EVPN null routes
An EVPN null route is a network security mechanism that
-
enables devices in an EVPN (Ethernet VPN) fabric to drop traffic destined for specific MAC or IP addresses identified as part of a Distributed Denial of Service (DDoS) attack
-
is implemented by injecting null (drop) route entries into the forwarding tables of VTEPs (Virtual Tunnel Endpoints), and
-
helps prevent malicious traffic from consuming network bandwidth and impacting legitimate traffic between hosts.
A null route is a network route (routing table entry) that leads nowhere. All matching packets are dropped (ignored or redirected) rather than forwarded, acting as a limited firewall. Null route filtering refers to the practice of setting such routes.
NX-OS supports configuring null/drop routes for IPv4, IPv6, and MAC addresses, and these routes should be distributed to all VTEPs in the fabric for comprehensive protection.
-
For IPv4/IPv6 attacks, use these commands to configure an IPv4/IPv6 static route to the null interface:
-
ip route x.x.x.x/y Null0
-
ipv6 route X:X:X::X/Y Null0
-
-
For MAC-based attacks, use mac address-table static xxxx.yyyy.zzzz vlan <VLAN-ID> drop command to drop packets at Layer 2.
-
A DDoS attack on a host in an EVPN Fabric consumes the network bandwidth resources and in turn impacts legitimate traffic to other hosts.
-
The DDoS attack can originate from:
-
Host connected to a leaf switch within the local site
-
Host connected to a leaf switch in a remote site
-
External networks such as WAN
-
-
DDoS attacks can be intra-subnets (MAC based) or inter-subnets (Host-based – IPv4/IPv6)
-
Null route filtering has been traditionally used in mitigating DDoS attacks especially in service provider networks.
-
| Manual configuration of null routes | EVPN null routing feature | |
|---|---|---|
| Scalability | Difficult across many VTEPs/sites | Scalable via automated route injection |
| Ease of management | Labor-intensive; prone to errors | Centralized control with orchestrator |
| Attack containment | May be delayed; not uniformly applied | Immediate, edge-based traffic drop |
Example
In large EVPN deployments with many VTEPs and multiple sites, manually configuring drop (null) routes for attack targets on each VTEP is challenging without an orchestrator like Nexus Dashboard Fabric Controller (NDFC). The EVPN null routing feature enables a VTEP to send null-tagged Type-2 and Type-5 routes, so other VTEPs (Borders and Leafs) automatically install drop entries in the IP or MAC tables, discarding attack traffic at network edges to preserve bandwidth.
Feedback