VXLAN EVPN Multihoming with Cisco Nexus 9000 Series Switches

Size: px
Start display at page:

Download "VXLAN EVPN Multihoming with Cisco Nexus 9000 Series Switches"

Transcription

1 White Paper VXLAN EVPN Multihoming with Cisco Nexus 9000 Series Switches 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 27

2 Contents Introduction... 3 Traditional vpc Multihoming... 3 BGP EVPN Multihoming... 3 BGP EVPN Multihoming... 3 Terminology... 3 EVPN Multihoming Redundancy Group... 3 Ethernet Segment Identifier... 4 LACP Bundling... 4 Layer 2 Gateway Spanning Tree Protocol... 6 Guidelines and Recommendations for L2G-STP EVPN Multihoming Feature Enablement EVPN Multihoming Implementation Sample Configuration EVPN Multihoming: Local Traffic Flows Locally Bridged Traffic Access Failure for Locally Bridged Traffic Core Failure for Locally Bridged Traffic Locally Routed Traffic Access Failure for Locally Routed Traffic Core Failure for Locally Routed Traffic EVPN Multihoming: Remote Traffic Flows Remote Bridged Traffic Ethernet Autodiscovery Route (Type 1) Per Ethernet Segment MAC-IP Route (Type 2) Access Failure for Remote Bridged Traffic Core Failure for Remote Bridged Traffic Remote Routed Traffic Access Failure for Remote Routed Traffic Core Failure for Remote Routed Traffic EVPN Multihoming Broadcast, Unicast, and Multicast Flows Designated Forwarder Split Horizon and Local Bias Ethernet Segment Route (Type 4) Designated-Forwarder Election and VLAN Carving Core and Site Failures for Broadcast, Unicast, and Multicast Traffic Conclusion For More Information Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 27

3 Introduction Cisco Nexus platforms support multihoming based on virtual port channel (vpc) technology, in which a pair of switches acts as a single device for redundancy, and both switches function in active mode. For Cisco Nexus 9000 Series Switches in a Virtual Extensible LAN (VXLAN) Border Gateway Protocol (BGP) Ethernet VPN (EVPN) environment, two solutions can be used to support Layer 2 multihoming: traditional vpc (emulated or virtual IP addresses) and BGP EVPN techniques. Traditional vpc uses consistency checking, which is a mechanism used by two switches configured as a vpc pair to exchange configuration information and verify compatibility. BGP EVPN lacks this consistency-check mechanism. BGP EVPN instead relies on Link Aggregation Control Protocol (LACP), to detect any misconfiguration.this approach eliminates the multichassis EtherChannel trunk (MCT) link (traditionally used by vpc) and offers more flexibility than traditional vpc because each VXLAN tunnel endpoint (VTEP) can be part of one or more redundancy groups and can potentially support any number of VTEPs in a given group. Traditional vpc Multihoming A virtual or emulated IP address is used as the VTEP IP for vpc connected hosts. Both vpc peers share this emulated address when advertising MAC and IP host routes for hosts that are multihomed to the vpc peers. This solution requires a dedicated MCT link. This solution will not be discussed further in this document. BGP EVPN Multihoming With a BGP EVPN control plane, each switch can use its own local IP address as the VTEP IP address and still provide active-active redundancy. During certain failure scenarios, BGP EVPN based multihoming also provides fast convergence that otherwise cannot be achieved without a control protocol (data-plane flood and learn). BGP EVPN Multihoming This section provides an overview of BGP EVPN multihoming. Terminology The following terminology is used in discussing BGP EVPN multihoming: The EVPN instance (EVI) is represented by the virtual network identifier (VNI). The MAC Virtual Routing and Forwarding (MAC-VRF) instance is a container for housing the virtual forwarding table for MAC addresses. The unique route distinguisher and import and export target can be configured per MAC-VRF instance. The Ethernet segment (ES) is a set of bundled links. The Ethernet segment identifier (ESI) represents each Ethernet segment uniquely across the network. EVPN Multihoming Redundancy Group Figure 1 shows a dual-homed topology in which VTEPs L1 and L2 are distributed anycast VXLAN gateways performing integrated routing bridging (IRB). Host H2 is connected to an access switch that is dual-homed to both L1 and L Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 27

4 Figure 1. [EVPN Multihoming] The access switch is connected to L1 and L2 through a bundled pair of physical links. The switch is not aware that the bundle is configured on two different devices on the other side. However, both L1 and L2 must be aware that they are parts of the same bundle. Note that there is no MCT link between L1 and L2, and each VTEP can have multiple such bundle links shared with the same set of neighbors. To make the VTEPs (L1 and L2) aware that they belong to the same bundle link, Cisco NX- OS Software uses the ESI and the system MAC address configured for the interface (port [po]). Ethernet Segment Identifier EVPN introduces the concept of the Ethernet segment identifier, or ESI. Each VTEP is configured with a 10-byte ESI value for the bundled link that they share with the multihomed neighbor. This ESI value can be configured manually or derived automatically. LACP Bundling LACP can be turned on to detect ESI misconfigurations in the multihomed port-channel bundle. LACP sends the ESI-configured MAC address in the hello messages sent to the access switch. LACP is not mandated with ESI. A given ESI interface (port) shares the same ESI across the VTEPs in the group. As shown in Figure 2, the access switch receives the same configured MAC address from both VTEPs (L1 and L2), so it puts the bundled link in the up state Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 27

5 Figure 2. [EVPN Multihoming and LACP] Because the Ethernet segment MAC address can be shared across all the Ethernet segments on the VTEP, LACP protocol data units (PDUs) use the Ethernet segment MAC address as the system MAC address, and the administrator key carries the ESI. The approach recommended here is to run LACP between VTEPs and access devices because LACP PDUs have a mechanism to detect and act on misconfigured ESIs. If a mismatch occurs on configured ESIs on the same port, LACP will bring down one of the links (the first link to come online will remain active). By default on most Cisco Nexus platforms, LACP sets a port to the suspended state if it does not receive an LACP PDU from the peer. This behavior is based on the lacp suspend- individual feature, which is enabled by default. This feature helps prevent loops created as a result of ESI configuration mismatch, so you should enable this command on port channels on access switches and servers. However, in some scenarios (such as power-on autoprovisioning [POAP] and NetBoot), it can cause servers to fail to boot because these servers require LACP to logically bring up the port. If you are using a static port channel and have mismatched ESIs, the MAC address is learned from both VTEP1 and VTEP2, and both will advertise the same MAC address but belonging to different ESIs. This behavior will trigger a MAC address move scenario, and eventually no traffic will be forwarded to that node for MAC addresses that are learned on both VTEP1 and VTEP Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 27

6 Layer 2 Gateway Spanning Tree Protocol This section provides an overview of Layer 2 Gateway Spanning Tree Protocol (L2G-STP). Figure 3 shows the topology. Figure 3. [EVPN Multihoming and L2G-STP] L2G-STP builds a loop-free tree topology. However, the Spanning Tree Protocol root must always (essentially) be in the VXLAN fabric. A bridge ID for Spanning Tree Protocol consists of a MAC address and bridge priority. When the system is running in the VXLAN fabric, the system automatically assigns the VTEPs with the MAC address c84c.75fa.6000 from a pool of reserved MAC addresses. As a result, each switch uses the same MAC address for the bridge ID emulating a single logical pseudo root. L2G-STP is disabled by default on EVPN ESI multihoming VLANs. You will need to explicitly issue a command to enable it (on all VTEPs). Table 1 lists the commands for configuring L2G-STP. Table 1. L2G-STP Configuration Commands Description Enable Spanning Tree Protocol mode. Enable default domain 0. Block loops only with pseudo- root emulation, with no tunneling of Bridge Protocol Data Units (BPDUs). Explicit domain ID is needed to tunnel encoded BPDUs to the core and processes received from the core. Command spanning-tree mode <rapid-pvst, mst> spanning-tree domain enable spanning-tree domain 1 Configure Spanning Tree Protocol priority. spanning-tree mst <id> priority 8192 spanning-tree vlan <id> priority 8192 Disable L2G-STP on a VTEP. spanning-tree domain disable 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 27

7 All L2G-STP VLANs should be set to a lower spanning-tree priority than the customer-edge (CE) topology to help ensure that the VTEP is the spanning-tree root for this VLAN. If the access switches have a higher priority, you can set the L2G-STP priority to 0 to retain the L2G- STP root in the VXLAN fabric. A configuration example is shown here. TOR9-leaf4# show spanning-tree summary Switch is in mst mode (IEEE Standard) Root bridge for: MST0000 L2 Gateway STP bridge for: MST0000 L2 Gateway Domain ID: 1 Port Type Default is disable Edge Port [PortFast] BPDU Guard Default is disabled Edge Port [PortFast] BPDU Filter Default is disabled Bridge Assurance is enabled Loopguard Default is disabled Pathcost method used is long PVST Simulation is enabled STP-Lite is disabled Name Blocking Listening Learning Forwarding STP Active MST mst TOR9-leaf4# show spanning-tree vlan 1001 MST0000 Spanning tree enabled protocol mstp Root ID Priority 8192 Address c84c.75fa L2G-STP reserved mac+ domain id This bridge is the root Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 8192 (priority 8192 sys-id-ext 0) Address c84c.75fa.6001 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 27

8 This output shows that the spanning-tree priority is set to 8192 (the default is 32768). Spanning-tree priority is set in multiples of The priority for individual instances is calculated as Priority + Instance_ID. In this case, the priority is calculated as = With L2G-STP, access ports (VTEP ports connected to access switches) have root guard enabled implicitly. If a superior BPDU is received on an edge port of a VTEP, the port is placed in the Layer 2 gateway inconsistent state until the condition is cleared as shown here: 2016 Aug 29 19:14:19 TOR9-leaf4 %$ VDC-1 %$ %STP-2-L2GW_BACKBONE_BLOCK: L2 Gateway Backbone port inconsistency blocking port Ethernet1/1 on MST Aug 29 19:14:19 TOR9-leaf4 %$ VDC-1 %$ %STP-2-L2GW_BACKBONE_BLOCK: L2 Gateway Backbone port inconsistency blocking port port-channel13 on MST0000. TOR9-leaf4# show spanning-tree MST0000 Spanning tree enabled protocol mstp Root ID Priority 8192 Address c84c.75fa.6001 This bridge is the root Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 8192 (priority 8192 sys-id-ext 0) Address c84c.75fa.6001 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Interface Role Sts Cost Prio.Nbr Type Po1 Desg FWD Edge P2p Po2 Desg FWD Edge P2p Po3 Desg FWD Edge P2p Po12 Desg BKN* P2p *L2GW_Inc Po13 Desg BKN* P2p *L2GW_Inc Eth1/1 Desg BKN* P2p *L2GW_Inc To disable L2G-STP on a VTEP, issue this command: spanning-tree domain disable This command will disable L2G-STP on all EVPN ESI multihomed VLANs. The bridge MAC address will be restored to the system MAC address, and the VTEP may not necessarily be the root. In the following case, the access switch has assumed the root role because L2G-STP is disabled Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 27

9 TOR9-leaf4(config)# spanning-tree domain disable TOR9-leaf4# show spanning-tree summary Switch is in mst mode (IEEE Standard) Root bridge for: none L2 Gateway STP is disabled Port Type Default is disable Edge Port [PortFast] BPDU Guard Default is disabled Edge Port [PortFast] BPDU Filter Default is disabled Bridge Assurance is enabled Loopguard Default is disabled Pathcost method used is long PVST Simulation is enabled STP-Lite is disabled Name Blocking Listening Learning Forwarding STP Active MST mst TOR9-leaf4# show spanning-tree vlan 1001 MST0000 Spanning tree enabled protocol mstp Root ID Priority 4096 Address 00c8.8ba Cost 0 Port 4108 (port-channel13) 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 27

10 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 8192 (priority 8192 sys-id-ext 0) Address 5897.bd1d.db95 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec With L2G-STP, access ports on VTEPs cannot be in an edge port, because they would behave like normal spanning-tree ports, receiving BPDUs from access switches. In that case, access ports on VTEPs would lose the advantage of rapid transmission, instead forwarding on Ethernet segment link flap (they will have to go through a proposal and agreement handshake before assuming the FWD-Desg role). Guidelines and Recommendations for L2G-STP Note the following points when using L2G-STP: With L2G-STP enabled, the VXLAN fabric (all VTEPs) emulates a single pseudo-root switch for the customer access switches. With L2G-STP, root guard is inherently enabled by default on all access ports. All access ports from VTEPs connecting to customer access switches will be in the Desg FWD state by default. All ports on customer access switches connecting to VTEPs are either in the root-port FWD or Altn BLK state. Root guard will be activated if better or superior spanning-tree information is received from customer access switches. This process will put the ports in BLK L2GW_Inc state to secure the root on the VXLAN fabric and prevent a loop. Explicit domain ID configuration is needed to enable spanning-tree BPDU tunneling across the fabric. As a best practice, you should configure all VTEPs with the lowest spanning-tree priority of all switches in the spanning-tree domain to which they are attached. By setting all the VTEPs as the root bridge, you make the entire VXLAN fabric appear to be one virtual bridge. ESI interfaces should not be enabled in spanning-tree edge mode to allow L2G-STP to run across the VTEP and access layer. You can continue to use ESIs or orphans (single-homed hosts) in spanning-tree edge mode if they directly connect to hosts or servers that do not run Spanning Tree Protocol and are end hosts. Configure all VTEPs that are connected by a common customer access layer in the same L2G-STP domain: ideally, all VTEPs on the fabric on which the hosts reside and to which the hosts can move. The L2G-STP domain scope is global, and all ESIs on a given VTEP can participate in only one domain. Mappings between Multiple Spanning Tree (MST) instances and VLANs must be consistent across the VTEPs in a given L2G-STP domain. Non-L2G-STP-enabled VTEPs cannot be directly connected to L2G-STP-enabled VTEPs. Doing so will result in conflicts and disputes because the non-l2g-stp VTEP will keep sending BPDUs and can steer the root outside Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 27

11 EVPN Multihoming Feature Enablement NX-OS allows either vpc-based EVPN multihoming or ESI-based EVPN multihoming on a VTEP; both features can t be enabled together. ESI-based multihoming is enabled by entering evpn esi multihoming in the commandline interface (CLI). The evpn esi multihoming feature enables Ethernet segment configuration and generation of Ethernet-segment routes (type 1 and type 2) on the VTEPs. The processing of Ethernet-segment routes with valid ESIs and path-list resolution are not tied to the evpn esi multihoming feature. If the VTEP receives MAC and MAC-IP routes with valid ESIs and the feature is not enabled, the Ethernet-segment-based path resolution logic still will apply to these remote routes. This behavior is required for interoperability between vpc-enabled VTEPs and ESI-enabled VTEPs. EVPN Multihoming Implementation The EVPN overlay draft specifies adaptations to the BGP Multiprotocol Label Switching (MPLS) based EVPN solution so that it can be applied as a network virtualization overlay with VXLAN encapsulation. The role of the provider-edge (PE) node described in BGP MPLS EVPN is equivalent to the role of the VTEP and network virtualization edge device (NVE), in which VTEPs use control-plane learning and distribution through BGP for remote addresses instead of data-plane learning. Five route types are currently defined: Type 1: Ethernet autodiscovery (EAD) route Type 2: MAC and MAC-IP route advertisements Type 3: Inclusive multicast route Type 4: Ethernet segment route Type 5: IP prefix route BGP EVPN running on NX-OS would use route type 2 to advertise MAC and IP (host) address information, route type 3 to carry VTEP information specifically for ingress replication, and route type 5 to advertise IPv4 and IPv6 prefixes in the network layer reachability information (NLRI) with no MAC addresses in the route key. With the introduction of EVPN multihoming, NX-OS can use the EAD route, in which the ESI and the Ethernet tag ID are considered to be part of the prefix in the NLRI. Because endpoint reachability is learned through the BGP control plane, the network convergence time is a function of the number of MAC and IP routes that must be withdrawn by the VTEP in the event of a failure. To manage such a condition, each VTEP advertises a set of one or more EAD routes per Ethernet segment route for each locally attached Ethernet segment. If a failure condition occurs in the attached segment, the VTEP withdraws the corresponding set of EAD routes per Ethernet segment routes. The Ethernet segment route is another route type used by NX-OS with EVPN multihoming. This type is used mainly for designated-forwarder election for broadcast, unknown unicast, and multicast (BUM) traffic. If the Ethernet segment is multihomed, the presence of multiple designated forwarders could result in forwarding loops in addition to potential packet duplication. Therefore, the Ethernet segment route (type 4) is used to elect the designated forwarder as well as to apply split-horizon filtering. All VTEPs and provider-edge nodes that are configured with an Ethernet segment originate this route. To summarize, these are the new implementation concepts for EVPN multihoming: 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 27

12 An EAD route per Ethernet segment, also referred to as a Type-1 route, is used to converge the traffic faster during an access-failure scenario. This route has an Ethernet tag of 0xFFFFFFFF. (Refer to the section EVPN Multihoming: Local Traffic Flows. ) An EAD route per EVI, also referred to as Type-1 route, is used for creating aliases and performing load balancing when traffic hashes to only one of the VTEPs. This route cannot have an Ethernet tag value of 0xFFFFFF to differentiate it from EAD route per Ethernet segment. The Ethernet segment route, also referred to as a Type-4 route, is used for designated forwarder election for BUM traffic. (Refer to the section EVPN Multihoming: Remote Traffic Flows. ) Aliasing is used to load-balance traffic to all the connected VTEPs for a given Ethernet segment using the Type-1 EAD route per EVI. Aliasing is performed regardless of the VTEP in which the hosts are actually learned. Mass withdrawal is used for fast convergence during access failure scenarios using the Type-1 EAD route per Ethernet segment. (Refer to the section EVPN Multihoming: Local Traffic Flows. ) Designated forwarder election is used to prevent forwarding loops and duplicates. Only a single VTEP is allowed to decapsulate and forward traffic for a given Ethernet segment. (Refer to the section EVPN Multihoming: Remote Traffic Flows. ) A split horizon is used to prevent forwarding loops and duplicates for BUM traffic. Only the BUM traffic originating from a remote site is allowed to be forwarded to a local site. (Refer to the section EVPN Multihoming: Remote Traffic Flows. ) Implementation items for a future release include the following: The ESI label extended community is used to signal the redundancy mode: single-active or active-active mode. Sample Configuration Table 2 outlines a sample configuration for enabling EVPN multihoming. Table 2. Configuration to Enable EVPN Multihoming Description Enable multihoming globally. This setting enables the EVPN multihoming feature. Enable BGP maximum paths. This setting enables equal-cost multipath (ECMP) for host routes. Otherwise, host routes will have only 1 VTEP as the next hop. Enable core links. This setting tracks uplink interfaces to the core. If all uplinks are down, local Ethernet segment based ports will be shut down or suspended. This setting is used mainly to avoid black-holing south-to-north traffic when no uplinks are available. Configure the Ethernet segment. The ethernet-segment value is the local ESI. The ESI must match on VTEPs on which the port is multihomed. The ESI should be unique per port. The system-mac value is the local system MAC ID. It must match on VTEPs on which the port is multihomed. The system MAC address can be shared across multiple ports. Configure ternary content-addressable memory (TCAM). The hardware accesslist tcam region vpc-convergence setting is used to configure split-horizon access control lists (ACLs) in hardware. This setting helps prevent BUM traffic duplication on shared Ethernet segment ports. Command evpn esi multihoming maximum-paths ibgp x maximum-paths x evpn multihoming core-tracking interface port-channel x ethernet-segment <es-id> system-mac <es-system-mac> hardware access-list tcam region vpc-convergence 256 hardware access-list tcam region arp-ether Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 27

13 Sample Configuration Figure 4 shows a sample configuration. Figure 4. [EVPN Multihoming Overview and Sample Configuration] Here is the configuration for top-of-rack switch 1 (TOR1): evpn esi multihoming router bgp 1001 address-family l2vpn evpn maximum-paths ibgp 2 interface Ethernet2/1 no switchport evpn multihoming core-tracking mtu 9216 ip address /30 ip pim sparse-mode no shutdown interface Ethernet2/2 no switchport evpn multihoming core-tracking mtu 9216 ip address /30 ip pim sparse-mode no shutdown 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 27

14 interface port-channel11 switchport mode trunk switchport access vlan 1001 switchport trunk allowed vlan , ethernet-segment 2011 system-mac mtu 9216 Here is the configuration for TOR2: evpn esi multihoming router bgp 1001 address-family l2vpn evpn maximum-paths ibgp 2 interface Ethernet2/1 no switchport evpn multihoming core-tracking mtu 9216 ip address /30 ip pim sparse-mode no shutdown interface Ethernet2/2 no switchport evpn multihoming core-tracking mtu 9216 ip address /30 ip pim sparse-mode no shutdown interface port-channel11 switchport mode trunk switchport access vlan 1001 switchport trunk allowed vlan , ethernet-segment 2011 system-mac mtu Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 27

15 EVPN Multihoming: Local Traffic Flows All VTEPs that are a part of the same redundancy group (as defined by the ESI) act as a single VTEP device with respect to the host access switch. However, there is no MCT link present to bridge and route traffic for local access. Locally Bridged Traffic As shown in Figure 5, host H2 is dual-homed, whereas hosts H1 and H3 are single-homed (such hosts are also known as orphans). Traffic is bridged locally from H1 to H2 through L1. However, if a packet needs to be bridged between orphans H1 and H3, the packet must be bridged through the VXLAN overlay. Figure 5. [EVPN Multihoming and Local Bridging] Access Failure for Locally Bridged Traffic As illustrated in Figure 6, if the ESI link at L1 fails, there is no path for bridged traffic to reach from H1 to H2 except through the overlay. Therefore, the local bridged traffic will take a suboptimal path, similar to the H1-to-H3 orphan flow. Note that when such a condition occurs, the MAC address table entry for H2 changes from a local route pointing to a port-channel interface to a remote overlay route pointing to a peer ID of L2. This change is sent through the system by BGP Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 27

16 Figure 6. [EVPN Multihoming Bridging and Local ESI Link Failure] Core Failure for Locally Bridged Traffic If VTEP L1 becomes isolated from the core, it must not continue to attract access traffic, because it will not be able to encapsulate and send the traffic on the overlay. Thus, the access links must be brought down at L1 if L1 loses core reachability (Figure 7). In this scenario, orphan H1 will lose all connectivity to both remote and locally attached hosts because there is no dedicated MCT link. Figure 7. [EVPN Multihoming Bridging and Core Link Failure] 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 27

17 Locally Routed Traffic Consider a scenario in which H1, H2, and H3 are in different subnets and L1 and L2 are distributed anycast gateways (Figure 8). Any packet that is routed from H1 to H2 will be directly sent from L1 through native routing. However, host H3 is not a locally attached adjacency, unlike in the vpc case, in which the Address Resolution Protocol (ARP) entry would have been synchronized with L1 as a locally attached adjacency. Instead, H3 appears as a remote host in the IP address table at L1, installed in the context of L3 VNI. This packet must be encapsulated in the router MAC address of L2 and routed to L2 through the VXLAN overlay. Therefore, traffic routing from H1 to H3 occurs exactly the same way traffic routing between truly remote hosts in different subnets. Figure 8. [EVPN Multihoming and Local Routed Traffic] 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 27

18 Access Failure for Locally Routed Traffic If the ESI link at VTEP L1 fails, there is no path for routed traffic to reach from H1 to H2 except through the overlay. Therefore, the local routed traffic takes a suboptimal path, much like the H1-to-H3 orphan flow (Figure 9). Figure 9. [EVPN Multihoming Routing and Local ESI Link Failure] Core Failure for Locally Routed Traffic If VTEP L1 becomes isolated from the core, it must not continue to attract access traffic, because it will not be able to encapsulate and send it on the overlay. Thus, the access links must be brought down at L1 if L1 loses core reachability (Figure 10). In this scenario, orphan H1 will lose all connectivity to both remote and locally attached hosts because there is no dedicated MCT link Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 27

19 Figure 10. [EVPN Multihoming Routing and Core Link Failure] EVPN Multihoming: Remote Traffic Flows Consider a remote VTEP L3 that is sending bridged and routed traffic to the multihomed complex consisting of VTEPs L1 and L2. Because there is no virtual or emulated IP address representing this multihomed complex, L3 must apply ECMP at the source for both bridged and routed traffic (Figure 11). This section describes how ECMP is used at L3 for both bridged and routed cases and how the system responds to core and access failures. Figure 11. [EVPN Multihoming and Remote Bridging] 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 27

20 Remote Bridged Traffic In Figure 11, remote host H5 wants to bridge traffic to host H2, which is sitting behind the EVPN multihomed complex (L1 and L2). Host H2 will build an ECMP list in accordance with the rules defined in RFC In the MAC address table at L3, the MAC address entry for H2 points to an ECMP path list consisting of IP-L1 and IP-L2. Any bridged traffic going from H5 to H2 will be VXLAN encapsulated and load balanced to L1 and L2. When the ECMP list is created, the following constructs need to be kept in mind: Mass withdrawal: Failures that cause path-list correction should be independent of the scale of MAC addresses. Aliasing: Path-list insertions may be independent of the scale of MAC addresses (depending on support for optional routes). The following sections present the main constructs needed to create this MAC address ECMP path list. Ethernet Autodiscovery Route (Type 1) Per Ethernet Segment EVPN defines a mechanism to efficiently and quickly signal the need to update the forwarding tables after a failure in connectivity to an Ethernet segment. To accomplish this, each provider-edge node advertises a set of one or more EAD routes per Ethernet segment for each locally attached Ethernet segment (Table 3). Table 3. Ethernet Autodiscovery Route (Route Type 1) per Ethernet Segment NLRI Route type Ethernet segment (Type 1) Route distinguisher Router-ID: Segment-ID (VNI << 8) ESI <Type: 1B><MAC: 6B><LD: 3B> Ethernet tag MAX-ET MPLS label 0 ATTRS ESI label extended community Single Active = False ESI Label = 0 Next hop Route target NVE loopback IP address Subset of list of route targets of MAC-VRF instances associated with all the EVIs active on the Ethernet segment MAC-IP Route (Type 2) The MAC and IP address route remains the same as that used in the current vpc multihoming and standalone single-homing solutions. However, now it will have a non-zero ESI field, which indicates that this is a multihomed host and so is a candidate for ECMP path resolution (Table 4). Table 4. MAC and IP Address Route (Route Type 2) NLRI Route type MAC and IP address route (Type 2) Route distinguisher Route distinguisher of MAC-VRF instance associated with the host ESI <Type: 1B><MAC: 6B><LD: 3B> Ethernet tag MAC address IP address Labels MAX-ET MAC address of the host IP address of the host L2 VNI associated with the MAC-VRF instance L3 VNI associated with the L3-VRF instance 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 27

21 ATTRS Next hop Loopback of NVE Route target Export the route target configured under the MAC-VRF instance or L3-VRF instance associated with the host Access Failure for Remote Bridged Traffic Failure of the ESI links will result in mass withdrawal. The EAD and Ethernet segment route will be withdrawn, leading the remote device to remove the VTEP from the ECMP list for the given Ethernet segment (Figure 12). Figure 12. [EVPN Multihoming Remote Bridging and ESI Link Failure] Core Failure for Remote Bridged Traffic If VTEP L1 becomes isolated from the core, it must not continue to attract access traffic, because it will not be able to encapsulate and send it on the overlay. Thus, the access links must be brought down at L1 if L1 loses core reachability (Figure 13) Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 27

22 Figure 13. [EVPN Multihoming Remote Bridging and Core Link Failure] Remote Routed Traffic In Figure 14, L3 is a Layer 3 VXLAN gateway, and H5 and H2 belonging to different subnets. In this case, any intersubnet traffic from L3 to L1 and L2 will be routed at L3, which is a distributed anycast gateway. Both L1 and L2 will advertise the MAC and IP address route for host H2. As a result of receiving these routes, L3 will build an L3 ECMP list consisting of L1 and L2. Figure 14. [EVPN Multihoming Remote Routing] 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 27

23 Access Failure for Remote Routed Traffic If the access link pointing to ES1 goes down on L1, the mass-withdrawal route will be sent in the form of EAD and Ethernet segment routes. This transmission will cause L3 to remove L1 from the MAC address ECMP path list, causing the intrasubnet (L2) traffic to converge quickly. L1 will now treat H2 as a remote route reachable through the VXLAN overlay because it is no longer directly connected through the ESI link. This behavior will cause traffic destined for H2 to take a suboptimal path from L3 to L1 to L2, as shown in Figure 15. Figure 15. [EVPN Multihoming Remote Routing and ESI Link Failure] Intersubnet traffic from H5 to H2 will follow this path: 1. The packet will be sent by H5 to the gateway at L3. 2. L3 will perform symmetric IRB and route the packet to L1 through the VXLAN overlay. 3. L1 will decapsulate the packet and perform an inner IP address lookup for H2. 4. H2 is a remote route, so L1 will route the packet to L2 through the VXLAN overlay. 5. L2 will decapsulate the packet and perform an IP address lookup and then route the packet directly to the attached switch virtual interface (SVI). Thus, routing will occur three times: once each at L3, L1, and L2. This suboptimal behavior will continue until the type-2 route is withdrawn for L1 by BGP. Core Failure for Remote Routed Traffic Core failure for remote routed traffic elicits the same behavior as core failure for remote bridged traffic. (Please refer to the section Core Failure for Remote Bridged Traffic. ) The underlay routing protocol will withdraw L1 s loopback reachability from all remote VTEPs, so L1 will be removed from both the MAC ECMP and IP ECMP lists everywhere (Figure 16) Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 27

24 Figure 16. [EVPN Multihoming Remote Routing and Core Link Failure] EVPN Multihoming Broadcast, Unicast, and Multicast Flows NX-OS supports a multicast core in the underlay with ESI. Consider BUM traffic originating from H5. The BUM packets will be encapsulated in the multicast group mapped to the VNI. Because both L1 and L2 have joined the shared tree ( *, G) for the underlay group based on the L2 VNI mapping, each will receive a copy of the BUM traffic (Figure 17). Figure 17. [EVPN Multihoming and BUM Flood Traffic] 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 24 of 27

25 Designated Forwarder Only one of the VTEPs in the redundancy group should decapsulate and forward BUM traffic over the ESI links. For this purpose, a unique designated forwarder is elected per Ethernet segment. The role of the designated forwarder is to decapsulate BUM traffic originating in the remote segments and forward it to the destination local segment for which the device is the designated forwarder. Note these points about designated-forwarder election: Designated-forwarder election is per Ethernet segment and VLAN. A given VLAN can have a different designated-forwarder for ES1 and ES2. Figure 17 shows L2 and the designated forwarder for both ES1 and ES2 on a given VLAN. Designated-forwarder election applies only to BUM traffic on the receiving side for decapsulation. Every VTEP must decapsulate BUM traffic to forward it to single-homed (or orphan) links. Duplication of the designated-forwarder role will lead to duplicate packets or loops in a dual-homed network, so the designated forwarder must be unique per ES and VLAN. Split Horizon and Local Bias Consider BUM traffic originating from H2. Assume that this traffic is hashed at L1. L1 will encapsulate this traffic in the overlay multicast group and send the packet to the core. All VTEPs that have joined this multicast group with the same L2 VNI will receive this packet. Additionally, L1 will locally replicate the BUM packet on all directly connected orphan and ESI ports. For example, if the BUM packet originated at ES1, L1 will locally replicate the packet to ES2 and the orphan ports. This technique for replicating packets to all the locally attached links is called local bias (Figure 18). Figure 18. [EVPN Multihoming Split Horizon and Local Bias] 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 25 of 27

26 Remote VTEPs will decapsulate the packet and forward it to their ESI and orphan links based on the designed forwarder state. However, this packet will also be received at L2, which belongs to the same redundancy group as the originating VTEP L1. L2 must decapsulate the packet to send it to orphan ports. However, even though L2 is the designated forwarder for ES1, L2 must not forward this packet to the ES1 link. This packet was received from a peer that shares ES1 with L1, and L1 would have used local bias, and you do not want duplicate copies to be received on ES2. Therefore, L2 (the designated forwarder) will apply a split-horizon filter for the L1 IP address on ES1 and ES2 that it shares with L1. This filter is applied in the context of a VLAN. Ethernet Segment Route (Type 4) The Ethernet segment route is used to elect the designated forwarder and to apply split-horizon filtering. All the VTEPs that are configured with an Ethernet segment originate this route. The Ethernet segment route is exported and imported when ESI is locally configured under the port channel (Table 5). Table 5. Ethernet Segment Route (Route Type 4) NLRI Route type Ethernet segment (Type 4) Route distinguisher Router-ID: Base + Port channel number ESI <Type : 1B><MAC : 6B><LD : 3B> ATTRS Originator IP address Ethernet segment import route target NVE loopback IP address 6-byte MAC address derived from ESI Designated-Forwarder Election and VLAN Carving Upon configuration of the ESI, both L1 and L2 will advertise the Ethernet segment route. The ESI MAC address is common between L1 and L2 and unique in the network. Hence, only L1 and L2 will import each other s Ethernet segment routes (Figure 19). Figure 19. [EVPN Multihoming and DF Election] 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 26 of 27

27 Core and Site Failures for Broadcast, Unicast, and Multicast Traffic If the access link pertaining to ES1 fails at L1, L1 will withdraw the Ethernet segment route for ES1. This withdrawal will trigger recomputation of the designated forwarder. Because L2 will be the only VTEP left in the ordinal table, it will take over the designated-forwarder role for all VLANs. Conclusion BGP EVPN multihoming on Cisco Nexus 9000 Series Switches requires little operational and cabling cost. It offers provisioning simplicity, flow-based load balancing, multipathing, and fail-safe redundancy. For More Information VXLAN: A framework for overlaying Virtualized Layer 2 Networks over Layer 3 Networks -- RFC BGP MPLS based EVPN -- RFC Requirements for Ethernet VPN (EVPN) Printed in USA C / Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 27

Configuring VXLAN Multihoming

Configuring VXLAN Multihoming VXLAN EVPN Multihoming Overview, page 1 Configuring VXLAN EVPN Multihoming, page 4 Configuring Layer 2 Gateway STP, page 7 Configuring VXLAN EVPN Multihoming Traffic Flows, page 11 Configuring VLAN Consistency

More information

Configuring VXLAN EVPN Multi-Site

Configuring VXLAN EVPN Multi-Site This chapter contains the following sections: About VXLAN EVPN Multi-Site, on page 1 Licensing Requirements for VXLAN EVPN Multi-Site, on page 2 Guidelines and Limitations for VXLAN EVPN Multi-Site, on

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels Configuring Virtual Port Channels This chapter describes how to configure virtual port channels (vpcs) on Cisco Nexus 5000 Series switches. It contains the following sections: Information About vpcs, page

More information

VXLAN Design with Cisco Nexus 9300 Platform Switches

VXLAN Design with Cisco Nexus 9300 Platform Switches Guide VXLAN Design with Cisco Nexus 9300 Platform Switches Guide October 2014 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 39 Contents What

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels This chapter contains the following sections: Information About vpcs, page 1 Guidelines and Limitations for vpcs, page 10 Verifying the vpc Configuration, page 11 vpc Default Settings, page 16 Configuring

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels This chapter contains the following sections: Information About vpcs, page 1 Guidelines and Limitations for vpcs, page 10 Configuring vpcs, page 11 Verifying the vpc Configuration, page 25 vpc Default

More information

Optimizing Layer 2 DCI with OTV between Multiple VXLAN EVPN Fabrics (Multifabric)

Optimizing Layer 2 DCI with OTV between Multiple VXLAN EVPN Fabrics (Multifabric) White Paper Optimizing Layer 2 DCI with OTV between Multiple VXLAN EVPN Fabrics (Multifabric) What You Will Learn This document describes how to achieve a VXLAN EVPN multifabric design by integrating Virtual

More information

Introduction to External Connectivity

Introduction to External Connectivity Before you begin Ensure you know about Programmable Fabric. Conceptual information is covered in the Introduction to Cisco Programmable Fabric and Introducing Cisco Programmable Fabric (VXLAN/EVPN) chapters.

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels This chapter contains the following sections: Information About vpcs vpc Overview Information About vpcs, on page 1 Guidelines and Limitations for vpcs, on page 11 Verifying the vpc Configuration, on page

More information

Configuring VXLAN EVPN Multi-Site

Configuring VXLAN EVPN Multi-Site This chapter contains the following sections: About VXLAN EVPN Multi-Site, page 1 Guidelines and Limitations for VXLAN EVPN Multi-Site, page 2 Enabling VXLAN EVPN Multi-Site, page 2 Configuring VNI Dual

More information

Configuring VXLAN EVPN Multi-Site

Configuring VXLAN EVPN Multi-Site This chapter contains the following sections: About VXLAN EVPN Multi-Site, page 1 Licensing Requirements for VXLAN EVPN Multi-Site, page 2 Guidelines and Limitations for VXLAN EVPN Multi-Site, page 2 Enabling

More information

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing

More information

Hierarchical Fabric Designs The Journey to Multisite. Lukas Krattiger Principal Engineer September 2017

Hierarchical Fabric Designs The Journey to Multisite. Lukas Krattiger Principal Engineer September 2017 Hierarchical Fabric Designs The Journey to Multisite Lukas Krattiger Principal Engineer September 2017 A Single Fabric, a Single Data Center External Layer-3 Network Pod 1 Leaf/ Topologies (aka Folded

More information

Data Center Configuration. 1. Configuring VXLAN

Data Center Configuration. 1. Configuring VXLAN Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2

More information

IP Fabric Reference Architecture

IP Fabric Reference Architecture IP Fabric Reference Architecture Technical Deep Dive jammon@brocade.com Feng Shui of Data Center Design 1. Follow KISS Principle Keep It Simple 2. Minimal features 3. Minimal configuration 4. Configuration

More information

Internet Engineering Task Force (IETF) Request for Comments: N. Bitar Nokia R. Shekhar. Juniper. J. Uttaro AT&T W. Henderickx Nokia March 2018

Internet Engineering Task Force (IETF) Request for Comments: N. Bitar Nokia R. Shekhar. Juniper. J. Uttaro AT&T W. Henderickx Nokia March 2018 Internet Engineering Task Force (IETF) Request for Comments: 8365 Category: Standards Track ISSN: 2070-1721 A. Sajassi, Ed. Cisco J. Drake, Ed. Juniper N. Bitar Nokia R. Shekhar Juniper J. Uttaro AT&T

More information

Internet Engineering Task Force (IETF) ISSN: A. Sajassi Cisco J. Uttaro AT&T May 2018

Internet Engineering Task Force (IETF) ISSN: A. Sajassi Cisco J. Uttaro AT&T May 2018 Internet Engineering Task Force (IETF) Request for Comments: 8388 Category: Informational ISSN: 2070-1721 J. Rabadan, Ed. S. Palislamovic W. Henderickx Nokia A. Sajassi Cisco J. Uttaro AT&T May 2018 Usage

More information

Ethernet VPN (EVPN) in Data Center

Ethernet VPN (EVPN) in Data Center Ethernet VPN (EVPN) in Data Center Description and Design considerations Vasilis Stavropoulos Sparkle GR EVPN in Data Center The necessity for EVPN (what it is, which problems it solves) EVPN with MPLS

More information

Solution Guide. Infrastructure as a Service: EVPN and VXLAN. Modified: Copyright 2016, Juniper Networks, Inc.

Solution Guide. Infrastructure as a Service: EVPN and VXLAN. Modified: Copyright 2016, Juniper Networks, Inc. Solution Guide Infrastructure as a Service: EVPN and VXLAN Modified: 2016-10-16 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.

More information

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note White Paper Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services Introduction and Application Note Last Updated: 5/2014 Ethernet VPN (EVPN)

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

VXLAN EVPN Multi-Site Design and Deployment

VXLAN EVPN Multi-Site Design and Deployment White Paper VXLAN EVPN Multi-Site Design and Deployment 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 55 Contents What you will learn... 4

More information

Traffic Load Balancing in EVPN/VXLAN Networks. Tech Note

Traffic Load Balancing in EVPN/VXLAN Networks. Tech Note Traffic Load Balancing in EVPN/VXLAN Networks Tech Note December 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks assumes no

More information

Virtual Extensible LAN and Ethernet Virtual Private Network

Virtual Extensible LAN and Ethernet Virtual Private Network Virtual Extensible LAN and Ethernet Virtual Private Network Contents Introduction Prerequisites Requirements Components Used Background Information Why you need a new extension for VLAN? Why do you chose

More information

Provisioning Overlay Networks

Provisioning Overlay Networks This chapter has the following sections: Using Cisco Virtual Topology System, page 1 Creating Overlays, page 2 Creating Network using VMware, page 4 Creating Subnetwork using VMware, page 4 Creating Routers

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the

More information

Unicast Forwarding. Unicast. Unicast Forwarding Flows Overview. Intra Subnet Forwarding (Bridging) Unicast, on page 1

Unicast Forwarding. Unicast. Unicast Forwarding Flows Overview. Intra Subnet Forwarding (Bridging) Unicast, on page 1 Unicast, on page 1 Unicast Flows Overview Intra and inter subnet forwarding are the possible unicast forwarding flows in the VXLAN BGP EVPN fabric, between leaf/tor switch VTEPs. They are explained in

More information

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across

More information

Spirent TestCenter EVPN and PBB-EVPN AppNote

Spirent TestCenter EVPN and PBB-EVPN AppNote Spirent TestCenter EVPN and PBB-EVPN AppNote Executive summary 2 Overview of EVPN 2 Relevant standards 3 Test case: Single Home Test Scenario for EVPN 4 Overview 4 Objective 4 Topology 4 Step-by-step instructions

More information

Configuring Rapid PVST+ Using NX-OS

Configuring Rapid PVST+ Using NX-OS Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:

More information

Contents. EVPN overview 1

Contents. EVPN overview 1 Contents EVPN overview 1 EVPN network model 1 MP-BGP extension for EVPN 2 Configuration automation 3 Assignment of traffic to VXLANs 3 Traffic from the local site to a remote site 3 Traffic from a remote

More information

Configuring Optional STP Features

Configuring Optional STP Features CHAPTER 29 This chapter describes how to configure optional STP features. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Master List, at this URL: http://www.cisco.com/en/us/docs/ios/mcl/allreleasemcl/all_book.html

More information

Huawei CloudEngine Series. VXLAN Technology White Paper. Issue 06 Date HUAWEI TECHNOLOGIES CO., LTD.

Huawei CloudEngine Series. VXLAN Technology White Paper. Issue 06 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 06 Date 2016-07-28 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

BESS work on control planes for DC overlay networks A short overview

BESS work on control planes for DC overlay networks A short overview BESS work on control planes for DC overlay networks A short overview Jorge Rabadan IETF99, July 2017 Prague 1 Agenda EVPN in a nutshell BESS work on EVPN for NVO3 networks EVPN in the industry today Future

More information

CCNA Semester 3 labs. Part 1 of 1 Labs for chapters 1 8

CCNA Semester 3 labs. Part 1 of 1 Labs for chapters 1 8 CCNA Semester 3 labs Part 1 of 1 Labs for chapters 1 8 2.1.2.12 Lab - Building a Switched Network with Redundant Links 2.3.2.3 Lab - Configuring Rapid PVST+, PortFast and BPDU Guard 2.4.3.4 Lab - Configuring

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 400-101 Title : CCIE Routing and Switching Written Exam v5.1 Vendor : Cisco Version : DEMO Get Latest & Valid

More information

Network Virtualization in IP Fabric with BGP EVPN

Network Virtualization in IP Fabric with BGP EVPN EXTREME VALIDATED DESIGN Network Virtualization in IP Fabric with BGP EVPN Network Virtualization in IP Fabric with BGP EVPN Version 2.0 9035383 February 2018 2018, Extreme Networks, Inc. All Rights Reserved.

More information

Cisco Nexus 7000 Series NX-OS VXLAN Configuration Guide

Cisco Nexus 7000 Series NX-OS VXLAN Configuration Guide First Published: 2015-05-07 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 2016

More information

Configuring Port Channels

Configuring Port Channels CHAPTER 5 This chapter describes how to configure port channels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of port channels in Cisco DCNM. For more information

More information

Intended status: Standards Track. Cisco Systems October 22, 2018

Intended status: Standards Track. Cisco Systems October 22, 2018 BESS WorkGroup Internet-Draft Intended status: Standards Track Expires: April 25, 2019 Ali. Sajassi Mankamana. Mishra Samir. Thoria Patrice. Brissette Cisco Systems October 22, 2018 AC-Aware Bundling Service

More information

HPE FlexFabric 5940 Switch Series

HPE FlexFabric 5940 Switch Series HPE FlexFabric 5940 Switch Series EVPN Configuration Guide Part number: 5200-2002b Software version: Release 25xx Document version: 6W102-20170830 Copyright 2017 Hewlett Packard Enterprise Development

More information

Configuring STP and RSTP

Configuring STP and RSTP 7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains

More information

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments. This chapter tells how to configure Virtual extensible LAN (VXLAN) interfaces. VXLANs act as Layer 2 virtual networks over Layer 3 physical networks to stretch Layer 2 networks. About VXLAN Encapsulation

More information

OTV Technology Introduction and Deployment Considerations

OTV Technology Introduction and Deployment Considerations CHAPTER 1 OTV Technology Introduction and Deployment Considerations This document introduces a Cisco innovative LAN extension technology called Overlay Transport Virtualization (OTV). OTV is an IP-based

More information

Configuring Port Channels

Configuring Port Channels This chapter contains the following sections: Information About Port Channels, page 1, page 11 Verifying Port Channel Configuration, page 19 Triggering the Port Channel Membership Consistency Checker,

More information

Border Provisioning Use Case in VXLAN BGP EVPN Fabrics - Multi-Site

Border Provisioning Use Case in VXLAN BGP EVPN Fabrics - Multi-Site Border Provisioning Use Case in VXLAN BGP EVPN Fabrics - Multi-Site This chapter explains LAN Fabric border provisioning using EVPN Multi-Site feature. Overview, page 1 Prerequisites, page 1 Limitations,

More information

Configuring Port Channels

Configuring Port Channels CHAPTER 5 This chapter describes how to configure port channels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of port channels using Cisco Data Center Network

More information

EVPN Overview. Cloud and services virtualization. Remove protocols and network simplification. Integration of L2 and L3 services over the same VPN

EVPN Overview. Cloud and services virtualization. Remove protocols and network simplification. Integration of L2 and L3 services over the same VPN Ethernet VPN (EVPN) is a next generation solution that provides Ethernet multipoint services over MPLS networks. EVPN operates in contrast to the existing Virtual Private LAN Service (VPLS) by enabling

More information

Cloud Data Center Architecture Guide

Cloud Data Center Architecture Guide Cloud Data Center Architecture Guide Modified: 2018-08-21 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper Networks

More information

Configuring STP Extensions Using Cisco NX-OS

Configuring STP Extensions Using Cisco NX-OS This chapter describes how to configure Spanning Tree Protocol (STP) extensions on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About

More information

Configuring Private VLANs Using NX-OS

Configuring Private VLANs Using NX-OS This chapter describes how to configure private VLANs on Cisco NX-OS devices. Private VLANs provide additional protection at the Layer 2 level. This chapter includes the following sections: Finding Feature

More information

EXTREME VALIDATED DESIGN. Network Virtualization in IP Fabric with BGP EVPN

EXTREME VALIDATED DESIGN. Network Virtualization in IP Fabric with BGP EVPN EXTREME VALIDATED DESIGN Network Virtualization in IP Fabric with BGP EVPN 53-1004308-07 April 2018 2018, Extreme Networks, Inc. All Rights Reserved. Extreme Networks and the Extreme Networks logo are

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information

More information

DHCP Relay in VXLAN BGP EVPN

DHCP Relay in VXLAN BGP EVPN Overview, on page 1 Guidelines and Limitations for DHCP Relay, on page 2 Example, on page 2 Configuring VPC Peers Example, on page 19 vpc VTEP DHCP Relay Configuration Example, on page 21 Overview DHCP

More information

VLAN Configuration. Understanding VLANs CHAPTER

VLAN Configuration. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the CGR 2010 ESM. It includes information about VLAN membership

More information

Configuring Virtual Private LAN Services

Configuring Virtual Private LAN Services Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS

More information

Configuring MPLS and EoMPLS

Configuring MPLS and EoMPLS 37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates

More information

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-3-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers

More information

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV. 2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are

More information

Building Blocks in EVPN VXLAN for Multi-Service Fabrics. Aldrin Isaac Co-author RFC7432 Juniper Networks

Building Blocks in EVPN VXLAN for Multi-Service Fabrics. Aldrin Isaac Co-author RFC7432 Juniper Networks Building Blocks in EVPN VXLAN for Multi-Service Fabrics Aldrin Isaac Co-author RFC7432 Juniper Networks Network Subsystems Network Virtualization Bandwidth Broker TE LAN Fabric WAN Fabric LAN WAN EVPN

More information

Cisco Nexus 3000 Series Switch NX-OS Verified Scalability Guide, Release 7.x

Cisco Nexus 3000 Series Switch NX-OS Verified Scalability Guide, Release 7.x Cisco Nexus 3000 Series Switch NX-OS Verified Scalability Guide, Release 7.x First Published: 2015-0-24 Last Modified: 2017-11-23 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,

More information

Cisco EXAM Cisco ADVDESIGN. Buy Full Product.

Cisco EXAM Cisco ADVDESIGN. Buy Full Product. Cisco EXAM - 352-001 Cisco ADVDESIGN Buy Full Product http://www.examskey.com/352-001.html Examskey Cisco 352-001 exam demo product is here for you to test the quality of the product. This Cisco 352-001

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 9 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN membership modes, VLAN configuration

More information

Building Data Center Networks with VXLAN EVPN Overlays Part I

Building Data Center Networks with VXLAN EVPN Overlays Part I BRKDCT-2949 Building Data Center Networks with VXLAN EVPN Overlays Part I Lukas Krattiger, Principal Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session

More information

InterAS Option B. Information About InterAS. InterAS and ASBR

InterAS Option B. Information About InterAS. InterAS and ASBR This chapter explains the different InterAS option B configuration options. The available options are InterAS option B, InterAS option B (with RFC 3107), and InterAS option B lite. The InterAS option B

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2

More information

Implementing VXLAN in DataCenter

Implementing VXLAN in DataCenter Implementing VXLAN in DataCenter LTRDCT-1223 Lilian Quan Technical Marketing Engineering, INSBU Erum Frahim Technical Leader, ecats John Weston Technical Leader, ecats Why Overlays? Robust Underlay/Fabric

More information

Configuring MST Using Cisco NX-OS

Configuring MST Using Cisco NX-OS This chapter describes how to configure Multiple Spanning Tree (MST) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About MST, page

More information

Exam Questions

Exam Questions Exam Questions 642-997 DCUFI Implementing Cisco Data Center Unified Fabric (DCUFI) v5.0 https://www.2passeasy.com/dumps/642-997/ 1.Which SCSI terminology is used to describe source and destination nodes?

More information

Configuring STP and Prestandard IEEE 802.1s MST

Configuring STP and Prestandard IEEE 802.1s MST 20 CHAPTER This chapter describes how to configure the Spanning Tree Protocol (STP) and prestandard IEEE 802.1s Multiple Spanning Tree (MST) protocol on Catalyst 6500 series switches. Note The IEEE 802.1s

More information

EVPN Multicast. Disha Chopra

EVPN Multicast. Disha Chopra EVPN Multicast Disha Chopra Agenda EVPN Multicast Optimizations Introduction to EVPN Multicast (BUM) IGMP Join/Leave Sync Routes Selective Multicast Ethernet Tag Route Use Case 2 EVPN BUM Traffic Basics

More information

Pluribus Data Center Interconnect Validated

Pluribus Data Center Interconnect Validated Design Guide Pluribus Data Center Interconnect Validated Design Guide www.pluribusnetworks.com Terminology Reference This is a glossary of acronyms and terms used throughout this document. AS BFD BGP L2VPN

More information

Feature Information for BGP Control Plane, page 1 BGP Control Plane Setup, page 1. Feature Information for BGP Control Plane

Feature Information for BGP Control Plane, page 1 BGP Control Plane Setup, page 1. Feature Information for BGP Control Plane Feature Information for, page 1 Setup, page 1 Feature Information for Table 1: Feature Information for Feature Releases Feature Information PoAP diagnostics 7.2(0)N1(1) Included a new section on POAP Diagnostics.

More information

Segment Routing on Cisco Nexus 9500, 9300, 9200, 3200, and 3100 Platform Switches

Segment Routing on Cisco Nexus 9500, 9300, 9200, 3200, and 3100 Platform Switches White Paper Segment Routing on Cisco Nexus 9500, 9300, 9200, 3200, and 3100 Platform Switches Authors Ambrish Mehta, Cisco Systems Inc. Haider Salman, Cisco Systems Inc. 2017 Cisco and/or its affiliates.

More information

Configuring PIM. Information About PIM. Send document comments to CHAPTER

Configuring PIM. Information About PIM. Send document comments to CHAPTER CHAPTER 3 This chapter describes how to configure the Protocol Independent Multicast (PIM) features on Cisco NX-OS switches in your IPv4 networks. This chapter includes the following sections: Information

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Catalyst 3750 switch. It includes information about VLAN

More information

Implementing IEEE 802.1ah Provider Backbone Bridge

Implementing IEEE 802.1ah Provider Backbone Bridge Implementing IEEE 802.1ah Provider Backbone Bridge This module provides conceptual and configuration information for IEEE 802.1ah Provider Backbone Bridge on Cisco ASR 9000 Series Routers. The IEEE 802.1ah

More information

Describing the STP. Enhancements to STP. Configuring PortFast. Describing PortFast. Configuring. Verifying

Describing the STP. Enhancements to STP. Configuring PortFast. Describing PortFast. Configuring. Verifying Enhancements to STP Describing the STP PortFast Per VLAN Spanning Tree+ (PVST+) Rapid Spanning Tree Protocol (RSTP) Multiple Spanning Tree Protocol (MSTP) MSTP is also known as Multi-Instance Spanning

More information

Nexus 7000 Peer Switch Configuration (Hybrid Setup)

Nexus 7000 Peer Switch Configuration (Hybrid Setup) Nexus 7000 Peer Switch Configuration (Hybrid Setup) Document ID: 116140 Contributed by Andy Gossett and Rajesh Gatti, Cisco TAC Engineers. Aug 09, 2013 Contents Introduction Prerequisites Requirements

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership

More information

VXLAN Multipod Design for Intra-Data Center and Geographically Dispersed Data Center Sites

VXLAN Multipod Design for Intra-Data Center and Geographically Dispersed Data Center Sites White Paper VXLAN Multipod Design for Intra-Data Center and Geographically Dispersed Data Center Sites May 17, 2016 Authors Max Ardica, Principal Engineer INSBU Patrice Bellagamba, Distinguish System Engineer

More information

Deploying LISP Host Mobility with an Extended Subnet

Deploying LISP Host Mobility with an Extended Subnet CHAPTER 4 Deploying LISP Host Mobility with an Extended Subnet Figure 4-1 shows the Enterprise datacenter deployment topology where the 10.17.1.0/24 subnet in VLAN 1301 is extended between the West and

More information

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Finding Feature Information, page 1 Configuring VPLS, page 1 Configuring VPLS BGP-based Autodiscovery, page 17 Finding Feature

More information

Contents. Introduction. Prerequisites. Requirements. Components Used

Contents. Introduction. Prerequisites. Requirements. Components Used Contents Introduction Prerequisites Requirements Components Used Background Information Terminology What is VXLAN? Why VXLAN? Configure Network Diagram Configurations 3172-A 9396-A 9396-B Verify Example

More information

Implementing Multiple Spanning Tree Protocol

Implementing Multiple Spanning Tree Protocol Implementing Multiple Spanning Tree Protocol This module provides conceptual and configuration information for Multiple Spanning Tree Protocol on Cisco ASR 9000 Series Routers. Multiple Spanning Tree Protocol

More information

EVPN Command Reference

EVPN Command Reference EVPN Command Reference EVPN Command Reference Command Hierarchies vpls service-id [customer customer-id] [vpn vpn-id] [m-vpls] [b-vpls i-vpls] [create] no vpls service-id bgp route-distinguisher [ip-addr:comm-val

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER 7 CHAPTER This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco MWR 2941 router. It includes information about VLAN

More information

Buy full file at

Buy full file at 14 Chapter 2 LAN Redundancy Chapter 2 LAN Redundancy 2.0.1.2 Class Activity Stormy Traffic ( ) Objective Explain the purpose of the Spanning Tree Protocol (STP) in a switched LAN environment with redundant

More information

Nexus 9000/3000 Graceful Insertion and Removal (GIR)

Nexus 9000/3000 Graceful Insertion and Removal (GIR) White Paper Nexus 9000/3000 Graceful Insertion and Removal (GIR) White Paper September 2016 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21

More information

Configuring STP Extensions

Configuring STP Extensions Configuring STP Extensions This chapter describes the configuration of extensions to the Spanning Tree Protocol (STP) on Cisco Nexus 5000 Series switches. It includes the following sections: About STP

More information

Designing Mul+- Tenant Data Centers using EVPN- IRB. Neeraj Malhotra, Principal Engineer, Cisco Ahmed Abeer, Technical Marke<ng Engineer, Cisco

Designing Mul+- Tenant Data Centers using EVPN- IRB. Neeraj Malhotra, Principal Engineer, Cisco Ahmed Abeer, Technical Marke<ng Engineer, Cisco Designing Mul+- Tenant Data Centers using EVPN- IRB Neeraj Malhotra, Principal Engineer, Cisco Ahmed Abeer, Technical Marke

More information

JN0-343 Q&As. Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee

JN0-343 Q&As. Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee JN0-343 Q&As Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee

More information

Service Graph Design with Cisco Application Centric Infrastructure

Service Graph Design with Cisco Application Centric Infrastructure White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...

More information

Configure Multipoint Layer 2 Services

Configure Multipoint Layer 2 Services This module provides the conceptual and configuration information for Multipoint Layer 2 Bridging Services, also called Virtual Private LAN Services (VPLS). Note VPLS supports Layer 2 VPN technology and

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25

More information

Virtual Hub & Spoke with BGP EVPNs

Virtual Hub & Spoke with BGP EVPNs Virtual Hub & Spoke with BGP EVPNs draft-keyupate-evpn-virtual-hub-00 Keyur Patel, Ali Sajassi, John Drake, Wim Henderickx IETF 94, November 2015, Yokohama, Japan Presentation_ID 2009 Cisco Systems, Inc.

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Finding Feature Information, page 1 Restrictions for STP, page 1 Information About Spanning Tree Protocol, page 2 How to Configure Spanning-Tree Features, page 14 Monitoring Spanning-Tree Status, page

More information

Configuring Optional STP Features

Configuring Optional STP Features CHAPTER 16 This chapter describes how to configure optional STP features. Note For complete syntax and usage information for the commands used in this chapter, refer to the Catalyst 6500 Series Switch

More information

Best Practices come from YOU Cisco and/or its affiliates. All rights reserved.

Best Practices come from YOU Cisco and/or its affiliates. All rights reserved. Best Practices come from YOU 2 Apple iphone4 launched in June 2010 3 Antennagate 4 IPHONE4 Best Practices from CUSTOMERS 5 vpc Best Practices and Design on NXOS Nazim Khan, CCIE#39502 (DC/SP) Technical

More information