ---- ---- 5.5.5.5 4.4.4.4
-----------------------------------------------
IP routing table name is Default-IP-Routing-Table(0)
-----------------------------------------------
IP routing table maximum-paths : 8
Total number of IPv4 routes : 12
Total number of IPv4 paths : 12
Pending routes (due to route max reached): 0
Route Source Networks
connected 3
ospf 9
Total 12
FIB 12
RD[41000:11]
*>i [5]:[0]:[1000]:[24]:[21.21.21.0]:[0.0.0.0]:[1000]
4.4.4.4 0 100 0 ? 4.4.4.4 VXLAN
RD[1.1.1.1:1]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[1.1.1.1:11]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
RD[1.1.1.1:21]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[201]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[2.2.2.2:1]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [4]:[00:00:00:00:00:22:22:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:11]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:21]
*>i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[00:00:00:00:00:22:22:00:00:00]:[201]:[48,0000:2222:1020]:[32,21.21.21.51]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[4.4.4.4:21]
*>i [2]:[0]:[201]:[48,0000:4444:1020]:[32,21.21.21.101]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[201]:[48,3c2c:99c7:077a]:[32,21.21.21.1]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[201]:[48,3c2c:99c7:077a]:[128,21:21::21:1]:[201]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [3]:[201]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
RD[5.5.5.5:11] VRF[L2VRF1]:
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[101]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[00:00:00:00:00:22:22:00:00:00]:[101]:[48,0000:2222:1010]:[32,11.11.11.51]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[101]:[48,0000:5555:1010]:[32,11.11.11.201]:[101]
5.5.5.5 0 100 32768 i ---------- VXLAN
*> [2]:[0]:[101]:[48,3c2c:99d6:167a]:[32,11.11.11.1]:[101]
5.5.5.5 0 100 32768 i ---------- VXLAN
*> [2]:[0]:[101]:[48,3c2c:99d6:167a]:[128,11:11::11:1]:[101]
5.5.5.5 0 100 32768 i ---------- VXLAN
* i [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [3]:[101]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [3]:[101]:[32,5.5.5.5]
5.5.5.5 0 100 32768 i ---------- VXLAN
RD[5.5.5.5:21] VRF[L2VRF2]:
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[201]:[201]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
VTEP1
Configure max-path ibgp 2 on VTEP1 under BGP IPv4 VRF address family.
(config-nvo)#exit Exit from VXLAN tenant mode and enter into configuration
mode.
(config)#commit Commit the transaction
VTEP2
Configure max-path ibgp 2 on VTEP1 under BGP IPv4 VRF address family.
(config-nvo)#exit Exit from VXLAN tenant mode and enter into configuration
mode.
(config)#commit Commit the transaction
VTEP5
Unconfigure - evpn irb-forwarding anycast-gateway-mac and assign different IP address and IPv6 address
to IRB interfaces on VTEP1. Resolve the ARP on Traffic generator and verify the learnt MAC is same as IRB interface
MAC not the anycast MAC (0000.0000.1111). Configure BGP max-path under BGP process.
Enable VXLAN Multihhoming on VTEP5 and reboot the node to apply the Multihoming configuration to hardware.
(config-nvo)#exit Exit from VXLAN tenant mode and enter into configuration
mode.
(config-nvo)#commit Commit the transaction
Validations
On VTEP5, verify that in the VRF routing table , ECMP path for the IRB address (11.11.11.1) is via VTEP1 - 1.1.1.1 and
VTEP2 -2.2.2.2 . Send the Traffic from VTEP5 Single homed to Multihomed. Traffic should be forwarded via VTEP1
and VTEP2 and is loadshared between the Multihome VTEPs.
VTEP5
TB2-VTEP5#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
5.5.5.5 2.2.2.2 Installed 00:34:13 00:34:13
5.5.5.5 4.4.4.4 Installed 00:01:26 00:01:26
5.5.5.5 1.1.1.1 Installed 00:34:13 00:34:13
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
___
101 VNI-101 L2 NW ---- ---- ---- ---- 5.5.5.5 2.2.2.2
101 VNI-101 L2 NW ---- ---- ---- ---- 5.5.5.5 1.1.1.1
101 VNI-101 -- AC xe48 --- Single Homed Port --- 10 ---- ---- ----
1000 ---- L3 NW ---- ---- ---- ---- 5.5.5.5 4.4.4.4
Send 10000 pps from VTEP5 (Traffic generator- SH5) and verify the counters on VTEP5, VTEP1, VTEP2 and Switch
VTEP1
TB2-VTEP1#show interface counter rate mbps
+-------------------+--------------+-------------+--------------+-------------+
| Interface | Rx mbps | Rx pps | Tx mbps | Tx pps |
+-------------------+--------------+-------------+--------------+-------------+
po2 62.75 5000 0.01 8
po1 0.00 0 62.98 5000
xe25 31.98 2500 0 0
xe26 30.95 2501 0 0
xe2 0.00 0 31.53 2500
xe3 0.00 0 30.53 2500
VTEP2
TB2-VTEP2#show interface counter rate mbps
+-------------------+--------------+-------------+--------------+-------------+
| Interface | Rx mbps | Rx pps | Tx mbps | Tx pps |
+-------------------+--------------+-------------+--------------+-------------+
po3 62.75 5000 0.01 8
po1 0.00 0 62.98 5000
xe27 31.98 2500 0 0
xe28 30.95 2501 0 0
xe8 0.00 0 31.53 2500
xe9 0.00 0 30.53 2500
Verify the Traffic on Multihomed Switch:
SW1 (Multihomed)
TB2-SW1#show interface counter rate mbps
+-------------------+--------------+-------------+--------------+-------------+
Overview
An EVPN-based Integrated Routing and Bridging solution enables communication between two Layer-2 Virtual
Network Identifiers (VNIDs) using IP-based Virtual Routing and Forwarding (IP-VRF).This enhancement provides
Anycast Gateway Routing support for multiple subnets under the IRB interface (per VNID).
Feature Characteristics
• Connects primary or secondary subnets with either router MAC or anycast MAC address.
• Supports Anycast Gateway for multiple subnets under the layer-2 VNID's.
• Subnets A, B, and C can have Anycast Gateway support, while subnet D is reserved for BGP.
• Supports the Interfacefull model for ARP/ND requests and the interfaceless model using the kernel interface with a
unique MAC per interface (Router MAC or Anycast MAC) for all subnets.
ARP/ND replies come from the ARP/ND cache table for host requests. Hosts can send Layer-3 packets with either
Anycast MAC or Router MAC, and Layer-3 termination in the VTEP happens for both. By default, each subnet uses the
Router MAC in ARP/ND cache. When the anycast argument is configured, it updates the ARP cache with the Anycast
MAC. BGP withdraws the Route-Type 2 and update with Anycast/Router MAC to inform the configured gateway for the
layer-2 VNID to non-default gateway nodes.
Topology
The procedures in this section use the topology in Figure 2-12.
Note: In the above topology TS1, and TS2 are the tenant systems.
VTEP1:OSPF configuration
VTEP1:BGP configuration
(config-router)#neighbor 5.5.5.5 remote-as Specify a VTEP5 loopback ip address and remote-as defined
5000
(config-router)#neighbor 5.5.5.5 update- Configure update as loopback for VTEP5
source lo
(config-router)#neighbor 5.5.5.5 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP5
(config-router)#address-family l2vpn evpn Enter into l2vpn EVPN address family mode
(config-router-af)#neighbor 2.2.2.2 activate Activate 2.2.2.2(VTEP2) into l2vpn evpn address family mode
(config-router-af)#neighbor 4.4.4.4 activate Activate 3.3.3.3(VTEP4) into l2vpn evpn address family mode
(config-router-af)#neighbor 5.5.5.5 activate Activate 5.5.5.5(VTEP5) into l2vpn evpn address family mode
(config-router-af)#exit-address-family Exit from l2vpn address family mode
(config-router)#exit Exit from Router BGP mode and enter into config mode
(config)#mac vrf L2VRF1 Create mac routing/forwarding instance with L2VRF1 name
and enter into vrf mode
(config-vrf)#rd 1.1.1.1:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from vrf mode
(config)#mac vrf L2VRF2 Create mac routing/forwarding instance with L2VRF2 name
and enter into vrf mode
(config-vrf)#rd 1.1.1.1:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from vrf mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-vlan mapping i.e. access port to outer-vlan
10 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vnid 101 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)# mac 0000.2222.1010 ip Configure static mac-ip
11.11.11.51
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-vlan mapping i.e. access port to outer-vlan
20 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vnid 201 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)# mac 0000.2222.1020 ip Configure static mac-ip
21.21.21.51
(config-nvo-acc-if)#commit Commit the candidate configuration to the running
configuration
(config)#nvo vxlan id 201 ingress- Configure VXLAN Network identifier with/without inner-
replication inner-vid-disabled viddisabled configure and enter into VXLAN tenant mode
(config-nvo)#vxlan host-reachability- Assign VRF for EVPN-BGP to carry EVPN route
protocol evpn-bgp L2VRF2
(config-nvo)# evpn irb2001 Configure irb2001 under vxlan id 201
(config-nvo)# vni-name VNI-201 Configure VNI name as VNI-201
(config)#qos enable Enabling QoS
VTEP1(config)#hostname VTEP2 Configure hostname
VTEP2:OSPF configuration
VTEP2:BGP configuration
(config)#mac vrf L2VRF1 Create mac routing/forwarding instance with L2VRF1 name
and enter into vrf mode
(config-vrf)#rd 1.1.1.1:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from vrf mode
(config)#mac vrf L2VRF2 Create mac routing/forwarding instance with L2VRF2 name
and enter into vrf mode
(config-vrf)#rd 1.1.1.1:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from vrf mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-vlan mapping i.e. access port to outer-vlan
10 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vnid 101 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)# mac 0000.2222.1010 ip Configure static mac-ip
11.11.11.51
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-vlan mapping i.e. access port to outer-vlan
20 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vnid 201 Map VXLAN Identified to access-port for VXLAN
VTEP3:OSPF configuration
VTEP3:BGP configuration
(config)#mac vrf L2VRF1 Create mac routing/forwarding instance with L2VRF1 name
and enter into vrf mode
(config-vrf)#rd 1.1.1.1:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from vrf mode
(config)#mac vrf L2VRF2 Create mac routing/forwarding instance with L2VRF2 name
and enter into vrf mode
(config-vrf)#rd 1.1.1.1:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from vrf mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-vlan mapping i.e. access port to outer-vlan
10 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vnid 101 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)# mac 0000.2222.1010 ip Configure static mac-ip
11.11.11.51
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-vlan mapping i.e. access port to outer-vlan
20 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vnid 201 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)# mac 0000.2222.1020 ip Configure static mac-ip
21.21.21.51
(config-nvo-acc-if)#commit Commit the candidate configuration to the running
configuration
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#exit Exit from configuration mode
(config)#nvo vxlan id 101 ingress- Configure VXLAN Network identifier with/without inner-
replication inner-vid-disabled viddisabled configure and enter into VXLAN tenant mode
(config)#vxlan host-reachability-protocol Assign vrf for evpn-bgp to carry EVPN rout
evpn-bgp L2VRF1
(config-nvo)# evpn irb1001 Configure irb1001 under vxlan id 101
(config-nvo)# vni-name VNI-101 Configure VNI name as VNI-101
(config-nvo)#exit Exit from VXLAN tenant mode and enter into configuration
mode
(config)#nvo vxlan id 201 ingress- Configure VXLAN Network identifier with/without inner-
replication inner-vid-disabled viddisabled configure and enter into VXLAN tenant mode
(config-nvo)#vxlan host-reachability- Assign VRF for EVPN-BGP to carry EVPN route
protocol evpn-bgp L2VRF2
(config-nvo)# evpn irb2001 Configure irb2001 under vxlan id 201
(config-nvo)# vni-name VNI-201 Configure VNI name as VNI-201
(config)#qos enable Enabling QoS
VTEP4(config)#hostname VTEP4 Configure hostname
VTEP4:OSPF configuration
VTEP4:BGP configuration
(config)#mac vrf L2VRF1 Create mac routing/forwarding instance with L2VRF1 name
and enter into vrf mode
(config-vrf)#rd 1.1.1.1:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from vrf mode
(config)#mac vrf L2VRF2 Create mac routing/forwarding instance with L2VRF2 name
and enter into vrf mode
(config-vrf)#rd 1.1.1.1:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from vrf mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-vlan mapping i.e. access port to outer-vlan
10 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vnid 101 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)# mac 0000.2222.1010 ip Configure static mac-ip
11.11.11.51
Spine1
Spine node where all VTEPs are connected.
Generic configuration:
OSPF configuration:
Switch1
(config-if)#switchport trunk allowed vlan Add the vlan for the trunk
add 2,10,20
(config-if)#switchport trunk allowed vlan Add the vlan for the trunk
add 2
(config)#interface ce56 Enter Interface mode for network side port
(config-if)#channel-group 1 mode active Map interface ce56 for channel group
Switch2
OSPF configuration:
Validation
VTEP1:
Leaf1#show nvo vxlan arp-cache
VXLAN ARP-CACHE Information
===========================
VNID Ip-Addr Mac-Addr Type Age-Out Retries-Left
____________________________________________________________________________
101 11.11.11.1 0000.0000.1111 Static Local ----
101 11.11.11.51 0000.2222.1010 Static Local ----
VTEP2:
Leaf2#show int counters rate mbps
+-------------------+--------------+-------------+--------------+-------------+
| Interface | Rx mbps | Rx pps | Tx mbps | Tx pps |
+-------------------+--------------+-------------+--------------+-------------+
ce49 1099.23 771933 0.00 1
ce50 0.00 0 0.00 0
ce51 0.00 0 0.00 0
ce52 0.00 0 0.00 0
ce53 0.00 0 0.00 0
ce54 0.00 0 0.00 0
ce55 0.00 0 0.00 0
ce56 0.00 0 0.00 0
po3 1099.23 771934 0.00 1
xe3 0.00 0 0.00 0
xe5 0.00 0 0.00 0
-------------------------------------------------------------
Leaf2#show nvo vxlan arp-cache
VXLAN ARP-CACHE Information
===========================
VNID Ip-Addr Mac-Addr Type Age-Out Retries-Left
____________________________________________________________________________
101 11.11.11.1 0000.0000.1111 Static Local ----
101 11.11.11.51 0000.2222.1010 Static Remote ----
101 11.11.11.201 0000.4444.1010 Static Remote ----
101 12.11.11.1 0000.0000.1111 Static Local ----
101 13.11.11.1 b86a.979c.1669 Static Local ----
101 14.11.11.1 b86a.979c.1669 Static Local ----
101 15.11.11.1 0000.0000.1111 Static Local ----
101 16.11.11.1 0000.0000.1111 Static Local ----
101 17.11.11.1 0000.0000.1111 Static Local ----
101 18.11.11.1 0000.0000.1111 Static Local ----
101 19.11.11.1 b86a.979c.1669 Static Local ----
101 20.11.11.1 0000.0000.1111 Static Local ----
201 21.21.21.1 0000.0000.1111 Static Local ----
201 21.21.21.51 0000.2222.1020 Static Remote ----
201 22.22.22.1 b86a.979c.1669 Static Local ----
201 23.23.23.1 0000.0000.1111 Static Local ----
201 24.24.24.1 0000.0000.1111 Static Local ----
201 25.25.25.1 b86a.979c.1669 Static Local ----
201 26.26.26.1 0000.0000.1111 Static Local ----
201 27.27.27.1 b86a.979c.1669 Static Local ----
201 28.28.28.1 0000.0000.1111 Static Local ----
201 29.29.29.1 b86a.979c.1669 Static Local ----
201 30.30.30.1 0000.0000.1111 Static Local ----
201 192.85.1.2 0039.4400.0020 Dynamic Remote ----
Total number of entries are 24
------------------------------------------------------
Leaf2# show nvo vxlan nd-cache
VXLAN ND-CACHE Information
===========================
VNID Ip-Addr Mac-Addr Type Age
-Out Retries-Left
________________________________________________________________________________
____________________
101 11:11::11:1 0000.0000.1111 Static Local ----
101 12:11::11:1 b86a.979c.1669 Static Local ----
101 13:11::11:1 0000.0000.1111 Static Local ----
101 14:11::11:1 0000.0000.1111 Static Local ----
101 15:11::11:1 0000.0000.1111 Static Local ----
101 16:11::11:1 b86a.979c.1669 Static Local ----
101 17:11::11:1 0000.0000.1111 Static Local ----
101 18:11::11:1 b86a.979c.1669 Static Local ----
101 19:11::11:1 b86a.979c.1669 Static Local ----
101 20:20::20:1 b86a.979c.1669 Static Local ----
201 21:21::21:1 b86a.979c.1669 Static Local ----
201 22:22::22:1 0000.0000.1111 Static Local ----
201 23:23::23:1 b86a.979c.1669 Static Local ----
201 24:24::24:1 b86a.979c.1669 Static Local ----
201 25:25::25:1 0000.0000.1111 Static Local ----
201 26:26::26:1 0000.0000.1111 Static Local ----
201 27:27::27:1 b86a.979c.1669 Static Local ----
201 28:28::28:1 0000.0000.1111 Static Local ----
201 29:29::29:1 b86a.979c.1669 Static Local ----
201 30:30::30:1 0000.0000.1111 Static Local ----
Total number of entries are 20
Leaf2#
VTEP4:
Leaf3#show interface counters rate mbps
+-------------------+--------------+-------------+--------------+-------------+
| Interface | Rx mbps | Rx pps | Tx mbps | Tx pps |
+-------------------+--------------+-------------+--------------+-------------+
ce49 0.00 1 0.00 0
ce51 0.00 0 0.00 0
ce52 0.00 0 0.00 0
VTEP5:
Leaf4#show interface counters rate mbps
+-------------------+--------------+-------------+--------------+-------------+
| Interface | Rx mbps | Rx pps | Tx mbps | Tx pps |
+-------------------+--------------+-------------+--------------+-------------+
ce49 0.00 0 0.00 0
ce50 0.00 0 0.00 0
ce52 0.00 0 0.00 0
ce53 0.00 0 0.00 0
ce54 1175.70 844612 0.00 1
ce55 0.00 0 0.00 0
po25 1175.70 844612 0.00 1
xe7 0.00 0 0.00 0
xe12 0.00 0 0.00 0
xe13 0.00 0 0.00 0
xe14 0.00 0 0.00 0
xe15 0.00 0 0.00 0
xe16 0.00 0 0.00 0
xe17 0.00 0 0.00 0
xe18 0.00 0 0.00 0
xe30 0.00 0 0.00 0
xe31 0.00 0 0.00 0
xe32 0.00 0 0.00 0
--------------------------------------------------------
Leaf4#show nvo vxlan arp-cache
VXLAN ARP-CACHE Information
===========================
VNID Ip-Addr Mac-Addr Type Age-Out Retries-Left
____________________________________________________________________________
101 11.11.11.1 0000.0000.1111 Static Local ----
101 11.11.11.51 0000.2222.1010 Static Remote ----
101 11.11.11.201 0000.4444.1010 Static Local ----
101 12.11.11.1 0000.0000.1111 Static Local ----
101 13.11.11.1 1444.8f45.8dc9 Static Local ----
101 14.11.11.1 1444.8f45.8dc9 Static Local ----
101 15.11.11.1 0000.0000.1111 Static Local ----
101 16.11.11.1 0000.0000.1111 Static Local ----
101 17.11.11.1 0000.0000.1111 Static Local ----
101 18.11.11.1 0000.0000.1111 Static Local ----
101 19.11.11.1 1444.8f45.8dc9 Static Local ----
101 20.11.11.1 0000.0000.1111 Static Local ----
201 21.21.21.1 0000.0000.1111 Static Local ----
201 21.21.21.51 0000.2222.1020 Static Remote ----
201 22.22.22.1 1444.8f45.8dc9 Static Local ----
201 23.23.23.1 0000.0000.1111 Static Local ----
201 24.24.24.1 0000.0000.1111 Static Local ----
201 25.25.25.1 1444.8f45.8dc9 Static Local ----
201 26.26.26.1 0000.0000.1111 Static Local ----
201 27.27.27.1 1444.8f45.8dc9 Static Local ----
201 28.28.28.1 0000.0000.1111 Static Local ----
201 29.29.29.1 1444.8f45.8dc9 Static Local ----
201 30.30.30.1 0000.0000.1111 Static Local ----
201 192.85.1.2 0039.4400.0020 Dynamic Remote ----
Total number of entries are 24
-----------------------------------------------------------
Leaf4#show nvo vxlan nd-cache
VXLAN ND-CACHE Information
===========================
VNID Ip-Addr Mac-Addr Type Age
-Out Retries-Left
________________________________________________________________________________
____________________
101 11:11::11:1 0000.0000.1111 Static Local ----
101 12:11::11:1 1444.8f45.8dc9 Static Local ----
Overview
EVPN-IRB enables communication between two L2VNI's by employing Routing through IP-VRF. This functionality
offers Host (/32) based Symmetric IRB support, directing inter-subnet traffic directly to the Host attached VTEP. To
implement this, configure "evpn irb-advertise-host-route" within VNID (BGP type 2) settings, or "redistribute connected-
host-routes" under BGP (BGP type 5) configurations.
Note:
• In VxLAN-EVPN Interface-less mode, only the 'redistribute connected-host-routes' command is supported.
However, in Interface-full mode, both commands are supported.
• It is advisable to configure a route map in ESI configured Multi-Homed (MH) nodes to block Hosts from peer MH.
This configuration is not required in non-ESI MH VTEPs.
Feature Characteristics
The preferred and recommended approach for AOS-CX VXLAN/EVPN Distributed L3 Gateways is Symmetric IRB.
This implementation offers superior scalability by eliminating the need to manage MAC/ARP entries for both source
and destination hosts, and it doesn't require configuring the same VLAN/VNI as in the case of Asymmetric IRB. These
advantages facilitate simpler and more scalable deployments in both Data Center and Campus networks.
Benefits
The advantages of utilizing a VxLAN-EVPN Symmetric IRB Support:
• Routing is employed on both ingress and egress VTEPs.
• Bi-directional traffic follows a symmetric path, such as utilizing an L3 VNI per VRF.
• VTEPs are relieved from holding unnecessary ARP/MAC resources.
• Configuration of the destination VLAN/VNI on the source VTEP is unnecessary.
Configuration
Ensure that the VTEPs have a base configuration with Symmetric IRB settings. Then, initiate dynamic traffic from
VTEP4 originating from the same subnet (53.1.X.XX/XXXX::XX) as the IRB interface. Typically, in EVPN, a single IP-
VRF can accommodate multiple IRB interfaces. Each IRB interface corresponds to a VNI, and multiple VNIs can be
associated with a MAC-VRF.
Topology
The procedures in this section use the topology in Figure 3-1
Base Configurations
Begin with a basic configuration that includes Symmetric IRB configurations on VTEPs, then initiate dynamic traffic
transmission from VTEP4 within the same subnet (53.1.1.40/5301::40) as the IRB interface.
Validation
Verification before configuring evpn irb-advertise-host-route under VNID configurations or redistribute connected-host-
routes under bgp.
In VTEP1:
In VTEP2:
In VTEP4:
VTEP4#show bgp l2vpn evpn mac-ip | grep 0000:0053:0040
0 605 0000:0053:0040 --
605 0 6.6.6.6 -- VxLAN
0 605 0000:0053:0040 53.1.1.40
605 0 6.6.6.6 -- VxLAN
0 605 0000:0053:0040 5301::40
605 0 6.6.6.6 -- VxLAN
VTEP4#
(config)#router bgp 1
(config-router)#address-family ipv4 vrf vxlan_l3_elan_sh
VTEP4(config-router-af)#redistribute connected-host-routes
Note: With static mac ip configured on vxlan access interface and when redistribute connected-host-routes is
configured under bgp. Then routes will not be advertised as /32 or /128 because for static mac-ip Arp entry will
not be present so only for dynamic routes.
Note: With redistribute connected-host-routes, show bgp l2vpn evpn mac-ip will not show the l3vnid.
Validation
Use this command to validate the VxLAN-EVPN Symmetric IRB.
In VTEP1:
In VTEP2:
In VTEP4:
Glossary
The following provides definitions for key terms or abbreviations and their meanings used throughout this document:
ECMP ECMP stands for Equal-Cost Multi-Path. It's a routing technique used in computer networks,
particularly in IP-based routing protocols like OSPF (Open Shortest Path First) and BGP (Border
Gateway Protocol).
VTEPs VTEP stands for VXLAN Tunnel Endpoint. It's a crucial component in network virtualization
architectures, particularly in overlay networks using VXLAN (Virtual Extensible LAN) technology.
ARP/MAC ARP (Address Resolution Protocol) and MAC (Media Access Control) address are both essential
components of networking, particularly in Ethernet-based networks.
VLAN/VNI VLAN (Virtual Local Area Network) and VNI (Virtual Network Identifier) are both technologies used
in networking to segment and manage traffic within a larger network infrastructure.
Topology
The procedures in this section use the topology in Figure 4-2.
VTEP1
Single Home -SH
OSPF configuration:
BGP configuration:
L2 VRF Configuration:
(config)# mac vrf RED Create mac routing/forwarding instance with RED name and
enter into vrf mode
(config-vrf)# rd 2.3.4.5:1 Assign RD value
(config-vrf)# route-target both 6000:6000 Assign route-target value for same for import and export.
Should be same on all node for RED
(config-vrf)#exit Exit from vrf mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
(config)# ip vrf FAX Create mac routing/forwarding instance with FAX name and
enter into vrf mode
(config-vrf)# rd 51.51.51.51:1050 Assign RD value
(config-vrf)# route-target both 1050:1050 Assign route-target value for same for import and export.
(config-vrf)# l3vni 10502 Configure L3VNI as 10502 for FAX vrf
(config-vrf)#exit Exit from vrf mode
(config)# interface irb 1050 Configure irb interface 1050
(config-if)ip vrf forwarding FAX Configure FAX
(config-if) ip address 10.12.32.1/24 Configure ip address
(config-if)exit Exit from interface config mode
VXLAN configuration:
VTEP2
(Multi-homed group) - Part of both Multi-homed with po1000(MH).
OSPF configuration:
BGP configuration:
(config-router)#neighbor 76.76.76.76 remote- Specify a VTEP3 loopback ip address and remote-as defined
as 500
(config-router)#neighbor 76.76.76.76 update- Configure update as loopback for VTEP3
source lo
(config-router)#neighbor 76.76.76.76 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP3
(config-router)# address-family ipv4 unicast Enter into IPV4 unicast address family mode
(config-router-af)# neighbor 66.66.66.66 Activate BorderVTEP1 into ipv4 unicast family
activate
(config-router-af)# neighbor 76.76.76.76 Activate VTEP3 into ipv4 unicast family
activate
(config-router-af)# exit-address-family Exit from IPV4 unicast address family
(config-router)#address-family l2vpn evpn Enter into l2vpn EVPN address family mode
(config-router-af)#neighbor 66.66.66.66 Activate BorderVTEP1 into l2vpn evpn address family mode
activate
(config-router-af)#neighbor 76.76.76.76 Activate VTEP3 into l2vpn evpn address family mode
activate
(config-router-af)#exit-address-family Exit from l2vpn address family mode
(config-router)#exit Exit from Router BGP mode and enter into config mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
L2 VRF Configuration:
(config)# mac vrf RED Create mac routing/forwarding instance with RED name and
enter into vrf mode
(config-vrf)# rd 2.3.4.5:2 Assign RD value
(config-vrf)# route-target both 6000:6000 Assign route-target value for same for import and export.
Should be same on all node for RED
(config-vrf)#exit Exit from vrf mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
(config)# ip vrf SMS Create mac routing/forwarding instance with SMS name and
enter into vrf mode
(config-vrf)# rd 60.60.60.60:1040 Assign RD value
(config-vrf)# route-target both 1040:1040 Assign route-target value for same for import and export.
(config-vrf)# l3vni 10402 Configure L3VNI as 10402 for SMS vrf
(config-vrf)#exit Exit from vrf mode
(config)# interface irb 1060 Configure irb interface 1060
(config-if)ip vrf forwarding SMS Configure ip vrf forwarding
(config-if) ip address 10.240.38.1/24 Configure ip address
(config-if) evpn irb-if-forwarding anycast- Anycast mac configured
gateway-mac
(config-if)exit Exit from interface config mode
VXLAN configuration:
VTEP3
(Multi-homed group) - Part of both Multi-homed with po1000(MH).
OSPF configuration:
BGP configuration:
L2 VRF Configuration:
(config)# mac vrf RED Create mac routing/forwarding instance with RED name and
enter into vrf mode
(config-vrf)# rd 2.3.4.6:2 Assign RD value
(config-vrf)# route-target both 6000:6000 Assign route-target value for same for import and export.
Should be same on all node for RED
(config-vrf)#exit Exit from vrf mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
(config)# ip vrf SMS Create mac routing/forwarding instance with SMS name and
enter into vrf mode
(config-vrf)# rd 76.76.76.76:1040 Assign RD value
(config-vrf)# route-target both 1040:1040 Assign route-target value for same for import and export.
(config-vrf)# l3vni 10402 Configure L3VNI as 10402 for SMS vrf
(config-vrf)#exit Exit from vrf mode
(config)# interface irb 1060 Configure irb interface 1060
(config-if)ip vrf forwarding SMS Configure ip vrf forwarding
(config-if) ip address 10.240.38.1/24 Configure ip address
VXLAN configuration:
BorderVTEP1
OSPF configuration:
BGP configuration:
(config-router)#neighbor 76.76.76.76 remote- Specify a VTEP3 loopback ip address and remote-as defined
as 500
(config-router)#neighbor 76.76.76.76 update- Configure update as loopback for VTEP3
source lo
(config-router)#neighbor 76.76.76.76 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP3
(config-router)# no bgp default ipv4-unicast It will avoid default ipv4 unicast routing
(config-router)# address-family ipv4 unicast Enter into IPV4 unicast address family mode
(config-router-af)# neighbor 51.51.51.51 Activate VTEP1 into ipv4 unicast family
activate
(config-router-af)# neighbor 60.60.60.60 Activate VTEP2 into ipv4 unicast family
activate
(config-router-af)# neighbor 76.76.76.76 Activate VTEP3 into ipv4 unicast family
activate
(config-router-af)# exit-address-family Exit from IPV4 unicast address family
(config-router)#address-family l2vpn evpn Enter into l2vpn EVPN address family mode
(config-router-af)#neighbor 51.51.51.51 Activate VTEP1 into l2vpn evpn address family mode
activate
(config-router-af)#neighbor 60.60.60.60 Activate VTEP2 into l2vpn evpn address family mode
activate
(config-router-af)#neighbor 76.76.76.76 Activate VTEP3 into l2vpn evpn address family mode
activate
(config-router-af)#exit-address-family Exit from l2vpn address family mode
(config-router)#exit Exit from Router BGP mode and enter into config mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
L2 VRF Configuration:
(config)# mac vrf RED Create mac routing/forwarding instance with RED name and
enter into vrf mode
(config-vrf)# rd 2.2.4.4:4 Assign RD value
(config-vrf)# route-target both 6000:6000 Assign route-target value for same for import and export.
Should be same on all node for RED
(config-vrf)#exit Exit from vrf mode
(config)#commit Commit the candidate configuration to running configuration
and save config and reload board
(config)# ip vrf gvrf Create mac routing/forwarding instance with gvrf name and
enter into vrf mode
(config-vrf)# rd 4.5.6.8:6 Assign RD value
(config-vrf)# route-target import 100:100 Assign route-target value for import from FAX vrf
(config-vrf)# route-target import 300:300 Assign route-target value for import from SMS vrf
(config-vrf)# route-target export 1000:1000 Assign route-target value for export from gvrf
(config-vrf)# l3vni 500 Configure L3VNI as 500 for gvrf vrf
VXLAN configuration:
Firewall
BGP configuration:
TOR1 (SH)
TOR2 (MH)
Multihomed to 2-VTEPs (VTEP2 and VTEP3).
Spine1
Spine node where all VTEPs are connected.
Generic configuration:
OSPF configuration:
Validations
Firewall
=========
Firewall#show ip bgp summary
BGP router identifier 10.10.19.2, local AS number 64603
BGP table version is 3
2 BGP AS-PATH entries
0 BGP community entries
8 Configured ebgp ECMP multipath: Currently set at 8
BorderVTEP1
===========
RD[2.2.4.4:4] VRF[RED]:
* i [1]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
* i 60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
* i [1]:[00:00:00:44:44:55:55:00:00:00]:[4294967295]:[0]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
* i 60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
* i [2]:[0]:[1050]:[48,0000:0e8d:561a]:[0]:[1050]
51.51.51.51 0 100 0 i 51.51.51.51 VXLAN
* i [2]:[0]:[1050]:[48,0000:0e8d:561a]:[32,10.12.32.11]:[1050]
51.51.51.51 0 100 0 i 51.51.51.51 VXLAN
* i [2]:[0]:[1050]:[48,0000:3333:1050]:[32,10.12.32.10]:[1050]
51.51.51.51 0 100 0 i 51.51.51.51 VXLAN
* i [2]:[0]:[1050]:[48,3c2c:99d6:167a]:[32,10.12.32.1]:[1050]
51.51.51.51 0 100 0 i 51.51.51.51 VXLAN
* i [2]:[0]:[1050]:[48,3c2c:99d6:167a]:[128,2401::1]:[1050]
51.51.51.51 0 100 0 i 51.51.51.51 VXLAN
* i [2]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[48,0000:0e8d:5619]:[0]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
* i
[2]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[48,0000:2222:1060]:[32,10.240.38.10]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
* i 60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
* i [2]:[0]:[1060]:[48,0000:2222:3333]:[32,10.240.38.1]:[1060]
RD[2.3.4.5:1]
*>i [2]:[0]:[1050]:[48,0000:0e8d:561a]:[0]:[1050]
51.51.51.51 0 100 0 i 51.51.51.51 VXLAN
*>i [2]:[0]:[1050]:[48,0000:0e8d:561a]:[32,10.12.32.11]:[1050]
51.51.51.51 0 100 0 i 51.51.51.51 VXLAN
*>i [2]:[0]:[1050]:[48,0000:3333:1050]:[32,10.12.32.10]:[1050]
51.51.51.51 0 100 0 i 51.51.51.51 VXLAN
*>i [2]:[0]:[1050]:[48,3c2c:99d6:167a]:[32,10.12.32.1]:[1050]
51.51.51.51 0 100 0 i 51.51.51.51 VXLAN
*>i [2]:[0]:[1050]:[48,3c2c:99d6:167a]:[128,2401::1]:[1050]
51.51.51.51 0 100 0 i 51.51.51.51 VXLAN
*>i [3]:[1050]:[32,51.51.51.51]
51.51.51.51 0 100 0 i 51.51.51.51 VXLAN
RD[2.3.4.5:2]
*>i [1]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[1060]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*>i
[2]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[48,0000:2222:1060]:[32,10.240.38.10]:[1060]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*>i [2]:[0]:[1060]:[48,0000:2222:3333]:[32,10.240.38.1]:[1060]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*>i [2]:[0]:[1060]:[48,0000:2222:3333]:[128,1601::1]:[1060]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*>i [3]:[1060]:[32,60.60.60.60]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
RD[2.3.4.6:2]
*>i [1]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i [2]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[48,0000:0e8d:5619]:[0]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i
[2]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[48,0000:2222:1060]:[32,10.240.38.10]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i [2]:[0]:[1060]:[48,0000:2222:3333]:[32,10.240.38.1]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i [2]:[0]:[1060]:[48,0000:2222:3333]:[128,1601::1]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i [3]:[1060]:[32,76.76.76.76]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
RD[51.51.51.51:1050]
*>i [5]:[0]:[10502]:[24]:[10.12.32.0]:[0.0.0.0]:[10502]
51.51.51.51 0 100 0 ? 51.51.51.51 VXLAN
RD[60.60.60.60:1]
*>i [1]:[00:00:00:44:44:55:55:00:00:00]:[4294967295]:[0]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*>i [4]:[00:00:00:44:44:55:55:00:00:00]:[32,60.60.60.60]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
RD[60.60.60.60:1040]
*>i [5]:[0]:[10402]:[24]:[10.240.38.0]:[0.0.0.0]:[10402]
60.60.60.60 0 100 0 ? 60.60.60.60 VXLAN
RD[76.76.76.76:1]
*>i [1]:[00:00:00:44:44:55:55:00:00:00]:[4294967295]:[0]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i [4]:[00:00:00:44:44:55:55:00:00:00]:[32,76.76.76.76]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
RD[76.76.76.76:1040]
*>i [5]:[0]:[10402]:[24]:[10.240.38.0]:[0.0.0.0]:[10402]
76.76.76.76 0 100 0 ? 76.76.76.76 VXLAN
RD[51.51.51.51:1050]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 10502 24 10.12.32.0 0.0.0.0
10502 51.51.51.51 VXLAN 3c2c:99d6:167a
RD[60.60.60.60:1040]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
RD[76.76.76.76:1040]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 10402 24 10.240.38.0 0.0.0.0
10402 76.76.76.76 VXLAN 3c2c:99de:1e7a
VTEP3
======
RD[2.2.4.4:4]
*>i [2]:[0]:[1067]:[48,3c2c:991c:dc7a]:[32,10.10.18.1]:[1067]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
*>i [2]:[0]:[1067]:[48,a82b:b5cf:f806]:[32,10.10.18.2]:[1067]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
*>i [3]:[1067]:[32,66.66.66.66]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
RD[2.3.4.5:2]
*>i [1]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[1060]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*>i
[2]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[48,0000:2222:1060]:[32,10.240.38.10]:[1060]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*>i [2]:[0]:[1060]:[48,0000:2222:3333]:[32,10.240.38.1]:[1060]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*>i [2]:[0]:[1060]:[48,0000:2222:3333]:[128,1601::1]:[1060]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*>i [3]:[1060]:[32,60.60.60.60]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
RD[2.3.4.6:2] VRF[RED]:
*> [1]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[1060]
76.76.76.76 0 100 32768 i ----------
VXLAN
* i 60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
* i [1]:[00:00:00:44:44:55:55:00:00:00]:[4294967295]:[0]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*> [2]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[48,0000:0e8d:5619]:[0]:[1060]
76.76.76.76 0 100 32768 i ----------
VXLAN
*>
[2]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[48,0000:2222:1060]:[32,10.240.38.10]:[1060]
76.76.76.76 0 100 32768 i ----------
VXLAN
* i 60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
* i [2]:[0]:[1060]:[48,0000:2222:3333]:[32,10.240.38.1]:[1060]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*> 76.76.76.76 0 100 32768 i ----------
VXLAN
* i [2]:[0]:[1060]:[48,0000:2222:3333]:[128,1601::1]:[1060]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*> 76.76.76.76 0 100 32768 i ----------
VXLAN
* i [2]:[0]:[1067]:[48,3c2c:991c:dc7a]:[32,10.10.18.1]:[1067]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
* i [2]:[0]:[1067]:[48,a82b:b5cf:f806]:[32,10.10.18.2]:[1067]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
* i [3]:[1060]:[32,60.60.60.60]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*> [3]:[1060]:[32,76.76.76.76]
76.76.76.76 0 100 32768 i ----------
VXLAN
* i [3]:[1067]:[32,66.66.66.66]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
RD[4.5.6.8:6]
*>i [5]:[0]:[500]:[0]:[0.0.0.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.18.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 ? 66.66.66.66 VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.20.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
RD[60.60.60.60:1]
*>i [1]:[00:00:00:44:44:55:55:00:00:00]:[4294967295]:[0]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*>i [4]:[00:00:00:44:44:55:55:00:00:00]:[32,60.60.60.60]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
RD[60.60.60.60:1040]
*>i [5]:[0]:[10402]:[24]:[10.240.38.0]:[0.0.0.0]:[10402]
60.60.60.60 0 100 0 ? 60.60.60.60 VXLAN
RD[66.66.66.66:1050]
*>i [5]:[0]:[500]:[0]:[0.0.0.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.18.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 ? 66.66.66.66 VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.20.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
RD[66.66.66.66:1060]
*>i [5]:[0]:[500]:[0]:[0.0.0.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.18.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 ? 66.66.66.66 VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.20.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
RD[76.76.76.76:1] VRF[evpn-gvrf-1]:
*> [1]:[00:00:00:44:44:55:55:00:00:00]:[4294967295]:[0]
76.76.76.76 0 100 32768 i ----------
VXLAN
* i [4]:[00:00:00:44:44:55:55:00:00:00]:[32,60.60.60.60]
60.60.60.60 0 100 0 i 60.60.60.60 VXLAN
*> [4]:[00:00:00:44:44:55:55:00:00:00]:[32,76.76.76.76]
76.76.76.76 0 100 32768 i ----------
VXLAN
RD[4.5.6.8:6]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 500 0 0.0.0.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.18.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.20.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
RD[60.60.60.60:1040]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 10402 24 10.240.38.0 0.0.0.0
10402 60.60.60.60 VXLAN 3c2c:99d1:117a
RD[66.66.66.66:1050]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 500 0 0.0.0.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.18.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.20.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
RD[66.66.66.66:1060]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 500 0 0.0.0.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.18.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.20.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
VTEP2
======
AC - Access Port
(u) - Untagged
RD[2.2.4.4:4]
*>i [2]:[0]:[1067]:[48,3c2c:991c:dc7a]:[32,10.10.18.1]:[1067]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
*>i [2]:[0]:[1067]:[48,a82b:b5cf:f806]:[32,10.10.18.2]:[1067]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
*>i [3]:[1067]:[32,66.66.66.66]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
RD[2.3.4.5:2] VRF[RED]:
* i [1]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
RD[2.3.4.6:2]
*>i [1]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i [2]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[48,0000:0e8d:5619]:[0]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i
[2]:[00:00:00:44:44:55:55:00:00:00]:[1060]:[48,0000:2222:1060]:[32,10.240.38.10]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i [2]:[0]:[1060]:[48,0000:2222:3333]:[32,10.240.38.1]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i [2]:[0]:[1060]:[48,0000:2222:3333]:[128,1601::1]:[1060]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i [3]:[1060]:[32,76.76.76.76]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
RD[4.5.6.8:6]
*>i [5]:[0]:[500]:[0]:[0.0.0.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.18.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 ? 66.66.66.66 VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.20.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
RD[60.60.60.60:1] VRF[evpn-gvrf-1]:
*> [1]:[00:00:00:44:44:55:55:00:00:00]:[4294967295]:[0]
60.60.60.60 0 100 32768 i ----------
VXLAN
*> [4]:[00:00:00:44:44:55:55:00:00:00]:[32,60.60.60.60]
60.60.60.60 0 100 32768 i ----------
VXLAN
* i [4]:[00:00:00:44:44:55:55:00:00:00]:[32,76.76.76.76]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
RD[66.66.66.66:1050]
*>i [5]:[0]:[500]:[0]:[0.0.0.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.18.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 ? 66.66.66.66 VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.20.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
RD[66.66.66.66:1060]
*>i [5]:[0]:[500]:[0]:[0.0.0.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.18.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 ? 66.66.66.66 VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.20.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
RD[76.76.76.76:1]
*>i [1]:[00:00:00:44:44:55:55:00:00:00]:[4294967295]:[0]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
*>i [4]:[00:00:00:44:44:55:55:00:00:00]:[32,76.76.76.76]
76.76.76.76 0 100 0 i 76.76.76.76 VXLAN
RD[76.76.76.76:1040]
*>i [5]:[0]:[10402]:[24]:[10.240.38.0]:[0.0.0.0]:[10402]
76.76.76.76 0 100 0 ? 76.76.76.76 VXLAN
RD[4.5.6.8:6]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
RD[66.66.66.66:1050]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 500 0 0.0.0.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.18.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.20.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
RD[66.66.66.66:1060]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 500 0 0.0.0.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.18.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.20.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
RD[76.76.76.76:1040]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 10402 24 10.240.38.0 0.0.0.0
10402 76.76.76.76 VXLAN 3c2c:99de:1e7a
VTEP2#
VTEP1
======
VTEP1#show nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
RD[2.2.4.4:4]
*>i [2]:[0]:[1067]:[48,3c2c:991c:dc7a]:[32,10.10.18.1]:[1067]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
*>i [2]:[0]:[1067]:[48,a82b:b5cf:f806]:[32,10.10.18.2]:[1067]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
*>i [3]:[1067]:[32,66.66.66.66]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
RD[2.3.4.5:1] VRF[RED]:
*> [2]:[0]:[1050]:[48,0000:0e8d:561a]:[0]:[1050]
51.51.51.51 0 100 32768 i ----------
VXLAN
*> [2]:[0]:[1050]:[48,0000:0e8d:561a]:[32,10.12.32.11]:[1050]
51.51.51.51 0 100 32768 i ----------
VXLAN
*> [2]:[0]:[1050]:[48,0000:3333:1050]:[32,10.12.32.10]:[1050]
51.51.51.51 0 100 32768 i ----------
VXLAN
*> [2]:[0]:[1050]:[48,3c2c:99d6:167a]:[32,10.12.32.1]:[1050]
51.51.51.51 0 100 32768 i ----------
VXLAN
*> [2]:[0]:[1050]:[48,3c2c:99d6:167a]:[128,2401::1]:[1050]
51.51.51.51 0 100 32768 i ----------
VXLAN
* i [2]:[0]:[1067]:[48,3c2c:991c:dc7a]:[32,10.10.18.1]:[1067]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
* i [2]:[0]:[1067]:[48,a82b:b5cf:f806]:[32,10.10.18.2]:[1067]
66.66.66.66 0 100 0 i 66.66.66.66 VXLAN
*> [3]:[1050]:[32,51.51.51.51]
RD[4.5.6.8:6]
*>i [5]:[0]:[500]:[0]:[0.0.0.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.18.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 ? 66.66.66.66 VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.20.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
RD[66.66.66.66:1050]
*>i [5]:[0]:[500]:[0]:[0.0.0.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.18.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 ? 66.66.66.66 VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.20.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
RD[66.66.66.66:1060]
*>i [5]:[0]:[500]:[0]:[0.0.0.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.18.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 ? 66.66.66.66 VXLAN
*>i [5]:[0]:[500]:[24]:[10.10.20.0]:[0.0.0.0]:[500]
66.66.66.66 0 100 0 64603 i 66.66.66.66
VXLAN
RD[4.5.6.8:6]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 500 0 0.0.0.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.18.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.20.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
RD[66.66.66.66:1050]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 500 0 0.0.0.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.18.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.20.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
RD[66.66.66.66:1060]
ESI Eth-Tag Prefix-Length IP-Address GW-
IPAddress L3VNID Nexthop Encap Router-Mac
0 500 0 0.0.0.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.18.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
0 500 24 10.10.20.0 0.0.0.0
500 66.66.66.66 VXLAN 3c2c:991c:dc7a
Ping to 10.10.20.1 network which is advertised by Firewall from VTEP1 FAX vrf
Overview
Dynamic Host Configuration Protocol (DHCP) is a protocol that allows a DHCP server to dynamically allocate IP
addresses to DHCP clients. The DHCP relay agent forwards DHCP messages between DHCP clients and DHCP
servers when they are on different networks.
For DHCP relay to function, uplink interface (server facing) and downlink interface (client facing) are to be configured
along with DHCP server address. These configurations are done in the interface mode.
In the IRB deployment, IRB interface acts as gateway and hence it might need to provide the service of DHCP for the
hosts connected to IRB network per L2 VPN. Since the DHCP server will not be present in the VTEP, it can forward the
DHCP requests to the DHCP server acting as relay agent.
Topology
The procedures in this section use the topology in Figure 5-3.
ROUTER-1
OcNOS(config)#mac vrf vrfred Create MAC VRF instance with vrfred name and enter into
VRF mode
OcNOS(config-vrf)#rd 1.1.1.1:1 Assign RD value
OcNOS(config-vrf)#route-target both Assign route target value
1.1.1.1:1
OcNOS(config-vrf)#exit Exit MAC VRF mode
OcNOS(config)#interface irb 1 Configure IRB interface
OcNOS(config-irb-if)#ip vrf forwarding vrf1 Configure IP VRF forwarding
OcNOS(config-irb-if)#ip address 11.1.1.1/24 Assign IP address on IRB interface.
OcNOS(config-irb-if)#ip dhcp relay Relay should be configured on the interface connecting to the
relay
OcNOS(config-irb-if)#exit Exit IRB interface mode
OcNOS(config)#interface irb 2 Configure irb interface
OcNOS(config-irb-if)#ip vrf forwarding vrf1 Configure IP VRF forwarding
OcNOS(config-irb-if)#ip address 70.70.70.1/ Assign IP address on IRB interface.
24
OcNOS(config-irb-if)#exit Exit IRB interface mode
OcNOS(config)#interface ce49 Enter Interface mode for ce49.
OcNOS(config-if)#ip address 10.1.1.2/24 Assign IP address on ce49 interface.
OcNOS(config-if)#exit Exit Interface mode and return to Configure mode.
OcNOS(config)#interface xe5 Enter Interface mode for xe5.
OcNOS(config-if)#switchport Configure interface as L2 interface
OcNOS(config-if)#exit Exit Interface mode and return to Configure mode.
OcNOS(config)#router ospf Enter the Router OSPF mode
OcNOS(config-router)#network 1.1.1.1/32 area Advertise loopback address in OSPF
0.0.0.0
OcNOS(config-router)#network 10.1.1.0/24 Advertise network address in OSPF
area 0.0.0.0
OcNOS(config-router)#exit Exit from Router OSPF mode and enter into config mode
OcNOS(config)#router bgp 1 Enter into BGP router mode
OcNOS(config-router)#neighbor 2.2.2.2 Specify a VTEP2 loopback IP address and remote-as defined
remote-as 1
OcNOS(config-router)#neighbor 2.2.2.2 Configure update as loopback for VTEP2
update-source 1.1.1.1
OcNOS(config-router)#address-family l2vpn Enter into L2VPN EVPN address family mode
evpn
OcNOS(config-router-af)#neighbor 2.2.2.2 Activate neighbor in L2VPN mode
activate
OcNOS(config-router-af)#exit-address-family Exit from Address family mode
OcNOS(config-router)#address-family ipv4 vrf Enter into address-family mode for VRF1
vrf1
OcNOS(config-router-af)#redistribute Configure Redistribute connected
connected
OcNOS(config-router-af)#exit-address-family Exit from Address family mode
OcNOS(config-router)#exit Exit from router BGP mode and enter into config mode
ROUTER-2
ROUTER-3
Validation
ROUTER-1
VTEP1#
!
nvo vxlan enable
!
nvo vxlan irb
!
nvo vxlan vtep-ip-global 1.1.1.1
!
nvo vxlan id 10 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp vrfred
evpn irb1
!
nvo vxlan id 30 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp vrfred
evpn irb2
!
nvo vxlan access-if port xe2
map vnid 10
!
nvo vxlan access-if port-vlan xe5 2
map vnid 10
!
VTEP1#show ip dhcp relay
DHCP relay service is Enabled.
VRF Name: vrf1
Option 82: Disabled
DHCP Servers configured: 40.40.40.1
Interface Uplink/Downlink
--------- -------------
irb1 Downlink
evpn uplink
Incoming DHCPv4 packets which already contain relay agent option are FORWARDED
unchanged.
============================================================================
1.1.1.1 2.2.2.2 Installed 01:51:11 01:51:11
ROUTER-2
VTEP2#show running-config nvo vxlan
!
nvo vxlan enable
!
nvo vxlan irb
!
nvo vxlan vtep-ip-global 2.2.2.2
!
nvo vxlan id 10 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp vrfred
!
nvo vxlan id 20 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp vrfred
evpn irb2
!
nvo vxlan access-if port xe19
map vnid 20
!
!
ip vrf vrf1
ip dhcp relay uplink evpn
Overview
An EVPN-based Integrated Routing and Bridging solution used for forwarding of intra-subnets and inter-subnets traffic.
Here QoS is applied on IRB solution for L3 packets.
VXLAN quality of service (QoS) provides differentiated service in VXLAN applications. A device implements mapping
between QoS priorities in original packets, internal priorities (local precedence assigned by the device to differentiate
service classes of packets), and priorities of encapsulated packets. In this way, the switch provides the differentiated
QoS service based on original packets.
Topology
The procedures in this section use the topology in Figure 6-4
Generic configuration:
OSPF configuration:
BGP configuration:
(config)#mac vrf L2VRF1 Create mac routing/forwarding instance with L2VRF1 name
and enter into vrf mode
(config-vrf)#rd 1.1.1.1:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from vrf mode
(config)#mac vrf L2VRF2 Create mac routing/forwarding instance with L2VRF2 name
and enter into vrf mode
(config-vrf)#rd 1.1.1.1:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from vrf mode
L2 VXLAN configuration:
(config)#nvo vxlan id 101 ingress- Configure VXLAN Network identifier with/without inner-vid-
replication inner-vid-disabled disabled configure and enter into VXLAN tenant mode
(config-nvo)#vxlan host-reachability- Assign vrf for evpn-bgp to carry EVPN route
protocol evpn-bgp L2VRF1
(config-nvo)# vni-name VNI-101 Configure VNI name as VNI-101
(config-nvo)#exit Exit from VXLAN tenant mode and enter into configuration
mode.
(config)#nvo vxlan id 201 ingress- Configure VXLAN Network identifier with/without inner-vid-
replication inner-vid-disabled disabled configure and enter into VXLAN tenant mode
(config-nvo)#vxlan host-reachability- Assign vrf for evpn-bgp to carry EVPN route
protocol evpn-bgp L2VRF2
(config-nvo)# vni-name VNI-201 Configure VNI name as VNI-201
(config-nvo)#exit Exit from VXLAN tenant mode and enter into configuration
mode.
(config)#nvo vxlan access-if port-vlan po1 Enable port-vlan mapping i.e. access port to outer-vlan
10 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vnid 101 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)# mac 0000.2222.1010 ip Configure static mac-ip
11.11.11.51
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#nvo vxlan access-if port-vlan po1 Enable port-vlan mapping i.e. access port to outer-vlan
20 (SVLAN) - Multihomed access port
(config-nvo-acc-if)#map vnid 201 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)# mac 0000.2222.1020 ip Configure static mac-ip
21.21.21.51
(config-nvo-acc-if)#commit Commit the candidate configuration to the running
configuration
(config-nvo-acc-if)#exit Exit from VXLAN access-interface mode and enter into
configuration mode
(config)#exit Exit from configuration mode
VTEP2
(Multi-homed group1) - Part of both Multi-homed with po1(MH1).
OSPF configuration:
BGP configuration:
(config-router-af)#neighbor 1.1.1.1 activate Activate 1.1.1.1(VTEP1) into l2vpn evpn address family mode
(config-router-af)#neighbor 4.4.4.4 activate Activate 4.4.4.4(VTEP4) into l2vpn evpn address family mode
(config-router-af)#neighbor 5.5.5.5 activate Activate 5.5.5.5(VTEP5) into l2vpn evpn address family mode
(config-router-af)#exit-address-family Exit from l2vpn address family mode
(config-router)#exit Exit from Router BGP mode and enter into config mode
VRF Configuration:
(config)#mac vrf L2VRF1 Create mac routing/forwarding instance with L2VRF1 name
and enter into vrf mode
(config-vrf)#rd 2.2.2.2:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from vrf mode
(config)#mac vrf L2VRF2 Create mac routing/forwarding instance with L2VRF2 name
and enter into vrf mode
(config-vrf)#rd 2.2.2.2:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from vrf mode
VXLAN configuration:
VTEP4
Single Home -SH5.
OSPF configuration:
BGP configuration:
VRF Configuration:
(config)#mac vrf L2VRF1 Create mac routing/forwarding instance with L2VRF1 name
and enter into vrf mode
(config-vrf)#rd 4.4.4.4:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from vrf mode
(config)#mac vrf L2VRF2 Create mac routing/forwarding instance with L2VRF2 name
and enter into vrf mode
(config-vrf)#rd 4.4.4.4:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from vrf mode
VXLAN configuration:
VTEP5
Single Home -SH3
OSPF configuration:
BGP configuration:
(config-router)#address-family l2vpn evpn Enter into l2vpn EVPN address family mode
(config-router-af)#neighbor 1.1.1.1 activate Activate 1.1.1.1(VTEP1) into l2vpn evpn address family mode
(config-router-af)#neighbor 2.2.2.2 activate Activate 2.2.2.2(VTEP2) into l2vpn evpn address family mode
(config-router-af)#neighbor 4.4.4.4 activate Activate 4.4.4.4(VTEP4) into l2vpn evpn address family mode
(config-router-af)#exit-address-family Exit from l2vpn address family mode
(config-router)#exit Exit from Router BGP mode and enter into config mode
VRF Configuration:
(config)#mac vrf L2VRF1 Create mac routing/forwarding instance with L2VRF1 name
and enter into vrf mode
(config-vrf)#rd 5.5.5.5:11 Assign RD value
(config-vrf)#description MAC VRF RED Give description to L2VRF1 as RED
(config-vrf)#route-target both 9.9.9.9:100 Assign route-target value for same for import and export.
Should be same on all node for L2VRF1
(config-vrf)#exit Exit from vrf mode
(config)#mac vrf L2VRF2 Create mac routing/forwarding instance with L2VRF2 name
and enter into vrf mode
(config-vrf)#rd 5.5.5.5:21 Assign RD value
(config-vrf)#route-target both Assign route-target value for same for import and export
90.90.90.90:100
(config-vrf)#description MAC VRF BLUE Give description to L2VRF2 as BLUE
(config-vrf)#exit Exit from vrf mode
VXLAN configuration:
Switch1 (MH2)
Multihomed to 2-VTEPs (VTEP1 and VTEP2). It acts as Tenant system for vlan1.20.
Spine-P3
Spine node where all VTEPs are connected.
Generic configuration:
OSPF configuration:
Centralized Gateway
In Centralized gateway approach, when two TS belonging to two different subnets connected to the same/different
VTEP node, wanted to communicate with each other, their traffic needed to be back hauled from the VTEP node to the
centralized gateway node where inter- subnet switching is performed and then back to the VTEP node.
VTEP1
(config)#qos profile cos-to-queue COS_QUEUE Create QoS profile for mapping traffic towards tunnel from
access-if
(config-ingress-cos-map)#cos 1 queue 5 Configure particular COS value to queue value for the profile
(config-ingress-cos-map)#exit Exit from qos profile mode
(config)#qos profile queue-color-to-dscp Create QoS profile for attaching in vxlan tunnel egress
QUEUE_DSCP
(config-egress-dscp-map)#queue 5 dscp 34 Configure queue value to DSCP value for the profile
(config)#nvo vxlan tunnel qos-map-mode cos- Map the configured QoS profile to vxlan tunnel egress
dscp egress QUEUE_DSCP
(config)#nvo vxlan access-if port-vlan po1 Enter into vxlan access port mode
20
(config-nvo-acc-if)#map qos-profile cos-to- Map the qos profile in vxlan access-if
queue COS_QUEUE
(config-nvo-acc-if)#commit Commit the candidate configuration to the running
configuration
(config-nvo-acc-if)#end Exit from vxlan access port
VTEP2
(config)#qos profile cos-to-queue COS_QUEUE Create QoS profile for mapping traffic towards tunnel from
access-if
(config-ingress-cos-map)#cos 1 queue 5 Configure particular COS value to queue value for the profile
(config-ingress-cos-map)#exit Exit from qos profile mode
(config)#qos profile queue-color-to-dscp Create QoS profile for attaching in vxlan tunnel egress
QUEUE_DSCP
(config-egress-dscp-map)#queue 5 dscp 34 Configure queue value to DSCP value for the profile
(config)#nvo vxlan tunnel qos-map-mode cos- Map the configured QoS profile to vxlan tunnel egress
dscp egress QUEUE_DSCP
(config)#nvo vxlan access-if port-vlan po1 Enter into vxlan access port mode
20
(config-nvo-acc-if)#map qos-profile cos-to- Map the qos profile in vxlan access-if
queue COS_QUEUE
(config-nvo-acc-if)#commit Commit the candidate configuration to the running
configuration
(config-nvo-acc-if)#end Exit from vxlan access port
VTEP4
VTEP5
(config)#qos profile queue-color-to-cos Create QoS profile for remark the queue value to COS value
QUEUE_COS
(config-egress-cos-map)#queue 2 cos 5 Configure particular queue value to COS value for the profile
(config-ingress-cos-map)#exit Exit from qos profile mode
(config)# qos profile dscp-to-queue Create QoS profile for attaching in vxlan tunnel ingress
DSCP_QUEUE
(config-ingress-dscp-map)#dscp 56 queue 2 Configure DSCP value to queue value for the profile
(config)#nvo vxlan tunnel qos-map-mode cos- Map the configured QoS profile to vxlan tunnel ingress
dscp ingress DSCP_QUEUE
(config)#nvo vxlan access-if port-vlan xe1 Enter into vxlan access port mode
10
(config-nvo-acc-if)#map qos-profile queue- Map the qos profile in vxlan access-if
color-to-cos QUEUE_COS
(config-nvo-acc-if)#commit Commit the candidate configuration to the running
configuration
(config-nvo-acc-if)#end Exit from vxlan access port
Validation
Send traffic from TS2-21 to MH2 access-if with dscp value 20 and COS value 1(vlan20) and verify traffic reaceived at
TS1-11 with dscp value 32 and COS value 5(vlan10) at the VTEP5 access-if.
VTEP1
VTEP1#show running-config qos
qos enable
!
qos profile cos-to-queue COS_QUEUE
cos 1 queue 5
!
qos profile queue-color-to-dscp QUEUE_DSCP
queue 5 color all dscp 34
!
!
!
VTEP1#show running-config nvo vxlan
!
nvo vxlan enable
!
Detailed mapping:
----------------+-------- | ----------------+-------- | ----------------+--------
INPUT | OUTPUT | INPUT | OUTPUT | INPUT | OUTPUT
----------------+-------- | ----------------+-------- | ----------------+--------
Queue | Color | DSCP | Queue | Color | DSCP | Queue | Color | DSCP
-------+--------+-------- | -------+--------+-------- | -------+--------+--------
0 green 0 | 0 yellow 0 | 0 red 0
1 green 10 | 1 yellow 12 | 1 red 14
2 green 18 | 2 yellow 20 | 2 red 22
3 green 26 | 3 yellow 28 | 3 red 30
4 green 34 | 4 yellow 36 | 4 red 38
5 green 34 | 5 yellow 34 | 5 red 34
6 green 48 | 6 yellow 48 | 6 red 48
7 green 56 | 7 yellow 56 | 7 red 56
VTEP4
VTEP4#show running-config qos
qos enable
!
qos profile dscp-to-queue DSCP_QUEUE
dscp 20 queue 1
!
!
!
interface irb2001
qos map-profile dscp-to-queue DSCP_QUEUE
!
VTEP4#show running-config nvo vxlan
!
nvo vxlan enable
!
nvo vxlan irb
!
evpn vxlan multihoming enable
!
nvo vxlan vtep-ip-global 4.4.4.4
!
nvo vxlan id 101 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF1
evpn irb1001
vni-name VNI-101
!
nvo vxlan id 201 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF2
evpn irb2001
vni-name VNI-201
!
nvo vxlan access-if port-vlan xe3 20
map vnid 201
mac 0000.5555.1020 ip 21.21.21.101
!
!
VTEP4#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
4.4.4.4 2.2.2.2 Installed 00:08:40 00:08:40
4.4.4.4 1.1.1.1 Installed 00:12:28 00:12:28
4.4.4.4 5.5.5.5 Installed 00:12:13 00:12:13
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
___
q3 (E) 125304832 0 0 0 0
q4 (E) 125304832 0 0 0 0
q5 (E) 125304832 0 0 0 0
q6 (E) 125304832 0 0 0 0
q7 (E) 125304832 0 0 0 0
VTEP4#show qos-profile DSCP_QUEUE
profile name: DSCP_QUEUE
profile type: dscp-to-queue
profile attached to 1 instances
configured mapping:
dscp 20 queue 1
Detailed mapping:
-------+--------------------------- | -------+--------------------------- | -------+--------------------------- | -------+-
--------------------------
INPUT | OUTPUT | INPUT | OUTPUT | INPUT | OUTPUT | INPUT |
OUTPUT
-------+--------------------------- | -------+--------------------------- | -------+--------------------------- | -------+-
--------------------------
DSCP | Queue | Color | Out DSCP | DSCP | Queue | Color | Out DSCP | DSCP | Queue | Color | Out DSCP | DSCP |
Queue | Color | Out DSCP
-------+-------+--------+---------- | -------+-------+--------+---------- | -------+-------+--------+---------- | -------+-
------+--------+----------
0 0 green 0 | 16 2 green 16 | 32 4 green 32 | 48 6
green 48
1 0 green 1 | 17 2 green 17 | 33 4 green 33 | 49 6
green 49
2 0 green 2 | 18 2 green 18 | 34 4 green 34 | 50 6
green 50
3 0 green 3 | 19 2 green 19 | 35 4 green 35 | 51 6
green 51
4 0 green 4 | 20 1 yellow 20 | 36 4 yellow 36 | 52 6
green 52
5 0 green 5 | 21 2 green 21 | 37 4 green 37 | 53 6
green 53
6 0 green 6 | 22 2 yellow 22 | 38 4 yellow 38 | 54 6
green 54
7 0 green 7 | 23 2 green 23 | 39 4 green 39 | 55 6
green 55
8 1 green 8 | 24 3 green 24 | 40 5 green 40 | 56 7
green 56
9 1 green 9 | 25 3 green 25 | 41 5 green 41 | 57 7
green 57
10 1 green 10 | 26 3 green 26 | 42 5 green 42 | 58 7
green 58
11 1 green 11 | 27 3 green 27 | 43 5 green 43 | 59 7
green 59
12 1 yellow 12 | 28 3 yellow 28 | 44 5 green 44 | 60 7
green 60
13 1 green 13 | 29 3 green 29 | 45 5 green 45 | 61 7
green 61
14 1 yellow 14 | 30 3 yellow 30 | 46 5 green 46 | 62 7
green 62
15 1 green 15 | 31 3 green 31 | 47 5 green 47 | 63 7
green 63
VTEP5
VTEP5#show running-config qos
qos enable
!
qos profile queue-color-to-cos QUEUE_COS
queue 2 color all cos 5
!
qos profile dscp-to-queue DSCP_QUEUE
dscp 56 queue 2
!
!
!
VTEP5#show running-config nvo vxlan
!
nvo vxlan enable
!
evpn vxlan multihoming enable
!
nvo vxlan vtep-ip-global 5.5.5.5
!
nvo vxlan tunnel qos-map-mode cos-dscp ingress DSCP_QUEUE
!
nvo vxlan id 101 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF1
vni-name VNI-101
!
nvo vxlan id 201 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF2
vni-name VNI-201
!
nvo vxlan access-if port-vlan xe1 10
map vnid 101
mac 0000.4444.1010 ip 11.11.11.201
map qos-profile queue-color-to-cos QUEUE_COS
!
!
VTEP5#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
5.5.5.5 2.2.2.2 Installed 01:11:17 01:11:17
5.5.5.5 4.4.4.4 Installed 01:14:50 01:14:50
5.5.5.5 1.1.1.1 Installed 01:14:50 01:14:50
q1 (E) 12517376 0 0 0 0
q2 (E) 12517376 1005800 1052066800 0 0
q3 (E) 12517376 0 0 0 0
q4 (E) 12517376 0 0 0 0
q5 (E) 12517376 0 0 0 0
q6 (E) 12517376 0 0 0 0
q7 (E) 12517376 0 0 0 0
VTEP5#sh qos-profile QUEUE_COS
profile name: QUEUE_COS
profile type: queue-color-to-cos
profile attached to 1 instances
configured mapping:
queue 2 color all cos 5
Detailed mapping:
----------------+-------- | ----------------+-------- | ----------------+--------
INPUT | OUTPUT | INPUT | OUTPUT | INPUT | OUTPUT
----------------+-------- | ----------------+-------- | ----------------+--------
Queue | Color | COS | Queue | Color | COS | Queue | Color | COS
-------+--------+-------- | -------+--------+-------- | -------+--------+--------
0 green 0 | 0 yellow 0 | 0 red 0
1 green 1 | 1 yellow 1 | 1 red 1
2 green 5 | 2 yellow 5 | 2 red 5
3 green 3 | 3 yellow 3 | 3 red 3
4 green 4 | 4 yellow 4 | 4 red 4
5 green 5 | 5 yellow 5 | 5 red 5
6 green 6 | 6 yellow 6 | 6 red 6
7 green 7 | 7 yellow 7 | 7 red 7
Anycast Gateway
For today's large multi-tenant data center, centralized L3 gateway scheme is very inefficient and sometimes
impractical. In order to overcome the drawback of centralized L3GW approach, anycast mode is used.
In Anycast gateway approach, all the VTEPs acts as default gateway for all the VNIDs. We will configure same anycast
mac in all VTEPs.
VTEP1
VTEP2
VTEP4
VTEP5
Validations
Send traffic from TS2-21 to MH2 access-if with dscp value 20 and COS value 1(vlan20) and verify traffic received at
TS1-11 with dscp value 20 and COS value 6(vlan10) at the VTEP5 access-if.
VTEP1
VTEP1#show running-config qos
qos enable
!
qos profile dscp-to-queue DSCP_QUEUE
dscp 20 queue 4
!
!
!
!
interface irb2001
qos map-profile dscp-to-queue DSCP_QUEUE
!
VTEP1#show running-config nvo vxlan
!
nvo vxlan enable
!
nvo vxlan irb
!
evpn vxlan multihoming enable
!
evpn irb-forwarding anycast-gateway-mac 0000.0000.1111
!
nvo vxlan vtep-ip-global 1.1.1.1
!
nvo vxlan id 101 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF1
evpn irb1001
vni-name VNI-101
!
nvo vxlan id 201 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF2
evpn irb2001
vni-name VNI-201
!
nvo vxlan access-if port-vlan po1 10
map vnid 101
mac 0000.2222.1010 ip 11.11.11.51
!
nvo vxlan access-if port-vlan po1 20
map vnid 201
mac 0000.2222.1020 ip 21.21.21.51
!
!
VTEP1#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
1.1.1.1 5.5.5.5 Installed 01:15:13 01:15:13
1.1.1.1 4.4.4.4 Installed 01:15:28 01:15:28
1.1.1.1 2.2.2.2 Installed 01:11:40 01:11:40
VTEP2
!
interface irb2001
qos map-profile dscp-to-queue DSCP_QUEUE
!
VTEP2#show running-config nvo vxlan
!
nvo vxlan enable
!
nvo vxlan irb
!
evpn esi hold-time 90
!
evpn vxlan multihoming enable
!
evpn irb-forwarding anycast-gateway-mac 0000.0000.1111
!
nvo vxlan vtep-ip-global 2.2.2.2
!
nvo vxlan id 101 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF1
evpn irb1001
vni-name VNI-101
!
nvo vxlan id 201 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF2
evpn irb2001
vni-name VNI-201
!
nvo vxlan access-if port-vlan po1 10
map vnid 101
mac 0000.2222.1010 ip 11.11.11.51
!
nvo vxlan access-if port-vlan po1 20
map vnid 201
mac 0000.2222.1020 ip 21.21.21.51
!
!
VTEP2#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
2.2.2.2 4.4.4.4 Installed 01:13:43 01:13:43
2.2.2.2 1.1.1.1 Installed 01:13:43 01:13:43
2.2.2.2 5.5.5.5 Installed 01:13:43 01:13:43
AC - Access Port
(u) - Untagged
VTEP4
VTEP4#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
4.4.4.4 2.2.2.2 Installed 01:14:47 01:14:47
4.4.4.4 1.1.1.1 Installed 01:18:35 01:18:35
4.4.4.4 5.5.5.5 Installed 01:18:20 01:18:20
* - candidate default
VTEP5
VTEP5#show running-config qos
qos enable
!
qos profile queue-color-to-cos QUEUE_COS
queue 2 color all cos 6
!
qos profile dscp-to-queue DSCP_QUEUE
dscp 34 queue 2
!
!
!
VTEP5#show running-config nvo vxlan
!
nvo vxlan enable
!
nvo vxlan irb
!
evpn vxlan multihoming enable
!
evpn irb-forwarding anycast-gateway-mac 0000.0000.1111
!
nvo vxlan vtep-ip-global 5.5.5.5
!
nvo vxlan tunnel qos-map-mode cos-dscp ingress DSCP_QUEUE
!
nvo vxlan id 101 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF1
evpn irb1001
vni-name VNI-101
!
nvo vxlan id 201 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF2
evpn irb2001
vni-name VNI-201
!
nvo vxlan access-if port-vlan xe1 10
map vnid 101
mac 0000.4444.1010 ip 11.11.11.201
map qos-profile queue-color-to-cos QUEUE_COS
!
!
VTEP5#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
5.5.5.5 2.2.2.2 Installed 01:11:17 01:11:17
5.5.5.5 4.4.4.4 Installed 01:14:50 01:14:50
5.5.5.5 1.1.1.1 Installed 01:14:50 01:14:50
Distributed Gateway
In distributed gateway approach, VTEP will act as default gateways for one or more VNIDs,
Each VTEP having its own default gateway IP and MAC configuration for a given VNID.
VTEP4
Unconfigure vnid 101 from nvo vxlan.
(config)#qos remark dscp Enable qos dscp remark for dscp-to-dscp mapping if required
(config)#qos profile dscp-to-queue Configure qos profile to remark at vxlan ingress tunnel. Here
DSCP_QUEUE dscp to <queue, dscp> is not applicable. I.e ingress remarking
of dscp at the ingress tunnel is not applicable.
(config-ingress-dscp-map)#dscp 56 queue 6 Configure particular outer dscp value to queue value. Here
classification at the ingress vtep is based on overlay dscp
value
(config-ingress-dscp-map)#exit Exit from qos profile config mode
(config-egress-dscp-map)#dscp 20 dscp 32 Configure particular dscp value to dscp value
(config-egress-dscp-map)#exit Exit from qos profile config mode
(config)#qos profile queue-color-to-cos Configure qos profile for remark at vxlan access-if
QUEUE_COS
(config-egress-cos-map)#queue 6 cos 2 Configure particular queue value to COS value
(config-egress-cos-map)#exit Exit from qos profile config mode
(config)#nvo vxlan tunnel qos-map-mode cos- Map the qos profile to vxlan tunnel ingress
dscp ingress DSCP_QUEUE
(config)#nvo vxlan access-if port-vlan xe3 Enter vxlan access-if mode
20
(config-nvo-acc-if)#map qos-profile queue- Map qos profile
color-to-cos QUEUE_COS
(config-nvo-acc-if)#commit Commit the candidate configuration to the running
configuration
(config-nvo-acc-if)#end Exit from global configuration mode
VTEP5
Unconfigure vnid 201 from nvo vxlan.
Validations
Send traffic from TS1-11 to VTEP5 access-if with dscp value 20 COS value 1(vlan10) and verify traffic received at TS2-
21 with dscp value 32 and COS value 2(vlan20) at the VTEP4 access-if.
VTEP5
VTEP5#show running-config qos
qos enable
!
qos profile dscp-to-queue DSCP_QUEUE
dscp 20 queue 4
!
!
!
!
interface irb1001
qos map-profile dscp-to-queue DSCP_QUEUE
!
VTEP5#show run nvo vxlan
!
nvo vxlan enable
!
nvo vxlan irb
!
evpn vxlan multihoming enable
!
4 0 green 4 | 20 4 yellow 20 | 36 4
yellow 36 | 52 6 green 52
5 0 green 5 | 21 2 green 21 | 37 4
green 37 | 53 6 green 53
6 0 green 6 | 22 2 yellow 22 | 38 4
yellow 38 | 54 6 green 54
7 0 green 7 | 23 2 green 23 | 39 4
green 39 | 55 6 green 55
8 1 green 8 | 24 3 green 24 | 40 5
green 40 | 56 7 green 56
9 1 green 9 | 25 3 green 25 | 41 5
green 41 | 57 7 green 57
10 1 green 10 | 26 3 green 26 | 42 5
green 42 | 58 7 green 58
11 1 green 11 | 27 3 green 27 | 43 5
green 43 | 59 7 green 59
12 1 yellow 12 | 28 3 yellow 28 | 44 5
green 44 | 60 7 green 60
13 1 green 13 | 29 3 green 29 | 45 5
green 45 | 61 7 green 61
14 1 yellow 14 | 30 3 yellow 30 | 46 5
green 46 | 62 7 green 62
15 1 green 15 | 31 3 green 31 | 47 5
green 47 | 63 7 green 63
8 1 green 8 | 24 3 green 24 | 40 5
green 40 | 56 7 green 56
9 1 green 9 | 25 3 green 25 | 41 5
green 41 | 57 7 green 57
10 1 green 10 | 26 3 green 26 | 42 5
green 42 | 58 7 green 58
11 1 green 11 | 27 3 green 27 | 43 5
green 43 | 59 7 green 59
12 1 yellow 12 | 28 3 yellow 28 | 44 5
green 44 | 60 7 green 60
13 1 green 13 | 29 3 green 29 | 45 5
green 45 | 61 7 green 61
14 1 yellow 14 | 30 3 yellow 30 | 46 5
green 46 | 62 7 green 62
15 1 green 15 | 31 3 green 31 | 47 5
green 47 | 63 7 green 63
VTEP4
VTEP4#show run qos
qos enable
qos remark dscp
!
!
qos profile queue-color-to-cos QUEUE_COS
queue 6 color all cos 2
!
qos profile dscp-to-queue DSCP_QUEUE
dscp 56 queue 6
!
!
!
!
VTEP4#show run nvo vxlan
!
nvo vxlan enable
!
nvo vxlan irb
!
evpn vxlan multihoming enable
!
nvo vxlan vtep-ip-global 4.4.4.4
!
nvo vxlan tunnel qos-map-mode cos-dscp ingress DSCP_QUEUE
!
nvo vxlan id 101 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF1
vni-name VNI-101
!
nvo vxlan id 201 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp L2VRF2
evpn irb2001
vni-name VNI-201
!
nvo vxlan access-if port-vlan xe3 20
map vnid 201
mac 0000.5555.1020 ip 21.21.21.101
map qos-profile queue-color-to-cos QUEUE_COS
!
!
VTEP4#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
============================================================================
4.4.4.4 2.2.2.2 Installed 00:28:32 00:28:32
4.4.4.4 1.1.1.1 Installed 00:28:38 00:28:38
4.4.4.4 5.5.5.5 Installed 00:28:31 00:28:31
1 0 green 1 | 17 2 green 17 | 33 4
green 33 | 49 6 green 49
2 0 green 2 | 18 2 green 18 | 34 4
green 34 | 50 6 green 50
3 0 green 3 | 19 2 green 19 | 35 4
green 35 | 51 6 green 51
4 0 green 4 | 20 2 yellow 20 | 36 4
yellow 36 | 52 6 green 52
5 0 green 5 | 21 2 green 21 | 37 4
green 37 | 53 6 green 53
6 0 green 6 | 22 2 yellow 22 | 38 4
yellow 38 | 54 6 green 54
7 0 green 7 | 23 2 green 23 | 39 4
green 39 | 55 6 green 55
8 1 green 8 | 24 3 green 24 | 40 5
green 40 | 56 7 green 56
9 1 green 9 | 25 3 green 25 | 41 5
green 41 | 57 7 green 57
10 1 green 10 | 26 3 green 26 | 42 5
green 42 | 58 7 green 58
11 1 green 11 | 27 3 green 27 | 43 5
green 43 | 59 7 green 59
12 1 yellow 12 | 28 3 yellow 28 | 44 5
green 44 | 60 7 green 60
13 1 green 13 | 29 3 green 29 | 45 5
green 45 | 61 7 green 61
14 1 yellow 14 | 30 3 yellow 30 | 46 5
green 46 | 62 7 green 62
15 1 green 15 | 31 3 green 31 | 47 5
green 47 | 63 7 green 63
Overview
Single Home Virtual Extensible LAN (VxLAN) with Integrated Routing (IRB) using Open Shortest Path First (OSPF)
and Intermediate System to Intermediate System (ISIS) protocols provides the solution for connecting and managing
virtual networks within a data center or network infrastructure.
This feature offers a solution for networks where the interconnection of VLANs is required. These protocols can be
configured on IRB interfaces within layer 3 switches or routers. This configuration enables dynamic routing, facilitating
the exchange of routing information with other devices in the network. By assigning IP addresses to the IRB interfaces,
they serve as the default gateways for devices within the respective VLANs.
Both OSPF and ISIS routing updates are dynamically exchanged over IRB interfaces, ensuring up-to-date routing
tables and optimized traffic routing across different VLANs and networks.
This feature offers flexibility in configuring network topologies, and ensures compatibility and interoperability within
diverse network environments.
Feature Characteristics
The OSPF and ISIS support over the IRB Interface feature has the following characteristics:
• Enables the control of Receive (RX)/ Transmit (TX) of OSPF and ISIS packets on IRB interfaces, providing
effective management of IRB interfaces interactions with OSPF and ISIS for optimized network communication
and routing.
• IRB interfaces process configured MTU size packets.
• Maintains consistency in CLI commands with SVI interfaces for OSPF and ISIS configurations, simplifying
network management tasks.
Benefits
The OSPF and ISIS support over the IRB Interface has the following benefits:
• Enables seamless inter-subnet communication across different VNIDs and subnets within the same customer
network.
• Promotes seamless connectivity between devices, irrespective of whether they are connected through IRB or
SVI interfaces, and simplifies network management.
• The network gains greater adaptability to various scenarios and evolving requirements, offering greater
versatility in its operations.
Prerequisites
• Router must be up and running.
• Maintain synchronization with VRF changes by performing IRB shut/no shut actions when specific events
occur within the IPVRF. These events may involve adding or removing Route Targets (RTs), updating Route
Distinguishers (RDs), or modifying Layer 3 Virtual Network Identifiers (L3VNIs).
Configuration
Perform the following configurations to set up different interfaces, routing protocols, and BGP parameters to enable
VXLAN, IRB, and EVPN functionality in the network.
Configure OSPF
PE1
PE1(config)#router ospf 1 Enters the OSPF configuration mode for OSPF process 1.
PE1(config-router)# ospf router-id 1.1.1.1 Sets the OSPF router ID to 1.1.1.1 for OSPF process 1.
PE1(config-router)# network 1.1.1.1/32 area Advertises the network 1.1.1.1/32 into OSPF area 0.0.0.0.
0.0.0.0
PE1(config-router)# network 10.1.1.0/24 area Advertises the network 10.1.1.0/24 into OSPF area 0.0.0.0.
0.0.0.0
PE1(config)#nvo vxlan enable Enables the VXLAN feature on the device.
PE1(config)#nvo vxlan irb Enables VXLAN IRB functionality.
PE1(config-vrf)#mac vrf L2VRF1 Configures a MAC VRF named L2VRF1.
PE1(config-vrf)# rd 1.1.1.1:11 Sets the Route Distinguisher (RD) to 1.1.1.1:11 for the VRF.
PE1(config-vrf)# route-target both Configures both import and export route targets for the VRF.
9.9.9.9:100
PE1(config-vrf)#ip vrf L3VRF1 Configures an IP VRF named L3VRF1.
PE1(config-vrf)# rd 51000:11 Sets the RD value to 51000:11 for the L3VRF1.
PE1(config-vrf)# route-target both 100:100 Configures both import and export route targets for L3VRF1.
PE1(config-vrf)# l3vni 1000 Configures the L3 Virtual Network Identifier (L3VNI) with the
value 1000.
PE1(config)#interface irb1001 Configures the IRB interface for L3VRF1.
PE1(config-irb-if)# ip vrf forwarding L3VRF1 Assigns the L3VRF1 to the IRB interface.
PE1(config-irb-if)# ip address 11.11.11.1/24 Assigns an IP address 11.11.11.1/24 to the IRB interface.
PE1(config-irb)#interface irb2001 Configures the IRB interface for IPv6 in L3VRF1.
PE1(config-irb-if)# ip vrf forwarding L3VRF1 Assigns the L3VRF1 to the IPv6 IRB interface.
PE1(config-irb-if)# ipv6 address 2001::1/64 Assigns an IP address 11.11.11.1/24 to the IRB interface.
PE1(config-irb-if)#mtu 9000 Sets the Maximum Transmission Unit (MTU) for this IRB
interface to 9000 bytes.
PE1(config-router)#router ospf 2 L3VRF1 Configures OSPF on the L3VRF1.
PE1(config-router)# network 11.11.11.0/24 Advertises the network 11.11.11.0/24 into OSPF area 0.0.0.0.
area 0.0.0.0
PE1(config-router)#router ipv6 vrf ospf Configures OSPFv3 on the L3VRF1.
L3VRF1
PE1(config-router)# router-id 1.1.1.1 Configures the router ID as 1.1.1.1.
PE1(config-irb)#interface irb2001 Configures the IPv6 IRB interface.
PE1(config-irb-if)# ipv6 router ospf area Attaches the OSPFv3 instance ID to the IPv6 IRB interface.
0.0.0.0 tag L3VRF1 instance-id 0
PE1(config)#nvo vxlan vtep-ip-global 1.1.1.1 Configures the global VTEP IP address as 1.1.1.1.
PE1(config)#nvo vxlan id 101 ingress- Configures the VXLAN ID as 101 for ingress replication.
replication
PE1(config-nvo)# vxlan host-reachability- Maps the EVPN-BGP host reachability protocol to L2VRF1.
protocol evpn-bgp L2VRF1
PE1(config-nvo)# evpn irb1001 Maps the IRB interface 1001 to EVPN.
PE1(config-nvo)# vni-name VNI-101 Configures the VNI name as VNI-101.
PE1(config)#nvo vxlan id 2001 ingress- Configures the VXLAN ID as 2001 for ingress replication.
replication
PE1(config-nvo)# vxlan host-reachability- Maps the EVPN-BGP host reachability protocol to L2VRF1.
protocol evpn-bgp L2VRF1
PE5
PE3
PE3(config-vrf)# l3vni 1000 Configures a L3VNI with the ID 1000 for the VRF.
PE3(config)#interface irb1001 Configures the IRB interface with the ID 1001.
PE3(config-irb-if)# ip vrf forwarding L3VRF1 Associates the IRB interface with the L3VRF1, ensuring that
traffic from this interface is isolated within that VRF.
PE3(config-irb-if)# ip address 12.12.12.1/24 Assigns an IP address 12.12.12.1 with a subnet mask of /24 to
the IRB interface, enabling it for L3 routing.
PE3(config-irb-if)# mtu 1500 Configures the MTU for the interface irb1001 to 1500 bytes.
PE3(config)#interface irb2001 Configures another IRB interface with the ID 2001.
PE3(config-irb-if)# ip vrf forwarding L3VRF1 Associates the IRB interface with the L3VRF1.
PE3(config-irb-if)# ipv6 address 2002::1/64 Assigns an IPv6 address 2002::1 with a subnet mask of /64 to
the IRB interface, enabling it for IPv6 routing.
PE3(config-irb-if)# mtu 1500 Configures the MTU for the interface irb2001 to 1500 bytes.
PE3(config-router)#router ospf 2 L3VRF1 Configures the OSPF routing process on OSPF instance 2 for
the L3VRF1.
PE3(config-router)# network 12.12.12.0/24 Advertises the network 12.12.12.0/24 to OSPF area 0.0.0.0.
area 0.0.0.0
PE3(config-router)#router ipv6 vrf ospf Configures the OSPFv3 routing process on OSPFv3 instance
L3VRF1 for the L3VRF1.
PE3(config-router)# router-id 4.4.4.4 Sets the router ID for the OSPF/OSPFv3 instances to 4.4.4.4.
PE3(config)#nvo vxlan vtep-ip-global 4.4.4.4 Configures the global VTEP IP address as 4.4.4.4 for VXLAN.
PE3(config)#nvo vxlan id 102 ingress- Configures the VXLAN with VNI ID 102 for ingress replication.
replication
PE3(config-nvo)# vxlan host-reachability- Maps the VXLAN configuration with the EVPN-BGP protocol
protocol evpn-bgp L2VRF1 and associates it with the L2VRF1.
PE3(config-nvo)# evpn irb1001 Maps the IRB interface irb1001 to the VXLAN.
PE3(config-nvo)# vni-name VNI-101 Configures the VNI name as VNI-101.
PE3(config)#nvo vxlan id 2002 ingress- Configures another VXLAN with VNI ID 2002 for ingress repli-
replication cation.
PE3(config-nvo)# vxlan host-reachability- Maps the VXLAN configuration with the EVPN-BGP protocol
protocol evpn-bgp L2VRF1 and associates it with the L2VRF1.
PE3(config-nvo)# evpn irb2001 Maps the IPv6 IRB interface irb2001 to the VXLAN.
PE3(config)#interface sa4 Configures interface sa4.
PE3(config-if)# switchport Configures the interface as a switchport.
PE3(config-if)# load-interval 30 Sets the load interval for the interface to 30 seconds.
PE3(config-if)# mtu 1500 Configures the MTU for the interface to 1500 bytes.
PE3(config)#interface xe1 Configures interface xe1.
PE3(config-if)# static-channel-group 4 Assigns a static channel group to interface xe1.
PE3(config)#nvo vxlan access-if port-vlan Configures a VxLAN nNVO on the interface xe2 with VLAN ID
sa4 100 100
PE3(config-nvo-acc-if)# map vnid 101 Maps VLAN 100 to the VxLAN VNID 101.
PE3(config-nvo-acc-if)#nvo vxlan access-if Configures another VxLAN NVO on the same interface xe2.
port-vlan sa4 2001
PE3(config-nvo-acc-if)# map vnid 2001 Maps VLAN 2001 to a different VxLAN VNID, in this case,
VNID 2001.
PE3(config-router)#router bgp 100 Configures the BGP with AS number 100.
PE3(config-router)# bgp router-id 4.4.4.4 Sets the BGP router ID to 4.4.4.4.
PE3(config-router)# neighbor 1.1.1.1 remote- Configures a BGP neighbor with the remote AS number 100
as 100 and the IP address 1.1.1.1.
PE3(config-router)# neighbor 1.1.1.1 update- Specifies the BGP neighbor to use the loopback interface as
source lo the source for updates.
PE3(config-router)# neighbor 1.1.1.1 Configures the advertisement interval for BGP neighbor
advertisement-interval 0 updates.
PE3(config-router)# address-family l2vpn Configures the BGP address family for Layer 2 VPN EVPN.
evpn
PE3(config-router-af)# neighbor 1.1.1.1 Activates the BGP neighbor for the specified address family.
activate
PE3(config-router-af)# exit-address-family Exits the BGP address family configuration.
PE3(config-router)# address-family ipv4 vrf Configures the BGP address family for IPv4 within VRF
L3VRF1 L3VRF1.
PE3(config-router-af)# redistribute Configures BGP to redistribute connected routes into the BGP
connected process.
PE3(config-router-af)# exit-address-family Exits the BGP address family configuration for IPv4.
PE3(config-router)# address-family ipv6 vrf Configures the BGP address family for IPv6 within VRF
L3VRF1 L3VRF1.
PE3(config-router-af)# redistribute Configures BGP to redistribute connected routes into the BGP
connected process.
PE3(config-router-af)# exit-address-family Exits the BGP address family configuration for IPv6.
PE6
Configure ISIS
PE2
PE2(config-vrf)# rd 2.2.2.2:11 Sets the route distinguisher (RD) for the VRF to 2.2.2.2:11.
PE2(config-vrf)#route-target both Specifies import and export route targets for the VRF.
10.10.10.10:100
PE2(config-vrf)#ip vrf L3VRF2 Enters the configuration mode for an IP VRF named L3VRF2.
PE2(config-vrf)#rd 61000:11 Sets the RD for the IP VRF to 61000:11
PE2(config-vrf)# route-target both 101:101 Specifies import and export route targets for the IP VRF.
PE2(config-vrf)# l3vni 2000 Configures the Layer 3 VNI (Virtual Network Identifier) for the
IP VRF.
PE2(config)#interface irb2001 Enters the configuration mode for interface IRB2001.
PE2(config-irb-if)# ip vrf forwarding L3VRF2 Associates the interface with the IP VRF L3VRF2.
PE2(config-irb-if)# ip address 13.13.13.1/24 Configures an IP address with a subnet mask of /24 on
IRB2001.
PE2(config-irb-if)#mtu 9000 Sets the Maximum Transmission Unit (MTU) for the interface
to 9000 bytes.
PE2(config-irb-if)#ip router isis 2 Associates the interface with ISIS routing process 2.
PE2(config-irb)#interface irb3001 Enters the configuration mode for interface IRB3001.
PE2(config-irb-if)# ip vrf forwarding L3VRF2 Associates the interface with the IP VRF L3VRF2.
PE2(config-irb-if)# ipv6 address 3001::1/64 Configures an IPv6 address on IRB3001 with the specified
prefix length.
PE2(config-irb-if)#mtu 9000 Sets the MTU for the interface to 9000 bytes.
PE2(config-irb)#ipv6 router isis 3 Associates the interface with IPv6 ISIS routing process 3.
PE2(config)#router isis 2 L3VRF2 Enters the configuration mode for ISIS routing process 2
within VRF L3VRF2.
PE2(config-router)#is-type level-1-2 Specifies the ISIS level type as level-1-2.
PE2(config-router)#metric-style wide Configures a wide metric style for ISIS.
PE2(config-router)# dynamic-hostname Enables dynamic hostname assignment for the ISIS router.
PE2(config-router)# bfd all-interfaces Enables Bidirectional Forwarding Detection (BFD) on all
interfaces within ISIS.
PE2(config-router)#net 49.0000.0000.0221.00 Configures the network entity title (NET) for the ISIS process.
PE2(config)#router isis 3 L3VRF2 Enters the configuration mode for ISIS routing process 3
within VRF L3VRF2.
PE2(config-router)#is-type level-1-2 Specifies the ISIS level type as level-1-2.
PE2(config-router)# metric-style wide Configures a wide metric style for ISIS.
PE2(config-router)# dynamic-hostname Enables dynamic hostname assignment for the ISIS router.
PE2(config-router)#bfd all-interfaces Enables BFD on all interfaces within ISIS.
PE2(config-router)# net 49.0000.0000.0222.00 Configures the network entity title (NET) for ISIS routing with
the specified value.
PE2(config)#nvo vxlan vtep-ip-global 2.2.2.2 Configures the global VxLAN VTEP IP address to 2.2.2.2.
PE2(config)#nvo vxlan id 201 ingress- Configures a VxLAN with VNI 201 and specifies ingress-
replication replication for multicast traffic handling.
PE2(config-nvo)# vxlan host-reachability- Specifies the EVPN-BGP host-reachability-protocol for the
protocol evpn-bgp L2VRF2 VxLAN with the VRF L2VRF2
PE2(config-nvo)# evpn irb2001 Enables EVPN IRB (Integrated Routing and Bridging) for
VxLAN interface IRB2001.
PE2(config-nvo)# vni-name VNI-201 Assigns a name VNI-201 to the VxLAN VNI 201.
PE2(config)#nvo vxlan id 3001 ingress- Configures another VxLAN with VNI 3001 and specifies
replication ingress-replicationr for multicast traffic handling.
PE2(config-nvo)# vxlan host-reachability- Specifies the EVPN-BGP host-reachability-protocol for the
protocol evpn-bgp L2VRF2 VxLAN with the VRF L2VRF2.
PE2(config-nvo)# evpn irb3001 Enables EVPN IRB for VxLAN interface IRB3001.
PE2(config-if)#interface xe11 Enters the configuration mode for the interface 11.
PE2(config-if)#switchport Configures the interface as a Layer 2 switchport.
PE2(config-if)#load-interval 30 Sets the interval for which interface statistics are collected to
30 seconds.
PE2(config)#nvo vxlan access-if port-vlan Configures a VxLAN network virtualization overlay (NVO) on
xe11 100 the interface xe2 with VLAN ID 100
PE2(config-nvo-acc-if)# map vnid 101 Maps VLAN 100 to the VxLAN Network Identifier (VNID) 101.
PE2(config-nvo-acc-if)#nvo vxlan access-if Configures another VxLAN NVO on the same interface xe2,
port-vlan xe11 2001 but this time with VLAN ID 2001
PE2(config-nvo-acc-if)# map vnid 101 Maps VLAN 100 to the VxLAN Network Identifier (VNID) 101.
PE2(config-nvo-acc-if)#nvo vxlan access-if Configures another VxLAN NVO on the same interface xe2,
port-vlan xe11 2001 but this time with VLAN ID 2001
PE2(config-nvo-acc-if)# map vnid 2001 Maps VLAN 2001 to a different VxLAN VNID.
PE2(config-if)#router isis 1 Starts the ISIS routing process with process ID 1.
PE2(config-if)#is-type level-1-2 Specifies that the router participates in both Level 1 and Level
2 routing.
PE2(config-if)#metric-style wide Configures the metric style to be wide, enabling more
flexibility in metric calculations.
PE2(config-if)#dynamic-hostname Enables the dynamic hostname feature for ISIS.
PE2(config-if)#bfd all-interfaces Configures Bidirectional Forwarding Detection on all
interfaces.
PE2(config-if)#net 49.0000.0000.0001.00 Specifies the network entity title (NET) for ISIS.
BGP Configuration
PE2(config)#router bgp 100 Starts the BGP routing process with an autonomous system
number (AS) of 100.
PE2(config-router)#bgp router-id 2.2.2.2 Sets the BGP router ID to 2.2.2.2.
PE2(config-router)#neighbor 3.3.3.3 remote- Configures a BGP neighbor with the IP address 3.3.3.3 and
as 100 specifies the remote AS number as 100.
PE2(config-router)#neighbor 3.3.3.3 update- Specifies that loopback interface (lo) is the source for BGP
source lo updates to the neighbor.
PE2(config-router)#neighbor 3.3.3.3 Sets the advertisement interval to 0, which means updates will
advertisement-interval 0 be sent immediately.
PE2(config-router)#address-family ipv4 Enters the configuration mode for the IPv4 unicast address
unicast family within the router configuration.
PE2(config-router-af)#network 2.2.2.2/32 Specifies that network 2.2.2.2 with a /32 subnet mask is part
of the IPv4 unicast address family.
PE2(config-router-af)#neighbor 3.3.3.3 Activates the neighbor with the IP address 3.3.3.3 for the IPv4
activate unicast address family.
PE2(config-router-af)#exit-address-family Exits the configuration mode for the IPv4 unicast address
family.
PE2(config-router)#address-family l2vpn evpn Enters the configuration mode for the L2VPN EVPN address
family within the router configuration.
PE2(config-router-af)#neighbor 3.3.3.3 Activates the neighbor with the IP address 3.3.3.3 for the
activate L2VPN EVPN address family.
PE2(config-router-af)#exit-address-family Exits the configuration mode for the L2VPN EVPN address
family.
PE2(config-router)#address-family ipv4 vrf Enters the configuration mode for the IPv4 address family
L3VRF2 within the VRF named L3VRF2.
PE2(config-router-af)#redistribute Configures the redistribution of directly connected routes into
connected the IPv4 address family for the specified VRF.
PE2(config-router-af)#exit-address-family Exits the configuration mode for the IPv4 address family within
the VRF L3VRF2.
PE2(config-router-af)#address-family ipv6 Enters the configuration mode for the IPv6 address family
vrf L3VRF2 within the VRF named L3VRF2.
PE2(config-router-af)#redistribute Configures the redistribution of directly connected routes into
connected the IPv6 address family for the specified VRF.
PE2(config-router-af)#exit-address-family Exits the configuration mode for the IPv6 address family within
the VRF L3VRF2.
PE5
PE5(config-if)#network 30.1.1.0/24 area Specifies another network, 30.1.1.0 with subnet mask
0.0.0.0 255.255.255.0, also belonging to OSPF area 0.0.0.0.
PE5(config-if)#network 70.1.1.0/24 area Specifies a third network, 70.1.1.0 with subnet mask
0.0.0.0 255.255.255.0, in OSPF area 0.0.0.0.
PE5(config-if)#router isis 1 Enters ISIS configuration mode with process ID 1.
PE5(config-if)#is-type level-1-2 Configures this ISIS router to support both Level 1 and Level
2 routing.
PE5(config-if)#metric-style wide Configures ISIS to use the wide metric style, which allows for
greater flexibility in metric values.
PE5(config-if)#dynamic-hostname Allows the hostname to be dynamically generated.
PE5(config-if)#bfd all-interfaces Enables Bidirectional Forwarding Detection on all interfaces.
PE5(config-if)#net 49.0000.0005.0001.00 Sets the NET for this router.
PE5(config-if)#exit Exits from the router mode.
PE 6
PE4
BGP Configuration
PE4(config)#router bgp 100 Starts the BGP routing process with an autonomous system
number (AS) of 100.
PE4(config-router)#bgp router-id 3.3.3.3 Sets the BGP router ID to 3.3.3.3
PE4(config-router)#neighbor 2.2.2.2 remote- Configures a BGP neighbor with the IP address 2.2.2.2 and
as 100 specifies the remote AS number as 100.
PE4(config-router)#neighbor 2.2.2.2 update- Specifies that loopback interface (lo) is the source for BGP
source lo updates to the neighbor.
PE4(config-router)#neighbor 2.2.2.2 Sets the advertisement interval to 0, which means updates will
advertisement-interval 0 be sent immediately.
PE4(config-router)#address-family ipv4 Enters the configuration mode for the IPv4 unicast address
unicast family within the router configuration.
PE4(config-router-af)#network 3.3.3.3/32 Specifies that network 3.3.3.3 with a /32 subnet mask is part
of the IPv4 unicast address family.
PE4(config-router-af)#neighbor 2.2.2.2 Activates the neighbor with the IP address 2.2.2.2 for the IPv4
activate unicast address family.
PE4(config-router-af)#exit-address-family Exits the configuration mode for the IPv4 unicast address
family.
PE4(config-router)#address-family l2vpn evpn Enters the configuration mode for the L2VPN EVPN address
family within the router configuration.
PE4(config-router-af)#neighbor 2.2.2.2 Activates the neighbor with the IP address 2.2.2.2 for the
activate L2VPN EVPN address family.
PE4(config-router-af)#exit-address-family Exits the configuration mode for the L2VPN EVPN address
family.
PE4(config-router)#address-family ipv4 vrf Enters the configuration mode for the IPv4 address family
L3VRF2 within the VRF named L3VRF2.
PE4(config-router-af)#redistribute Configures the redistribution of directly connected routes into
connected the IPv4 address family for the specified VRF.
PE4(config-router-af)#exit-address-family Exits the configuration mode for the IPv4 address family within
the VRF L3VRF2.
PE4(config-router-af)#address-family ipv6 Enters the configuration mode for the IPv6 address family
vrf L3VRF2 within the VRF named L3VRF2.
PE4(config-router-af)#redistribute Configures the redistribution of directly connected routes into
connected the IPv6 address family for the specified VRF.
PE4(config-router-af)#exit-address-family Exits the configuration mode for the IPv6 address family within
the VRF L3VRF2.
Implementation Examples
Scenario: Configure OSPF and ISIS protocols on an IRB interface with an assigned IP address.
Validation
OSPF Validation
PE1#show ip ospf neighbor
Total number of full neighbors: 1
OSPF process 1 VRF(default):
Neighbor ID Pri State Dead Time Address Interface
Instance ID
50.1.1.1 1 Full/DR 00:00:38 10.1.1.2 sa1
RD[7100:11]
*>i [5]:[0]:[0]:[24]:[16.16.16.0]:[0.0.0.0]:[1000]
7.7.7.7 0 100 0 i 7.7.7.7 VXLAN
*>i [5]:[0]:[0]:[64]:[7002::]:[::]:[1000]
7.7.7.7 0 100 0 i 7.7.7.7 VXLAN
RD[56000:11]
*>i [5]:[0]:[0]:[24]:[12.12.12.0]:[0.0.0.0]:[1000]
4.4.4.4 0 100 0 ? 4.4.4.4 VXLAN
*>i [5]:[0]:[0]:[64]:[2002::]:[::]:[1000]
4.4.4.4 0 100 0 ? 4.4.4.4 VXLAN
RD[1.1.1.1:11] VRF[L2VRF1]:
*> [2]:[0]:[101]:[48,0010:9400:0001]:[0]:[101]
1.1.1.1 0 100 32768 i --------- VXLAN
*> [2]:[0]:[101]:[48,0010:9400:0001]:[32,11.11.11.2]:[101]
1.1.1.1 0 100 32768 i --------- VXLAN
*> [2]:[0]:[101]:[48,9819:2ccd:9301]:[32,11.11.11.1]:[101]
1.1.1.1 0 100 32768 i --------- VXLAN
* i [2]:[0]:[102]:[48,0010:9400:0002]:[0]:[102]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i [2]:[0]:[102]:[48,0010:9400:0002]:[32,12.12.12.2]:[102]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i [2]:[0]:[102]:[48,5c07:5813:425e]:[32,12.12.12.1]:[102]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*> [2]:[0]:[2001]:[48,0010:9400:0009]:[0]:[2001]
1.1.1.1 0 100 32768 i --------- VXLAN
*> [2]:[0]:[2001]:[48,0010:9400:0009]:[128,2001::2][2001]
1.1.1.1 0 100 32768 i --------- VXLAN
*> [2]:[0]:[2001]:[48,9819:2ccd:9301]:[128,2001::1][2001]
1.1.1.1 0 100 32768 i --------- VXLAN
* i [2]:[0]:[2002]:[48,0010:9400:000a]:[0]:[2002]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i [2]:[0]:[2002]:[48,0010:9400:000a]:[128,2002::2][2002]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i [2]:[0]:[2002]:[48,5c07:5813:425e]:[128,2002::1][2002]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*> [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i --------- VXLAN
* i [3]:[102]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*> [3]:[2001]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i --------- VXLAN
* i [3]:[2002]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
RD[4.4.4.4:11]
*>i [2]:[0]:[102]:[48,0010:9400:0002]:[0]:[102]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[102]:[48,0010:9400:0002]:[32,12.12.12.2]:[102]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[102]:[48,5c07:5813:425e]:[32,12.12.12.1]:[102]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[2002]:[48,0010:9400:000a]:[0]:[2002]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[2002]:[48,0010:9400:000a]:[128,2002::2][2002]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [2]:[0]:[2002]:[48,5c07:5813:425e]:[128,2002::1][2002]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [3]:[102]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i [3]:[2002]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
l - labeled, S Stale
Origin codes: i - IGP, e - EGP, ? - incomplete
RD[51000:11]
*>i [5]:[0]:[0]:[24]:[11.11.11.0]:[0.0.0.0]:[1000]
1.1.1.1 0 100 0 ? 1.1.1.1 VXLAN
*>i [5]:[0]:[0]:[64]:[2001::]:[::]:[1000]
1.1.1.1 0 100 0 ? 1.1.1.1 VXLAN
RD[1.1.1.1:11]
*>i [2]:[0]:[101]:[48,0010:9400:0001]:[0]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[101]:[48,0010:9400:0001]:[32,11.11.11.2]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[101]:[48,9819:2ccd:9301]:[32,11.11.11.1]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[2001]:[48,0010:9400:0009]:[0]:[2001]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[2001]:[48,0010:9400:0009]:[128,2001::2][2001]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [2]:[0]:[2001]:[48,9819:2ccd:9301]:[128,2001::1][2001]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*>i [3]:[2001]:[32,1.1.1.1]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
RD[4.4.4.4:11] VRF[L2VRF1]:
* i [2]:[0]:[101]:[48,0010:9400:0001]:[0]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [2]:[0]:[101]:[48,0010:9400:0001]:[32,11.11.11.2]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
* i [2]:[0]:[101]:[48,9819:2ccd:9301]:[32,11.11.11.1]:[101]
1.1.1.1 0 100 0 i 1.1.1.1 VXLAN
*> [2]:[0]:[102]:[48,0010:9400:0002]:[0]:[102]
4.4.4.4 0 100 32768 i --------- VXLAN
*> [2]:[0]:[102]:[48,0010:9400:0002]:[32,12.12.12.2]:[102]
4.4.4.4 0 100 32768 i --------- VXLAN
*> [2]:[0]:[102]:[48,5c07:5813:425e]:[32,12.12.12.1]:[102]
4.4.4.4 0 100 32768 i ----------
VXLAN
* i [2]:[0]:[2001]:[48,0010:9400:0009]:[0]:[2001]
ISIS Validation
PE2#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
========================================================================
2.2.2.2 3.3.3.3 Installed 00:00:10 00:00:10
RD[63000:11]
*>i [5]:[0]:[0]:[24]:[14.14.14.0]:[0.0.0.0]:[2000]
3.3.3.3 0 100 0 ? 3.3.3.3 VXLAN
*>i [5]:[0]:[0]:[64]:[3002::]:[::]:[2000]
3.3.3.3 0 100 0 ? 3.3.3.3 VXLAN
RD[2.2.2.2:11] VRF[L2VRF2]:
*> [2]:[0]:[201]:[48,0010:9400:0003]:[0]:[201]
2.2.2.2 0 100 32768 i --------- VXLAN
*> [2]:[0]:[201]:[48,0010:9400:0003]:[32,13.13.13.2]:[201]
2.2.2.2 0 100 32768 i --------- VXLAN
* i [2]:[0]:[201]:[48,0010:9400:0005]:[0]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i [2]:[0]:[201]:[48,0010:9400:0005]:[32,14.14.14.2]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*> [2]:[0]:[201]:[48,e8c5:7a76:581d]:[32,13.13.13.1]:[201]
2.2.2.2 0 100 32768 i --------- VXLAN
* i [2]:[0]:[201]:[48,e8c5:7aa8:7cb3]:[32,14.14.14.1]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*> [2]:[0]:[3001]:[48,0010:9400:000c]:[0]:[3001]
2.2.2.2 0 100 32768 i --------- VXLAN
*> [2]:[0]:[3001]:[48,0010:9400:000c]:[128,3001::2][3001]
2.2.2.2 0 100 32768 i --------- VXLAN
*> [2]:[0]:[3001]:[48,e8c5:7a76:581d]:[128,3001::1][3001]
2.2.2.2 0 100 32768 i --------- VXLAN
* i [2]:[0]:[3002]:[48,0010:9400:000b]:[0]:[3002]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i [2]:[0]:[3002]:[48,0010:9400:000b]:[128,3002::2][3002]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i [2]:[0]:[3002]:[48,e8c5:7aa8:7cb3]:[128,3002::1][3002]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*> [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 32768 i --------- VXLAN
* i [3]:[201]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*> [3]:[3001]:[32,2.2.2.2]
2.2.2.2 0 100 32768 i --------- VXLAN
* i [3]:[3002]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
RD[3.3.3.3:11]
*>i [2]:[0]:[201]:[48,0010:9400:0005]:[0]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i [2]:[0]:[201]:[48,0010:9400:0005]:[32,14.14.14.2]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i [2]:[0]:[201]:[48,e8c5:7aa8:7cb3]:[32,14.14.14.1]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i [2]:[0]:[3002]:[48,0010:9400:000b]:[0]:[3002]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i [2]:[0]:[3002]:[48,0010:9400:000b]:[128,3002::2][3002]
RD[7400:11]
*>i [5]:[0]:[0]:[24]:[17.17.17.0]:[0.0.0.0]:[2000]
7.7.7.7 0 100 0 i 7.7.7.7 VXLAN
*>i [5]:[0]:[0]:[64]:[8002::]:[::]:[2000]
7.7.7.7 0 100 0 i 7.7.7.7 VXLAN
RD[61000:11]
*>i [5]:[0]:[0]:[24]:[13.13.13.0]:[0.0.0.0]:[2000]
2.2.2.2 0 100 0 ? 2.2.2.2 VXLAN
*>i [5]:[0]:[0]:[64]:[3001::]:[::]:[2000]
2.2.2.2 0 100 0 ? 2.2.2.2 VXLAN
RD[2.2.2.2:11]
*>i [2]:[0]:[201]:[48,0010:9400:0003]:[0]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[201]:[48,0010:9400:0003]:[32,13.13.13.2]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[201]:[48,e8c5:7a76:581d]:[32,13.13.13.1]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[3001]:[48,0010:9400:000c]:[0]:[3001]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[3001]:[48,0010:9400:000c]:[128,3001::2][3001]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[3001]:[48,e8c5:7a76:581d]:[128,3001::1][3001]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[3001]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[3.3.3.3:11] VRF[L2VRF2]:
* i [2]:[0]:[201]:[48,0010:9400:0003]:[0]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[201]:[48,0010:9400:0003]:[32,13.13.13.2]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[201]:[48,0010:9400:0005]:[0]:[201]
3.3.3.3 0 100 32768 i --------- VXLAN
*> [2]:[0]:[201]:[48,0010:9400:0005]:[32,14.14.14.2]:[201]
3.3.3.3 0 100 32768 i ----------
VXLAN
* i [2]:[0]:[201]:[48,e8c5:7a76:581d]:[32,13.13.13.1]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[201]:[48,e8c5:7aa8:7cb3]:[32,14.14.14.1]:[201]
3.3.3.3 0 100 32768 i ----------
VXLAN
* i [2]:[0]:[3001]:[48,0010:9400:000c]:[0]:[3001]
ISIS Validation
PE2#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
========================================================================
2.2.2.2 3.3.3.3 Installed 00:00:10 00:00:10
RD[63000:11]
*>i [5]:[0]:[0]:[24]:[14.14.14.0]:[0.0.0.0]:[2000]
3.3.3.3 0 100 0 ? 3.3.3.3 VXLAN
*>i [5]:[0]:[0]:[64]:[3002::]:[::]:[2000]
3.3.3.3 0 100 0 ? 3.3.3.3 VXLAN
RD[2.2.2.2:11] VRF[L2VRF2]:
*> [2]:[0]:[201]:[48,0010:9400:0003]:[0]:[201]
2.2.2.2 0 100 32768 i --------- VXLAN
*> [2]:[0]:[201]:[48,0010:9400:0003]:[32,13.13.13.2]:[201]
2.2.2.2 0 100 32768 i --------- VXLAN
* i [2]:[0]:[201]:[48,0010:9400:0005]:[0]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i [2]:[0]:[201]:[48,0010:9400:0005]:[32,14.14.14.2]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*> [2]:[0]:[201]:[48,e8c5:7a76:581d]:[32,13.13.13.1]:[201]
2.2.2.2 0 100 32768 i --------- VXLAN
* i [2]:[0]:[201]:[48,e8c5:7aa8:7cb3]:[32,14.14.14.1]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*> [2]:[0]:[3001]:[48,0010:9400:000c]:[0]:[3001]
2.2.2.2 0 100 32768 i --------- VXLAN
*> [2]:[0]:[3001]:[48,0010:9400:000c]:[128,3001::2][3001]
2.2.2.2 0 100 32768 i --------- VXLAN
*> [2]:[0]:[3001]:[48,e8c5:7a76:581d]:[128,3001::1][3001]
2.2.2.2 0 100 32768 i --------- VXLAN
* i [2]:[0]:[3002]:[48,0010:9400:000b]:[0]:[3002]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i [2]:[0]:[3002]:[48,0010:9400:000b]:[128,3002::2][3002]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i [2]:[0]:[3002]:[48,e8c5:7aa8:7cb3]:[128,3002::1][3002]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*> [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 32768 i --------- VXLAN
* i [3]:[201]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*> [3]:[3001]:[32,2.2.2.2]
2.2.2.2 0 100 32768 i --------- VXLAN
* i [3]:[3002]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
RD[3.3.3.3:11]
*>i [2]:[0]:[201]:[48,0010:9400:0005]:[0]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i [2]:[0]:[201]:[48,0010:9400:0005]:[32,14.14.14.2]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i [2]:[0]:[201]:[48,e8c5:7aa8:7cb3]:[32,14.14.14.1]:[201]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i [2]:[0]:[3002]:[48,0010:9400:000b]:[0]:[3002]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i [2]:[0]:[3002]:[48,0010:9400:000b]:[128,3002::2][3002]
RD[7400:11]
*>i [5]:[0]:[0]:[24]:[17.17.17.0]:[0.0.0.0]:[2000]
7.7.7.7 0 100 0 i 7.7.7.7 VXLAN
*>i [5]:[0]:[0]:[64]:[8002::]:[::]:[2000]
7.7.7.7 0 100 0 i 7.7.7.7 VXLAN
RD[61000:11]
*>i [5]:[0]:[0]:[24]:[13.13.13.0]:[0.0.0.0]:[2000]
2.2.2.2 0 100 0 ? 2.2.2.2 VXLAN
*>i [5]:[0]:[0]:[64]:[3001::]:[::]:[2000]
2.2.2.2 0 100 0 ? 2.2.2.2 VXLAN
RD[2.2.2.2:11]
*>i [2]:[0]:[201]:[48,0010:9400:0003]:[0]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[201]:[48,0010:9400:0003]:[32,13.13.13.2]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[201]:[48,e8c5:7a76:581d]:[32,13.13.13.1]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[3001]:[48,0010:9400:000c]:[0]:[3001]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[3001]:[48,0010:9400:000c]:[128,3001::2][3001]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [2]:[0]:[3001]:[48,e8c5:7a76:581d]:[128,3001::1][3001]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i [3]:[3001]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[3.3.3.3:11] VRF[L2VRF2]:
* i [2]:[0]:[201]:[48,0010:9400:0003]:[0]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[201]:[48,0010:9400:0003]:[32,13.13.13.2]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[201]:[48,0010:9400:0005]:[0]:[201]
3.3.3.3 0 100 32768 i ---------- VXLAN
*> [2]:[0]:[201]:[48,0010:9400:0005]:[32,14.14.14.2]:[201]
3.3.3.3 0 100 32768 i ---------- VXLAN
* i [2]:[0]:[201]:[48,e8c5:7a76:581d]:[32,13.13.13.1]:[201]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[201]:[48,e8c5:7aa8:7cb3]:[32,14.14.14.1]:[201]
3.3.3.3 0 100 32768 i ---------- VXLAN
* i [2]:[0]:[3001]:[48,0010:9400:000c]:[0]:[3001]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[3001]:[48,0010:9400:000c]:[128,3001::2][3001]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i [2]:[0]:[3001]:[48,e8c5:7a76:581d]:[128,3001::1][3001]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[0]:[3002]:[48,0010:9400:000b]:[0]:[3002]
3.3.3.3 0 100 32768 i ---------- VXLAN
*> [2]:[0]:[3002]:[48,0010:9400:000b]:[128,3002::2][3002]
3.3.3.3 0 100 32768 i ---------- VXLAN
*> [2]:[0]:[3002]:[48,e8c5:7aa8:7cb3]:[128,3002::1][3002]
3.3.3.3 0 100 32768 i ---------- VXLAN
* i [3]:[201]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [3]:[201]:[32,3.3.3.3]
3.3.3.3 0 100 32768 i ---------- VXLAN
* i [3]:[3001]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [3]:[3002]:[32,3.3.3.3]
3.3.3.3 0 100 32768 i ---------- VXLAN
Abbreviations
The following are some key abbreviations and their meanings relevant to this document:
Acronym Description
SR Segment Routing
Glossary
The following provides definitions for key terms used throughout this document.
Single Home VxLAN This refers to a Virtual Extensible LAN (VxLAN) deployment where a single data center or network site
is connected to a single external network (usually the internet) for connectivity.
IRB A networking feature that enables the integration of Layer 3 IP routing and Layer 2 MAC address
bridging within the same interface, simplifying network management and resource utilization.
OSPF A dynamic and efficient link-state routing protocol used to determine the best path for data packets in
an IP network. It is characterized by rapid convergence and adaptability, making it suitable for large
and dynamic networks.
ISIS A routing protocol designed for scalability and stability in computer networks, commonly used in large
Service Provider networks. It provides a robust framework for routing information exchange.
Layer 3 Routing Network routing operations at the Network Layer (Layer 3) of the OSI model, focusing on routing IP
packets between different subnets or networks.
Layer 2 Bridging Network bridging operations at the Data Link Layer (Layer 2) of the OSI model, handling the forwarding
of data frames based on MAC addresses within the same network segment.
EVPN Ethernet VPN, a technology that provides advanced and efficient methods for Layer 2 and Layer 3
services in Ethernet networks, often used in data centers and service provider environments.
Overview
The support for Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (ISIS) protocols on
Virtual Extensible LAN (VxLAN) Integrated Routing (IRB) interface is enhanced with multihoming switches that
provides the solution for connecting and managing virtual networks within a data center or network infrastructure.
This feature offers flexibility in configuring network topologies, and ensures compatibility and interoperability within
diverse network environments.
Note: Configure mutually exclusive secondary IP subnets between each anycast-IRB and CE within the same L2VNI
in multi-homing scenarios or when the same IRB anycast interface is configured on multiple nodes. This
ensures unique identification of the routing protocol peer.
Feature Characteristics
The OSPF and ISIS support over the IRB Interface with multihoming feature has the following characteristics:
• Connect the host node to two VTEPs with all-active redundancy mode. It helps forward all traffic from VTEP to
the host when one VTEP goes down.
Benefits
The OSPF and ISIS support over the IRB Interface has the following benefits:
• Uninterrupted service between host and VTEP.
Prerequisites
• Router must be up and running.
• Maintain synchronization with VRF changes by performing IRB shut/no shut actions when specific events
occur within the IPVRF. These events may involve adding or removing Route Targets (RTs), updating Route
Distinguishers (RDs), or modifying Layer 3 Virtual Network Identifiers (L3VNIs).
Configuration
Perform the following configurations to set up different interfaces, routing protocols, and BGP parameters to enable
VXLAN, IRB, and EVPN functionality with multihoming in the network.
PE1
PE1(config)#vlan database Enter the VLAN configuration mode.
PE1(config-vlan)# vlan 200-201 bridge 1 Enable VLAN (200-201) on bridge 1. Specifying the enable
state enable state allows forwarding of frames on this VLAN-aware
bridge.
PE1(config-vlan)#interface sa1 Enter sa1 interface mode.
PE1(config-if)# switchport Configure port as L2.
PE1(config-if)# bridge-group 1 Associate the interface with bridge group 1.
PE1(config-if)# switchport mode trunk Set the switching characteristics of this interface to trunk
mode.
PE1(config-if)# switchport trunk allowed Enable VLAN ID 200-201 on this port.
vlan add 200-201
PE1(config-if)# load-interval 30 Configures the load-interval for monitoring traffic on the sa1
interface.
PE1(config-if)# exit Exit from sa1 interface configuration mode.
PE1(config)#interface ce0 Enter ce0 interface mode.
PE1(config-if)# static-channel-group 1 Make it member port of sa1
PE1(config-if)#interface lo Configures the loopback (lo) interface.
PE1(config-if)# ip address 1.1.1.1/32 Assigns a secondary the IP address 1.1.1.1/32 to the
secondary loopback interface.
PE1(config-if)# ipv6 address ::1/128 Assigns the IPv6 address ::1/128 to the loopback
interface.
PE1(config-if)#interface vlan1.200 Enter interface VLAN1.200 configuration mode.
PE1(config-if)# ip address 101.11.11.1/ Assigns the primary IP address.
24
PE1(config-if)# ip address 16.16.16.1/24 Assigns the secondary IP address.
secondary
PE1(config-if)# ip address 17.17.17.1/24 Assigns the secondary IP address.
secondary
PE1(config-if)# exit Exit from VLAN interface configuration mode.
PE1(config)#interface xe2 Enter xe2 interface configuration mode.
PE1(config-if)# load-interval 30 Configures the load-interval for monitoring traffic on the xe2
interface.
PE1(config-if)#interface xe2.103 Enter VLAN ID 103 interface config mode.
PE1(config-if)# encapsulation dot1q 103 Setting Encapsulation to dot1q with VLAN ID 103.
PE1(config-if)# ip address 20.1.1.1/24 Assigns the primary IP address.
PE1(config-if)# exit Exit from xe2 VLAN interface configuration mode.
PE1(config)#interface xe23 Enter xe23 interface configuration mode.
PE1(config-if)# static-channel-group 1 Configure static channel 1 member port
PE1(config)#router ospf 1 Enters the OSPF configuration mode for OSPF process 1.
PE1(config-router)# network 16.16.16.0/ Advertises the network 16.16.16.0/24 into OSPF area
24 area 0.0.0.0 0.0.0.0.
PE1(config-router)# network 17.17.17.0/ Advertises the network 17.17.17.0/24 into OSPF area
24 area 0.0.0.0 0.0.0.0.
PE1(config-router)# network 20.1.1.0/24 Advertises the network 20.1.1.0/24 into OSPF area 0.0.0.0.
area 0.0.0.0
PE2
PE2(config-if)# channel-group 1 mode Configure the member port for po1 interface
active
PE2(config)#router isis 1 Configure the ISIS router.
PE2(config-router)# is-type level-1-2 Configure level1-2 ISIS mode.
PE2(config-router)# metric-style wide Configure metric style as wide.
PE2(config-router)# dynamic-hostname Configure the hostname to be advertised for an ISIS 1
instance.
PE2(config-router)# bfd all-interfaces Enable the Bidirectional Forwarding Detection (BFD) feature
on all the interfaces enabled with this ISIS instance.
PE2(config-router)# net Set a Network Entity Title for this instance, specifying the
49.0000.0000.0001.00 area address and the system ID.
PE2(config-router)# redistribute Redistribute the connected routes.
connected
Configure VxLAN IRB with Multihoming for OSPF and ISIS Router
Perform the following configurations to create VxLAN IRB interfaces with multihoming for OSPF and ISIS routing
process on PE7 and PE8 node.
PE7
PE7(config-nvo)# evpn irb801 Configure default gateway behavior for IRB interface
irb801.
PE7(config-nvo)# vni-name VNI-101 Configure VNI name.
PE7(config-nvo)#qos enable Enable QoS.
PE7(config-nvo)#exit Exit from NVO mode.
PE7(config)#interface po1 Configure po1 interface.
PE7(config-if)# switchport Configure port as L2.
PE7(config-if)# load-interval 30 Configures the load-interval for monitoring traffic on the
po1 interface.
PE7(config-if)# evpn multi-homed system-mac Configure system MAC as ESI value for po1 interface.
0000.0000.7782 VTEP1 and VTEP2 should have same ESI value.
PE7(config-if)#interface sa1 Configure sa1 interface.
PE7(config-if)# switchport Configure port as L2.
PE7(config-if)# load-interval 30 Configures the load-interval for monitoring traffic on the
po1 interface.
PE7(config-if)# evpn multi-homed esi Configure 9-octet ESI value for sa1 interface.
00:01:02:03:04:05:06:07:08
PE7(config-if-es)#interface sa2 Configure sa2 interface.
PE7(config-if)# load-interval 30 Configures the load-interval for monitoring traffic on the
sa2 interface.
PE7(config-if)# ip address 80.1.1.1/24 Configure IP address.
PE7(config-if)# mtu 9000 Configure the Maximum Transmission Unit (MTU).
PE7(config-if)# ip router isis 1 Configure ISIS router on sa2 interface.
PE7(config-if)#exit Exit from the sa2 interface.
PE7(config)#interface sa3 Configure sa3 interface.
PE7(config-if)# load-interval 30 Configures the load-interval for monitoring traffic on the
sa3 interface.
PE7(config-if)# ip address 22.1.1.1/24 Configure IP address.
PE7(config-if)# mtu 9000 Configure the Maximum Transmission Unit (MTU).
PE7(config-if)#interface ce50 Configure ce50 interface.
PE7(config-if)# static-channel-group 1 Configure member port for sa3
PE7(config-if)#exit Exit from ce50 interface configuration mode.
PE7(config)#interface lo Configure loopback interface.
PE7(config-if)# ip address 7.7.7.7/32 Configure secondary IP address
secondary
PE7(config-if)#exit Exit from the lo interface.
PE7(config)#interface xe1 Configure xe1 interface.
PE7(config-if)# channel-group 1 mode active Configure member port of po1 interface.
PE7(config-if)#interface xe39 Configure xe39 interface.
PE7(config-if)# static-channel-group 3 Configure member port of sa3 interface.
PE7(config-if)#interface xe40 Configure xe40 interface.
PE7(config-if)# static-channel-group 2 Configure member port of sa2 interface.
PE7(config-if)#exit Exit from the xe40 interface.
PE7(config)#router ospf 1 Configure OSPF router.
PE7(config-router-af)# neighbor 6.6.6.6 Enable the exchange of specific address family routes
activate with a neighboring router 6.6.6.6.
PE7(config-router-af)# exit-address-family Exit from address family mode.
PE7(config-router)# address-family ipv4 vrf Enter to the IRB IPv4 VRF address family mode to
L3VRF3 configure the address-family specific parameters.
PE7(config-router-af)# network 16.16.16.0/ Enable OSPF routing on IRB interface with IP address
24 that match the network address 16.16.16.0/24.
PE7(config-router-af)# redistribute ospf Redistribute OSPF routes.
PE7(config-router-af)# exit-address-family Exit from address family mode.
PE7(config-router)# address-family ipv4 vrf Enter to the IRB IPv4 VRF address family mode to
L3VRF4 configure the address-family specific parameters.
PE7(config-router-af)# network 12.1.1.0/24 Enable OSPF routing on IRB interface with IP address
that match the network address 12.1.1.0/24.
PE7(config-router-af)# redistribute isis Redistribute ISIS routes.
PE7(config-router-af)# exit-address-family Exit address family mode.
PE7(config)#nvo vxlan access-if port-vlan Map the VLAN port for ISIS switch on po1 interface to
po1 100 identify the VxLAN traffic and to enter NVO access
interface mode.
PE7(config-nvo-acc-if)# map vnid 801 Map the l2vnid to an access-port.
PE7(config-nvo-acc-if)#nvo vxlan access-if Configure access-if port for OSPF switch.
port-vlan sa1 200
PE7(config-nvo-acc-if)# map vnid 701 Map the l2vnid to an access-port.
PE8
PE8(config-vrf)# route-target both Add import and export route-target extended communities
7.7.7.7:100 to the VRF.
PE8(config-vrf)#mac vrf L2VRF2 Create a L2 MAC VRF to use in EVPN routes.
PE8(config-vrf)# rd 8.8.8.8:12 Specify a route distinguisher for the VRF.
PE8(config-vrf)# route-target both Add import and export route-target extended communities
7.7.7.7:101 to the VRF.
PE7(config-vrf)#exit Exit the VRF configuration mode.
PE8(config)#evpn irb-forwarding anycast- Configure common Anycast MAC address for all the IRB
gateway-mac 0000.0000.1111 interfaces.
PE8(config-if)#interface irb701 Enter into IRB interface configuration mode to configure
IRB interfaces for OSPF router.
PE8(config-irb-if)# ip vrf forwarding L3VRF3 Associate IRB interface with L3VRF3.
PE8(config-irb-if)# evpn irb-if-forwarding Map the global anycast IRB MAC address with L3VRF3.
anycast-gateway-mac
PE8(config-irb-if)# ip address 17.12.13.1/24 Configure an Anycast IP address.
anycast
PE8(config-irb-if)# ip address 17.17.17.2/24 Configure a secondary IP address.
secondary PE7(config-irb-if)#exitExit from the IRB interface.
PE8(config-irb-if)#interface irb801 Enter into IRB interface configuration mode to configure
IRB interfaces for ISIS router.
PE8(config-irb-if)# ip vrf forwarding L3VRF4 Associate IRB interface with L3VRF4.
PE8(config-irb-if)# evpn irb-if-forwarding Map the global anycast IRB MAC address with L3VRF4.
anycast-gateway-mac
PE8(config-irb-if)# ip address 12.13.14.2/24 Configure an Anycast IP address.
anycast
PE8(config-irb-if)# ip address 12.1.1.2/24 Configure an Anycast IP address.
secondary
PE8(config-irb-if)# ip router isis 2 Configure ISIS router on IRB interface.
PE7(config-irb-if)#exit Exit from the IRB interface.
PE8(config)#nvo vxlan vtep-ip-global 8.8.8.8 Configure the source VTEP IP address of the VxLAN
tunnel.
PE8(config)#nvo vxlan id 701 ingress- Add a tenant L2 VNID to the VxLAN. Specify
replication inner-vid-disabled ingress-replication to use head end replication for
forwarding BUM traffic
inner-vid-disabled to not carry VID out of network port
PE8(config-nvo)# vxlan host-reachability- Associate the L2VRF1reachable protocol to Ethernet-VPN
protocol evpn-bgp L2VRF1 over BGP
PE8(config-nvo)# evpn irb701 Configure default gateway behavior for IRB interface
irb701.
PE8(config-nvo)# vni-name VNI-701 Configure VNI name.
PE7(config-nvo)#exit Exit from NVO mode.
PE8(config-nvo)#nvo vxlan id 801 ingress- Add a tenant L2 VNID to the VxLAN. Specify
replication inner-vid-disabled ingress-replication to use head end replication for
forwarding BUM traffic
inner-vid-disabled to not carry VID out of network port
PE8(config-nvo)# vxlan host-reachability- Associate the L2VRF2reachable protocol to Ethernet-VPN
protocol evpn-bgp L2VRF2 over BGP
PE8(config-nvo)# evpn irb801 Configure default gateway behavior for IRB interface
irb801.
PE8(config-nvo)# vni-name VNI-101 Configure VNI name.
PE8(config-nvo)#qos enable Enable QoS.
PE8(config-nvo)#exit Exit from NVO mode.
PE8(config-vlan)#interface po1 Configure po1 interface.
PE8(config-if)# switchport Configure port as L2.
PE8(config-if)# load-interval 30 Configures the load-interval for monitoring traffic on the po1
interface.
PE8(config-if)# evpn multi-homed system-mac Configure system MAC as ESI value for po1 interface.
0000.0000.7782 VTEP1 and VTEP2 should have same ESI value.
PE8(config-if-es)#interface sa1 Configure sa1 interface.
PE8(config-if)# switchport Configure port as L2.
PE8(config-if)# load-interval 30 Configures the load-interval for monitoring traffic on the po1
interface.
PE8(config-if)# evpn multi-homed esi Configure 9-octet ESI value for sa1 interface.
00:01:02:03:04:05:06:07:08
PE8(config-irb-if)#interface lo Configure loopback interface
PE8(config-if)# ip address 8.8.8.8/32 Configure secondary IP address
secondary
PE8(config-if)#exit Exit from the lo interface.
PE8(config)#interface xe1 Configure xe1 interface.
PE8(config-if)# static-channel-group 1 Configure member port of sa3 interface.
PE8(config-if)#interface xe2 Configure xe2 interface.
PE8(config-if)# ip address 90.1.1.1/24 Configure IP address
PE8(config-if)# mtu 9000 Configure the Maximum Transmission Unit (MTU).
PE8(config-if)# ip router isis 1 Configure ISIS router on IRB interface.
PE8(config-if)#exit Exit from the lo interface.
PE8(config)#interface xe12 Configure xe1 interface.
PE8(config-if)# load-interval 30 Configures the load-interval for monitoring traffic on the po1
interface.
PE8(config-if)# ip address 21.1.1.1/24 Configure IP address
PE8(config-if)# mtu 9000 Configure the Maximum Transmission Unit (MTU).
PE8(config-if)#exit Exit from the lo interface.
PE8(config-if)#interface xe26 Configure xe26 interface.
PE8(config-if)# channel-group 1 mode active Configure member port of xe26 interface.
PE8(config)#router ospf 1 Configure OSPF router.
PE8(config-router)# ospf router-id 8.8.8.8 Configure router id for OSPF.
PE8(config-router)# network 8.8.8.8/32 area Enable OSPF routing with area ID 0.0.0.0 on IRB interface
0.0.0.0 with IP address that match the network address 8.8.8.8/32.
PE8(config-router)# network 21.1.1.0/24 area Enable OSPF routing with area ID 0.0.0.0 on IRB interface
0.0.0.0 with IP address that match the network address 21.1.1.0/
24.
PE8(config-router)#router ospf 2 L3VRF3 Configure OSPF on IRB L3VRF3.
PE8(config-router-af)# network 12.1.1.0/24 Enable OSPF routing on IRB interface with IP address that
match the network address 12.1.1.0/24.
PE8(config-router-af)# redistribute isis Redistribute ISIS routes.
PE8(config-router-af)# exit-address-family Exit address family mode.
PE8(config-router)# exit Exit from router mode configuration.
PE8(config)#nvo vxlan access-if port-vlan Map the VLAN port for ISIS switch on po1 interface to
po1 100 identify the VxLAN traffic and to enter NVO access interface
mode.
PE8(config-nvo-acc-if)# map vnid 801 Map the l2vnid to an access-port.
PE8(config-nvo-acc-if)#nvo vxlan access-if Configure access-if port for OSPF switch.
port-vlan sa1 200
PE8(config-nvo-acc-if)# map vnid 701 Map the l2vnid to an access-port.
PE8(config-nvo-acc-if)#end End global configuration.
PE5
PE5(config-router)# network 5.5.5.5/32 area Enable OSPF routing with area ID 0.0.0.0 on IRB interface
0.0.0.0 with IP address that match the network address 5.5.5.5/32.
PE5(config-router)# network 21.1.1.0/24 area Enable OSPF routing with area ID 0.0.0.0 on IRB interface
0.0.0.0 with IP address that match the network address 21.1.1.0/24.
PE5(config-router)# network 22.1.1.0/24 area Enable OSPF routing with area ID 0.0.0.0 on IRB interface
0.0.0.0 with IP address that match the network address 22.1.1.0/24.
PE5(config-router)# network 23.1.1.0/24 area Enable OSPF routing with area ID 0.0.0.0 on IRB interface
0.0.0.0 with IP address that match the network address 23.1.1.0/24.
PE5(config-router)# network 24.1.1.0/24 area Enable OSPF routing with area ID 0.0.0.0 on IRB interface
0.0.0.0 with IP address that match the network address 24.1.1.0/24.
PE5(config-router)#router bgp 500 Start the eBGP router 500.
PE5(config-router)# bgp router-id 5.5.5.5 Configure BGP router id 5.5.5.5.
PE5(config-router)# no bgp inbound-route- Disable the VPN/BGP inbound route-target filter.
filter
PE5(config-router)# neighbor 3.3.3.3 remote- Configure BGP 3.3.3.3 peering relationship with a customer
as 300 edge router.
PE5(config-router)# neighbor 4.4.4.4 remote- Configure BGP 4.4.4.4 peering relationship with a customer
as 400 edge router.
PE5(config-router)# neighbor 7.7.7.7 remote- Configure BGP 7.7.7.7 peering relationship with a customer
as 700 edge router.
PE5(config-router)# neighbor 8.8.8.8 remote- Configure BGP 8.8.8.8 peering relationship with a customer
as 800 edge router.
PE5(config-router)# neighbor 3.3.3.3 update- Specifies that loopback interface (lo) is the source for the
source lo BGP 3.3.3.3 to establish the TCP connections.
PE5(config-router)# neighbor 4.4.4.4 update- Specifies that loopback interface (lo) is the source for the
source lo BGP 4.4.4.4 to establish the TCP connections.
PE5(config-router)# neighbor 7.7.7.7 update- Specifies that loopback interface (lo) is the source for the
source lo BGP 7.7.7.7 to establish the TCP connections.
PE5(config-router)# neighbor 8.8.8.8 update- Specifies that loopback interface (lo) is the source for the
source lo BGP 8.8.8.8 to establish the TCP connections.
PE5(config-router)# address-family l2vpn Enter to the L2 VPN address family mode to configure the
evpn address-family specific parameters.
PE5(config-router-af)# neighbor 3.3.3.3 Enable the exchange of specific address family routes with a
activate neighboring router 3.3.3.3.
PE5(config-router-af)# neighbor 4.4.4.4 Enable the exchange of specific address family routes with a
activate neighboring router 4.4.4.4.
PE5(config-router-af)# neighbor 7.7.7.7 Enable the exchange of specific address family routes with a
activate neighboring router 7.7.7.7.
PE5(config-router-af)# neighbor 8.8.8.8 Enable the exchange of specific address family routes with a
activate neighboring router 8.8.8.8.
PE5(config-router-af)# exit-address-family Exit address family configuration mode.
PE5(config-router)# exit Exit router configuration mode.
PE5(config)#end Exit global configuration mode.
PE6
PE6(config-router)# neighbor 7.7.7.7 remote- Configure BGP peering relationship with a customer edge
as 700 router.
PE6(config-router)# neighbor 8.8.8.8 remote- Configure BGP peering relationship with a customer edge
as 800 router.
PE6(config-router)# neighbor 3.3.3.3 update- Specifies that loopback interface (lo) is the source for the
source lo BGP 3.3.3.3 to establish the TCP connections
PE6(config-router)# neighbor 4.4.4.4 update- Specifies that loopback interface (lo) is the source for the
source lo BGP 4.4.4.4 to establish the TCP connections
PE6(config-router)# neighbor 7.7.7.7 update- Specifies that loopback interface (lo) is the source for the
source lo BGP 7.7.7.7 to establish the TCP connections
PE6(config-router)# neighbor 8.8.8.8 update- Specifies that loopback interface (lo) is the source for the
source lo BGP 8.8.8.8 to establish the TCP connections
PE6(config-router)# address-family l2vpn Enter to the L2 VPN address family mode to configure the
evpn address-family specific parameters.
PE6(config-router-af)# neighbor 3.3.3.3 Enable the exchange of specific address family routes
activate with a neighboring router 3.3.3.3.
PE6(config-router-af)# neighbor 4.4.4.4 Enable the exchange of specific address family routes
activate with a neighboring router 4.4.4.4.
PE6(config-router-af)# neighbor 7.7.7.7 Enable the exchange of specific address family routes
activate with a neighboring router 7.7.7.7.
PE6(config-router-af)# neighbor 8.8.8.8 Enable the exchange of specific address family routes
activate with a neighboring router 8.8.8.8.
PE6(config-router-af)# exit-address-family Exit address family configuration mode.
PE6(config-router)# exit Exit router configuration mode.
PE6(config)#end Exit global configuration mode.
Configure VxLAN IRB with Single Homing OSPF and ISIS Router
Perform the following configurations to create VxLAN IRB interfaces with singlehoming for OSPF and ISIS routing
process on PE3 and PE4 nodes.
PE3
PE3(config-vrf)# route-target both Add import and export route-target extended communities
9.9.9.9:100 to the VRF.
PE3(config-if)#interface irb1001 Enter into IRB interface configuration mode to configure
IRB interfaces for OSPF router.
PE3(config-irb-if)# ip vrf forwarding L3VRF1 Associate IRB interface with L3VRF3.
PE3(config-irb-if)# ip address 40.1.1.1/24 Configure an Anycast IP address.
PE3(config-irb-if)# ip ospf cost 1 Specify the cost of the link-state metric in a router-LSA.
PE3(config-vrf)#nvo vxlan vtep-ip-global Configure the source VTEP IP address of the VxLAN
3.3.3.3 tunnel.
PE3(config)#nvo vxlan id 102 ingress- Add a tenant L2 VNID to the VxLAN. Specify
replication ingress-replication to use head end replication for
forwarding BUM traffic
inner-vid-disabled to not carry VID out of network port
PE3(config-nvo)# vxlan host-reachability- Associate the L2VRF1 reachable protocol to Ethernet-
protocol evpn-bgp L2VRF1 VPN over BGP
PE3(config-nvo)# evpn irb1001 Configure default gateway behavior for IRB interface
irb1001.
PE3(config-nvo)# vni-name VNI-102 Configure VNI name.
PE3(config-nvo)#nvo vxlan id 2002 ingress- Add a tenant L2 VNID to the VxLAN. Specify
replication ingress-replication to use head end replication for
forwarding BUM traffic
inner-vid-disabled to not carry VID out of network port
PE3(config-nvo)# vxlan host-reachability- Associate the L2VRF1 reachable protocol to Ethernet-
protocol evpn-bgp L2VRF1 VPN over BGP
PE3(config-nvo)# evpn irb2002 Configure default gateway behavior for IRB interface
irb72002.
PE3(config-nvo)#qos enable Enable QoS.
PE3(config)#interface sa4 Configure sa4 interface.
PE3(config-if)# switchport Configure port as L2.
PE3(config-if)# load-interval 30 Configures the load-interval for monitoring traffic on the
po1 interface.
PE3(config)#nvo vxlan access-if port-vlan Map the VLAN port for ISIS switch on sa4 interface to
sa4 100 identify the VxLAN traffic and to enter NVO access
interface mode.
PE3(config-acc-if-evpn)#map vpn-id 102 Map the l2vnid to an access-port.
PE3(config-if)#interface ce3 Configure ce3 interface.
PE3(config-if)# load-interval 30 Configures the load-interval for monitoring traffic on the
ce3 interface.
PE3(config-if)# ip address 101.1.1.2/24 Configure IP address.
PE3(config-if)# mtu 9000 Configure the Maximum Transmission Unit (MTU).
PE3(config-if)# ip router isis 1 Configure ISIS router on ce3 interface.
PE3(config-irb-if)#interface lo Configure loopback interface
PE3(config-if)# ip address 3.3.3.3/32 Configure secondary IP address
secondary
PE3(config-if)# ip router isis 1 Configure ISIS router on ce3 interface.
PE3(config-if)#interface xe10 Configure xe10 interface.
PE3(config-if)# static-channel-group 4 Configure member port of ce3 interface.
PE3(config-router-af)# neighbor 6.6.6.6 Enable the exchange of specific address family routes with
activate a neighboring router 6.6.6.6.
PE3(config-router-af)# exit-address-family Exit address family configuration mode.
PE3(config-router)# address-family ipv4 vrf Enter to the IRB IPv4 VRF address family mode to
L3VRF1 configure the address-family specific parameters.
PE3(config-router-af)# redistribute Redistribute connected routes.
connected
PE3(config-router-af)# redistribute ospf Redistribute OSPF routes.
PE3(config-router-af)# exit-address-family Exit address family configuration mode.
PE3(config-router)# exit Exit router configuration mode.
PE3(config)#end Exit global configuration mode.
PE4
PE4(config-router)#!
PE4(config-router)#router isis 2 L3VRF2 Configure ISIS on IRB L3VRF2.
PE4(config-router)# is-type level-1-2 Configure IS type as level 1 and level 2.
PE4(config-router)# metric-style wide Configure metric-style as wide.
PE4(config-router)# dynamic-hostname Configure the hostname to advertise for the ISIS router.
PE4(config-router)# bfd all-interfaces Enable the Bidirectional Forwarding Detection (BFD)
feature on all the interfaces enabled with this ISIS
instance.
PE4(config-router)# net Set a Network Entity Title for this instance, specifying the
49.0000.0000.0441.00 area address and the system ID.
PE4(config-router)#router bgp 400 Start the eBGP router.
PE4(config-router)# bgp router-id 4.4.4.4 Configure BGP router id.
PE4(config-router)# no bgp inbound-route- Disable the VPN/BGP inbound route-target filter.
filter
PE4(config-router)# neighbor 5.5.5.5 remote- Configure BGP peering relationship with a customer edge
as 500 router.
PE4(config-router)# neighbor 6.6.6.6 remote- Configure BGP peering relationship with a customer edge
as 600 router.
PE4(config-router)# neighbor 5.5.5.5 update- Specifies that loopback interface (lo) is the source for the
source lo BGP 5.5.5.5 to establish the TCP connections
PE4(config-router)# neighbor 6.6.6.6 Configure a minimum advertisement interval between the
advertisement-interval 0 sending of BGP routing updates.
PE4(config-router)# address-family l2vpn Enter to the L2 VPN address family mode to configure the
evpn address-family specific parameters.
PE4(config-router-af)# neighbor 5.5.5.5 Enable the exchange of specific address family routes with
activate a neighboring router 5.5.5.5.
PE4(config-router-af)# neighbor 6.6.6.6 Enable the exchange of specific address family routes with
activate a neighboring router 6.6.6.6.
PE4(config-router-af)# exit-address-family Exit address family configuration mode.
PE4(config-router)# address-family ipv4 vrf Enter to the IRB IPv4 VRF address family mode to
L3VRF2 configure the address-family specific parameters.
PE4(config-router-af)# redistribute Redistribute connected routes.
connected
PE4(config-router-af)# exit-address-family Exit address family configuration mode.
PE4(config-router)# exit Exit router configuration mode.
PE4(config)#end Exit global configuration mode.
Validation
PE1#show ip ospf neighbor
vrf all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
___
701 VNI-701 L2 NW ---- ---- ---- ---- 7.7.7.7 8.8.8.8
701 VNI-701 -- AC sa1 00:00:01:02:03:04:05:06:07:08 200 DF ---- ----
801 VNI-101 L2 NW ---- ---- ---- ---- 7.7.7.7 8.8.8.8
801 VNI-101 -- AC po1 00:00:00:00:00:77:82:00:00:00 100 DF ---- ----
1000 ---- L3 NW ---- ---- ---- ---- 7.7.7.7 8.8.8.8
1000 ---- L3 NW ---- ---- ---- ---- 7.7.7.7 3.3.3.3
2000 ---- L3 NW ---- ---- ---- ---- 7.7.7.7 8.8.8.8
2000 ---- L3 NW ---- ---- ---- ---- 7.7.7.7 4.4.4.4
7001 ---- L2 NW ---- ---- ---- ---- 7.7.7.7 8.8.8.8
7001 ---- -- AC sa1 00:00:01:02:03:04:05:06:07:08 201 NON-DF ---- ----
8001 ---- L2 NW ---- ---- ---- ---- 7.7.7.7 8.8.8.8
8001 ---- -- AC po1 00:00:00:00:00:77:82:00:00:00 101 NON-DF ---- ----
RD[8100:11]
ESI Eth-Tag Prefix-Length IP-Address GW-IPAddress L3VNID/LABEL Nexthop Encap Router-Mac
0 0 24 17.17.17.0 0.0.0.0 1000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 24 17.17.17.0 0.0.0.0 1000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 30:: :: 1000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 30:: :: 1000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 7102:: :: 1000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 7102:: :: 1000 8.8.8.8 VXLAN 1444:8f53:3e9e
RD[8400:11]
ESI Eth-Tag Prefix-Length IP-Address GW-IPAddress L3VNID/LABEL Nexthop Encap Router-Mac
0 0 24 10.1.1.0 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 24 10.1.1.0 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 24 11.11.11.0 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 24 11.11.11.0 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 24 12.1.1.0 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 24 12.1.1.0 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 24 12.13.14.0 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 24 12.13.14.0 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 24 13.1.1.0 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 24 13.1.1.0 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 32 2.2.2.2 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 32 2.2.2.2 0.0.0.0 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 2:: :: 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 2:: :: 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 40:: :: 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 40:: :: 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 50:: :: 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 50:: :: 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 8002:: :: 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 8002:: :: 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 8102:: :: 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
0 0 64 8102:: :: 2000 8.8.8.8 VXLAN 1444:8f53:3e9e
RD[56000:11]
ESI Eth-Tag Prefix-Length IP-Address GW-IPAddress L3VNID/LABEL Nexthop Encap Router-Mac
0 0 24 40.1.1.0 0.0.0.0 1000 3.3.3.3 VXLAN e49d:73b1:c301
0 0 24 40.1.1.0 0.0.0.0 1000 3.3.3.3 VXLAN e49d:73b1:c301
0 0 64 2002:: :: 1000 3.3.3.3 VXLAN e49d:73b1:c301
0 0 64 2002:: :: 1000 3.3.3.3 VXLAN e49d:73b1:c301
RD[63000:11]
ESI Eth-Tag Prefix-Length IP-Address GW-IPAddress L3VNID/LABEL Nexthop Encap Router-Mac
0 0 24 50.50.50.0 0.0.0.0 2000 4.4.4.4 VXLAN e8c5:7aa8:7cb3
0 0 24 50.50.50.0 0.0.0.0 2000 4.4.4.4 VXLAN e8c5:7aa8:7cb3
0 0 64 3002:: :: 2000 4.4.4.4 VXLAN e8c5:7aa8:7cb3
0 0 64 3002:: :: 2000 4.4.4.4 VXLAN e8c5:7aa8:7cb3
PE7#PE8#show clns neighbors
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
___
701 VNI-701 L2 NW ---- ---- ---- ---- 8.8.8.8 7.7.7.7
701 VNI-701 -- AC sa1 00:00:01:02:03:04:05:06:07:08 200 NON-DF ---- ----
801 VNI-101 L2 NW ---- ---- ---- ---- 8.8.8.8 7.7.7.7
801 VNI-101 -- AC po1 00:00:00:00:00:77:82:00:00:00 100 NON-DF ---- ----
1000 ---- L3 NW ---- ---- ---- ---- 8.8.8.8 7.7.7.7
1000 ---- L3 NW ---- ---- ---- ---- 8.8.8.8 3.3.3.3
2000 ---- L3 NW ---- ---- ---- ---- 8.8.8.8 7.7.7.7
2000 ---- L3 NW ---- ---- ---- ---- 8.8.8.8 4.4.4.4
7001 ---- L2 NW ---- ---- ---- ---- 8.8.8.8 7.7.7.7
7001 ---- -- AC sa1 00:00:01:02:03:04:05:06:07:08 201 DF ---- ----
8001 ---- L2 NW ---- ---- ---- ---- 8.8.8.8 7.7.7.7
8001 ---- -- AC po1 00:00:00:00:00:77:82:00:00:00 101 DF ---- ----
RD[7100:11]
ESI Eth-Tag Prefix-Length IP-Address GW-IPAddress L3VNID/LABEL Nexthop Encap Router-Mac
0 0 24 16.16.16.0 0.0.0.0 1000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 16.16.16.0 0.0.0.0 1000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 17.17.17.0 0.0.0.0 1000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 17.17.17.0 0.0.0.0 1000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 20.1.1.0 0.0.0.0 1000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 20.1.1.0 0.0.0.0 1000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 30:: :: 1000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 30:: :: 1000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 7002:: :: 1000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 7002:: :: 1000 7.7.7.7 VXLAN e001:a666:056d
RD[7400:11]
ESI Eth-Tag Prefix-Length IP-Address GW-IPAddress L3VNID/LABEL Nexthop Encap Router-Mac
0 0 24 10.1.1.0 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 10.1.1.0 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 11.11.11.0 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 11.11.11.0 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 12.1.1.0 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 12.1.1.0 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 12.13.14.0 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 12.13.14.0 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 13.1.1.0 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 24 13.1.1.0 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 32 2.2.2.2 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 32 2.2.2.2 0.0.0.0 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 2:: :: 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 2:: :: 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 40:: :: 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 40:: :: 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 50:: :: 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 50:: :: 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 8002:: :: 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 8002:: :: 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 8102:: :: 2000 7.7.7.7 VXLAN e001:a666:056d
0 0 64 8102:: :: 2000 7.7.7.7 VXLAN e001:a666:056d
RD[56000:11]
ESI Eth-Tag Prefix-Length IP-Address GW-IPAddress L3VNID/LABEL Nexthop Encap Router-Mac
0 0 24 40.1.1.0 0.0.0.0 1000 3.3.3.3 VXLAN e49d:73b1:c301
0 0 24 40.1.1.0 0.0.0.0 1000 3.3.3.3 VXLAN e49d:73b1:c301
0 0 64 2002:: :: 1000 3.3.3.3 VXLAN e49d:73b1:c301
0 0 64 2002:: :: 1000 3.3.3.3 VXLAN e49d:73b1:c301
RD[63000:11]
ESI Eth-Tag Prefix-Length IP-Address GW-IPAddress L3VNID/LABEL Nexthop Encap Router-Mac
0 0 24 50.50.50.0 0.0.0.0 2000 4.4.4.4 VXLAN e8c5:7aa8:7cb3
0 0 24 50.50.50.0 0.0.0.0 2000 4.4.4.4 VXLAN e8c5:7aa8:7cb3
0 0 64 3002:: :: 2000 4.4.4.4 VXLAN e8c5:7aa8:7cb3
0 0 64 3002:: :: 2000 4.4.4.4 VXLAN e8c5:7aa8:7cb3
PE8#
v - vrf leaked
* - candidate default
Abbreviations
The following are some key abbreviations and their meanings relevant to this document:
Acronym Description
SR Segment Routing
Glossary
The following provides definitions for key terms used throughout this document.
Multi Home VxLAN This refers to a Virtual Extensible LAN (VxLAN) deployment where a Multi data center or network site is
connected to a Multi external network (usually the internet) for connectivity.
IRB A networking feature that enables the integration of Layer 3 IP routing and Layer 2 MAC address
bridging within the same interface, simplifying network management and resource utilization.
OSPF A dynamic and efficient link-state routing protocol used to determine the best path for data packets in
an IP network. It is characterized by rapid convergence and adaptability, making it suitable for large
and dynamic networks.
ISIS A routing protocol designed for scalability and stability in computer networks, commonly used in large
Service Provider networks. It provides a robust framework for routing information exchange.
Layer 3 Routing Network routing operations at the Network Layer (Layer 3) of the OSI model, focusing on routing IP
packets between different subnets or networks.
Layer 2 Bridging Network bridging operations at the Data Link Layer (Layer 2) of the OSI model, handling the forwarding
of data frames based on MAC addresses within the same network segment.
EVPN Ethernet VPN, a technology that provides advanced and efficient methods for Layer 2 and Layer 3
services in Ethernet networks, often used in data centers and service provider environments.
Overview
An EVC represents a logical relationship between Ethernet User Network Interface (UNI) in a provider-based Ethernet
service. An EVC represents the service offered and is carried through the provider network. Each EVC is configured by
a unique name across the provider network.
An EVC is an end–to–end representation of a single instance of a Layer 2 service that a service provider offers. An
EVC embodies the different parameters based on which the service is offered. EVC prevents data transfer between
sites that are not part of the same EVC.
EVC is an A–Z circuit that enables you to pass customer VLANs from one port on a node to another port on another
node in the network. EVC represents a Carrier Ethernet service and is an entity that provides end–to–end connection
between two or more customer end points.
Topology
RTR1/VTEP1
RTR2
RTR3/VTEP2
(config-router)#neighbor 12.12.12.1 remote- Specify a neighbor router with peer ip address and remote-as
as 200 defined
(config-router)#neighbor 12.12.12.1 fall- Configure single-hop BFD session for its BGP peer
over bfd
(config-router)#address-family ipv4 unicast Enter into ipv4 unicast address family
(config-router-af)#network 34.34.34.0/31 Advertise loopback network into BGP for VTEP ID reachability
(config-router-af)#exit-address-family Exit ipv4 unicast address family mode
(config-router)#address-family l2vpn evpn Enter into l2vpn address family mode
(config-router-af)#neighbor 12.12.12.1 Activate the peer into address family mode
activate
(config-router-af)#exit-address-family Exit l2vpn address family mode
(config-router)#exit Exit BGP router mode
(config)#nvo vxlan enable Enable VXLAN
(config)#nvo vxlan vtep-ip-global 34.34.34.0 Configure Source vtep-ip-global configuration
(config)#nvo vxlan id 1 ingress-replication Configure VXLAN Network identifier with/without inner-vid-
inner-vid-disabled disabled configure and enter into VXLAN tenant mode
(config-nvo)#vxlan host-reachability- Assign VRF for evpn-bgp to carry EVPN route
protocol evpn-bgp vrf1
(config-nvo)#exit Exit VXLAN tenant mode.
(config)#nvo vxlan access-if port-vlan xe6 Enable port-vlan mapping i.e. access port to outer-vlan
1000 inner-vlan 2000 (SVLAN) and inner-vlan (CVLAN) mapping
(config-nvo-acc-if)#map vnid 1 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)#exit Exit VXLAN access-interface mode
(config)#commit Commit the candidate configuration to the running
configuration
(config)#exit Exit configuration mode
Validation
RD[100:11] VRF[vrf1]:
* [2]:[0]:[1]:[48,0000.339a.9397]:[0]:[1]
34.34.34.0 0 100 0 200
300 i 11.11.11.1 VXLAN
*> [2]:[0]:[1]:[48,0000.339a.9abb]:[0]:[1]
33.33.33.0 0 100 32768 i -
--------- VXLAN
*> [3]:[1]:[32,33.33.33.1]
33.33.33.0 0 100 32768
i ---------- VXLAN
* [3]:[1]:[32,34.34.34.0]
34.34.34.0 0 100 0 200
300 i 11.11.11.1 VXLAN
RD[300:11]
*> [2]:[0]:[1]:[48,0000.339a.9397]:[0]:[1]
34.34.34.0 0 100 0 200
================================================================================
=====================================================================
VXLAN MAC Entries
================================================================================
=====================================================================
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
________________________________________________________________________________
_____________________________________________________________________
RTR3/VTEP2
#show running-config nvo vxlan
!
nvo vxlan enable
!
nvo vxlan vtep-ip-global 34.34.34.0
!
nvo vxlan id 1 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp vrf1
!
nvo vxlan access-if port-vlan xe6 1000 inner-vlan 2000
map vnid 1
!
VTEP2#show bgp l2vpn evpn summary
BGP router identifier 3.3.3.3, local AS number 300
BGP table version is 7
2 BGP AS-PATH entries
0 BGP community entries
RD[100:11]
*> [2]:[0]:[1]:[48,0000.339a.9abb]:[0]:[1]
33.33.33.0 0 100 0 200
100 i 12.12.12.1 VXLAN
*> [3]:[1]:[32,33.33.33.0]
33.33.33.0 0 100 0 200
100 i 12.12.12.1 VXLAN
*> [2]:[0]:[1]:[48,0000.339a.9397]:[0]:[1]
34.34.34.0 0 100 32768 i -
--------- VXLAN
* [2]:[0]:[1]:[48,0000.339a.9abb]:[0]:[1]
33.33.33.0 0 100 0 200
100 i 12.12.12.1 VXLAN
* [3]:[1]:[32,33.33.33.0]
33.33.33.0 0 100 0 200
100 i 12.12.12.1 VXLAN
*> [3]:[1]:[32,34.34.34.0]
34.34.34.0 0 100 32768 i -
--------- VXLAN
#show ip route
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2,
ia - IS-IS inter area, E - EVPN,
v - vrf leaked
* - candidate default
VTEP2
(config)#nvo vxlan access-if port xe6 Enable port-only mapping for access port
(config-nvo-acc-if)#map vnid 1 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)#exit Exit VXLAN access-interface mode
(config)#commit Commit the candidate configuration to the running
configuration
(config)#exit Exit configuration mode
RTR3/VTEP2
#show nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
VNID VNI-Name VNI-Type Type Interface ESI
VLAN DF-Status Src-Addr Dst-Addr
________________________________________________________________________________
1 ---- L2 NW ---- ------
---- ---- 34.34.34.0 33.33.33.0
1 ---- -- AC xe6 --- Single Homed Port ---
---- ---- ---- ----
Total number of entries are 2
(config)#nvo vxlan access-if port-vlan xe6 Enable port-vlan mapping i.e. access port to outer-vlan
3000 inner-vlan 2000 (SVLAN) and inner-vlan (CVLAN) mapping
(config-nvo-acc-if)#map vnid 1 Map VXLAN Identified to access-port for VXLAN
(config-nvo-acc-if)#exit Exit VXLAN access-interface mode
(config)#commit Commit the candidate configuration to the running
configuration
(config)#exit Exit configuration mode
RTR3/VTEP2
#show running-config nvo vxlan
!
nvo vxlan enable
!
nvo vxlan vtep-ip-global 34.34.34.0
!
nvo vxlan id 1 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp vrf1
!
nvo vxlan access-if port-vlan xe1/1 3000 inner-vlan 2000
map vnid 1
!
#show nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
Overview
Ethernet VPN Ethernet-Tree (EVPN E-Tree), is a networking solution designed to manage communication within
broadcast domains, incorporating redundancy through multi-homing in a network. It optimizes traffic routing and
control, especially in scenarios where specific services or devices need controlled communication. It categorizes
network nodes based on predefined definitions of EVPN Instances as Leaf or Root, allowing or restricting
communication between them.
Feature Characteristics
Implemented Scenario 1 of the EVPN E-Tree solution, as defined by RFC-8317, designates each Provider Edge (PE)
node as either a Leaf or a Root site per Virtual Private Network (VPN) for VXLAN and MPLS EVPN in OcNOS.
EVPN E-Tree
The classification ensures that communication follows specific rules:
• Communication between Leaf hosts is restricted, as indicated by red dotted lines with a cross mark (X) in the
topology diagram. However, communication between Leaf and Root nodes, as well as between Root nodes, is
permitted, marked by green dotted lines.
• Leaf nodes within PE-1 and PE-2 are isolated from each other, preventing intra-PE communication.
The scenario 1 is achieved through two main concepts:
1. Inter-PE Communication
• The inter-PE Route Target (RT) Constraint Method is applicable only to Single-Homing (SH) devices. Two RTs
per broadcast domain are utilized, with Leaf PEs exporting Leaf RTs and Root nodes exporting Root RTs. Leaf
nodes import only Root RTs, allowing communication with Root PEs while preventing communication with
other Leaf nodes. RT constraints limit the import of specific EVPN routes (MAC-IP and IMET routes) to
designated paths for inter-PE communication.
• IPI employs a proprietary method to support inter-PE connectivity for both SH and MH devices, using BGP
extended community to advertise Leaf Indication in BGP routes and influence traffic flow for both Unicast and
BUM traffic. This method enables implementation of ARP or ND cache suppression and MAC mobility sub-
features specified in RFC-7432.
2. Intra-PE communication: Local Split Horizon controls intra-PE communication between Attachment Circuits
(ACs) within Leaf PE nodes, ensuring that traffic between ACs does not egress to other Leaf ACs.
Note: This functionality depends on hardware capabilities.
Benefits
EVPN E-Tree offers benefits in networking environments by providing efficient traffic control, enhanced security,
scalability, and improved performance.
Efficient Traffic Control: EVPN E-Tree allows for efficient control over traffic within network broadcast domains. By
segregating nodes into Leaf and Root categories, it enables precise management of communication flows, ensuring
the traffic is directed only where needed.
Enhanced Security: The isolation of Leaf hosts from each other adds a layer of security to the network. This prevents
unauthorized communication between devices within the same broadcast domain, reducing the risk of data breaches
and unauthorized access.
Scalability: EVPN E-Tree is scalable, making it suitable for networks of various sizes and complexities. Whether
deploying in small-scale environments or large enterprise networks, EVPN E-Tree offers flexibility and scalability to
meet evolving business needs.
Improved Performance: By controlling communication paths and optimizing traffic flows, EVPN E-Tree can improve
network performance. This ensures that critical data packets are delivered efficiently, reducing latency and enhancing
overall network performance.
Prerequisites
In setting up a VXLAN EVPN network, certain prerequisites are essential to ensure proper functionality and
connectivity.
Ensure VXLAN EVPN Configuration: Confirm that VXLAN, EVPN VXLAN, and VXLAN filtering are already enabled
in the network as they are required for VXLAN EVPN Multihoming.
Define Interfaces and Loopback Addresses: Configure Layer 2 interfaces, like port channel interfaces (e.g., po1),
and assign specific system MAC addresses (Ethernet Segment Identifier (ESI) values) for proper identification and
routing. Additionally, assign loopback IP addresses to establish essential points of connectivity. These configurations
establish the efficient network routing and communication.
Configure OSPF and BGP for Dynamic Routing: Enable OSPF to facilitate dynamic routing within the network.
Define OSPF router IDs to match loopback IP addresses and add network segments to OSPF areas for proper route
distribution. Additionally, establish BGP sessions to advertise routes between different nodes. Set up neighbor
relationships using loopback IP addresses, ensuring efficient route advertisement and convergence for optimal network
performance.
Leaf Node
1. Enable VXLAN and EVPN MH
Enable features like VXLAN and EVPN Multihoming, VXLAN filtering, and quality of service (QoS) capabilities on
all Leaf nodes.
!
nvo vxlan enable
!
evpn vxlan multihoming enable
!
qos enable
!
2. Configure Interfaces and Loopback
Define a port channel interface (po1) as an L2 interface and assign the system MAC (0000.0000.1111) as the
ESI value. Designate an interface (xe7) as a member port of po1. Assign the loopback IP address (1.1.1.1) to
Leaf node, and set IP addresses (10.10.10.1 and 10.10.11.1) to interfaces (xe45 and xe49/2), respectively,
for connectivity with Spine nodes.
!
interface po1
switchport
evpn multi-homed system-mac 0000.0000.1111
!
interface lo
ip address 1.1.1.1/32 secondary
!
interface xe7
channel-group 1 mode active
!
interface xe45
ip address 10.10.10.1/24
!
interface xe49/2
ip address 10.10.11.1/24
exit
!
3. Configure OSPF
In OSPF router mode, set the router ID (1.1.1.1), to match the loopback IP address. Add the loopback network
(1.1.1.1/32) and networks (10.10.10.0/24 and 10.10.11.0/24) connected to Spine nodes in OSPF area
0. Enable Bidirectional Forwarding Detection (BFD) on all OSPF interfaces for faster convergence.
!
router ospf 100
ospf router-id 1.1.1.1
bfd all-interfaces
network 1.1.1.1/32 area 0.0.0.0
network 10.10.10.0/24 area 0.0.0.0
network 10.10.11.0/24 area 0.0.0.0
!
4. Configure BGP
In BGP router mode, set the router ID (1.1.1.1) to match the loopback IP address. Specify the loopback IP
address of each Leaf node as neighbors with their respective remote AS numbers. Configure the loopback as the
update source for each neighbor and set the advertisement interval (0) for rapid convergence. In L2VPN EVPN
address family mode, activate each Leaf node (2.2.2.2, 3.3.3.3, 4.4.4.4) to establish connections within
the EVPN address family.
!
router bgp 100
bgp router-id 1.1.1.1
neighbor 2.2.2.2 remote-as 100
neighbor 3.3.3.3 remote-as 100
neighbor 4.4.4.4 remote-as 100
neighbor 2.2.2.2 update-source lo
neighbor 2.2.2.2 advertisement-interval 0
neighbor 3.3.3.3 update-source lo
neighbor 3.3.3.3 advertisement-interval 0
neighbor 4.4.4.4 update-source lo
neighbor 4.4.4.4 advertisement-interval 0
!
address-family l2vpn evpn
neighbor 2.2.2.2 activate
neighbor 3.3.3.3 activate
neighbor 4.4.4.4 activate
exit-address-family
!
exit
!
5. Configure VRF
In VRF mode, create a MAC routing or forwarding instance (VRF1). Assign the Route Distinguisher (RD) value
(1.1.1.1:100) and set both import and export route-target value (100:100) . Ensure that the same route-target
value is configured on all Leaf nodes for MAC VRF to maintain consistency.
!
mac vrf VRF1
rd 1.1.1.1:100
route-target both 100:100
!
Spine Node
1. Configure Interfaces and Loopback
Enable QoS and assign specific IP addresses to loopback interfaces. Configure IP addresses for interfaces
connected to each Leaf node.
!
qos enable
!
interface ce1/2
ip address 40.40.40.2/24
!
interface ce1/4
ip address 10.10.10.2/24
!
interface ce24/1
ip address 30.30.30.2/24
!
interface ce27/1
ip address 20.20.20.2/24
!
interface lo
ip address 5.5.5.5/32 secondary
!
2. Configure OSPF
In OSPF router mode, set the router ID (5.5.5.5), to match the loopback IP address. Add the loopback network
(5.5.5.5/32) and networks (10.10.10.0/24, 20.20.20.0/24, 30.30.30.0/24, and 40.40.40.0/
24) connected to Leaf nodes in OSPF area 0. Enable BFD on all OSPF interfaces for faster convergence.
!
router ospf 100
ospf router-id 5.5.5.5
bfd all-interfaces
network 5.5.5.5/32 area 0.0.0.0
network 10.10.10.0/24 area 0.0.0.0
network 20.20.20.0/24 area 0.0.0.0
network 30.30.30.0/24 area 0.0.0.0
network 40.40.40.0/24 area 0.0.0.0
!
Configure Switch
Set up an IEEE VLAN bridge, enabling VLANs and associating them with bridge 1. Configure interfaces (xe57, po1,
xe46, xe47) to be part of bridge 1, setting them as hybrid ports with VLAN (1000) allowed and egress-tagged
enabled. Designate interfaces connected to Leaf nodes (xe46 and xe47) as member ports of po1.
!
bridge 1 protocol ieee vlan-bridge
!
vlan database
vlan-reservation 4000-4094
vlan 1000 bridge 1 state enable
!
interface po1
switchport
bridge-group 1
switchport mode hybrid
switchport mode hybrid acceptable-frame-type all
switchport hybrid allowed vlan add 1000 egress-tagged enable
!
interface xe46
channel-group 1 mode active
!
interface xe47
channel-group 1 mode active
!
interface xe57
switchport
bridge-group 1
switchport mode hybrid
switchport mode hybrid acceptable-frame-type all
switchport hybrid allowed vlan add 1000 egress-tagged enable
!
Configuration
Configure various nodes within the topology to set up a VXLAN EVPN E-Tree network.
Topology
The sample topology includes Leaf Nodes (VTEP1, VTEP2, VTEP3, and VTEP4), Spine Nodes (SPINE1 and SPINE2),
and Switches (SWITCH1 and SWITCH2).
VTEP1 and VTEP2 belong to Multi-homed group 1 (MH1) with po1, while VTEP3 and VTEP4 are in Multi-homed group
2 (MH2) with po2. VTEP2 and VTEP4 connect to single home access ports SH1 and SH2, respectively. All VTEPs link
to Spine nodes SPINE1 and SPINE2. SWITCH1 is multi-homed to VTEP1 and VTEP2, and SWITCH2 connects to
VTEP3 and VTEP4.
1. Enable EVPN E-Tree on VTEP3 and VTEP4 nodes, allowing them to participate in E-Tree functionality within the
VXLAN network, controlling traffic and establishing hierarchical connections between Leaf nodes in the network
architecture.
(config)#evpn etree enable
2. Set the ESI hold time (90 seconds) on all VTEP nodes to allow the tunnel to establish during VXLAN initialization
before bringing up the ESI. Configure the source VTEP IP address (3.3.3.3) which serves as the global identifier
for VXLAN encapsulation and decapsulation within the network, facilitating proper communication and tunnel
establishment.
(config)#evpn esi hold-time 90
(config)#nvo vxlan vtep-ip-global 3.3.3.3
3. Define VXLAN identifier (10) with ingress replication and disabled inner VLAN ID (VID) for E-Tree leaf nodes
(VTEP3 and VTEP4) to support hierarchical connectivity and traffic control within the VXLAN network. This
configuration allows for efficient replication of traffic at the ingress point and ensures that inner VLAN IDs are
disabled, optimizing the functionality of E-Tree leaf nodes within the network architecture. On the VXLAN tenant
node, assign VRF (VRF1) to EVPN-BGP for carrying EVPN routes within the VXLAN network.
(config)#nvo vxlan id 10 ingress-replication inner-vid-disabled etree-leaf
(config-nvo)#vxlan host-reachability- protocol evpn-bgp VRF1
(config-nvo)#exit
4. Enable port-VLAN mapping (po2) with VLAN ID (1000) to facilitate multi-homed access on all VTEP nodes. Map
VXLAN identifier (10) to the access port for VXLAN connectivity.
(config)#nvo vxlan access-if port-vlan po2 1000
(config-nvo-acc-if)#map vnid 10
(config-nvo-acc-if)#exit
(config)#commit
Validation
Use the show commands described in this section to verify the network for proper VXLAN EVPN E-Tree configuration.
Verify OSPF sessions between the VTEP nodes and the SPINEs within the VXLAN network using the show ip ospf
neighbor command. This command displays OSPF neighbor details, including the state of the OSPF neighbor
relationship. A State of Full/DR indicates a fully adjacent and operational state between the routers, confirming
proper OSPF connectivity within the network.
VTEP1#show ip ospf neighbor
Neighbor V AS MsgRcv MsgSen TblVer InQ OutQ Up/Down State/PfxRcd AD MACIP MCAST ESI PREFIX-ROUTE
2.2.2.2 4 100 34 28 7 0 0 00:07:37 9 3 4 1 1 0
3.3.3.3 4 100 30 33 8 0 0 00:07:34 6 3 2 1 0 0
4.4.4.4 4 100 31 28 7 0 0 00:07:37 8 3 4 1 0 0
To validate the BGP L2VPN output on VTEPs and check MAC-IP routes and ESI information, use the show bgp
l2vpn evpn command output. This command verifies routes with status code i (internal) and EVPN route
types 2 and 4, displaying detailed information for each VTEP nodes.
VTEP1#show bgp l2vpn evpn
BGP table version is 9, local router ID is 1.1.1.1
Status codes: s suppressed, d damped, h history, a add-path, b back-up, * valid, > best, i - internal,
l - labeled, S Stale
Origin codes: i - IGP, e - EGP, ? - incomplete
RD[1.1.1.1:100] VRF[VRF1]:
*> [1]:[00:00:00:00:00:11:11:00:00:00]:[10]:[10]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i[1]:[00:00:00:00:00:22:22:00:00:00]:[10]:[10]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i[1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i 3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*> [2]:[00:00:00:00:00:11:11:00:00:00]:[10]:[48,0000:1000:1000]:[32,100.100.100.1]:[10]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*> [2]:[00:00:00:00:00:11:11:00:00:00]:[10]:[48,0000:1000:1001]:[128,1000::1][10]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i 2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i[2]:[0]:[10]:[48,0000:2000:2000]:[32,200.200.200.1]:[10]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i[2]:[0]:[10]:[48,0000:2000:2001]:[128,2000::1][10]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i[2]:[00:00:00:00:00:22:22:00:00:00]:[10]:[48,0000:3000:3000]:[32,103.103.103.1]:[10]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i[2]:[00:00:00:00:00:22:22:00:00:00]:[10]:[48,0000:3000:3001]:[128,1003::1][10]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i 4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i[2]:[0]:[10]:[48,0000:4000:4000]:[32,104.104.104.1]:[10]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
* i[2]:[0]:[10]:[48,0000:4000:4001]:[128,1004::1][10]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*> [3]:[10]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i[3]:[10]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
* i[3]:[10]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
* i[3]:[10]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
RD[1.1.1.1:64512] VRF[evpn-gvrf-1]:
*> [1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
1.1.1.1 0 100 32768 i ---------- VXLAN
*> [4]:[00:00:00:00:00:11:11:00:00:00]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i ---------- VXLAN
* i[4]:[00:00:00:00:00:11:11:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:100]
*>i[1]:[00:00:00:00:00:11:11:00:00:00]:[10]:[10]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i[1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i[2]:[00:00:00:00:00:11:11:00:00:00]:[10]:[48,0000:1000:1000]:[32,100.100.100.1]:[10]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i[2]:[00:00:00:00:00:11:11:00:00:00]:[10]:[48,0000:1000:1001]:[128,1000::1][10]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i[2]:[0]:[10]:[48,0000:2000:2000]:[32,200.200.200.1]:[10]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i[2]:[0]:[10]:[48,0000:2000:2001]:[128,2000::1][10]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i[3]:[10]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[2.2.2.2:64512]
*>i[1]:[00:00:00:00:00:11:11:00:00:00]:[4294967295]:[0]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
*>i[4]:[00:00:00:00:00:11:11:00:00:00]:[32,2.2.2.2]
2.2.2.2 0 100 0 i 2.2.2.2 VXLAN
RD[3.3.3.3:100]
*>i[1]:[00:00:00:00:00:22:22:00:00:00]:[10]:[10]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i[1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i[2]:[00:00:00:00:00:22:22:00:00:00]:[10]:[48,0000:3000:3000]:[32,103.103.103.1]:[10]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i[2]:[00:00:00:00:00:22:22:00:00:00]:[10]:[48,0000:3000:3001]:[128,1003::1][10]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
*>i[3]:[10]:[32,3.3.3.3]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
RD[3.3.3.3:64512]
*>i[1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
3.3.3.3 0 100 0 i 3.3.3.3 VXLAN
RD[4.4.4.4:100]
*>i[1]:[00:00:00:00:00:22:22:00:00:00]:[10]:[10]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i[1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i[2]:[00:00:00:00:00:22:22:00:00:00]:[10]:[48,0000:3000:3000]:[32,103.103.103.1]:[10]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i[2]:[00:00:00:00:00:22:22:00:00:00]:[10]:[48,0000:3000:3001]:[128,1003::1][10]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i[2]:[0]:[10]:[48,0000:4000:4000]:[32,104.104.104.1]:[10]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i[2]:[0]:[10]:[48,0000:4000:4001]:[128,1004::1][10]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
*>i[3]:[10]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
RD[4.4.4.4:64512]
*>i[1]:[00:00:00:00:00:22:22:00:00:00]:[4294967295]:[0]
4.4.4.4 0 100 0 i 4.4.4.4 VXLAN
Validate the LAG interfaces (po1 and po2) are up for MH1 and MH2 by reviewing the show etherchannel
summary output. Check the Link and sync fields, where link displays the port channel interface and ID number, and
sync indicates whether MAC address synchronization is enabled to forward Layer 3 packets arriving on these
interfaces.
VTEP1#show etherchannel summary
Aggregator po1 100001
Aggregator Type: Layer2
Admin Key: 0001 - Oper Key 0001
Link: xe7 (5005) sync: 1
Validate the status of NVO VXLAN on VTEPs by examining the output of the show nvo vxlan command. The DF-
Status field displays the forwarding status of VXLAN tunnels as a Designated Forwarder (DF) or Non-Designated
Forwarder (Non-DF).
VTEP1#show nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
____________________________________________________________________________________________________________________________
10 ---- L2 NW ---- ---- ---- ---- 1.1.1.1 4.4.4.4
10 ---- L2 NW ---- ---- ---- ---- 1.1.1.1 3.3.3.3
10 ---- L2 NW ---- ---- ---- ---- 1.1.1.1 2.2.2.2
10 ---- -- AC po1 00:00:00:00:00:11:11:00:00:00 1000 DF ---- ----
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
___________________________________________________________________________________________________________________________
10 ---- L2 NW ---- ---- ---- ---- 2.2.2.2 4.4.4.4
10 ---- L2 NW ---- ---- ---- ---- 2.2.2.2 1.1.1.1
10 ---- L2 NW ---- ---- ---- ---- 2.2.2.2 3.3.3.3
10 ---- -- AC xe37 --- Single Homed Port --- 1000 ---- ---- ----
10 ---- -- AC po1 00:00:00:00:00:11:11:00:00:00 1000 NON-DF ---- ----
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
___________________________________________________________________________________________________________________________
10 ---- L2 NW ---- ---- ---- ---- 3.3.3.3 2.2.2.2
10 ---- L2 NW ---- ---- ---- ---- 3.3.3.3 1.1.1.1
10 ---- L2 NW ---- ---- ---- ---- 3.3.3.3 4.4.4.4
10 ---- -- AC po2 00:00:00:00:00:22:22:00:00:00 1000 DF ---- ----
VNID VNI-Name VNI-Type Type Interface ESI VLAN DF-Status Src-Addr Dst-Addr
___________________________________________________________________________________________________________________________
10 ---- L2 NW ---- ---- ---- ---- 4.4.4.4 2.2.2.2
10 ---- L2 NW ---- ---- ---- ---- 4.4.4.4 3.3.3.3
10 ---- L2 NW ---- ---- ---- ---- 4.4.4.4 1.1.1.1
10 ---- -- AC xe34 --- Single Homed Port --- 1000 ---- ---- ----
10 ---- -- AC po2 00:00:00:00:00:22:22:00:00:00 1000 NON-DF ---- ----
Validate the NVO VXLAN tunnel status on VTEPs by reviewing the output of the show nvo vxlan tunnel
command. The Status field indicates the current status of each tunnel. In this case, all three tunnels between VTEPs
and their respective destinations are marked as Installed, confirming that these tunnels are successfully
established and operating.
VTEP1#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
========================================================================
1.1.1.1 4.4.4.4 Installed 00:02:26 00:01:58
1.1.1.1 3.3.3.3 Installed 00:02:26 00:01:55
1.1.1.1 2.2.2.2 Installed 00:02:25 00:01:55
Validation
Verify the MAC table entries on MH VTEPs (MH1 and MH2) and the SH VTEPs (VTEP2 and VTEP4). The MAC
addresses are advertised using the ESI values from VTEP1 and VTEP2 for MH1, and from VTEP3 and VTEP4 for
MH2. Additionally, verify the VTEP IP addresses associated with SH VTEP2 and VTEP4 for MAC advertisement.
In the output of the show nvo vxlan mac-table command on all VTEP nodes, the MAC entries advertised from
Leaf VTEPs will have the LeafFlag field status set.
Note:
• MAC IPv4 or IPv6 configured under SH Leaf VTEP access port will be advertised to the Root VTEP and other Leaf
VTEPs.
• MAC IPv4 or IPv6 configured under an MH Leaf VTEP access port must be symmetric and will be advertised to
both the Root VTEP and other leaf VTEPs.
• MAC IPv4 or IPv6 configured under either SH or MH Root VTEP will be advertised to both the Root VTEP and the
Leaf VTEPs.
• The Leaf-to-Leaf communication will display MAC status and tunnel status per VNI as Leaf type. The MAC will be
in the discard state in the BCM shell.
VTEP1#show nvo vxlan mac-table
============================================================================================================================
VXLAN MAC Entries
============================================================================================================================
VNID Interface VlanId In-VlanId Mac-Addr VTEP-Ip/ESI Type Status MAC move AccessPortDesc LeafFlag
____________________________________________________________________________________________________________________________
10 po1 1000 ---- 0000.1000.1000 00:00:00:00:00:11:11:00:00:00 Static Local ------- 0 ------- ----
10 po1 1000 ---- 0000.1000.1001 00:00:00:00:00:11:11:00:00:00 Static Local ------- 0 ------- ----
10 ---- ---- ---- 0000.2000.2000 2.2.2.2 Static Remote ------- 0 ------- ----
10 ---- ---- ---- 0000.2000.2001 2.2.2.2 Static Remote ------- 0 ------- ----
10 ---- ---- ---- 0000.3000.3000 00:00:00:00:00:22:22:00:00:00 Static Remote ------- 0 ------- set
10 ---- ---- ---- 0000.3000.3001 00:00:00:00:00:22:22:00:00:00 Static Remote ------- 0 ------- set
10 ---- ---- ---- 0000.4000.4000 4.4.4.4 Static Remote ------- 0 ------- set
10 ---- ---- ---- 0000.4000.4001 4.4.4.4 Static Remote ------- 0 ------- set
10 ---- ---- ---- 0000.1000.1000 00:00:00:00:00:11:11:00:00:00 Static Remote ------- 0 ------- ----
10 ---- ---- ---- 0000.1000.1001 00:00:00:00:00:11:11:00:00:00 Static Remote ------- 0 ------- ----
10 ---- ---- ---- 0000.2000.2000 2.2.2.2 Static Remote ------- 0 ------- ----
10 ---- ---- ---- 0000.2000.2001 2.2.2.2 Static Remote ------- 0 ------- ----
10 po2 1000 ---- 0000.3000.3000 00:00:00:00:00:22:22:00:00:00 Static Local ------- 0 ------- set
10 po2 1000 ---- 0000.3000.3001 00:00:00:00:00:22:22:00:00:00 Static Local ------- 0 ------- set
10 ---- ---- ---- 0000.4000.4000 4.4.4.4 Static Remote ------- 0 ------- set
10 ---- ---- ---- 0000.4000.4001 4.4.4.4 Static Remote ------- 0 ------- set
Use the show nvo vxlan arp-cache command to verify the Address Resolution Protocol (ARP) cache information
on all VTEP nodes. This command displays entries that map IPv4 addresses to MAC addresses within the specified
VXLAN VNID network.
VTEP1#show nvo vxlan arp-cache
VXLAN ARP-CACHE Information
===========================
VNID Ip-Addr Mac-Addr Type Age-Out Retries-Left
____________________________________________________________________________
10 100.100.100.1 0000.1000.1000 Static Local ----
10 103.103.103.1 0000.3000.3000 Static Remote ----
10 104.104.104.1 0000.4000.4000 Static Remote ----
10 200.200.200.1 0000.2000.2000 Static Remote ----
Total number of entries are 4
VTEP1
!
nvo vxlan enable
!
evpn esi hold-time 90
!
evpn vxlan multihoming enable
!
mac vrf VRF1
rd 1.1.1.1:100
route-target both 100:100
!
nvo vxlan vtep-ip-global 1.1.1.1
!
nvo vxlan id 10 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp VRF1
!
qos enable
!
interface po1
switchport
evpn multi-homed system-mac 0000.0000.1111
!
interface lo
ip address 1.1.1.1/32 secondary
!
interface xe7
channel-group 1 mode active
!
interface xe45
ip address 10.10.10.1/24
!
interface xe49/2
ip address 10.10.11.1/24
!
exit
!
VTEP2
!
nvo vxlan enable
!
evpn esi hold-time 90
!
evpn vxlan multihoming enable
!
mac vrf VRF1
rd 2.2.2.2:100
route-target both 100:100
!
nvo vxlan vtep-ip-global 2.2.2.2
!
nvo vxlan id 10 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp VRF1
!
qos enable
!
interface po1
switchport
evpn multi-homed system-mac 0000.0000.1111
!
interface lo
ip address 2.2.2.2/32 secondary
!
interface xe38
channel-group 1 mode active
!
interface xe49/1
ip address 20.20.20.1/24
!
interface xe50/1
ip address 20.20.21.1/24
!
exit
!
VTEP3
!
nvo vxlan enable
!
evpn esi hold-time 90
!
evpn vxlan multihoming enable
!
evpn etree enable
!
mac vrf VRF1
rd 3.3.3.3:100
route-target both 100:100
!
nvo vxlan vtep-ip-global 3.3.3.3
!
nvo vxlan id 10 ingress-replication inner-vid-disabled etree-leaf
vxlan host-reachability-protocol evpn-bgp VRF1
!
qos enable
!
interface po2
switchport
evpn multi-homed system-mac 0000.0000.2222
!
interface lo
ip address 3.3.3.3/32 secondary
!
interface xe53/1
ip address 30.30.30.1/24
!
interface xe54/1
ip address 30.30.31.1/24
!
interface xe55/1
channel-group 2 mode active
!
exit
!
router ospf 100
ospf router-id 3.3.3.3
bfd all-interfaces
network 3.3.3.3/32 area 0.0.0.0
network 30.30.30.0/24 area 0.0.0.0
network 30.30.31.0/24 area 0.0.0.0
!
router bgp 100
bgp router-id 3.3.3.3
neighbor 1.1.1.1 remote-as 100
neighbor 2.2.2.2 remote-as 100
neighbor 4.4.4.4 remote-as 100
neighbor 1.1.1.1 update-source lo
neighbor 1.1.1.1 advertisement-interval 0
neighbor 2.2.2.2 update-source lo
neighbor 2.2.2.2 advertisement-interval 0
neighbor 4.4.4.4 update-source lo
neighbor 4.4.4.4 advertisement-interval 0
!
address-family l2vpn evpn
neighbor 1.1.1.1 activate
neighbor 2.2.2.2 activate
neighbor 4.4.4.4 activate
exit-address-family
!
exit
!
!
nvo vxlan access-if port-vlan po2 1000
map vnid 10
mac 0000.3000.3000 ip 103.103.103.1
VTEP4
!
nvo vxlan enable
!
evpn esi hold-time 90
!
evpn vxlan multihoming enable
!
evpn etree enable
!
mac vrf VRF1
rd 4.4.4.4:100
route-target both 100:100
!
nvo vxlan vtep-ip-global 4.4.4.4
!
nvo vxlan id 10 ingress-replication inner-vid-disabled etree-leaf
vxlan host-reachability-protocol evpn-bgp VRF1
!
qos enable
!
interface po2
switchport
evpn multi-homed system-mac 0000.0000.2222
!
interface lo
ip address 4.4.4.4/32 secondary
!
interface xe11/1
ip address 40.40.41.1/24
!
interface xe31/1
channel-group 2 mode active
!
interface xe33
ip address 40.40.40.1/24
!
interface xe34
switchport
!
exit
!
router ospf 100
ospf router-id 4.4.4.4
bfd all-interfaces
network 4.4.4.4/32 area 0.0.0.0
network 40.40.40.0/24 area 0.0.0.0
network 40.40.41.0/24 area 0.0.0.0
!
router bgp 100
bgp router-id 4.4.4.4
neighbor 1.1.1.1 remote-as 100
SPINE1
!
qos enable
!
interface ce1/2
ip address 40.40.40.2/24
!
interface ce1/4
ip address 10.10.10.2/24
!
interface ce24/1
ip address 30.30.30.2/24
!
interface ce27/1
ip address 20.20.20.2/24
!
interface lo
ip address 5.5.5.5/32 secondary
!
exit
!
router ospf 100
ospf router-id 5.5.5.5
bfd all-interfaces
network 5.5.5.5/32 area 0.0.0.0
network 10.10.10.0/24 area 0.0.0.0
network 20.20.20.0/24 area 0.0.0.0
SPINE2
!
qos enable
!
interface ce5/1
ip address 20.20.21.2/24
!
interface ce10/1
ip address 30.30.31.2/24
!
interface ce11/1
ip address 40.40.41.2/24
!
interface ce14/2
ip address 10.10.11.2/24
!
interface lo
ip address 6.6.6.6/32 secondary
!
exit
!
router ospf 100
ospf router-id 6.6.6.6
bfd all-interfaces
network 6.6.6.6/32 area 0.0.0.0
network 10.10.11.0/24 area 0.0.0.0
network 20.20.21.0/24 area 0.0.0.0
network 30.30.31.0/24 area 0.0.0.0
network 40.40.41.0/24 area 0.0.0.0
!
SWITCH1
!
bridge 1 protocol ieee vlan-bridge
!
vlan database
vlan-reservation 4000-4094
vlan 1000 bridge 1 state enable
!
interface po1
switchport
bridge-group 1
switchport mode hybrid
switchport mode hybrid acceptable-frame-type all
switchport hybrid allowed vlan add 1000 egress-tagged enable
!
interface xe46
channel-group 1 mode active
!
interface xe47
SWITCH2
!
bridge 1 protocol ieee vlan-bridge
!
vlan database
vlan-reservation 4000-4094
vlan 1000 bridge 1 state enable
!
interface po2
switchport
bridge-group 1
switchport mode hybrid
switchport mode hybrid acceptable-frame-type all
switchport hybrid allowed vlan add 1000 egress-tagged enable
!
interface xe33
switchport
bridge-group 1
switchport mode hybrid
switchport mode hybrid acceptable-frame-type all
switchport hybrid allowed vlan add 1000 egress-tagged enable
!
interface xe49/1
channel-group 2 mode active
!
interface xe51/1
channel-group 2 mode active
!
exit
!
Implementation Examples
Here is an example scenario and a solution for implementing EVPN E-Tree.
Scenario 1: Specific traffic isolation and control measures are essential in a network of EVPN L2VPN services or
instances. Within a broadcast domain, services communicating with each other may result in flooding BUM traffic to all
services within the domain. Moreover, hosts are learned and advertised between different sites/services.
Use Case 1: Implementing an EVPN E-Tree solution defines the network topology with distinct Root and Leaf
classifications, BUM traffic flooding can be minimized, and traffic isolation can be achieved. This ensures efficient
communication between services while preventing unnecessary traffic propagation and maintaining network integrity.
Scenario 2: An Internet Service Provider (ISP) provides services to multiple subscribers and aims to facilitate
communication with them. However, the ISP needs to ensure that subscribers exclusively communicate with the ISP
and not among themselves.
Use Case 2: Implementing EVPN E-Tree is essential to fulfill this requirement. By categorizing ISP services as Root
and subscribers as Leaf, traffic isolation can be enforced. This configuration enables the ISP to communicate with
subscribers while preventing inter-subscriber communication. As a result, network security is enhanced, and the ISP
maintains control over communication within its network.
evpn etree
Use this command to enable E-Tree functionality within the EVPN configuration.
Command Syntax
evpn etree enable
Parameters
None
Default
Disabled
Command Mode
Configure mode
Applicability
Introduced in OcNOS version 6.5.1.
Example
The following example illustrates how to activate E-Tree functionality for EVPN:
OcNOS#configure terminal
OcNOS(config)#evpn etree enable
nvo vxlan id
• The existing syntax now includes the newly added parameter for E-Tree, namely etree-leaf.
• The command nvo vxlan id <VNID> ingress-replication inner-vid-disabled etree-leaf
allows users to tailor VXLAN behavior on a network device, specifying VXLAN parameters and indicating its
participation as a leaf node in an E-Tree deployment. For more details, refer to the nvo vxlan id command in the
VXLAN Commands chapter in the OcNOS VXLAN Guide.
Troubleshooting
1. When traffic, whether unicast (UC) or broadcast, is passed to the Intra Leaf site:
• Check the sub-interface or physical interface counters to monitor traffic throughput and potential issues.
• Verify the Leaf status of the corresponding VNI to ensure proper functionality.
• Use packet sniffing tools to analyze packets in the egress direction for any anomalies or errors.
• MAC entries learned via leaf access port should include the set keyword in the MAC table output.
Glossary
The following provides definitions for key terms or abbreviations and their meanings used throughout this document:
Ethernet VPN Ethernet- A networking solution designed to manage communication within broadcast domains,
Tree (EVPN E-Tree) incorporating redundancy through multi-homing in a network. It optimizes traffic routing and
control, categorizing network nodes based on predefined definitions of EVPN Instances as Leaf
or Root, allowing or restricting communication between them.
Virtual Extensible LAN A technology that provides encapsulation techniques to create virtualized Layer 2 networks over
(VXLAN) Layer 3 infrastructure, facilitating scalable and flexible network designs.
Ethernet Virtual Private A Layer 2 VPN technology that extends Ethernet services across data centers and wide-area
Network (EVPN) networks using BGP.
Multi-homing (MH) The ability of a device to connect to multiple network segments simultaneously to increase
network availability and redundancy.
Provider Edge (PE) Node A device at the edge of a service provider network that connects to customer premises equipment
(CE) and participates in providing services to customers.
Leaf Node In the context of EVPN E-Tree, a network node categorized to handle communication within
specific broadcast domains and may connect to Root nodes.
Root Node A network node within EVPN E-Tree that serves as the central point of communication and
handles BUM traffic distribution.
Ethernet Segment Identifier A unique identifier used to identify Ethernet segments within a VXLAN network.
(ESI)
Overview
VxLAN EVPN solution is envisioned to simplify the topology and configurations in Data Centers (DC). In Data Centers,
CLOS topology was used, which makes network side pure L3 and uses EBGP as IGP.
VxLAN solution is required for Service Providers (SP) as well to run few of the services or all services in their network
over VxLAN. When they choose to run few services over VxLAN, then on the network side there will be a need to run
VxLAN over SVI.
Topology
The Topology shown below contains the 3 VTEPS i.e VTEP1 ,VTEP2 and VTEP3 and 3 core nodes P1 ,P2 and P3.
Vxlan tunnel will be established between VTEPS over SVI interfaces. OSPF as IGP will be running between VTEPS
and the core node to provide the end to end connectivity. Switch is connected between host and VTEP-1, VTEP-2 via
dynamic LAG.
RTR1/VTEP1
VTEP1(config-router)#network 14.1.1.0/24 Define the Network on which OSPF runs and associate the
area 0.0.0.0 area ID (area 0) with the interface.
VTEP1(config-router)#router bgp 100 Enter Router BGP mode and define the AS number 100.
VTEP1(config-router)#address-family ipv4 Enter address-family IPv4 unicast mode
unicast
VTEP1(config-router)#network 1.1.1.1/32 Add the lo network to BGP route
VTEP1(config-router-af)#neighbor 2.2.2.2 Activate neigbors
activate
VTEP1(config-router-af)#neighbor 6.6.6.6 Activate neigbors
activate
VTEP1(config-router-af)#exit-address-family Exit address-family mode.
VTEP1(config-router)#neighbor 2.2.2.2 Configure BGP remote-as 100 with neighbor IP
remote-as 100
VTEP1(config-router)#neighbor 2.2.2.2 Define BGP neighbors, to update the source routes with lo
update-source lo
VTEP1(config-router)#neighbor 2.2.2.2 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP2
VTEP1(config-router)#neighbor 6.6.6.6 Configure BGP remote-as 100 with neighbor IP
remote-as 100
VTEP1(config-router)#neighbor 6.6.6.6 Define BGP neighbors, to update the source routes with lo
update-source lo
VTEP1(config-router)#neighbor 6.6.6.6 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP3
VTEP1(config-router)#address-family l2vpn Enter in to BGP L2VPN EVPN address-family
evpn
VTEP1(config-router-af)#neighbor 2.2.2.2 Activate neigbors
activate
VTEP1(config-router-af)#neighbor 6.6.6.6 Activate neigbors
activate
VTEP1(config-router-af)#exit-address-family Exit from BGP L2VPN EVPN address-family
VTEP1(config-router)#nvo vxlan vtep-ip- Configure VXLAN global IP
global 1.1.1.1
VTEP1(config)#nvo vxlan id 1 ingress- Create VNID 1
replication inner-vid-disabled
VTEP1(config-nvo)#vxlan host-reachability- Associate VNID with EVPN and vrf1
protocol evpn-bgp vrf1
VTEP1(config-nvo)#nvo vxlan id 1000 ingress- Create VNID 1000
replication inner-vid-disabled
VTEP1(config-nvo)#vxlan host-reachability- Associate VNID with EVPN and vrf2
protocol evpn-bgp vrf2
VTEP1(config-nvo-acc-if)#nvo vxlan access-if Create VXLAN access port port-vlan
port-vlan po1 2000
VTEP1(config-nvo-acc-if)#no shutdown Unshut the access interface
VTEP1(config-nvo-acc-if)#map vnid 1000 Map the VNID to access-if
VTEP1(config-nvo)#nvo vxlan access-if port Create VXLAN access port
xe46
VTEP1(config-nvo-acc-if)#no shutdown Unshut the access interface
VTEP1(config-nvo-acc-if)#map vnid 1 Map the VNID to access-if
VTEP2
P1
P2
P3
VTEP3
VTEP3(config-if)#switchport mode trunk Set the switching characteristics of this interface to trunk
mode.
VTEP3(config-if)#switchport trunk allowed Enable VLAN's allowed on this interface.
vlan add 80,89
VTEP3(config-if)#switchport trunk native Configure native VLAN
vlan 89
VTEP3(config-if)#load-interval 30 Configure load period in multiple of 30 seconds
VTEP3(config-if)#mtu 1600 Change interface mtu value
VTEP3(config-if)#spanning-tree edgeport Set the port as an edge-port to enable rapid transitions
VTEP3(config-if)#interface xe45 Enter interface mode
VTEP3(config-if)#switchport Set the interface as Layer2 port
VTEP3(config-if)#load-interval 30 Configure load period in multiple of 30 seconds
VTEP3(config-if)#interface xe46 Enter interface mode
VTEP3(config-if)#switchport Set the interface as Layer2 port
VTEP3(config-if)#load-interval 30 Configure load period in multiple of 30 seconds
VTEP3(config-if)#router ospf 1 Enter OSPF configuration mode
VTEP3(config-router)#ospf router-id 6.6.6.6 Configure OSPF router id
VTEP3(config-router)#bfd all-interfaces Enable BFD in all OSPF interfaces
VTEP3(config-router)#network 6.6.6.6/32 area Define the Network on which OSPF runs and associate the
0.0.0.0 area ID (area 0) with the interface.
VTEP3(config-router)#network 46.1.1.0/24 Define the Network on which OSPF runs and associate the
area 0.0.0.0 area ID (area 0) with the interface.
VTEP3(config-router)#network 56.1.1.0/24 Define the Network on which OSPF runs and associate the
area 0.0.0.0 area ID (area 0) with the interface.
VTEP3(config-router)#router bgp 100 Enter address-family IPv4 unicast mode
VTEP3(config-router)#address-family ipv4 Add the lo network to BGP route
unicast
VTEP3(config-router)#network 6.6.6.6/32 Activate neighbors
VTEP3(config-router-af)#neighbor 1.1.1.1 Activate neigbors
activate
VTEP3(config-router-af)#neighbor 2.2.2.2 Exit address-family mode.
activate
VTEP3(config-router-af)#exit-address-family Enter Router BGP mode and define the AS number 100.
VTEP3(config-router)#neighbor 1.1.1.1 Configure BGP remote-as 100 with neighbor IP
remote-as 100
VTEP3(config-router)#neighbor 1.1.1.1 Define BGP neighbors, to update the source routes with lo
update-source lo
VTEP3(config-router)#neighbor 2.2.2.2 Configure BGP remote-as 100 with neighbor IP
remote-as 100
VTEP3(config-router)#neighbor 2.2.2.2 Configure advertisement-interval as 0 for fast convergence for
update-source lo VTEP2
(config-router)#neighbor 2.2.2.2 Configure advertisement-interval as 0 for fast convergence for
advertisement-interval 0 VTEP1
(config-router)#neighbor 1.1.1.1 Define BGP neighbors, to update the source routes with lo
advertisement-interval 0
VTEP3(config-router)#address-family l2vpn Enter in to BGP L2VPN EVPN address-family
evpn
SWITCH
Validation
VTEP1#sh ip ospf neighbor
VTEP1#
VTEP2#sh nvo vxlan mac-table
=======================================================================================
==============================================================
VXLAN MAC Entries
=======================================================================================
==============================================================
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
_______________________________________________________________________________________
______________________________________________________________
VTEP2#
VTEP3#sh nvo vxlan mac-table
=======================================================================================
==============================================================
VXLAN MAC Entries
=======================================================================================
==============================================================
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/ESI
Type Status AccessPortDesc
_______________________________________________________________________________________
______________________________________________________________
VTEP3#
VTEP1#show nvo vxlan access-if brief
arp-cache disable
Use this command to disable the ARP cache for MAC/IP.
When the ARP cache is disabled on a VxLAN access port, OcNOS does not reply to any ARP arriving on this port from
the cache. OcNOS withdraws all MAC/IPs configured/learned on this access port and removes the MAC/IP entry for
this access port from the local ARP cache.
OcNOS also makes sure that on withdrawing the MAC/IP route, the MAC does not become unknown. If all routes for
this MAC are being withdrawn because of this command, then OcNOS advertises a MAC-only route. This is done so
that the MAC does not become unknown and only the cache functionality becomes disabled.
Use the no form of this command to enable ARP cache for MAC/IP.
Note: On enabling the cache, an IP will be in conflict, then the cache enable will fail. The conflict has to be manually
removed and then the cache enabled.
Command Syntax
arp-cache disable
no arp-cache disable
Parameters
None
Default
By default, the arp-cache option is enabled.
Command Mode
NVO access interface mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 2
(config-nvo-acc-if)#arp-cache disable
(config-nvo-acc-if)#exit
arp-nd flood-suppress
Use this command to completely restrict the flood of ARP/ND packets towards remote VTEPs or other access ports.
This command applies only when the ARP cache and ND cache are enabled. When the ARP cache is disabled, ARP
flooding is not suppressed even if this command is given. When the ND cache is disabled, ND flooding is not disabled,
even if this command is given.
Use the no form of this command to not restrict the flood of ARP/ND packets.
Command Syntax
arp-nd flood-suppress
no arp-nd flood-suppress
Parameters
None
Default
By default, the arp-nd flood-suppress option is disabled.
Command Mode
NVO access interface mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 2
(config-nvo-acc-if)#arp-nd flood-suppress
(config-nvo-acc-if)#exit
Command Syntax
nvo vxlan arp-nd refresh-timer <3-190> mac (XX-XX-XX-XX-XX-
XX|XX:XX:XX:XX:XX:XX|XXXX.XXXX.XXXX)
no nvo vxlan arp-nd refresh-timer
Parameters
<3-190> refresh time in seconds
XX-XX-XX-XX-XX-XX
v-mac is mandatory for MH
Command Mode
Config mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#config mode
(config)#nvo vxlan arp-nd refresh-timer 100
(config)#no nvo vxlan arp-nd refresh-timer
Command Syntax
clear mac address table dynamic vxlan
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#clear mac address table dynamic vxlan
Command Syntax
clear nvo vxlan counters((access-port (port IFNAME | port-vlan IFNAME (VLAN_ID |
outer-vlan) | all)) | (network-port (dst A.B.C.D | all)))
Parameters
port Port
IFNAME Interface name
port-vlan VLAN port
IFNAME Interface name
VLAN_ID VLAN identifier
Outer-vlan Outer Vlan
A.B.C.D Tunnel destination IPv4 address
all All access or network ports
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
Example for clearing a VLAN port counter:
#clear nvo vxlan counters access-port port-vlan xe1 2
Example for clearing all access port counters:
#clear nvo vxlan counters access-port all
Example for clearing network port counters:
#clear nvo vxlan counters network-port dst 1.1.1.1
Example for clearing all network port counters:
#clear nvo vxlan counters network-port all
Command Syntax
clear nvo vxlan tunnels (|dst-ip A.B.C.D)
Parameters
dst-ip VXLAN tunnel destination
A.B.C.D destination IPv4 address
Command Mode
Exec mode
Applicability
This command was introduced in OcNOS version 3.0.
Example
#clear nvo vxlan tunnels dst-ip 2.2.2.2
Note: clear nvo vxlan tunnels This command will clear all the VXLAN tunnels destination.
clear nvo vxlan tunnels dst-ip A.B.C.D - This command to clear individual tunnel destination( i.e
A.B.C.D).
Command Syntax
clear nvo vxlan mac-stale-entries (vnid <1-16777215> |)
Parameters
<1-16777215> VXLAN network identifier
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#clear nvo vxlan mac-stale-entries vnid 100
description
Use this command to set a description for a port.
Use the no form of this command to remove the description for a port.
Command Syntax
description LINE
no description
Parameters
LINE Maximum 32 characters describing this port.
Default
No default value is specified for description LINE commands.
Command Mode
NVO access interface mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 2
(config-nvo-acc-if)#description member-port xe1 with vlan 2
(config-nvo-acc-if)#exit
dynamic-learning disable
Use this command to disable dynamic learning of MACs at the access port. This command also disables dynamic
learning of MAC/IP from ARP/ND messages received on this access port.
Use the no form of this command to enable dynamic learning of MACs at the access port.
Command Syntax
dynamic-learning disable
no dynamic-learning disable
Parameters
None
Default
By default, the dynamic-learning option is enabled.
Command Mode
NVO access interface mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 2
(config-nvo-acc-if)#dynamic-learning disable
(config-nvo-acc-if)#exit
encapsulation
Use this command to assign a Tag Protocol Identifier (TPID) to an access port.
Use the no form of this command to set the default TPID (0x8100: IEEE 802.1Q VLAN-tagged frame) to an access
port.
Command Syntax
encapsulation TPID
no encapsulation
Parameters
TPID Tag Protocol Identifier:
Ox88A8: IEEE 802.1ad Provider Bridging
Ox9100: IEEE 802.1Q VLAN-tagged frame with double tagging
Default
The encapsulation TPID default is 0X8100.
Command Mode
NVO access interface mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 2
(config-nvo-acc-if)#encapsulation 0x9100
(config-nvo-acc-if)#exit
Command Syntax
evpn esi holdtime <10-300>
no evpn esi holdtime <10-300>
Parameters
<10-300> Hold time in seconds
Default
Default value is 0.
Command Mode
Configuration Mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)# evpn esi holdtime 100
(config)# exit
Command Syntax
evpn vxlan multihoming enable
no evpn vxlan multihoming enable
Parameters
None
Default
By Default Multi-homing will be d]isabled
Command Mode
Configuration Mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
#(config)# evpn vxlan multihoming enable
#(config)# exit
evpn multi-homed
Use this command to configure interfaces as multi-homed and configure esi-value in case of physical and static lag and
system-mac in case of Dynamic lag.
Use the no parameter of this command to unconfigure multi-homed on the interface.
Command Syntax
evpn multi-homed (esi XX:XX:XX:XX:XX:XX:XX:XX:XX | system-mac (XX-XX-XX-XX-XX-
XX|XX:XX:XX:XX:XX:XX|XXXX.XXXX.XXXX)
no evpn multi-homed (esi | system-mac)
Parameters
XX:XX:XX:XX:XX:XX:XX:XX:XX ESI value in HH:HH:HH:HH:HH:HH:HH:HH:HH - 9
octet format
XX-XX-XX-XX-XX-XX Host MAC address (Option 1)
XX:XX:XX:XX:XX:XX Host MAC address (Option 2)
XXXX.XXXX.XXXX Host MAC address (Option 3)
Default
Default value is 0.
Command Mode
Interface Mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)# interface xe1
(config)# evpn multi-homed esi 00:11:22:33:44:55:66:77:88
(config)# exit
configure terminal
(config)# interface po1
(config)# evpn multi-homed system-mac 0000.0000.1111
(config)# exit
evpn-vlan-service
Use this command to configure EVPN-Service type.
Use the no form of this command to delete the evpn vlan service.
Note: If access port mappings to vnid exists already and VLAN service is configured later and mapped to tenant then
we should not allow the mapping, user should either remove and reconfigure the access port mappings.
Command Syntax
evpn-vlan-service (vlan-aware-bundle | vlan-based)
no evpn-vlan-service
Parameters
vlan-based VLAN-based mapping of a mac-vrf to single VNI (1 to 1)
vlan-aware-bundle
VLAN-aware-bundle mapping of a mac-vrf to multiple VNI (1 to many)
Default
By default, vlan-aware-bundle service is applied when we no evpn-vlan-service configuration is specified
explicitly.
Command Mode
MAC vrf mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#mac vrf vrf1
(config-vrf)# evpn-vlan-service vlan-based
(config-vrf)# no evpn-vlan-service vlan-based
garp-gna enable
Use this command to enable GARP/GNA packets per vxlan on the outgoing access interfaces where it is configured.
Use the no form this command to disable GARP/GNA packets on the outgoing access interfaces.
By default it will be disable
Command Syntax
garp-gna enable
garp-gna enable
Parameters
None
Command Mode
config-nvo-acc-if mode
Applicability
This command is introduced in OcNOS version 1.3.6.
Example
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 10
config-nvo-acc-if)#garp-gna enable
Command Syntax
load-balance rtag7 vxlan inner-l2 (dest-mac | src-mac)
no load-balance rtag7 vxlan inner-l2 (dest-mac | src-mac)
Parameter
dest-mac Destination MAC Address.
src-mac Source MAC Address.
Default
By default, the load-balance rtag7 vxlan inner-l2 default is src-mac.
Command Mode
Configure mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#load-balance rtag7 vxlan inner-l2 dest-mac
Command Syntax
load-balance rtag7 vxlan inner-l3 (dest-ip | destl4-port | protocol-id | src-ip |
srcl4-port)
no load-balance rtag7 vxlan inner-l3 (dest-ip | destl4-port | protocol-id | src-ip
| srcl4-port)
Parameter
dest-ip Destination IP.
destl4-port Destination l4 port.
protocol-id Protocol (IPv4).
src-ip Source IP.
srcl4-port Source l4 port.
Default
By default, the load-balance rtag7 vxlan inner-l3 default is src-ip.
Command Mode
Configure mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#load-balance rtag7 vxlan inner-l3 dest-ip
mac
Use this command to associate a static MAC address and a static IPv4 or IPv6 address on an access interface.
Use the no form of this command to disassociate a static MAC address and an IPv4 or IPv6 address for an access
interface.
Note: When a static host is configured on an access port which is in the down state, its state is Inactive.
Note: The same static mac configuration is not allowed on a different access port as then there will be a chance of
conflict. However, if a dynamic packet is sent at another access port which is up and running with the same
MAC, it learns as usual. As soon as the port on which the static MAC is configured comes up, static learning is
given precedence and the dynamically learned MAC is moved to the port where it is configured statically.
Command Syntax
mac XXXX.XXXX.XXXX
mac XXXX.XXXX.XXXX (ip A.B.C.D | ipv6 X:X::X:X)
no mac XXXX.XXXX.XXXX (ip A.B.C.D | ipv6 X:X::X:X)
Parameters
XXXX.XXXX.XXXX Static MAC address. The following formats are supported:
XX-XX-XX-XX-XX-XX Source MAC address (Option 1)
XX:XX:XX:XX:XX:XX Source MAC address (Option 2)
XXXX.XXXX.XXXX Source MAC address (Option 3)
A.B.C.D Static IPv4 address.
X:X::X:X Static IPv6 address.
Default
No default value is specified for mac command.
Command Mode
NVO access interface mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 2
(config-nvo-acc-if)#mac 0000.0000.aaaa ip 10.10.10.1
(config-nvo-acc-if)#mac 0000.0000.aaaa ipv6 1201::1
(config-nvo-acc-if)#exit
mac vrf
Use this command to create a MAC VRF to use in EVPN routes.
See also vxlan host-reachability-protocol evpn-bgp.
Use the no parameter of this command to delete the MAC VRF.
Command Syntax
mac vrf WORD
no mac vrf WORD
Parameter
WORD MAC routing or forwarding instance name.
Default
No default value is specified for mac vrf WORD command.
Command Mode
Configure mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#mac vrf vrf1
mac-holdtime
Use this command to set the MAC hold time for a MAC/IP or MAC.
The feature holds the MAC in hardware until BGP has withdrawn from the neighbors. This helps to reduce flooding to
other access ports.
This setting applies when the access port is shut down, the physical port on which the access port is down, or the
access port is removed from the VNID using the no form of the map vnid command.
When the MAC hold time is configured as -1, then the MAC is not removed from the hardware and is also not
withdrawn from EVPN BGP.
Use the no form of this command to remove the MAC hold time for the MAC/IP or MAC.
Note: When a MAC is moved to discard state, traffic to and from this MAC is discarded. This is applicable only on
statically configured MAC/MAC-IPs.
Command Syntax
mac-holdtime <-1-300>
no mac-holdtime
Parameters
<-1-300> MAC hold time in seconds. Specify -1 to “never expire”.
Default
The default holdtime for mac is 3 seconds.
Command Mode
NVO mode and NVO_ACC_IF_MODE mode
Note: When configured in both modes, then the NVO_ACC_IF_MODE value takes preference for that access port.
Applicability
This command was introduced before OcNOS version 1.3.
This command in NVO_ACC_IF_MODE mode is introduced in OcNOS version 1.3.4.
Example
#configure terminal
(config)#nvo vxlan id 3 ingress-replication inner-vid-disabled
(config-nvo)#mac-holdtime -1
(config-nvo)#exit
map vnid
Use this command to map a tenant to an access-port.
Use the no form of this command to remove the tenant from an access-port
Command Syntax
map vnid <1-16777215>
no map vnid <1-16777215>
Parameters
<1-16777215> VxLAN network identifier.
Default
No default value is specified for map vnid command.
Command Mode
NVO access interface mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 2
(config-nvo-acc-if)#map vnid 100
(config-nvo-acc-if)#exit
nd-cache disable
Use this command to disable ND cache for MAC/IPv6.
When the ND cache is disabled on a VxLAN access port, OcNOS does not reply to any ND arriving on this port from
the cache. OcNOS withdraws all MAC/IPs configured/learned on this access port and removes the MAC/IP entry for
this access port from the local ND cache.
OcNOS also makes sure that on withdrawing the MAC/IP route, the MAC does not become unknown. If all routes for
this MAC are being withdrawn because of this command, then OcNOS advertises a MAC-only route. This is done so
that the MAC does not become unknown and only the cache functionality becomes disabled.
See also arp-cache disable.
Use the no form of this command to enable ND cache for MAC/IPv6.
Note: On enabling the cache, an IP will be in conflict, then the cache enable will fail. The conflict has to be manually
removed and then the cache enabled.
Command Syntax
nd-cache disable
no nd-cache disable
Parameters
None
Default
By default, the nd-cache option is enabled.
Command Mode
NVO access interface mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 2
(config-nvo-acc-if)#nd-cache disable
(config-nvo-acc-if)#exit
no nvo vxlan
Use this command to delete a given tenant or all tenants/VPNs.
Command Syntax
no nvo vxlan (id <1-16777215>|all-vnids)
Parameters
<1-16777215> VXLAN Network Identifier.
all-vnids Delete all VxLAN network identifiers.
Command Mode
Configure mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#no nvo vxlan id 100
nvo vxlan
Use this command to enable or disable VxLAN.
Command Syntax
nvo vxlan (enable | disable)
Parameters
None
Default
By default, the nvo vxlan option is disabled.
Command Mode
Configure mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan enable
nvo vxlan id
Use this command to add a tenant and the type of VPN. This command changes the mode to NVO mode.
Use no form of this command to unconfigure the VXLAN ID.
Before using this command, enable VXLAN by using the nvo vxlan command.
Command Syntax
nvo vxlan id <1-16777215> (etree-leaf|) ((ingress-replication (inner-vid-disabled |
bridge-vlan VLAN-ID | etree-leaf)
no nvo vxlan id <1-16777215>
Parameters
vxaln id <1- Specifies the VXLAN Network Identifier (VNID) to identify the virtual VXLAN overlay network
16777215> segment.
multicast (Optional) Specifies a multicast mode (point to multipoint) used for transmitting VXLAN
encapsulated multicast packets.
ingress- (Optional) Enables head-end replication for forwarding BUM traffic.
replication
bridge-vlan (Optional) Specifies the VLAN ID.
VLAN-ID
inner-vid- (Optional) Disables the transmission of the VLAN ID (VID) with traffic leaving the network
disabled port.
etree-leaf (Optional) Configures the device as a leaf node within the E-Tree topology, implying its role in
forwarding BUM traffic within the E-Tree service model.
Command Mode
Configure mode
Applicability
This command was introduced before OcNOS version 1.3. Introduced the etree-leaf parameter in the OcNOS
version 6.5.1
Example
#configure terminal
(config)#nvo vxlan id 300 ingress-replication
(config-nvo)#exit
(config-nvo)#exit
Command Syntax
nvo vxlan access-if (port IFNAME (| default) | port-vlan IFNAME VLAN_RANGE (|
inner-vlan <2-4094>))
no nvo vxlan access-if (port IFNAME | port-vlan IFNAME VLAN_RANGE(| inner-vlan <2-
4094>))
Parameters
port A physical port.
IFNAME Interface name (Physical/Static lag/Dynamic lag)
default Default access interface
port-vlan The physical port on which VLANs are configured
IFNAME Interface name (Physical/Static lag/Dynamic lag)
VLAN_RANGE Configure VlanId or Vlan-Range for outer vlan
Inner-vlan Inner-vlan id
<2-4094> VLAN id
Default
By default, the nvo vxlan access-if option is port VLAN ID and VLAN_RANGE option is introduced in
OcNOS version 5.0..
Command Mode
Configure mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 2-10
(config-nvo-acc-if)#exit
#configure terminal
#configure terminal
(config)#nvo vxlan access-if port xe1 default
(config-nvo-acc-if)#exit
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 2 inner-vlan 10
(config-nvo-acc-if)#exit
Command Syntax
nvo vxlan mac-ageing-time <10-572>
no nvo vxlan mac-ageing-time
Parameters
<10-572> Ageing time in seconds.
Default
The default age out time is 300 seconds.
Command Mode
Configure mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan mac-ageing-time 10
Command Syntax
nvo vxlan max-cache-disable <1-200>
no nvo vxlan max-cache-disable
Parameters
<-1-200> Number of ARP/ND cache disable allowed
Default
The default maximum number of ARP and ND cache disables is 0.
Command Mode
Configuration mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan max-cache-disable 10
(config-nvo)#exit
Command Syntax
nvo vxlan vtep-ip-global A.B.C.D
no nvo vxlan vtep-ip-global A.B.C.D
Parameters
A.B.C.D Source VTEP IP address of the global configuration
Default
No default value is specified for nvo vxlan vtep-ip-global command.
Command Mode
NVO mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
(config-nvo)#nvo vxlan vtep-ip-global 10.10.11.1
Command Syntax
show bgp l2vpn evpn ((vrf WORD)|(rd WORD)| time|)
show bgp l2vpn evpn mac-ip ((vrf WORD)|(rd WORD)|)
show bgp l2vpn evpn mcast
show bgp l2vpn evpn multihoming es-route <(rd WORD)|(vrf WORD)>
show bgp l2vpn evpn multihoming ethernet-ad-per-evi <(rd WORD)|(vrf WORD)>
show bgp l2vpn evpn multihoming ethernet-ad-per-es <(rd WORD)|(vrf WORD)>
Parameters
vrf Virtual Routing and Forwarding instance
WORD VRF name
rd Route distinguisher
WORD Route distinguisher: ASN:nn or IP:nn
time Display learned time for EVPN routes
mac-ip MAC/IP routes (EVPN type 2)
mcast Multicast routes (EVPN type 3)
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#show bgp l2vpn evpn
2 - MAC/IP Route
3 - Inclusive Multicast Route
4 - Ethernet Segment Route
RD[1.1.1.1:1] VRF[vrfblue]:
*> [2]:[0]:[100]:[48,0000.00aa.aaaa]:[32,10.1.1.2]:[100]
1.1.1.1 0 100 32768 i
*>i [2]:[0]:[100]:[48,0000.00bb.bbbb]:[32,10.1.1.3]:[100]
4.4.4.4 0 100 0 i 10.1.1.1
*> [3]:[100]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i
*>i [3]:[100]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 10.1.1.1
*> [3]:[101]:[32,1.1.1.1]
1.1.1.1 0 100 32768 i
*>i [3]:[101]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 10.1.1.1
RD[2.2.2.2:1]
*>i [2]:[0]:[100]:[48,0000.00bb.bbbb]:[32,10.1.1.3]:[100]
4.4.4.4 0 100 0 i 10.1.1.1
*>i [3]:[100]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 10.1.1.1
*>i [3]:[101]:[32,4.4.4.4]
4.4.4.4 0 100 0 i 10.1.1.1
Status
code Description Comments
d damped When the penalty of a flapping route exceeds the suppress limit, the route is damped and remains
in a withdrawn state until its penalty decreases below the reuse limit.
h history When the penalty of a flapping route does not exceed the suppress limit, the route is not damped
and BGP maintains a history of the flapping route.
* valid Whether the route is valid. When a route is not suppressed, damped, or present in the history, it is
valid.
> best The selected route to be installed in the kernel routing table.
l labeled BGP Labeled Unicast advertises route information between inter region routers.
Table 1-2 shows the codes at the end of each route entry that indicate where the route originated.
Origin
Code Description Comments
? incomplete Origin not known. Typically, these are routes redistributed from an IGP.
Field Description
The route type indicates the type of routing information advertised by the EVPN control plane:
2 MAC/IP Route: Endpoint reachability information, including MAC and IP addresses of the endpoints.
3 Inclusive Multicast Route: Information about how to forward Broadcast, Unknown Unicast and Multicast (BUM)
traffic.
ESI (Ethernet Segment Identifier): a unique non-zero identifier that identifies an Ethernet segment, which is a set
of links that connects a network or device to one or more PEs. ESI 0 denotes a single-homed site.
E-Tag (Ethernet tag): identifies a particular broadcast domain such as a VLAN or VNID in the VxLAN case. An
EVPN instance consists of one or more broadcast domains.
VNID (VXLAN network identifier): identifies Layer 2 segments and maintains Layer 2 isolation between the
segments, allowing the addressing of up to 16 million logical networks in the same administrative domain.
Metric Multiple-Exit Discriminator (MED). If there are multiple paths to the same destination from a single routing
protocol, then the multiple paths have the same administrative distance and the best path is selected based on
this metric. The path with the lowest metric is selected as the optimal path and installed in the routing table.
LocPrf Local preference set with the set local-preference command. This value is used only with iBGP sessions
within the local autonomous system to determine if a route towards a destination is the “best” one. The path with
the highest local preference is preferred.
Weight This field applies only to routes within an individual router. If a route was learned from a peer, it has a default
weight of 0. All routes generated by the local router have a weight of 32,768.
Field Description
Path The autonomous systems through which the prefix advertisement passed.
The origin codes are explained in Table 1-2.
Command Syntax
show bgp l2vpn evpn summary
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#show bgp l2vpn evpn summary
BGP router identifier 1.1.1.1, local AS number 100
BGP table version is 17
1 BGP AS-PATH entries
0 BGP community entries
Neighbor V AS MsgRcv MsgSen TblVer InQ OutQ Up/Down State/PfxRcd AD MACIP MCAST ESI
8.8.8.8 4 100 111 112 17 0 0 00:53:03 3 0 0 3 0
9.9.9.9 4 100 110 110 17 0 0 00:52:10 15 0 13 2 0
13.13.13.13 4 100 132 109 17 0 0 00:51:57 4 0 2 2 0
Field Description
Field Description
TblVer Last version of the local router’s BGP database advertised to the peer.
InQ Received messages waiting in the input queue for further processing.
State/PfxRcd If the TCP session is up and the BGP peers have formed an adjacency, this field shows how many prefixes
have been received from the remote neighbor.
Other states:
Idle: The local router has not allocated resources for the peer connection, so incoming connection requests
are refused
Active: the local router is trying to establish a TCP connection to the remote peer. You might see this if the
local peer has been configured, but the remote peer is unreachable or has not been configured.
OpenConfirm: BGP received an open message from the peer and is now waiting for a keepalive or notification
message. If BGP receives a keep alive message from the peer, the state changes to established. If the
message is a notification, the state changes to idle.
Established: BGP is ready to exchange update, notification, and keep alive messages with its peer
AD Number of EVPN type 1 Ethernet Auto-discovery routes: Only originated for multi-homed sites. Type 1 routes
allow fast convergence where PE devices can change the next-hop adjacencies for all MAC addresses
associated with a particular Ethernet Segment and aliasing where traffic can be balanced across multiple
egress points
MACIP Number of EVPN type 2 MAC/IP routes: Endpoint reachability information, including MAC and IP addresses of
the endpoints.
MCAST Number of EVPN type 3 Inclusive Multicast routes: Broadcast, Unknown Unicast and Multicast (BUM) traffic.
ESI Number of EVPN type 4 Ethernet Segment Routes: Used in multi-homing for Designated Forwarder Election.
The Designated Forwarder sends BUM traffic to the CE on a particular Ethernet Segment.
Command Syntax
show nvo vxlan (vnid <1-16777215>|)
Parameters
<1-16777215> VXLAN network identifier.
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#sh nvo vxlan
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
Field Description
Field Description
Command Syntax
show nvo vxlan access-if-config (LINE|)
Parameters
LINE Access port description.
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3,
Added new cli "garp-gna enable" under access-if cli in OcNOS version 1.3.6.
Example
#show nvo vxlan access-if-config
nvo vxlan access-if port-vlan xe1 2
map vnid 100
garp-gna enable
access-if-description member-port with xe1 as vlan 2
dynamic-learning disable
arp-nd flood-suppress
arp-cache disable
nd-cache disable
shutdown
mac 0000.0000.1111
mac 0000.0000.aaaa ip 12.12.12.1
mac 0000.0000.bbbb ipv6 1201::1
map qos-profile ingress 100
cos 2 egress
!
nvo vxlan access-if port-vlan po1 6 inner-vlan 5
encapsulation 0x9100
no shutdown
map vnid 100
!
Command Syntax
show nvo vxlan arp-cache (vnid <1-16777215>|summary|)
Parameters
<1-16777215> VXLAN network identifier.
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3, modified to include new fields – Age-Out and Retries-Left in
OcNOS version 1.3.5.
Remote Static and Dynamic keyword got changed to Static and Dynamic Remote in MAC table in
OcNOS version 1.3.6.
Example
#sh nvo vxlan arp-cache
VXLAN ARP-CACHE Information
===========================
ND Timeout : 300 sec Random-Jitter-Max : 640
Field Description
Field Description
Command Syntax
show nvo vxlan counters access-port (port IFNAME | port-vlan IFNAME VLAN_ID)
Parameters
port Port Mapping
IFNAME Access port name
port-vlan Port-vlan Mapping
IFNAME Access port name
VLAN_ID_RANGEVlan Id or Vlan Range <2-4094>
INNER_VLAN_ID Inner-Vlan Id
all All ports and VLANs
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3 and added Control packet (ARP, ND and GARP) counters in
OcNOS version 1.3.5. The VLAN_RANGE option is introduced in OcNOS version 5.0.
Example
#show nvo vxlan counters access-port port-vlan xe1 2
Data packets:
*If ARP/ND cache is enabled, TX doesn't count ARP/ND replies
from ARP/ND cache and ARP/ND forwarded after uplifting to
the control plane.
RX: packets : 2774939
bytes : 210553516
TX: packets : 4322274
bytes : 326026474
Control Packets:
*ARP/ND uplifted and sent/replied from control plane:
Rx Vxlan Arp discard count : 0
Rx Vxlan Nd discard count : 2
Tx Vxlan Arp discard count : 0
Tx Vxlan Nd discard count : 0
Rx Vxlan Arp Request count : 2
Tx Vxlan Arp Request count : 0
Rx Vxlan Arp Reply count : 5
Tx Vxlan Arp Reply count : 1
Rx Vxlan Neighbor Solicitation count : 6
Tx Vxlan Neighbor Solicitation count : 0
Field Description
Field Description
Command Syntax
show nvo vxlan counters network-port dst A.B.C.D
Parameters
A.B.C.D Tunnel IPv4 address
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3 and added control packets (ARP, ND, and GARP) counters
in OcNOS version 1.3.5.
Example
VTEP1#sh nvo vxlan counters network-port dst 100.2.2.2
Data packets:
*If ARP/ND cache is enabled, TX doesn't count ARP/ND replies
from ARP/ND cache and ARP/ND forwarded after uplifting to
the control plane.
RX: packets : 814327
bytes : 92833544
TX: packets : 1508023
bytes : 171914622
Control Packets:
*ARP/ND uplifted and sent/replied from control plane:
TX VXLAN Arp discard count : 0
TX VXLAN ND discard count : 0
Tx Vxlan Arp Request count : 0
Tx Vxlan Arp Reply count : 0
Tx Vxlan Neighbor Solicitation count : 0
Tx Vxlan Neighbor Advertisement count: 0
Rx Vxlan Gratuitous ARP count: 0
Tx Vxlan Gratuitous ARP count: 0
Rx Vxlan Gratuitous Neighbor Advertisement count: 0
Tx Vxlan Gratuitous Neighbor Advertisement count: 0
Field Description
RX: bytes Number of hello packets received from neighbor in bytes received.
Tx Vxlan Arp discard count Number of discarded Arp that is transmitted to peer.
Rx Vxlan Arp Request Number of request ARP that is received from neighbor.
count
Rx Vxlan Arp Reply count Number of replied ARP that is received from neighbor.
Tx Vxlan Arp Reply count Number of replied ARP which is transmitted to peer.
Rx Vxlan Gratuitous ARP Number of Gratuitous ARP that is received from neighbor.
count
Rx Vxlan Gratuitous Number of Gratuitous Neighbor Advertisement that is received from neighbor.
Neighbor Advertisement
count
Command Syntax
show nvo vxlan mac-table (vnid <1-16777215>|) (summary | hardware |)
Parameters
<1-16777215> VXLAN network identifier.
summary Count the MAC addresses.
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Remote Static and Dynamic keyword got changed to Static and Dynamic Remote in MAC table in
OcNOS version 1.3.6.
Example
#show nvo vxlan mac-table
==============================================================================
=======================================================================
VXLAN MAC Entries
==============================================================================
=======================================================================
VNID Interface VlanId Inner-VlanId Mac-Addr VTEP-Ip/
ESI Type Status AccessPortDesc
______________________________________________________________________________
_______________________________________________________________________
Field Description
Remote: Statically configured for remote; used only for static VxLAN, not with EVPN
Static Local: Configured on local VTEP
Dynamic Local: Learned by data plane source learning
Status Max Move conflict: When a MAC has moved too many times (5 or more times in 180 seconds). This is
according to the procedures defined in RFC 7432, Section 15.1.
Discard: If a MAC hold time is configured, then if the VxLAN access port goes down (admin or operational),
the MAC is moved to the discard state for the period of the hold time. The MAC is also moved to the discard
state if the VNID is unmapped from the port. In dynamically learned cases, the MAC is also moved to
discard when learning is disabled.
Field Description
Command Syntax
show nvo vxlan nd-cache (vnid <1-16777215>|summary|)
Parameters
<1-16777215> VXLAN network identifier.
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3, modified to include new fields – Age-Out and Retries-Left in
OcNOS version 1.3.5.
Remote Static and Dynamic keyword got changed to Static and Dynamic Remote in ND table in OcNOS version 1.3.6.
Example
#show nvo vxlan nd-cache
VXLAN ND-CACHE Information
===========================
ND Timeout : 300 sec Random-Jitter-Max : 640
Field Description
Ip-Addr IP address
Static Remote: Statically configured for remote; used only for static VxLAN, not with EVPN
Static Local: Configured on local VTEP
Dynamic: Learned by data plane source learning
Evpn: Learned by EVPN Type 2 (MAC/IP) routes
Field Description
Command Syntax
show nvo vxlan static host state
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#sh nvo vxlan static host state
VNID Ifname Vlan Ip-Addr Mac-Addr Status
______________________________________________________________________
100 xe1 2 12.12.12.1 0000.0000.aaaa Inactive
100 xe2 2 1201::1 0000.0000.bbbb Conflict
100 xe3 2 120.120.120.1 0000.0000.bb11 Active
Table 1-7 explains the output fields.
Table 1-11: Static host fields
Field Description
Ip-Addr IP address
Field Description
Conflict: When a MAC/IP was configured, the conflict was not known as the VNID was not mapped to the
access port. After the VNID is mapped, if the same MAC/IP is present statically on some other port on the
same VNID, then it is in conflict state.
Learnt Conflict: When a MAC/IP was configured, the conflict was not known. However, it is now in conflict
because the same MAC/IP is configured on an access port on VTEP1 and on an access port on VTEP2.
Because the BGP session/tunnel was not up, the MAC/IP was not known to the other VTEP and the
configuration was allowed. When the BGP session/tunnel comes up and it finds such a conflicted route, it
marks the state as Learnt Conflict.
Inactive: Configured but not operating, such as when the port is not mapped to any VNID. The port is down
and the ARP/ND cache is disabled.
Command Syntax
show nvo vxlan tunnel
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
The following is a sample output of the show nvo vxlan tunnel command.
#show nvo vxlan tunnel
VXLAN Network tunnel Entries
Source Destination Status Up/Down Update
====================================================
1.1.1.1 2.2.2.2 Installed 00:00:20 00:00:20
Total number of entries are 1
#
Table 1-8 explains the output fields.
Table 1-12: VxLAN tunnel fields
Field Description
Resolved: Tunnel destination IP is reachable, but VxLAN tunnel not installed in hardware. Therefore, not
operating.
Command Syntax
show running-config nvo vxlan
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced in a version before OcNOS version 1.3 and added few CLIs for IRB and ARP-ND
refresh timer for OcNOS version 1.3.5.
Example
#show running-config nvo vxlan
!
nvo vxlan multihoming enable
!
nvo vxlan enable
!
nvo vxlan vtep-ip-global 1.1.1.1
!
nvo vxlan max-cache-disable 10
!
nvo vxlan tunnel qos-map-mode cos-dscp ingress QUE_DSCP
!
nvo vxlan tunnel qos-map-mode cos-dscp egress DSCP_QUE
!
nvo vxlan id 100 ingress-replication inner-vid-disabled
vxlan host-reachability-protocol evpn-bgp vrf1
mac-holdtime 20
!
nvo vxlan access-if port-vlan xe1 2
map vnid 100
access-if-description member-port with xe1 as vlan 2
dynamic-learning disable
arp-nd flood-suppress
arp-cache disable
nd-cache disable
shutdown
mac 0000.0000.1111
mac 0000.0000.aaaa ip 12.12.12.1
mac 0000.0000.bbbb ipv6 1201::1
map qos-profile cos-to-queue COS_QUE
map qos-profile queue-color-to-cos QUE_COS
!
nvo vxlan access-if port-vlan po1 6 inner-vlan 5
encapsulation 0x9100
no shutdown
map vnid 100
!
Command Syntax
show evpn multi-homing (all |)
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#show evpn multi-homing all
ESI Access-IF PE-IP-ADDRESS
===========================================================
00:00:11:22:33:44:55:66:77:88 ce21/1 1.1.1.1
00:00:11:22:33:44:55:66:77:88 ---- 2.2.2.2
Total number of entries are 2
Field Description
ESI An Ethernet segment has an unique nonzero identifier, called the Ethernet segment identifier (ESI).
The ESI is encoded as a 10-octet integer that identifies this segment. When manually configuring an
ESI value, the most significant octet, known as the type byte, must be 00. When a single-homed CE
device is attached to an Ethernet segment, the entire ESI value is zero.
Command Syntax
show evpn multihoming-status
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#show evpn multihoming-status
Multihoming is ACTIVE in Hardware
Command Syntax
show nvo vxlan route-count (|vnid <1-16777215>)
Parameters
<1-16777215> Range supported for VNID.
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3 and modified to include new fields – GW-IPv4, GW_IPv6,
Prefix IPv4 and Prefix IPv6 in OcNOS version 1.3.5.
Example
#show nvo vxlan route-count
VXLAN Active route count information
====================================
Max route count : 32768
Active route count: 7
------------------------------------------------------------------------------
----------
VNID Total MACONLY MACIPv4 MACIPv6 GW GW Prefix
Prefix
MACIPv4 MACIPv6 IPv4
IPv6
------------------------------------------------------------------------------
----------
2000 3 1 1 1 0 0 0
0
1000 0 0 0 0 0 0 0
0
10002 4 0 0 0 1 1 1
1
Field Description
Field Description
VNID VNID is used to identify Layer 2 segments and to maintain Layer 2 isolation between the segments.
MACONLY The MAC-only route for the local interface appears in the VXLAN instance route table.
MACIPv4 IPv4 media access control (MAC) address for a default virtual gateway.
MACIPv6 IPv6 media access control (MAC) address for a default virtual gateway.
Command Syntax
show nvo vxlan vni-name (WORD)
Parameters
WORD VNI name of max size 10 character and should not be only numeric.
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#show nvo vxlan vni-name SITEA-PRO
VXLAN Information
=================
Codes: NW - Network Port
AC - Access Port
(u) - Untagged
VNID Vni-name Type Interface ESI Vlan DF-Status Src-addr Dst-addr
______________________________________________________________________________
______________________________
1 ---- NW ---- ---------- ---- ------ 10.0.1.1 10.0.6.8
1 ---- NW ---- ---------- ---- ------ 10.0.1.1 10.0.6.9
1 ---- NW ---- ---------- ---- ------ 10.0.1.1 10.0.3.1
1 ---- NW ---- ---------- ---- ------ 10.0.1.1 10.0.1.2
1 ---- NW ---- ---------- ---- ------ 10.0.1.1 10.0.5.1
1 ---- NW ---- ---------- ---- ------ 10.0.1.1 10.0.2.2
1 ---- NW ---- ---------- ---- ------ 10.0.1.1 10.0.2.1
1 SITEA-PRO AC xe7 — Single Homed port — 2 ------ ---- ----
1 SITEA-PRO AC xe1 — Single Homed port — 1010 ------ ---- ----
1 SITEA-PRO AC xe1 — Single Homed port — 100 ------ ---- ----
1 SITEA-PRO AC xe1 — Single Homed port — 2020 ------ ---- ----
1 SITEA-PRO AC po1 — Single Homed port — 100 ------ ---- ----
1 SITEA-PRO AC po1 — Single Homed port — 2 ------ ---- ----
1 SITEA-PRO AC po1 — Single Homed port — 200 ------ ---- ----
1 SITEA-PRO AC xe8 — Single Homed port — ---- ------ ---- ----
1 SITEA-PRO AC po2 — Single Homed port — ---- ------ ---- ----
Total number of entries are 16
shutdown
Use this command to administratively shut down an NVO access interface.
Use the no form of this command to start an NVO access interface.
Command Syntax
shutdown
no shutdown
Parameters
None
Default
The NVO access interface is running by default.
Command Mode
NVO access interface mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
#configure terminal
(config)#nvo vxlan access-if port-vlan xe1 2
(config-nvo-acc-if)#shutdown
(config-nvo-acc-if)#exit
Command Syntax
vxlan host-reachability-protocol evpn-bgp NAME
no vxlan host-reachability-protocol evpn-bgp
Parameters
NAME Name of the VRF to carry VNID routes.
Default
No default value is specified for vxlan host-reachability-protocol command.
Command Mode
NVO mode
Applicability
This command was introduced before OcNOS version 1.3.
Example
(config)#nvo vxlan id 3
(config-nvo)#vxlan host-reachability-protocol evpn-bgp Blue
vlan-xlate-1 large
Use this command to increase the size of the VLAN_XLATE_1_DOUBLE table to 20k. Internally, the BCM maintains
VLAN_XLATE_1_DOUBLE table for access interfaces, L2vnid,and L3vnid. The default size of the table is 16k. After
configuring the CLI, the table size is increased to 20k.
Use the no form of this command to change the VLAN_XLATE_1_DOUBLE table size to default.
Note: Reboot the system after configuring the CLI.
Command Syntax
vlan-xlate-1 large
no vlan-xlate-1 large
Parameters
None
Default
None
Command Mode
Configuration Mode
Applicability
This command was introduced before OcNOS version 6.5.3.
Examples
(config)#vlan-xlate-1 large
OcNOS(config)#commit
%% System Reboot required, please save the config and reboot the board.
OcNOS(config)#end
OcNOS#
evpn irb
Use this command to configure default gateway behavior on a VTEP for particular VNID.
Use the no form this command to disable default gateway behavior on a VTEP for the particular VNID.
Note: Map an IRB interface to an L2 VNID. This IRB interface can have multiple IP address as configured in IRB IP
address CLI and can serve all subnets attached to the L2 VNID.
Command Syntax
evpn <NAME>
no evpn <NAME>
Parameters
NAME IRB interface name
Command Mode
NVO Mode
Applicability
This command was introduced in OcNOS version 5.1.
Example
#config mode
(config)# nvo vxlan id 2000 ingress-replication inner-vid-disabled
(config-nvo)# evpn irb1
(config-nvo)# no evpn irb1
Command Syntax
evpn irb-forwarding anycast-gateway-mac XXXX.XXXX.XXXX
no evpn irb-forwarding anycast-gateway-mac
Parameters
XX-XX-XX-XX-XX-XX Source MAC address (Option 1)
XX:XX:XX:XX:XX:XX Source MAC address (Option 2)
XXXX.XXXX.XXXX Source MAC address (Option 3)
Command Mode
Configuration Mode
Applicability
This command was introduced in OcNOS version 5.1.
Example
#configure terminal
(config)#evpn irb-forwarding anycast-gateway-mac 0000.0000.1313
Or
(config)#evpn irb-forwarding anycast-gateway-mac 00:00:00:00:13:13
Or
(config)#evpn irb-forwarding anycast-gateway-mac 00-00-00-00-13-13
(config)# no evpn irb-forwarding anycast-gateway-mac
Command Syntax
evpn irb-if-forwarding anycast-gateway-mac
no evpn irb-if-forwarding anycast-gateway-mac
Parameters
None
Command Mode
IRB_IF_Mode
Applicability
This command was introduced in OcNOS version 5.1.
Example
#configure teminal
(config)# interface irb 1
(config-irb-if)# ip vrf forwarding vrfip
(config-irb-if)#evpn irb-if-forwarding anycast-gateway-mac
(config-irb-if)#no evpn irb-if-forwarding anycast-gateway-mac
interface irb
Use this command to configure logical IRB interface.
Use the no form of this command to un-configure logical IRB interface.
Command Syntax
interface irb<1-4094>
no interface irb<1-4094>
Parameters
<1-4094> IRB interface number
Command Mode
Configure mode
Applicability
This command was introduced in OcNOS version 5.1.
Example
#configure teminal
(config)#interface irb1
(config)#no interface irb1
l3vni
Use this command to configure L3 Virtual Network Identifier for an ip vrf
Use the no form of this command to remove L3 Virtual Network Identifier
This identifies a tenant, with this one tenant can have L3VNI as its identifier and he can have multiple L2 networks
identified with L2VNI's.
Note: L3 VNID cannot be same as L2 VNID.
Command Syntax
l3vni <L3 VNID>
no l3vni <L3 VNID>
Parameters
<1-16777215> L3 VNID. Cannot be same as L2 VNID
Command Mode
Configure VRF mode
Applicability
This command was introduced in OcNOS version 5.1.
Example
#configure teminal
(config)#ip vrf vrfip
(config-vrf)#l3vni 10002
(config-vrf)#no l3vni 10002
Command Syntax
nvo vxlan irb
no nvo vxlan irb
Parameters
None
Command Mode
Configure mode
Applicability
This command was introduced in OcNOS version 5.1.
Example
#configure terminal
(config)#nvo vxlan irb
(config)#no nvo vxlan irb
Command Syntax
show bgp l2vpn evpn (((vrf WORD)|(rd WORD)|)((prefix WORD)|)(detail| time|))
show bgp l2vpn evpn mac-ip ((vrf WORD)|(rd WORD)|)
show bgp l2vpn evpn mcast
show bgp l2vpn evpn multihoming es-route <(rd WORD)|(vrf WORD)>
show bgp l2vpn evpn multihoming ethernet-ad-per-evi <(rd WORD)|(vrf WORD)>
show bgp l2vpn evpn multihoming ethernet-ad-per-es <(rd WORD)|(vrf WORD)>
Parameters
vrf Virtual Routing and Forwarding instance
WORD VRF name
rd Route distinguisher
WORD Route distinguisher: ASN:nn or IP:nn
prefix-route Shows detail of the Prefix-Route (Type:5))
detail Detailed output of the route-path
time Display learnt time for details for evpn routes.
mac-ip Show detail of the MAC-IP route (Type:2)
mcast Show detail of the Inclusive MULTICAST route (Type:3)
multihoming Show multihoming information
peer-group Dynamic peer-group
Command Mode
Exec mode
Applicability
This command was introduced in OcNOS version 5.1.
Example
show bgp l2vpn evpn detail
BGP route entry for prefix : [1]:[00:00:00:00:11:12:12:22:11:11]:[100]:[100]
Route-Distinguisher: 1.1.1.1:1
Flags : Valid, Selected, IBGP, Labelled
Nexthop : 1.1.1.1 MED value : 0
Community:
Extended Community: RT:100:1 Encapsulation:VxLAN ESI-Label:0
Weight :0, Local Preference :100
AS Path : Local
Origin : IGP
Last Update : Thu Apr 13 12:05:23 2023
Peer : 1.1.1.1
Command Syntax
show bgp l2vpn evpn prefix-route <vrf WORD | rd Word>
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 4.1.
Example
rtr1#show bgp l2vpn evpn prefix-route
RD[300:1]
ESI Eth-Tag Prefix-Length IP-Address
GW-IP Address L3VNID Nexthop Encap
0 45001 24 80.80.80.0
0.0.0.0 45001 2.2.2.2 VXLAN
0 45001 24 90.90.90.0
0.0.0.0 45001 2.2.2.2 VXLAN
0 45001 64 8001::
:: 45001 2.2.2.2 VXLAN
0 45001 64 9001::
:: 45001 2.2.2.2 VXLAN
rtr1#
Command Syntax
show interface irb<1-4094>
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced in OcNOS version 5.1.
Example
rtr1#show interface irb1
Interface irb1
Hardware is IRB Current HW addr: 0000.0000.ff10
Physical:(Not Applicable) Logical:0000.0000.ff10
Port Mode is Router
Interface index: 700001
Metric 0 mtu 1500
Debounce timer: disable
ARP ageing timeout 1500
<UP,BROADCAST,RUNNING,MULTICAST>
VRF Binding: Associated with vrf1
Label switching is disabled
Administrative Group(s): None
DHCP client is disabled.
Last Flapped: Never
Statistics last cleared: 2019 Mar 14 17:57:06 (00:21:31 ago)
inet 80.80.80.1/24 broadcast 80.80.80.255
inet6 8001::1/64
inet6 fe80::200:ff:fe00:ff10/64
RX
unicast packets 0 multicast packets 0 broadcast packets 0
input packets 0 bytes 0
jumbo packets 0
undersize 0 oversize 0 CRC 0 fragments 0 jabbers 0
input error 0
input with dribble 0 input discard 0
Rx pause 0
TX
unicast packets 0 multicast packets 0 broadcast packets 0
output packets 0 bytes 0
jumbo packets 0
output errors 0 collision 0 deferred 0 late collision 0
output discard 0
Tx pause 0
rtr1#
Command Syntax
show evpn l3vni-map
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced in OcNOS version 5.1.
Example
rtr3#show evpn l3vni-map
L3VNI L2VNI IRB-interface
===================================
45001 10 irb1
45001 20 irb2
rtr3#
Command Syntax
show evpn irb-status
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced before OcNOS version 5.1.
Example
#show evpn irb-status
IRB is ACTIVE in Hardware
Command Syntax
show running-config interface irb<1-4094>
Parameters
None
Command Mode
Exec mode
Applicability
This command was introduced in OcNOS version 5.1.
Example
#show running-config interface irb1
!
interface irb1
ip vrf forwarding vrfip
ip address 144.144.144.1/24
ipv6 address 1201::1/48
evpn irb-if-forwarding anycast-gateway-mac
mac-address 0000.0000.1234
qos map-profile dscp-to-queue DSCP_QUE
qos map-profile queue-color-to-dscp QUE_DSCP
shutdown
!
Command Syntax
clear nvo vxlan tunnels (|dst-ip A.B.C.D)
Parameters
dst-ip VXLAN tunnel destination
A.B.C.D destination IPv4 address
Command Mode
Exec mode
Applicability
This command was introduced in OcNOS version 1.3.
Example
#clear nvo vxlan tunnels dst-ip 2.2.2.2
Note: clear nvo vxlan tunnels This command will clear all the VXLAN tunnels destination.
clear nvo vxlan tunnels dst-ip A.B.C.D - This command to clear individual tunnel destination( i.e
A.B.C.D).
cos queue
Use this command to configure user defined mapping for cos and queue.
Use the no form of this command to remove the mapping.
Command Syntax
cos <0-7> queue <0-7>
no cos <0-7>
Parameters
<0-7> COS and Queue ranger
Default
Default cos and queue value is one-one default mapping if it is not configured.
Command Mode
QoS config mode
Applicability
This command was introduced in OcNOS version 1.3.
Example
(config)#qos profile cos-to-queue ac_port_ingress
(config-ingress-cos-map)#cos 1 queue 7
(config-ingress-cos-map)#no cos 1
dscp queue
Use this command to configure user defined mapping for DSCP to queue. This will be mapped with nvo VXLAN tunnel
of remote VTEP.
Use the no form of this command to delete the mapping.
Command Syntax
dscp <0-63> queue <0-7> (color (green|yellow|red)|) (dscp <0-63>|)
no dscp <0-63>
Parameters
<0-63> DSCP
<0-7> Queue number
color Color to map
green Set mapping for green packets
red Set mapping for red packets
yellow Set mapping for yellow packets
<0-63> out DSCP value
Default
Default queue and cos value is one-one default mapping if it is not configured.
Command Mode
Ingress-dscp-map mode
Applicability
This command was introduced in OcNOS version 1.3.
Example
(config)#qos profile dscp-to-queue nw_profile
(config-ingress-dscp-map)#dscp 50 queue 1
(config-ingress-dscp-map)#no dscp 50
map qos-profile
Use this command to map (attach) the qos profile to an IRB interface.
Use the no form of this command to remove a profile.
Use the following qos profile type for mapping from/to on the IRB interface.
• dscp-to-queue for ingress traffic and
• queue-color-to-dscp profile for egress traffic
Removing the map qos-profile, applies the default profile to the IRB interface.
Note: Default profile is applied to all the IRB interface only when qos is enabled.
Command Syntax
map qos-profile (dscp-to-queue | queue-color-to-dscp) <NAME>
no map qos-profile (dscp-to-queue | queue-color-to-dscp) <NAME>
Parameters
NAME Profile name
Default
By default, the default dscp-to-queue and queue-color-to-dscp profile is attached to all IRB interface.
Changing the value in the default profile, will impact both the IRB interfaces and L3 interfaces.
Command Mode
IRB_IF_Mode
Default
Default mapping between queue and DSCP value is one-one.
Applicability
This command is introduced in OcNOS version 5.1.
Example
#configure terminal
(config)#interface irb 1
(config-irb-if)# map qos-profile queue-color-to-dscp QUE_DSCP
(config-irb-if)# no map qos-profile queue-color-to-dscp QUE_DSCP
(config)#interface irb 1
(config-irb-if)# map qos-profile dscp-to-queue DSCP_QUE
(config-irb-if)# no map qos-profile dscp-to-queue DSCP_QUE
Command Syntax
map qos-profile cos-to-queue NAME
no map qos-profile cos-to-queue NAME
Parameters
NAME Profile name
Default
None
Command Mode
NVO access interface mode
Applicability
This command was introduced in OcNOS version 4.2.
Example
(config)#nvo vxlan access-if port-vlan xe1 10
(config-nvo-acc-if)#map qos-profile cos-to-queue ac_port_ingress
(config-nvo-acc-if)#no map qos-profile cos-to-queue ac_port_ingress
Command Syntax
map qos-profile queue-color-to-cos NAME
no map qos-profile queue-color-to-cos NAME
Parameters
NAME Profile name
Default
None
Command Mode
NVO access interface mode
Applicability
This command was introduced in OcNOS version 4.2.
Example
(config)#nvo vxlan access-if port-vlan xe2 10
(config-nvo-acc-if)#map qos-profile queue-color-to-cos ac_profile
(config-nvo-acc-if)#no map qos-profile queue-color-to-cos ac_profile
Command Syntax
nvo vxlan disable-arp-storm-control-for-cpu
no nvo vxlan disable-arp-storm-control-for-cpu
Parameters
None
Command Mode
Configure mode
Applicability
This command was introduced in OcNOS version 6.5.3.
Example
(config)#nvo vxlan disable-arp-storm-control-for-cpu
Command Syntax
nvo vxlan tunnel qos-map-mode cos-dscp (ingress|egress) NAME
no nvo vxlan tunnel qos-map-mode cos-dscp (ingress|egress)
Parameters
NAME Profile name
ingress Ingress direction
egress Egress direction
Command Mode
Configure mode
Applicability
This command was introduced in OcNOS version 1.3.
Example
(config)#nvo vxlan tunnel qos-map-mode cos-dscp egress nw_profile
(config)#no nvo vxlan tunnel qos-map-mode cos-dscp egress
(config)#nvo vxlan tunnel qos-map-mode cos-dscp ingress nw_profile
(config)#no nvo vxlan tunnel qos-map-mode cos-dscp ingress
Command Syntax
qos profile cos-to-queue (NAME|default)
no qos profile cos-to-queue NAME
Parameters
NAME QoS profile name for cos-to-queue
default Default name
Command Mode
Configure mode
Applicability
This command was introduced in OcNOS version 1.3.
Example
(config)#qos profile cos-to-queue ac_port_ingress
(config)#no qos profile cos-to-queue ac_port_ingress
Command Syntax
qos profile dscp-to-queue (NAME|default}
no qos profile dscp-to-queue NAME
Parameters
NAME Profile name
default Default name
Command Mode
Configure mode
Applicability
This command was introduced in OcNOS version 1.3.
Example
(config)#qos profile dscp-to-queue nw_profile
(config-ingress-dscp-map)#exit
(config)#no qos profile dscp-to-queue nw_profile
(config)#
Command Syntax
qos profile queue-color-to-cos (NAME|default)
no qos profile queue-color-to-cos NAME
Parameters
NAME Profile name
default Default name
Command Mode
Configure mode
Applicability
This command was introduced in OcNOS version 1.3.
Example
(config)#qos profile queue-color-to-cos ac_profile
(config)#no qos profile queue-color-to-cos ac_profile
Command Syntax
qos profile queue-color-to-dscp (NAME|default)
no qos profile queue-color-to-dscp NAME
Parameters
NAME Profile name
default Default name
Default
None
Command Mode
Configure mode
Applicability
This command was introduced in OcNOS version 1.3.
Example
(config)#qos profile queue-color-to-dscp nw_profile
(config-egress-dscp-map)#exit
(config)#no qos profile queue-color-to-dscp nw_profile
queue cos
Use this command to configure user defined mapping for queue and cos.
Use the no form of this command to remove the mapping.
Command Syntax
queue <0-7> (color(green|yellow|red|all)|) cos <0-7>
no queue <0-7> (color(green|yellow|red|all)|)
Parameters
<0-7> Queue and cos range
color Color to map
all Set mapping for all packets
green Set mapping for green packets
red Set mapping for red packets
yellow Set mapping for yellow packets
Default
Default queue and cos value is one-one default mapping if it is not configured.
Command Mode
QoS config mode
Applicability
This command was introduced in OcNOS version 1.3.
Example
(config)#qos profile queue-color-to-cos ac_profile
(config-egress-cos-map)#queue 5 cos 2
(config-egress-cos-map)#no queue 5
queue dscp
Use this command to configure user-defined mapping for queue to DSCP. This will be mapped with nvo VXLAN tunnel
of local VTEP.
Use the no form of this command to remove the queue-to-DSCP mapping.
Command Syntax
queue <0-7> (color(green|yellow|red|all)|) dscp <0-63>
no queue <0-7> (color(green|yellow|red|all)|)
Parameters
<0-7> Queue number
<0-63> DSCP
color Color to map
all Set mapping for all packets
green Set mapping for green packets
red Set mapping for red packets
yellow Set mapping for yellow packets
Default
Default queue and cos value is one-one default mapping if it is not configured.
Command Mode
QoS config mode
Applicability
This command was introduced in OcNOS version 1.3.
Example
(config)#qos profile queue-color-to-dscp nw_profile
(config-egress-dscp-map)# queue 1 dscp 63
(config-egress-dscp-map)#no queue 1
nvo vxlan tunnel qos-map-mode 527 show nvo vxlan counters network-port 536, 564
nvo vxlan vtep-ip-global 527 show nvo vxlan interface counters 538
show nvo vxlan mac-table 538, 564
P show nvo vxlan nd-cache 541, 566
show nvo vxlan static host state 543, 566
parantheses show nvo vxlan tunnel 545
command syntax 12 show running-config nvo vxlan 546
parentheses shutdown 516, 552, 553, 562
command syntax 12 square brackets
period command syntax 13
command syntax 13
port breakout configuration 256 T
Port Mapping 26
privileged exec mode 18 time
command syntax 13
Q Tunnel End Point 24
question mark U
command syntax 13
unicast configuration 26
R
V
router mode 18
vertical bars
S command syntax 12
VXLAN Architecture 22
show commands 15 VXLAN Commands 495, 556, 567
exclude modifier 16 vxlan host-reachability-protocol evpn-bgp 554
include modifier 16 VXLAN Unicast Configuration 26
redirect modifier 17
show interface irb 552 W
show nvo vxlan 528, 563
show nvo vxlan arp-cache 531 WORD 13
show nvo vxlan counters access-port 533, 564