EVPN Ethernet Segment Identifier Multi-Homing

Ethernet Segment Identifier (ESI) multi-homing represents a more modern and scalable approach, leveraging the industry-standard BGP Ethernet VPN (EVPN) control plane. Unlike vPC, ESI multi-homing does not require a dedicated peer-link. Instead, coordination and state synchronization (for example, MAC or ARP) between participating switches (VTEPs) occur over the VXLAN fabric using BGP-EVPN signaling. A key advantage of ESI multi-homing is its ability to support redundancy with more than two switches, offering up to four-way redundancy for a single host connection, making it suitable for larger, more distributed environments.

EVPN ESI multi-homing

This section describes how to configure the EVPN ESI multi-homing on Cisco NX-OS devices.

EVPN ESI multi-homing solutions

EVPN ESI multi-homing solutions are standardized EVPN multi-homing technologies that:

  • use BGP EVPN-based communication between ESI peers to synchronize data plane state,

  • provide redundancy similar to vPC and vPC fabric peering, and

  • support 2-way, 3-way, and 4-way multi-homing.


Note


vPC and vPC fabric peering only support 2-way multi-homing.


The main functions supported by ESI multi-homing include:

  • ESI multi-homing with Primary IP (PIP) or Unicast next-hop,

  • ESI multi-homing with Virtual IP (VIP) or Anycast next-hop,

  • Butterfly topology,

  • IGMP or MLD Snooping (Type-7 and Type-8), and

  • ECMP optimization.

The following sections provide detailed explanations of the ESI multi-homing functions.

EVPN multi-homing terms and definitions

This table defines key EVPN multi-homing terms.
Table 1. EVPN multi-homing terms and definitions

Term

Description

EVI

An EVPN instance represented by the VNI.

MAC-VRF

A container housing virtual forwarding tables for MAC addresses. Each MAC-VRF can have a unique route distinguisher and import or export target.

ES

An Ethernet Segment composed of a set of bundled links.

EAD/ES

An Ethernet Auto Discovery route per ES (Type-1), used for fast traffic convergence during access failures. It uses Ethernet Tag value 0xFFFFFFFF.

EAD/EVI

An Ethernet Auto Discovery route per EVI (Type-1), used for aliasing and load balancing. It cannot use Ethernet Tag value 0xFFFFFFFF.

Aliasing

A method for load balancing traffic to all switches connected to an Ethernet Segment using the Type-1 EAD/EVI route, regardless of the switch where hosts are learned.

Mass withdrawal

A mechanism for fast convergence during access failure using the Type-1 EAD/ES route.

Designated Forwarder (DF) election

A process to prevent forwarding loops and duplicates by allowing only a single switch to decapsulate and forward traffic for an Ethernet Segment.

Split horizon

A method to prevent forwarding loops between VTEPs on the same Ethernet Segment and avoid duplicate BUM traffic.

Ethernet Segment Identifier (ESI)

A 10-byte value assigned to each switch under a bundled link shared with a multi-homed neighbor. It is used for DF election for BUM traffic via a Type-4 route.

LACP bundling

LACP is used to detect ESI misconfiguration in multi-homed port-channel bundles. LACP sends the configured ESI MAC address to the access switch. Cisco recommends running LACP to detect and act on misconfigured ES IDs.

EVPN multi-homing information

The EVPN overlay draft introduces changes to the BGP MPLS-based EVPN solution. These changes allow the solution to operate as a network virtualization overlay using VXLAN encapsulation. In BGP MPLS EVPN, the Provider Edge (PE) node acts as the VTEP or Network Virtualization Edge device (NVE). VTEPs use control plane learning and distribute remote addresses through BGP, instead of relying on data plane learning.

The supported route types:

  • Type-1: Ethernet Auto-Discovery (EAD) route

  • Type-2: MAC advertisement route

  • Type-3: Inclusive multicast route

  • Type-4: Ethernet Segment route

  • Type-5: IP prefix route

  • Type-6: Selective Multicast (SMET) route

    For more information, see the Optimized Layer 2 Overlay Multicast chapter.

  • Type-7: Multicast membership report synch route

    For more information, see the IGMP or MLD Snooping with ESI section.

  • Type-8: Multicast leave synch route

    For more information, see the IGMP or MLD Snooping with ESI section.

BGP EVPN running on Cisco NX-OS uses route Type-2 to advertise MAC and IP (host) information. Route Type-3 specifically carries VTEP information for ingress replication. EVPN route Type-5 allows the advertisements of IPv4 or IPv6 prefixes in a Network Layer Reachability Information (NLRI) without MAC addresses in the route key.

With EVPN multi-homing, Cisco NX-OS software uses the EAD route. In this route, the Ethernet Segment Identifier and the Ethernet Tag ID are part of the prefix in the NLRI.

The BGP control plane learns the reachability of end points. As a result, network convergence time depends on how many MAC or IP routes the VTEP must withdraw during a failure scenario. To handle such conditions, each VTEP advertises one or more Ethernet Auto-Discovery per ES routes for every locally attached Ethernet Segment. If an attached segment fails, the VTEP withdraws the corresponding set of routes. For information on fast convergence, see the Layer 2 fast reroute section.

Cisco NX-OS software also uses the Ethernet Segment Route with EVPN multi-homing, primarily for DF election for BUM traffic. If the Ethernet Segment is multi-homed, the presence of multiple DFs could cause forwarding loops and packet duplication. Therefore, the Ethernet Segment Route (Type-4) is used to elect the DF and apply split horizon filtering. All VTEPs or PEs that are configured with an Ethernet Segment originate this route.

ESI multi-homing operation modes

ESI multi-homing supports the following operation modes:

  • PIP mode: Use unique loopback addresses on each ESI-VTEP to identify the reachability of a multi-homed host.

  • VIP mode: Use a common Anycast IP address (VIP), configured across all ESI peer VTEPs, to identify the reachability of a multi-homed host.

ESI multi-homing PIP modes

ESI multi-homing PIP modes are operational modes in VXLAN EVPN fabrics that:

  • enable a host to be multi-homed to multiple ESI peer VTEPs,

  • identify the reachability of a multi-homed host using unique loopback addresses (PIPs) on individual ESI-VTEPs, and

  • operate without requiring a common or Anycast IP address across ESI peers in a PIP setup.

How ESI multi-homing PIP modes work
  • PIP assignment: Each VTEP that is part of an ESI cluster is assigned a distinct loopback address, referred to as its PIP.

  • Host reachability advertisement: A multi-homed host connects to multiple ESI peer VTEPs. The BGP EVPN control plane advertises the host's reachability through the individual PIP addresses of all connected ESI peer VTEPs to other remote VTEPs in the VXLAN fabric.

  • Traffic forwarding: When a remote VTEP needs to send traffic to the multi-homed host, it performs a hashing operation to select one of the available ESI peer VTEPs (identified by their unique PIPs) for Equal-Cost Multi-Path (ECMP) forwarding. The selected PIP then becomes the destination IP in the outer VXLAN header of the encapsulated traffic.

  • Fault tolerance and ECMP adjustment: If an ESI goes down on a particular ESI switch, the BGP EVPN control plane signals this status change throughout the VXLAN fabric. Remote VTEPs update their forwarding tables and remove the PIP of the failed VTEP from the list of available paths for the multi-homed host. Subsequent traffic to the host is then re-balanced using ECMP across the remaining active ESI peers. If traffic lands on a VTEP where ESI is down, the Layer 2 Fast Reroute (L2FRR) mechanism forwards the traffic to a VTEP where ESI is up. For more information on L2FRR, see the Layer 2 fast reroute section.


Note


  • A switch can operate in either VIP mode or PIP mode, but not both simultaneously.

  • Ensure that all ESI peers operate in the same mode to avoid inconsistencies.


Examples

Consider four ESI peer VTEPs (L1, L2, L3, and L4), with their respective unique PIP addresses (PIP-1, PIP-2, PIP-3, and PIP-4). A host (H1), is multi-homed to all four of these VTEPs. A remote VTEP (L10), learns that H1 is reachable through PIP-1, PIP-2, PIP-3, and PIP-4. When L10 sends traffic to H1, it uses hashing to select one of these PIPs (PIP-3) and encapsulates the traffic, setting PIP-3 as the outer VXLAN destination IP. If the ESI on L3 experiences failure, the BGP EVPN control plane informs L10. L10 then removes PIP-3 from its list of paths for H1 and subsequently distributes traffic to H1 using ECMP, selecting from PIP-1, PIP-2, and PIP-4, in this example PIP-2 is selected.

Figure 1. Steady state scenario
  1. L10 sends packet to Host with destination IP, PIP-3

  2. Spine forwards packet to L3

Figure 2. Failure scenario
  1. ESI goes down on L3

  2. L10 makes adjustment to send traffic to PIP-2 (and not PIP-3)

  3. Spine forwards packet to L2

ESI multi-homing VIP modes

ESI multi-homing VIP modes are operational modes in VXLAN EVPN fabric that:

  • identify the reachability of a multi-homed host through a common Anycast IP address (VIP) configured across all participating ESI peer VTEPs,

  • provide a highly resilient and scalable solution for host connectivity in VXLAN EVPN fabrics, and

  • simplify the forwarding logic for remote VTEPs by presenting a single, stable IP address for multi-homed hosts. This approach reduces control plane churn across the fabric.

How ESI multi-homing VIP modes work
  • VIP assignment: Each ESI-VTEP is configured with a unique PIP. Additionally, all ESI-VTEPs within a given ESI cluster are configured with the same VIP.

  • Host reachability advertisement: A multi-homed host connects to multiple ESI peer VTEPs. The BGP EVPN control plane advertises the host's reachability to remote VTEPs. Critically, it advertises reachability via the common VIP rather than the individual PIPs.

  • Traffic forwarding: When a remote VTEP needs to send traffic to the multi-homed host, it encapsulates the traffic with the VIP as the destination IP in the outer VXLAN header. The remote VTEP does not need to know the individual PIPs of the ESI peers.

    The spine switches or other intermediate devices in the VXLAN fabric are aware that the VIP is reachable through multiple VTEPs (the ESI peer VTEPs). The spine switch performs an ECMP hash to select one of the available ESI peer VTEPs and forwards the encapsulated traffic to that selected VTEP.

    Once the traffic reaches the selected ESI peer VTEP, the VTEP forwards it to the multi-homed host.

  • Fault tolerance: If an ESI goes down on a particular ESI switch, the BGP EVPN control plane signals this information. However, the remote VTEP continues to send traffic to the host using the VIP. No changes occur to forwarding at the spine. If the traffic lands on the VTEP whose ESI is down, the Layer 2 Fast Reroute (L2FRR) mechanism forwards the traffic to one of the VTEPs where ESI is UP. For more information on L2FRR, see the Layer 2 fast reroute section.

  • Impact on VIP or PIP switching: The status of ESIs is signaled via BGP-EVPN. Remote VTEPs use this information to dynamically switch between VIP forwarding mode (when two or more multi-homed ESI-VTEPs are up) and PIP forwarding mode (when only a single ESI-VTEP is active), ensuring continuous traffic flow despite changes in ESI availability.

    When the ESI-VTEPs are configured in VIP (Anycast) mode, the Remote VTEP can operate with VIP next-hop or with PIP next-hop, depending on how many ESI-VTEPs are currently active for the multi-homed host.

    Remote VTEPs in the VXLAN fabric track the number of VTEPs that are active for a particular ESI based on the BGP-EVPN signaling across the fabric. For example, when an ESI is down on a particular ESI-VTEP, route Type-1 , such as a BGP EVPN Route-Update, is signaled across the VXLAN fabric.

    If more than one ESI-VTEP is active, a Remote VTEP using VIP next-hop operates more efficiently. When only one ESI-VTEP is active, using VIP next-hop increases the chance that the flow reaches an ESI-VTEP whose ESI is down. In this case, traffic is rerouted to an ESI-active, which increases latency.

    Thus, the remote VTEP operates primarily in VIP next-hop mode and occasionally in PIP next-hop mode, depending on the status of the ESI-VTEPs. The L2FRR mechanism on the ESI-VTEPs ensures that traffic is forwarded to one of the VTEPs during transitions between PIP and VIP modes. For more information on L2FRR, see the Layer 2 fast reroute section.


Note


  • A switch can operate in either VIP mode or PIP mode, but not both simultaneously.

  • Ensure all ESI peers operate in the same mode to avoid inconsistencies.

  • VIP or Anycast next-hop is specified in draft evpn-anycast-aliasing.


Examples

Consider four ESI peer (L1, L2, L3, and L4), with individual PIPs (PIP-1, PIP-2, PIP-3, PIP-4), and a common VIP (VIP-x). A host (H1), is multi-homed to all four VTEPs. A remote VTEP (L10), learns that H1 is reachable through VIP-x. L10 encapsulates traffic to H1 with VIP-x as the outer VXLAN destination IP. The spine switch, knowing that VIP-x is reachable via L1, L2, L3, and L4 uses ECMP to select one (for example, L3) and forwards the traffic to L3. If the ESI on L3 fails, BGP-EVPN route Type 1 updates are sent to the fabric. L10 continues to send traffic to VIP-x, and the spine continues to ECMP the traffic to L1, L2, L3, and L4. If traffic lands on L3, then L2FRR sends the traffic to any one of the remaining VTEPs without requiring L10 to update its forwarding state. In this example L1 is chosen.

Figure 3. Steady state scenario
  1. L10 sends packet to Host with Dest-IP VIP-x

  2. Spine selects L3 for VIP-x and forwards to L3

Figure 4. Failure scenario
  1. ESI goes down on L3

  2. L10 continues to send with VIP-x

  3. Traffic reaches L3 where ESI is down

  4. L3 uses L2FRR to redirect the traffic to L1 where ESI-1 is still up.

Example for VIP to PIP transition
  1. Multiple ESI links (L2, L3, and L4) go down, causing several ESI failures to be detected.

  2. BGP-EVPN Route Type 1 (RT-1) withdrawals are signaled across the fabric to indicate these changes.

  3. Remote VTEP L10 receives updates about the ESI status changes.

  4. As a result, the number of active ESI-VTEPs drops to one—only L1 remains active.

  5. L10 detects that fewer than two ESI-VTEPs are active and triggers a transition from VIP-next-hop mode to PIP-next-hop mode.

  6. The next-hop is updated from the shared VIP-x to the individual IP address of L1 (PIP-1).

  7. All traffic is now sent directly to L1 without ECMP distribution among multiple VTEPs.

  8. Since there is only one active ESI-VTEP, no fast reroute is needed; traffic reaches the remaining active VTEP (L1) directly.

Figure 5. VIP to PIP transition
Example for PIP to VIP transition
  1. ESI recovery occurs as the L2 and L3 ESI links come back online.

  2. BGP-EVPN Route Type 1 (RT1) advertisements are signaled across the fabric to announce the recovery.

  3. Remote VTEP L10 receives updates about the restored ESI status.

  4. The count of active ESI-VTEPs increases to three, where L1, L2, and L3 are all active.

  5. L10 detects that two or more ESI-VTEPs are now active and initiates a transition from PIP-next-hop mode to VIP-next-hop mode.

  6. The next-hop is updated from the individual IP address of L1 (PIP-1) to the shared anycast IP (VIP-x).

  7. With ECMP load balancing enabled, traffic is distributed across L1, L2, and L3.

  8. As a result, bandwidth utilization is optimized through even traffic distribution.

Figure 6. PIP to VIP transition

Layer 2 fast reroute

Layer 2 Fast Reroute (L2FRR) is a network protection mechanism that"

  • minimizes traffic disruption and prevents traffic from being discarded during failure conditions of an ESI connection,

  • ensures that traffic destined for a multi-homed host, that might still arrive at a failed ESI switch, is redirected to an active ESI peer within the same cluster, and

  • enhances network resilience by maintaining traffic flow during convergence or when remote VTEPs are not yet updated.

How L2FRR work
  • General principle: When an ESI connection to a multi-homed host fails on a specific ESI switch, the L2FRR functionality is activated on that failing switch. The switch internally redirects any traffic that still reaches it for the affected multi-homed host to another healthy ESI peer switch in the same multi-homing cluster.

    Assign a unique identifier to the fast reroute packet. This allows you to handle fast reroute packets in specific ways. For example, if a packet has already been fast rerouted once, it should not be fast rerouted again to another ESI-VTEP in case of double failures. To ensure unique identification, assign a special Source IP, called the fast reroute anycast source IP, to the fast reroute packet. For detailed configuration steps, see the Enable EVPN ESI multi-homing section.


    Note


    Ensure that you configure the fast reroute anycast source IP address uniquely on all the switches that are part of the same ESI multi-homing cluster.


  • In PIP mode:

    • Failure event: If an ESI connection goes down on an ESI switch (for example, L3), the BGP-EVPN control plane signals this event across the VXLAN fabric.

    • Convergence delay: There is a brief period during which remote VTEPs (for example, L10) are converging and updating their forwarding tables to remove the failed VTEP (L3) from the list of reachable paths for the multi-homed host.

    • L2FRR action: During this convergence period, traffic from L10 might still be directed to L3. Upon arrival at L3, the L2FRR functionality detects the ESI connection failure and internally redirects this traffic to one of the remaining active ESI peers (for example, L1, L2, or L4).

      For each ESI, a reroute peer is elected in a round-robin fashion from the active peer list whenever an ESI peer comes up. This approach minimizes oversubscription in scenarios where multiple ESIs are down and require fast rerouting.

    • Outcome: This prevents traffic from being discarded while the network converges, ensuring continuous service until remote VTEPs fully update their forwarding paths to bypass the failed VTEP.

    For more information, see the Examples.

  • In VIP mode:

    • Failure event: If an ESI connection goes down on a particular ESI switch (for example, L3), the BGP-EVPN control plane signals this event.

    • Remote VTEP behavior: In VIP-mode, remote VTEPs (for example, L10) always send traffic to the common VIP for the multi-homed host, regardless of individual ESI connection status. The spine switch is responsible for ECMP'ing traffic to the underlying active VTEPs for that VIP.

    • L2FRR action: Even though ESI is down on L3, the spine switch will still have the VIP reachable via L3, and traffic may still be directed to L3 (for example, due to hashing or specific network conditions). The L2FRR functionality on L3 intercepts any traffic destined for the multi-homed host and redirects it to one of the remaining active ESI peers (for example, L1, L2, or L4).

    • Outcome: This ensures that traffic is never discarded at the failed ESI switch, providing robust fault tolerance without requiring any changes or churn on the remote VTEP.

    For more information, see Examples.

Designated Forwarder elections

Designated Forwarder (DF) elections are network mechanisms in multi-homing VXLAN EVPN fabrics that:

  • determine which VTEP forwards BUM traffic to a shared Ethernet Segment,

  • avoid redundant forwarding and network loops, and

  • support configurable methods, such as per-flow hashing and modulo-based selection, to optimize traffic handling and scalability.

How DF elections works

DF elections are crucial in multi-homing environments to prevent duplicate forwarding of BUM traffic. DF elections select one VTEP from those connected to an Ethernet Segment to forward such traffic. Other VTEPs do not forward BUM traffic for that segment.

Figure 7. DF election traffic flows

(1): VTEP-L10 sends broadcast packet (for example, ARP)

(2), (3), (4), and (5): Spine sends to all VTEPs (L1-L4)

In this example, the fabric uses a multicast underlay. If the underlay uses IR, the Remote VTEP (L10) sends a separate copy of the packet to each ESI-VTEP. In both cases, broadcast data packet reaches all the ESI-VTEPs.

(6): L1 is the DF and sends packet to Host

(7), (8), and (9): L2, L3, and L4 are non-DFs and do not forward the packet to Host

Supported DF election methods

Per-flow (Packet Hash-based) method (default)

  • Mechanism: This is the default method. The DF is determined based on hashing the fields of each incoming packet. Each ESI peer independently performs this hash.

    The DF election algorithm per-flow uses the Ethernet Segment route type (Type-4).

    The BGP route Type-4 helps you determine the number of ESI-VTEPs for an ESI and their respective loopback IPs that are associated with each ESI. Based on this information from route Type-4, the hash result is divided equally among the ESI peer VTEPs.

    After calculating the packet hash, each VTEP determines whether it must forward the packet to the multi-homed host or if another ESI peer is responsible.

    All VTEPs participating in the ESI peer cluster must use the same per-flow DF. If any VTEPs do not use per-flow DF, the cluster uses modulo-based DF election.

  • Traffic handling:

    • Each ESI peer receives BUM traffic, which is based on PIP, from the remote VTEP, regardless of the underlay replication mode (ingress replication or multicast).

    • Upon receiving the traffic, each ESI peer calculates the packet hash.

    • Based on the hash result, one peer is designated as the forwarder for that specific flow and sends the traffic to the multi-homed host.

    • Other peers not designated for that flow drop the traffic towards the multi-homed host.

    • If traffic is received from an ESI peer (for example, from another VTEP in the same ESI cluster), the ESI ports are pruned to prevent loops.

  • Scalability: This method offers excellent scalability for L2VNIs because the DF election is determined per-flow, rather than per-VLAN, and provides better BUM flow distribution across the multi-homed VTEPs.

Modulo method (fallback)

  • Mechanism: This method utilizes Ethernet Segment routes, which are also employed in Anycast BGWs and multi-homing scenarios. It assigns DF responsibility based on a modulo calculation.

    The BGP route Type-4 helps you determine the number of ESI-VTEPs for an ESI and their respective loopback IPs. Based on this information, the VLANs are distributed equally among the ESI peer-VTEPs. In this way, for each VLAN, only one ESI-VTEP is responsible to forward the traffic to the multi-homed host and is called the DF for that VLAN. This process is the modulo method.

  • Fallback use case: The modulo method acts as a fallback DF election mechanism if members of the same Ethernet Segment are configured with different DF election modes.

  • Scalability implication: This method typically requires the use of alternative multicast indices (Alt-mcindex), which are derived from a shared global multicast index pool. This can impact the overall scale of supported VLANs and IGMP or MLD groups on the platform.

  • Traffic handling: When BUM traffic arrives at an ESI-VTEP and the Modulo Method is used:

    • The ESI-VTEP forwards the BUM traffic to all orphan ports associated with that VLAN, regardless of whether it is the DF for that VLAN.

    • The ESI-VTEP then evaluates whether to send the BUM traffic to the ESI port, which connects to the multi-homed host. If the ESI-VTEP is the DF for that VLAN, it forwards the traffic to the multi-homed host through the ESI port. If it is not the DF, it does not send the traffic to the multi-homed host.

    This process ensures that only one ESI-VTEP sends BUM traffic to the multi-homed host, preventing duplication.

EVPN EAD-EVI routes

EVPN EAD-EVI route is a type of BGP EVPN route that:

  • advertises per-EVI information to enable flexible communication between Ethernet segments in an EVPN network,

  • supports standards compliance for multi-homed host scenarios, and

  • enables interoperability while being disabled by default in Cisco NX-OS implementations unless explicitly enabled.

In the current Cisco NX-OS implementation, when a host is learned on one ESI-VTEP, it is advertised to the peer ESI VTEPs. The peer ESI VTEPs also send out a Re-Origination (RO) to the fabric. This approach ensures that a remote VTEP has all the information needed to route traffic through multiple paths to a multi-homed host. Since RO is mandatory in NX-OS, a remote VTEP does not need to use EAD-EVI information to determine the ESI VTEPs for a multi-homed host. The EAD-EVI route remains available for standards compliance.

Type-2 route re-origination

A Type-2 route re-origination is an EVPN mechanism that

  • enables VTEP peers to originate new copies of peer-synced MAC and MAC-IP routes,

  • ensures redundancy for multi-homed hosts in ESI clusters, and

  • prevents loss of reachability for remote VTEPs if a local VTEP or Ethernet Segment goes down.

Example

A host (H1) is multi-homed to VTEPs L1, L2, L3, and L4. If H1’s MAC and MAC-IP routes are learned locally on L1, then L1 advertises MAC and MAC-IP reachability. As part of the same ESI cluster, L2, L3, and L4 treat those as peer-synced routes and program reachability to the local Ethernet Segment. L2, L3, and L4 also re-originate the MAC and MAC-IP routes and advertise them in EVPN update messages.

A remote VTEP, L10, learns that H1 is reachable through PIP-1, PIP-2, PIP-3, and PIP-4 (in PIP mode), or through a virtual IP (VIP) with 4 paths from L1–L4 (in VIP mode).

If re-origination is not used, remote VTEP L10 receives only a single path (from L1) for H1’s reachability. If the ES goes down on L1 and the other VTEPs have not yet learned H1’s MAC and MAC-IP routes, IP traffic to H1 is lost until the routes are learned elsewhere. With re-origination, the remaining VTEPs prevent this traffic loss by advertising alternate paths.

Ethernet Segment delay-restore timers

The Ethernet Segment (ES) delay-restore timer is a mechanism for managing the recovery of Ethernet Segments in EVPN that

  • activates when an NVE interface flaps (for example, during Anycast IP configuration, core isolation, or device reload), causing all associated ESIs to go down,

  • delays the restoration of ESIs, bringing them back online only after the timer expires, and

  • prevents traffic from being attracted to the VIP while hardware programming is still in progress, avoiding potential traffic instability during convergence.

The VIP interface remains down until the ES delay-restore timer expires. Once all ESI POs are operational, the VIP interface activates. After the ES delay-restore timer ends, a 480-second VIP anycast delay-restore timer starts. This additional timer ensures that if a PO fails to come online after the ES delay-restore timer expires, the VIP interface will eventually activate.

How ESI multi-homing topologies work

ESI multi-homing topologies are data center network designs that provide redundancy and load balancing through the use of Ethernet Segment Identifiers. These designs support scalable deployments by allowing multiple ESI interfaces in various configurations. Examples include 2-way, 4-way, and butterfly topologies. These designs also support flexible and interoperable network architectures that provide high availability.

The supported ESI multi-homing topologies include:

  • ESI multi-homing with 2-way, 4-way and standalone remote leaf,

  • Butterfly topology, and

  • Interoperability with different ESI multi-homing solutions.

The key components involved in the process are:

  • Spine switches (Spine 1 and Spine 2): The spine switches interconnect all leaf switches and provide high-speed forwarding between network segments.

  • Leaf switches (Leaf 1-10): These switches act as the access layer, connecting directly to end hosts and providing connectivity to the spine layer. Leaf switches participate in ESI groups to support multi-homed hosts.

  • ESI: A logical construct that groups multiple physical links from a host to different leaf switches, enabling multi-homing for redundancy and load balancing.

  • Hosts: End devices (for example: servers, virtual machines) that require network connectivity and can be configured for single-homed or multi-homed attachment.

  • 2-way ESI configuration: A setup where a host is multi-homed to two leaf switches, providing dual-path redundancy. This configuration is also called dual homing.

  • 4-way ESI configuration: A setup where a host is multi-homed to four leaf switches, offering enhanced redundancy and greater load-balancing capabilities.

  • Standalone remote leaf (Leaf 7): A leaf switch that provides single-homed connectivity to a host, operating independently without multi-homing.

  • vPC or vPC fabric peering multi-homing: Represents various multi-homing approaches, including physical link aggregation, vPC fabric peering, and vPC for redundant host attachments.

ESI multi-homing topology with 2-way, 4-way and standalone remote leaf

Figure 8. Topology of 2-way ESI, 4-way ESI and standalone remote leaf

ESI is a crucial component in modern data center networks, particularly in EVPN deployments. It provides multi-homing capabilities for end hosts. This mechanism ensures high availability and efficient traffic distribution.

The process involves these stages:

  • Host multi-homing: A host connects its physical interfaces to two or more leaf switches. This configuration creates redundant physical paths, allowing the host to access the network.

  • ESI group formation: Leaf switches that are configured with the same ESI for a specific host form a logical group. The leaf switches exchange control plane information to coordinate traffic forwarding for the multi-homed host.

  • Ingress traffic handling: When the multi-homed host sends traffic, it is received by one of the active leaf switches within its ESI group. The receiving leaf switch then forwards the traffic toward the spine layer for routing to its destination. The receiving leaf switch also forwards the traffic to local interfaces that are part of the ESI group or to orphan interfaces.

  • Egress traffic handling: When BUM (multi-destination) traffic is destined for a multi-homed host, all leaf switches in the host's ESI group may receive the traffic from the spine layer. The ESI mechanism ensures that only one designated leaf switch forwards traffic to the host and prevents duplicate frames from reaching the host.

  • Load balancing and redundancy: The ESI mechanism balances traffic to and from the multi-homed host across the active links and leaf switches in the ESI group. If a link or leaf switch fails, the remaining active ESI group members seamlessly take over traffic forwarding to ensure continuous host connectivity.

  • Standalone leaf operation: For hosts connected to a standalone remote leaf (for example, Leaf 7), traffic forwarding follows a direct, single-path route between the host, the leaf switch, and the spine switches, as these hosts are not part of an ESI multi-homing group.

Result: Ethernet Segments provide high availability, redundancy, and efficient load balancing for your hosts in a spine-leaf network architecture. This ensures robust and scalable data center connectivity.

Butterfly topology

The butterfly topology connects hosts through Ethernet Segments between 2-way and 4-way ESI clusters. This approach allows seamless traffic forwarding between different multi-homing clusters in complex network topologies.

The supported cluster combinations in butterfly topology include:

  • Multiple hosts connected via butterfly topology,

  • 2-way butterfly topology, and

  • 4-way butterfly topology.

Multiple hosts connected via butterfly topology
Figure 9. Butterfly topology of multiple hosts

Key components in butterfly topology are:

  • 2-way ESI cluster: Leaf 1 and Leaf 2.

  • 4-way ESI cluster: Leaf 3, Leaf 4, Leaf 5, and Leaf 6.

Host connections:

  • Host-A is connected to the 2-way ESI cluster (via Leaf 2) using ESI-2 and to the 4-way ESI cluster (via Leaf 3) using ESI-2 as well.

  • Host-B is connected to the 2-way ESI cluster (via Leaf 1) using ESI-3 and to the 4-way ESI cluster (via Leaf 3) also using ESI-3 as well.

Result:

  • This allows Host 1 to send and receive traffic through both clusters using the ESI (ESI-2).

  • Host 2 uses ESI-3 for both clusters, enabling similar redundancy and flexible traffic forwarding.

2-way butterfly topology

Figure 10. Butterfly topology of 2-way ESI cluster

In this topology, Host-A connects to the 4-way ESI cluster by using ESI-2 through Leaf 3 and Leaf 4. This setup forms a 2-way butterfly topology.

4-way butterfly topology

Figure 11. Butterfly topology of 4-way ESI cluster

In this topology, Host-A connects to the 2-way ESI cluster through Leaf 2 and to the 4-way ESI cluster through Leaf 3, Leaf 4, and Leaf 5, using ESI-2. This setup forms a 4-way butterfly topology.

Interoperability with different ESI multi-homing solutions

Figure 12. ESI multi-homing topology with different ESI multi-homing solutions

ESI multi-homing supports interoperability with different solutions, such as vPC and vPC fabric peering, to establish robust and redundant host connectivity. The use of various multi-homing techniques and foundational fabric designs achieves this goal. These methods ensure high availability, efficient traffic distribution, and scalability for connected devices.

The process involves the following stages:

  • vPC or vPC fabric peering multi-homing: In environments where hosts connect through an intermediate Layer 2 device, leaf switches (for example: Leaf 9 and Leaf 10) provide multi-homed connectivity. This typically involves physical link aggregation or vPC configurations, ensuring redundant paths from the L2 device to the leaf switches and ultimately to the spine fabric.

Result: The implementation of these diverse connectivity methods ensures that hosts within a spine-leaf network achieve high availability, optimal traffic distribution, and robust fault tolerance, adapting to various application demands and infrastructure designs.

Guidelines and limitations for ESI multi-homing

This section outlines the requirements, constraints, and supported behaviors for configuring ESI multi-homing on Cisco NX-OS.

Supported releases and platforms

Table 2. Supported releases and platforms

Release

Platforms

10.6(1)F

Cisco Nexus 9300-FX2/FX3/GX/GX2/H2R/H1 Series switches

Cisco Nexus 9500 Series switches with 9700-GX/FX3 line cards

Note

 

Cisco Nexus 9700-FX line cards support only core links on the ESI fabric.

Supported and unsupported features

Table 3. Supported and unsupported features

Feature

Supported Release

Comments

Multi-site

10.6(1)F

Multi-Homing on BGW is not supported.

DF algorithm

10.6(1)F

Supported

Host mobility

10.6(1)F

Supported

Multicast underlay and ingress replication for IPv4

10.6(1)F

Supported

IGMP and MLD Snooping, Type-7 and 8

10.6(1)F

Supported

Full STP support

10.6(1)F

Supported

PIP and VIP NH

10.6(1)F

Supported

VXLAN PBR

10.6(1)F

Supported

N-way ESI

10.6(1)F

4-way ESI is supported, but configurations exceeding 4-way (for example, 5-way or more) are not supported.

Butterfly topology

10.6(1)F

Only PIP mode is supported. VIP mode is not supported.

ESI Type-0 and 3

10.6(1)F

Supported

VXLAN TE

-

Not supported

TRM

-

Not supported

ISSU on EOR

-

Not supported

IPv6 underlay

-

Not supported

DSVNI

-

Not supported

Configuration requirements

  • The maximum-path must be configured under the EVPN address-family on all participating NX-OS nodes. This allows BGP to select multiple paths for EAD per ES and EAD per EVI routes. Remote VTEPs require this configuration for ESI-RX functionality, supporting multi-homing on ESI-VTEPs.

  • vPC or vPC fabric peering can coexist. However, each VTEP operates in either vPC-VTEP or ESI-VTEP mode, not both simultaneously.

  • The new L3-VNI must be configured on all ESI peers to extend the VNI range.

  • Beginning with Cisco NX-OS Release 10.6(1)F, link-local addresses are advertised on devices with ESI multi-homing enabled. Only devices participating in the given Ethernet Segment accept the route. Devices that are not part of the Ethernet Segment drop the route.

  • The fast reroute anycast source IP address must be unique across the fabric to handle the fast reroute packet appropriately.

    For example, if a packet has already undergone fast rerouting once, do not reroute it again to another ESI-VTEP in the event of double failures. Assign a specific source IP address, known as the fast reroute anycast source IP, to reroute the packet and ensure unique identification. For more information about configuration, see the Enable EVPN ESI multi-homing section.

  • ISSU is supported for VTEPs part of a multi-homing cluster.

  • All multi-homed hosts across ESIs must be configured to the same set of ESI-VTEPs, and the esi-id should be consistent on each relevant port-channel; discrepancies are not flagged by the consistency checker.

  • The ESI Multi-homing feature requires TCAM carving of the region ing-flow-redirect . Save the configuration and reload the switch to apply the changes.


    Note


    The ing-flow-redirect TCAM region must be explicitly carved to a size of 512.


  • A secondary IP address (VIP) is required only when either vPC or EVPN ESI multi-homing is configured.

  • Ethernet Segment and ESI configurations are supported only on Layer 2 port channel interfaces.

  • To detect duplicate host addresses and set host move detection parameters, use these commands:

    • l2rib dup-host-mac-detection num-of-host-moves dup-detection-timeout

    • fabric forwarding dup-host-ip-addr-detection num-of-host-moves dup-detection-timeout

    For more information, see the Duplicate Detection for IP and MAC Addresses section.

  • If a user performs clear ip arp force-delete on a VRF, and then clear mac address-table dynamic, the number of ARP entries on the ESI nodes may become unsynchronized. To prevent this inconsistent state, synchronize the ARP entries on all ESI nodes by using the ip arp suppression-cache download remote vlan vlan_id command.

PIP or VIP mode

  • If re-origination occurs, you do not need to send the EAD/EVI route. By default, the EAD/EVI route is disabled for both PIP and VIP modes. Enable EAD/EVI using the ead-evi route command if required. This configuration optimizes the network by reducing the number of routes. For configuration details, see the EVPN EAD-EVI routes section.

  • An L2FRR entry is programmed for the duration of the ESI downtime. This action redirects traffic to another functional ESI peer.

  • In PIP mode, FRR must be configured to ensure that L2FRR functions correctly.

  • In VIP next-hop mode, traffic may land on a VTEP whose ESI is down. This occurs because the remote VTEP continues to use the VIP as the next hop.

  • Mode transition behavior (from the standpoint of a remote VTEP)

    • The VTEP operates in VIP next-hop mode when ESI is active on two or more VTEP peers.

    • It transitions to PIP next-hop mode when only one ESI peer remains active for a multi-homed host.

    • The system reverts to VIP next-hop mode if two or more ESI peers become active again.

    For more information, see the ESI multi-homing PIP modes and ESI multi-homing VIP modes sections.

Enable EVPN ESI multi-homing

Enable ESI-based multi-homing using the evpn esi multihoming command. The ESI multi-homing command enables Ethernet-segment configurations and generates Ethernet-segment routes on the switches.

Receiving Type-1 and Type-2 routes with a valid ESI, as well as path-list resolution, does not depend on the evpn esi multihoming command. If the switch receives MAC or MAC-IP routes with a valid ESI when the command is not enabled, ES-based path resolution logic still applies to these remote routes. This behavior ensures interoperability between vPC-enabled switches and ESI-enabled switches.


Note


Cisco NX-OS supports either vPC-based EVPN multi-homing or ESI-based EVPN multi-homing, but not both simultaneously.


Follow these steps to enable the EVPN ESI multi-homing feature:

Before you begin

  • Make sure TCAM carving is configured.

    • If TCAM carving is not already configured, use the following command to configure it:
      hardware access-list tcam region ing-flow-redirect 512
    • Reload the switch to apply the configuration.

  • Configure maximum-path under the EVPN address-family on the Cisco NX-OS nodes. This configuration enables BGP to select multiple paths for EAD per ES and EAD per EVI routes. Remote VTEPs require this setting for ESI-RX functionality. This configuration allows the fabric to support multi-homing on ESI-VTEPs.

    Example:
    Leaf-7(config)# router bgp 1
    Leaf-7(config-router)# address-family l2vpn evpn
    Leaf-7(config-router-af)# maximum-paths ibgp 4
    
    Leaf-7(config-router)# vrf 3001
    Leaf-7(config-router-vrf)# address-family ipv4 unicast
    Leaf-7(config-router-vrf-af)# maximum-paths ibgp 4 

Procedure


Step 1

Enter global configuration mode.

Use the configure terminal command.

Example:

switch# configure terminal
switch(config)#

Step 2

Enable EVPN ESI multi-homing.

Use the evpn multihoming command.

Example:

switch(config)# evpn multihoming 
switch(config-evpn-mh)#

To disable EVPN ESI multi-homing, use the no evpn multihoming command.

Step 3

(Optional) Configure system MAC address.

Use the system-mac system-mac command with your chosen format to inherit globally configured MAC for all ESI.

Example:

switch(config-evpn-mh)# system-mac 1200.0000.0000
Supported formats for the global system MAC address are:
  • system-mac E.E.E,

  • system-mac EE-EE-EE-EE-EE-EE,

  • system-mac EE:EE:EE:EE:EE:EE, and

  • system-mac EEEE.EEEE.EEEE

Step 4

(Optional) Set DF election mode.

Use the df-election mode {modulo | per-flow} command.

Example:

switch(config-evpn-mh)# df-election mode modulo
  • Default mode: per-flow.

  • To restore the default, use the no df-election mode command.

Step 5

(Optional) Configure DF election timer.

Use the df-election time secs command to set the DF election timer for all ES.

Example:

switch(config-evpn-mh)# df-election time 1.0
  • Range: 1 to 3 seconds. Default: 3 seconds.

  • To restore the default, use the no df-election time secs command.

    Tip

     

    The default three second DF election timer ensures stable DF elections. However, a one second timer can accelerate convergence and reduce failover time, suitable for low-latency, critical environments.

Step 6

(Optional) Enable EAD-EVI route advertisement.

Use the ead-evi route command.

Example:

switch(config-evpn-mh)# ead-evi route
  • By default, EAD-EVI route advertisement is disabled.

  • To disable, use the no ead-evi route command.

Step 7

(Optional) Configure Ethernet segment delay restore time.

Use the ethernet-segment delay-restore time secs command.

Example:

switch(config-evpn-mh)# ethernet-segment delay-restore time 180
  • Range: 30 to 1000 seconds. Default: 180 seconds.

  • To restore the default, use the no ethernet-segment delay-restore time secs command.

Step 8

Configure fast reroute anycast source IP (L2FRR).

Use the frr anycast source-ip ip-address command.

Example:

switch(config-evpn-mh)# frr anycast source-ip 10.0.0.13

Example:

Note

 
  • For L2FRR to work properly, ensure the VIP or fast reroute anycast source IP is configured correctly.

  • Fast reroute anycast source IP is mandatory for PIP mode.

  • In VIP mode of operation, this command is optional and uses the VIP as the anycast source IP. The configured anycast source IP takes precedence over the VIP address.

  • If 4-way is used, configure the same IP on all four nodes.

  • The fast reroute anycast source IP address must be unique across the entire fabric. For PIP mode, configuration on a specific interface is not required.

Step 9

Exit EVPN multi-homing configuration mode.

Use the exit command.

Example:

switch(config-evpn-mh)# exit
switch(config)#

Step 10

Enable core-links tracking on L3 interface toward spine.

In interface config mode, use the evpn multihoming core-tracking command.

Example:

switch(config)# interface Ethernet1/1
switch(config-if)# description intf_site_1_spine_1_1
switch(config-if)# evpn multihoming core-tracking
switch(config-evpn-mh)#

To remove core-link tracking, use the no evpn multihoming core-tracking command.

Note

 

This step is required; without it, the ES is not UP.

Step 11

(Optional) Verify configuration.

Use the show running-config nv overlay command.

Example:

switch# show running-config nv overlay
evpn multihoming
  ethernet-segment delay-restore time 120
  ead-evi route
  frr anycast source-ip 10.0.0.13
  df-election mode modulo
  df-election time 1.0
  system-mac 1200.0000.0000
advertise evpn multicast
switch#

EVPN ESI multi-homing is enabled and operational. Verification confirms the configuration is active and correct.

Configure ESI under a port channel interface

Configure an ESI for a Layer 2 port channel interface to enable multi-homing and redundancy in an EVPN environment. The port channel can then participate in multi-chassis link aggregation, supporting features such as active-active redundancy and seamless failover between devices.

Follow these steps to configure an ESI for a port channel interface.

Before you begin

  • Before you begin, ensure that Port channel is configured as a Layer 2 port channel.

  • To inherit the globally configured system MAC in a Type-3 ESI, you must first configure the global system MAC.

Procedure


Step 1

Enter global configuration mode.

Use the configure terminal command.

Example:

switch# configure terminal
switch(config)#

Step 2

Enter interface mode.

Use the interface port-channel value command.

Example:

switch(config)# interface port-channel 1
switch(config-if)#

Step 3

Enable ES configuration.

Use the ethernet-segment command.

Example:

switch(config-if)# ethernet-segment
switch(config-if-ethernet-segment)# 

Step 4

Configure ESI under port channel.

Use the esi value | esi system-mac [system-mac] local-discriminator command.

The supported ESI route types are:

  • Type-0: Configure a 10-byte ESI value manually, with the first byte set to 00.

    Example:
    esi 004a.230a.03c8.8299.58e0
  • Type-3: These options are available to configure Type-3 ESI.

    The ESI Type-3 consists of the PE system MAC address combined with a local discriminator (unique 32-bit value). The local discriminator distinguishes Ethernet segments that share the same PE system MAC address, ensuring each Ethernet Segment Identifier is unique.

    Table 4. Type-3 ESI configuration options

    If

    Then

    Example

    Global system MAC inherited without local identifier (local discriminator)

    System MAC is derived from global system MAC.

    Note

     
    If the local-Identifier is omitted, port channel number from the port channel interface will be inherited as local discriminator value.
    switch(config-if-ethernet-segment)# esi system-mac

    Global system MAC inherited with local identifier (local discriminator)

    The system MAC is derived from the global system MAC. Additionally, configure a local identifier (local discriminator) with the system MAC. The valid range is 0 to 16,777,215.

    switch(config-if-ethernet-segment)# esi system-mac 1

    Manually configured system MAC without local identifier (local discriminator)

    The user defines the system MAC.

    Note

     
    If the local-Identifier is omitted, port channel number from the port channel interface will be inherited as local discriminator value.
    For a manually configured system MAC without local discriminator, the local discriminator is inherited from the port channel number.
    switch(config-if-ethernet-segment)# esi system-mac 0334.5600.0000

    Manually configured system MAC with local identifier (local discriminator)

    The user defines the system MAC. Additionally local identifier (local discriminator) is configured along with user defined system MAC. Range: 0 - 16777215.

    switch(config-if-ethernet-segment)#esi system-mac 0334.5600.0000 1

Step 5

Exit until you reach configuration mode.

Use the exit command.

Example:

switch(config-if-ethernet-segment)# exit
switch(config-evpn-mh)# exit
switch(config)#

Step 6

Configure the NVE interface.

Use the interface nve value command.

Example:

switch(config)# interface nve 1
(config-if-nve)#

Step 7

(Optional) Configure Anycast VIP interface.

Use the source-interface loopback Id anycast loopback Id command in NVE interface.

Example:

switch(config)# interface nve 1
(config-if-nve)# source-interface loopback1 anycast loopback2

To remove the NVE source and anycast loopback interface mapping, use the no source-interface loopback Id anycast loopback Id command.

Note

 

To remove only anycast loopback interface mapping, use the source-interface loopback Id command.

Step 8

(Optional) Verify the port channel configuration.

Use the show running-config interface port-channel value command.

Example:

switch# show running-config interface port-channel
interface port-channel1
  switchport
  switchport mode trunk
  switchport trunk allowed vlan 2-6
  ethernet-segment
    esi system-mac 1
  spanning-tree port type edge trunk

interface Ethernet1/14/4

  description intf_site_1_l2sw_1_esia_1
  switchport
  switchport mode trunk
  switchport trunk allowed vlan 2-6
  channel-group 1 mode active
  no shutdown

Step 9

(Optional) Verify whether the ES status is up on all the ESI multi-homing nodes after ES configuration.

Use the show nve ethernet-segment command.

Example:

switch# show nve ethernet-segment s
ESI                              Parent interface   ES State
------------------------------   ------------------ ----------
0334.5600.0000.0000.0001         port-channel1      Up
0334.5600.0000.0000.0002         port-channel2      Up
switch# show nve ethernet-segment

ESI: 0080.7e59.e1e4.5459.e022
   Parent interface: port-channel201
  ES State: Up                     !Verify ES Status is UP
  Port-channel state: Up
  NVE Interface: nve1
   NVE State: Up
   Host Learning Mode: control-plane
  Anycast IP: 192.0.2.4
  Active Vlans: 2-41
   DF Vlans: 3,5,7,9,11,13,15,17,19,21,23,25,27,29,31,33,35,37,39,41
   Active VNIs: 2000002-2000041
  DF BDs: N/A
   DF VNIs: N/A
   Number of ES members: 2
  My ordinal: 1
  DF timer start time: 00:00:00
  DF timer expiry: 08:08:09
  Config State: config-applied
  DF List: 192.0.2.12 192.0.2.13
  Bounce peer : 192.0.2.12
  ES route added to L2RIB: True
  EAD/ES routes added to L2RIB: True
  EAD/EVI route timer age: not running [Disabled]
  EAD/EVI timer duration: 00:05:00
  ESI type: Ether-segment
  ESI DF election mode: Modulo
switch#

Step 10

(Optional) Verify the NVE interface configuration details.

Use the show nve interface nve 1 detail command.

Example:

switch# show nve interface nve 1 detail
Interface: nve1, State: Up, encapsulation: VXLAN
 VPC Capability: VPC-VIP-Only [not-notified]
 Local Router MAC: f4ee.31e8.f2fd
 Host Learning Mode: Control-Plane
 Source-Interface: loopback1 (primary: 192.0.2.11)           !Verify source interface loopback IP address
 Anycast-Interface: loopback2 (secondary: 192.0.2.1)            !Verify Anycast interface loopback IP address         
 Source Interface State: Up                                  !Verify source interface Status
 Anycast Interface State: Up                                    !Verify source interface Status
 ESI multihoming anycast-restore time left: 0 seconds
 Virtual RMAC Advertisement: No
 NVE Flags:
 Interface Handle: 0x49000001
 Source Interface hold-down-time: 180
 Source Interface hold-up-time: 30
 Remaining hold-down time: 0 seconds
 Virtual Router MAC: 0200.0101.0101
 Interface state: nve-intf-add-complete
 ESI multihoming delay-restore time: 180 seconds
 ESI multihoming delay-restore time left: 0 seconds
 ESI multihoming FRR anycast source IP: 192.0.2.1           !Verify source interface loopback IP address          
 Fabric convergence time: 135 seconds
 Fabric convergence time left: 0 seconds

The port channel is successfully configured with the specified ESI, enabling it for multi-homing in an EVPN environment. The system recognizes the ESI configuration, and verification commands confirm that the ESI and related interfaces are operational, supporting redundancy and resiliency for Layer 2 services.

What to do next

  • Verify connectivity and redundancy.

  • Monitor the status of the ESI and port channel interfaces and confirm they remain in the "Up" state.

Verification commands for ESI multi-homing configuration

Use these commands to view ESI multi-homing configuration information and verify the ESI multi-homing setup on your device.

Table 5. Verification commands for ESI multi-homing configuration
Command Purpose
show bgp evi Displays BGP EVPN routes learned by the switch.
show bgp l2vpn evpn route-type value Displays BGP route type state.
show l2route topology all Displays a comprehensive view of the Layer 2 forwarding table with information about MAC addresses, associated VLANs, and next-hops.
show l2route evpn mac all Displays all learned MAC addresses within the EVPN domain.
show l2route evpn mac-ip all Displays all MAC and IP addresses that the switch learned through BGP EVPN.
show l2route evpn imet all Displays the MAC addresses, their associated VNI, and the VTEP from which the addresses were learned.
show l2route evpn fl all Displays all Layer 2 EVPN routes the switch learned, both locally and remotely.
show l2route evpn ead all Displays information about all EAD routes in the EVPN routing table.

show l2route evpn ethernet-segment {esi esi-id | all}[bgp | vxlan] [detail]

Displays information about Ethernet Segments in an EVPN environment, specifically within a VXLAN fabric.

show l2route evpn ethernet-segment {esi esi-id | all}[detail]

Displays information about Ethernet Segments in an EVPN environment on the switch.
show l2route smet {topology topo-id | all} [detail] Displays information about Layer 2 Multicast (SMET) routes within a VXLAN EVPN fabric.

show l2routereport-sync{topology topo-id | all} [esiesi- id] [detail]

Displays details about the synchronization of Layer 2 EVPN routes reports.

show l2routeleave-sync{topology topo-id | all} [esi esi-id] [detail]

Displays details about leave synchronization for Layer 2 EVPN routes.
show nve interface nve1 detail Displays information about the Network Virtualization Edge interface nve1.
show nve ethernet-segment Displays detailed information about configured NVE Ethernet segments.
show nve core-links Displays details about the configured Ethernet segments, including their status and associated VNIs.
show [ip | ipv6] [igmp | mld] snooping groups [vlan] [vlan ID] Displays the corresponding group address, version, group type, and port list information, depending on IGMP or MLD.
show ipv6 mld groups Displays information about MLD snooping.
show ip igmp snooping evpn Displays information about the IP IGMP snooping configuration and statistics.
show ipv6 mld snooping evpn Displays information about the IPv6 MLD snooping configuration.
show ip igmp snooping evpn esi Displays the IGMP snooping configuration and status for the EVPN context, including ESI details, port-channel, ESI ID, and type.
show ipv6 mld snooping evpn esi Displays information about MLD snooping within the EVPN context, including ESI details, port-channel, ESI ID, and type.
show ip igmp snooping evpn report-sync Displays IGMP snooping and EVPN report-sync information for VLAN, VNI, group, source, local/remote, and version flags.
show ipv6 mld snooping evpn report-sync Displays IPv6 IGMP snooping and EVPN report-sync information for VLAN, VNI, group, source, local/remote, and version flags.
show ip igmp snooping evpn leave-sync Displays the IGMP snooping leave synchronization status in an EVPN environment.
show ipv6 mld snooping evpn leave-sync Displays the IPv6 IGMP snooping leave synchronization status in an EVPN environment.
show ip igmp snooping remote groups Displays the remote IGMP group address, version, group type, and port list at VLAN level.
show ipv6 mld snooping remote groups

Displays the remote MLD group address, version, group type, and port list at VLAN level.

show bgp l2vpn evpn route-type 7 Displays the state of BGP L2VPN EVPN route Type-7 and the report-sync routing table information for all VRFs.
show bgp l2vpn evpn route-type 8 Displays the state of BGP L2VPN EVPN route Type-8 and leave-sync routing table information for all VRFs.
show ip adjacency vrf vrf-id Displays IP adjacency information for a specific VRF.
show ipv6 adjacency vrf vrf-id Displays IPv6 adjacency information within a specific VRF.
show ip arp vrf vrf-id Displays the ARP table for a specific VRF instance.
show ip arp suppression-cache vlan vlan-id Displays ARP entries being suppressed for the specified VLAN, including IP address, MAC address, and interface for each entry.
show ipv6 neighbor vrf vrf_name Displays the IPv6 neighbors learned via NDP within the specific VRF.
show ipv6 icmp neighbor vrf vrf_name Displays the IPv6 neighbor entries for a specified VRF, typically learned via ICMPv6 Neighbor Discovery.
show mac address-table dynamic Displays all MAC addresses learned dynamically by the switch, along with associated interface and VLAN.
show mac address-table count es all Displays the total number of MAC addresses learned for each Ethernet Segment.
show forwarding route ipaddr platform Displays the routing table, including learned routes, next hops, and associated interfaces.

ESI multi-homing configuration examples

Pre configure for ESI multi-homing

This section explains how to configure and verify the ESI multi-homing (MH) feature on Cisco devices, covering baseline setup, ESI enablement, and NVE interface configuration for both PIP and VIP modes.

Before configuring ESI multi-homing, ensure the following steps are complete

  1. Create a TCAM carving. TCAM carving is required to enable the ESI-MH feature.

    Leaf-3(config)# hardware access-list tcam region ing-flow-redirect 512
  2. Enable maximum-paths. Themaximum-paths is required on ESI-RX VTEPs to enable ECMP.
    Leaf-7(config)# router bgp 1
    Leaf-7(config-router)# address-family l2vpn evpn
    Leaf-7(config-router-af)# maximum-paths ibgp 4
    
    Leaf-7(config-router)# vrf 3001
    Leaf-7(config-router-vrf)# address-family ipv4 unicast
    Leaf-7(config-router-vrf-af)# maximum-paths ibgp 4

Configure ESI multi-homing

Figure 13. Enable ESI MH
  1. Enable ESI multi-homing with system MAC. The system-mac is required to generate the Ethernet Segment ID (ESI).
    Leaf-3(config)# evpn multihoming
    Leaf-3(config-evpn-mh)# system-mac 0000.3456.3456
  2. Enable L2 Fast Reroute (L2FRR). L2FRR is designed to minimize traffic disruption during ESI failure conditions. This command is mandatory in PIP mode but optional in VIP mode, where VIP is used as the anycast source IP.
    Leaf-3(config-evpn-mh)# frr anycast source-ip 203.0.113.1
  3. Enable core links tracking on L3 interfaces to check the operational state of the core links. When all core links are down, ESI port-channel interfaces also go down to avoid traffic null route.
    Leaf-3(config)# interface Ethernet1/1-2
    Leaf-3(config-if)# evpn multihoming core-tracking

Enable Ethernet Segment

  1. Enable Ethernet Segment (ES) on Port-Channel interface.
    Leaf-3(config)# interface port-channel 1
    Leaf-3(config-if)# ethernet-segment
  2. Configure ESI

    • Type 0: Arbitrary 9-byte values
      Leaf-3(config-if-ethernet-segment)# esi 0021.0000.0000.2100.0222
    • Type 3: System MAC address (6 bytes) and Local Discriminator (3 bytes). For more details of Type-3 system MAC options, see the Configure ESI under a port channel interface section.
      Leaf-3(config-if-ethernet-segment)# esi system-mac

Enable ESI multi-homing PIP or VIP mode

Figure 14. VIP and PIP mode configuration
  1. Configuration for PIP mode

    • Create loopback interface with NVE source IP.
      Leaf-3(config)# interface loopback 1
      Leaf-3(config-if)# ip address 192.0.2.1/32
    • Enable PIP on NVE interface.
      Leaf-3(config)# interface nve1
      Leaf-3(config-if-nve)# source-interface loopback1
  2. Configuration for PIP mode

    • Create loopback interface with NVE source IP.
      Leaf-3(config)# interface loopback 1
      Leaf-3(config-if)# ip address 192.0.2.1/32
    • Create loopback interface with Anycast VIP.
      Leaf-3(config)# interface loopback 2
      Leaf-3(config-if)# ip address 198.51.100.1/32
    • Enable Anycast VIP on NVE interface.
      Leaf-3(config)# interface nve1
      Leaf-3(config-if-nve)# source-interface loopback1 anycast loopback2

Verification of VIP mode

This section details the verification steps for ESI multi-homing VIP Mode. The validation covers the advertisement and synchronization of EVPN Type-1 (EAD-ES) and Type-2 (MAC-IP) routes across local and remote VTEPs using a VIP.

  1. EVPN EAD-ES route advertisements

    • Local route (from Leaf 3): Shows that Leaf 3, as an ESI node, advertises its local EAD-ES route (Type-1) with a VIP Next-Hop (198.51.100.1) to its ESI peers (Leaf 4, Leaf 5 and Leaf 6) and BGP. The show l2route evpn ead es and show bgp l2vpn evpn route-type 1 outputs confirm the local origination and the VIP as the egress next-hop.

      Figure 15. Verification of VIP mode – Local route
      Example for BGP component:
      Leaf3# show bgp l2vpn evpn route-type 1
      
      Route Distinguisher: 192.0.13.1:7817   (EAD-ES [0300.0034.5634.5600.0001 7817])
      BGP routing table entry for [1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152, version 154
      Paths: (1 available, best #1)
      Flags: (0x000002) (high32 00000000) on xmit-list, is not in l2rib/evpn
      Multipath: eBGP iBGP
      
        Advertised path-id 1
        Path type: local, path is valid, is best path, no labeled nexthop
        AS-Path: NONE, path locally originated
          192.0.2.1 (metric 0) from 0.0.0.0 (192.0.13.1)
            Origin IGP, MED not set, localpref 100, weight 32768
            Received label 0
            Extcommunity: RT:1:2001001 RT:1:2001002 ENCAP:8 ESI:32:000000
            Tunnel Encapsulation Attribute: Type: 8 Length: 12 Sub Type: 6
               Egress Nexthop: 198.51.100.1
      
        Path-id 1 advertised to peers:
          192.0.2.21         192.0.2.22
      Example for L2RIB component:
      Leaf3# show l2route evpn ead es
      
      Topology ID   Prod   ESI                       Sent To    Num PLs  Flags
      ------------- ------ ------------------------- ---------- -------- ----------
      4294967294    VXLAN  0300.0034.5634.5600.0001   BGP        0       A
                    Next-Hops: 192.0.2.1
                    VIP Next-Hop: 198.51.100.1
    • Remote route (received by Leaf3): Shows Leaf 3 receiving Type-1 routes from other remote ESI peers (Leaf 4, Leaf 5, and Leaf 6) within the 4-way ESI cluster. These routes also indicate the VIP (198.51.100.1) as the egress next-hop, and Leaf3's L2RIB correctly populates the next-hops for these remote ESI members.

      Figure 16. Verification of VIP mode – Remote route
      Example for BGP component:
      Leaf3# show bgp l2vpn evpn route-type 1
      
      Route Distinguisher: 192.0.13.1:65534    (L2VNI 0)<SNIP>
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.16.1:7821:[1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.4 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2002001 RT:1:2002002 ENCAP:8 ESI:32:000000
            Originator: 192.0.16.1 Cluster list: 192.0.2.21
            Tunnel Encapsulation Attribute: Type: 8 Length: 12 Sub Type: 6
               Egress Nexthop: 198.51.100.1
      
        Advertised path-id 1
        Path type: internal, path is valid, is best path, no labeled nexthop, in rib
                   Imported from 192.0.14.1:7821:[1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.2 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2002001 RT:1:2002002 ENCAP:8 ESI:32:000000
            Originator: 192.0.14.1 Cluster list: 192.0.2.21
            Tunnel Encapsulation Attribute: Type: 8 Length: 12 Sub Type: 6
               Egress Nexthop: 198.51.100.1
      
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.2.10:7821:[1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.3 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2002001 RT:1:2002002 ENCAP:8 ESI:32:000000
            Originator: 192.0.2.10 Cluster list: 192.0.2.21
            Tunnel Encapsulation Attribute: Type: 8 Length: 12 Sub Type: 6
               Egress Nexthop: 198.51.100.1
      Example for L2RIB component:
      Leaf3# show l2route evpn ead es
      Topology ID   Prod   ESI                       Sent To    Num PLs  Flags
      ------------- ------ ------------------------- ---------- -------- ----------
      4294967294    BGP    0300.0034.5634.5600.0001   -          0       A
                    Next-Hops: 192.0.2.2
                               192.0.2.3
                               192.0.2.4
    • Remote VTEP (ESI-RX, Leaf 7): Verifies that a remote VTEP (Leaf 7) receives Type-1 EAD-ES route advertisements from all four ESI nodes (Leaf 3, Leaf 4, Leaf 5, and Leaf 6) within the 4- way ESI cluster, with the VIP (198.51.100.1) consistently being the egress next-hop. Leaf 7's L2RIB reflects all four VTEP IPs as next-hops for the ESI.

      Figure 17. Verification of VIP mode - Remote VTEP (ESI-RX)
      Example for BGP component:
      Leaf 7# show bgp l2vpn evpn route-type 1
      
      Route Distinguisher: 192.0.17.1:65534    (L2VNI 0)
      <SNIP>
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.16.1:7821:[1]:[0300.0034.5634.5600.0002]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.4 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2002001 RT:1:2002002 ENCAP:8 ESI:32:000000
            Originator: 192.0.16.1 Cluster list: 192.0.2.21
            Tunnel Encapsulation Attribute: Type: 8 Length: 12 Sub Type: 6
               Egress Nexthop: 198.51.100.1
      
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.14.1:7821:[1]:[0300.0034.5634.5600.0002]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.2 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2002001 RT:1:2002002 ENCAP:8 ESI:32:000000
            Originator: 192.0.14.1 Cluster list: 192.0.2.21
            Tunnel Encapsulation Attribute: Type: 8 Length: 12 Sub Type: 6
               Egress Nexthop: 198.51.100.1
      
        Advertised path-id 1
        Path type: internal, path is valid, is best path, no labeled nexthop, in rib
                   Imported from 192.0.13.1:7821:[1]:[0300.0034.5634.5600.0002]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.1 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2002001 RT:1:2002002 ENCAP:8 ESI:32:000000
            Originator: 192.0.13.1 Cluster list: 192.0.2.21
            Tunnel Encapsulation Attribute: Type: 8 Length: 12 Sub Type: 6
               Egress Nexthop: 198.51.100.1
      
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.2.10:7821:[1]:[0300.0034.5634.5600.0002]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.3 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2002001 RT:1:2002002 ENCAP:8 ESI:32:000000
            Originator: 192.0.2.10 Cluster list: 192.0.2.21
            Tunnel Encapsulation Attribute: Type: 8 Length: 12 Sub Type: 6
               Egress Nexthop: 198.51.100.1
      Example for L2RIB component:
      Leaf 7# show l2route evpn ead es
      
      Topology ID   Prod   ESI                       Sent To    Num PLs  Flags
      ------------- ------ ------------------------- ---------- -------- ----------
      4294967294    BGP    0300.0034.5634.5600.0001   -          2       A
                    Next-Hops: 192.0.2.1
                               192.0.2.2
                               192.0.2.3
                               192.0.2.4
  2. Verification of NVE Ethernet Segment

    Confirms the Ethernet Segment (ESI: 0300.0034.5634.5600.0001) on Leaf3 is "Up" and associated with port-channel1. The show nve ethernet-segment and show nve interface nve 1 detail commands on Leaf 3 confirm the configuration of the Anycast IP: 198.51.100.1 and list all four ESI members (192.0.2.1, 192.0.2.2, 192.0.2.3, 192.0.2.4) in the Designated Forwarder (DF) list. The NVE interface detail also shows the Anycast-Interface as loopback2 (secondary: 198.51.100.1).
    Figure 18. VIP mode -NVE Ethernet Segment verifications
    !Shows NVE status
    Leaf3# show nve ethernet-segment summary
    ESI                              Parent interface   ES State
    ------------------------------   ------------------ ----------
    0300.0034.5634.5600.0001         port-channel1      Up
    
    !Shows ES status and ES configuration information
    Leaf3# show nve ethernet-segment
    
    ESI: 0300.0034.5634.5600.0001
       Parent interface: port-channel1
      ES State: Up
      Port-channel state: Up
      NVE Interface: nve1
       NVE State: Up
       Host Learning Mode: control-plane
      Anycast IP: 198.51.100.1
      Active Vlans: 1001-1002
       DF Vlans:
       Active VNIs: 2001001-2001002
      DF BDs: N/A
       DF VNIs: N/A
       Number of ES members: 4
      My ordinal: 0
      DF timer start time: 00:00:00
      DF timer expiry: 16:05:31
      Config State: config-applied
      DF List: 192.0.2.1 192.0.2.2 192.0.2.3 192.0.2.4
      Bounce peer : 192.0.2.4
      ES route added to L2RIB: True
      EAD/ES routes added to L2RIB: True
      EAD/EVI route timer age: not running [Disabled]
      EAD/EVI timer duration: 00:05:00
      ESI type: Ether-segment
      ESI DF election mode: Per-flow
    
    !Shows ES configuration information in detial
    Leaf3# show nve interface nve 1 detail
    
    Interface: nve1, State: Up, encapsulation: VXLAN
     VPC Capability: VPC-VIP-Only [not-notified]
     Local Router MAC: 4880.0290.0727
     Host Learning Mode: Control-Plane
     Source-Interface: loopback1 (primary: 192.0.2.1)
     Anycast-Interface: loopback2 (secondary: 198.51.100.1)
     Source Interface State: Up
     Anycast Interface State: Up
     ESI multihoming anycast-restore time left: 0 seconds
     Virtual RMAC Advertisement: No
     NVE Flags:
     Interface Handle: 0x49000001
     Source Interface hold-down-time: 180
     Source Interface hold-up-time: 30
     Remaining hold-down time: 0 seconds
     Virtual Router MAC: 0200.6701.8601
     Interface state: nve-intf-add-complete
     ESI multihoming delay-restore time: 180 seconds
     ESI multihoming delay-restore time left: 0 seconds
     ESI multihoming FRR anycast source IP: 203.0.113.1
     Fabric convergence time: 135 seconds
     Fabric convergence time left: 0 seconds
  3. EVPN Type-2 Route Advertisement (MAC-IP)

    • Local VTEP to ESI peers (peer sync): Demonstrates a host (MAC: 0010.0100.1301, IP: 10.1.13.1) learned locally on Leaf 5. Leaf 5 then advertises this Type-2 route as "locally originated" with its ESI. Other ESI peers (Leaf 3, Leaf 4, and Leaf 6) receive this route as "Peer Synced" (PS flag in L2RIB), indicating they learned it from a peer within the same ESI.

      Figure 19. Verification of VIP mode - Local VTEP to ESI peers (peer sync)
      L2FM:
      Leaf5# show mac address-table vlan 1001
      VLAN     MAC Address      Type      age     Secure NTFY Ports
      ---------+-----------------+--------+---------+------+----+------------------
      C 1001     0010.0100.1301   dynamic  NA         F      F    Po1
      ARP:
      Leaf5# show ip arp vrf 3001
      
      Address         Age       MAC Address     Interface       Flags
      10.1.13.1       00:18:43  0010.0100.1301  Vlan1001
      L2RIB:
      Leaf5# show l2route evpn mac-ip evi 1001 detail
      
      Topology    Mac Address    Host IP                              Prod   Flags              Seq No     Next-Hops
      ----------- -------------- ------------------------------------ ------ ----------------- ---------- --------------------------
      1001        0010.0100.1301 10.1.13.1                            HMM    L,                 0          Local
                  L3-Info: 3003001
                  Sent To: BGP            
                  ESI : 0300.0034.5634.5600.0001
      BGP:
      Leaf5# show bgp l2vpn evpn 10.1.13.1
      
      Route Distinguisher: 192.0.2.10:33768    (L2VNI 2001001)
      <SNIP>
        Advertised path-id 1
        Path type: local, path is valid, is best path, no labeled nexthop
        AS-Path: NONE, path locally originated
          192.0.2.3 (metric 0) from 0.0.0.0 (192.0.2.10)
            Origin IGP, MED not set, localpref 100, weight 32768
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 ENCAP:8 Router MAC:4880.0290.01af
            ESI: 0300.0034.5634.5600.0001
      
        Path-id 1 advertised to peers:
          192.0.2.21         192.0.2.22
    • ESI-MH Peer VTEP (Peer Sync): Shows successful peer synchronization of an EVPN Type-2 route for host 10.1.13.1 in one of 4-Way ESI MH node (example, Leaf 6). This is visible by the mh_peer_synced flag and "PS" flag.

      Figure 20. Verification of VIP mode - ESI-MH Peer VTEP (Peer Sync)
      BGP:
      Leaf6# show bgp l2vpn evpn 10.1.13.1
      
      Route Distinguisher: 192.0.16.1:33768    (L2VNI 2001001)
      <SNIP>
        Path type: internal, path is valid, not best reason: Local ESI, mh_peer_synced, no labeled nexthop, in rib
                   Imported from 192.0.2.10:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.3 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 ENCAP:8 Router MAC:4880.0290.01af
            Originator: 192.0.2.10 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      L2RIB:
      Leaf6# show l2route evpn mac-ip evi 1001 detail
      
      Topology    Mac Address    Host IP                              Prod   Flags              Seq No     Next-Hops
      ----------- -------------- ------------------------------------ ------ ----------------- ---------- --------------------------
      1001        0010.0100.1301 10.1.13.1                            BGP    PS,                0          192.0.2.3 (Label: 2001001)
                  Sent To: ARP
                  ESI : 0300.0034.5634.5600.0001
                  Port-Channel Info: Po1
                  Encap-type:1
    • ESI-MH Remote VTEP (Re-Origination): Shows that an ESI member (Leaf 6) re-originates the Type-2 route for the locally learned host (even if learned via peer sync) to remote VTEPs. This is visible by a "locally originated" path from Leaf 6 itself, alongside the "Peer Synced" entry.

      Figure 21. Verification of VIP mode - ESI-MH Remote VTEP (Re-Origination)
      BGP:
      Leaf6# show bgp l2vpn evpn 10.1.13.1
      Route Distinguisher: 192.0.16.1:33768    (L2VNI 2001001)
      <SNIP>
       Advertised path-id 1
       Path type: local, path is valid, is best path, no labeled nexthop
        AS-Path: NONE, path locally originated
          192.0.2.4 (metric 0) from 0.0.0.0 (192.0.16.1)
            Origin IGP, MED not set, localpref 100, weight 32768
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.16.1:256 ENCAP:8
                Router MAC:f839.184d.48c7
            ESI: 0300.0034.5634.5600.0001
       Path-id 1 advertised to peers:
          192.0.2.21         192.0.2.22
      L2RIB:
      Leaf6# show l2route evpn mac-ip evi 1001 detail
      
      Topology    Mac Address    Host IP                              Prod   Flags              Seq No     Next-Hops
      ----------- -------------- ------------------------------------ ------ ----------------- ---------- --------------------------
      1001        0010.0100.1301 10.1.13.1                            BGP    PS,                0          192.0.2.4 (Label: 2001001)
                  Sent To: ARP
                  ESI : 0300.0034.5634.5600.0001
                  Port-Channel Info: Po1
                  Encap-type:1
      
      1001        0010.0100.1301 10.1.13.1                            HMM    RO,                0         Local
                  L3-Info: 3003001
                  Sent To: BGP
                  ESI : 0300.0034.5634.5600.0001
    • Re-Origination Verification (Local VTEP): Verifies that the local VTEP (Leaf 5) receives re-originated Type-2 routes from other ESI members, marked with the mh_peer_reoriginated flag in BGP.
      Figure 22. Verification of VIP mode - ESI-MH Local VTEP (Re-Origination)
      Leaf5# show bgp l2vpn evpn 10.1.13.1
      
      Route Distinguisher: 192.0.2.10:33768    (L2VNI 2001001)
      <SNIP>
        Path type: internal, path is valid, not best reason: Router Id, mh_peer_reoriginated, no labeled nexthop
                   Imported from 192.0.14.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.2 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.14.1:256 ENCAP:8
                Router MAC:f839.1867.df6b
            Originator: 192.0.14.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      
        Path type: internal, path is valid, not best reason: Router Id, mh_peer_reoriginated, no labeled nexthop
                   Imported from 192.0.16.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.4 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.16.1:256 ENCAP:8
                Router MAC:f839.184d.48c7
            Originator: 192.0.16.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      
        Path type: internal, path is valid, not best reason: Local ESI, mh_peer_reoriginated, no labeled nexthop
                   Imported from 192.0.13.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.1 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.13.1:256 ENCAP:8
                Router MAC:4880.0290.0727
            Originator: 192.0.13.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
    • To Remote VTEP (ESI-RX, Leaf 7): Confirms that the remote ESI-RX VTEP (Leaf 7) receives the Type-2 route for the host (10.1.13.1) from all four ESI cluster members. All these paths consistently point to the VIP (198.51.100.1) as the egress next-hop. The L2RIB, MAC address table, IP route table, and FIB on Leaf 7 all show the host reachable via the VIP (198.51.100.1) through the NVE interface.

      Figure 23. Verification of VIP mode - Remote VTEP (ESI-RX)
      BGP:
      Leaf7# show bgp l2vpn evpn 10.1.13.1
      
        Path type: internal, path is valid, not best reason: Router Id, no labeled nexthop, anycast NH
                   Imported from 192.0.14.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          198.51.100.1 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.14.1:256 ENCAP:8
                Router MAC:f839.1867.df6b
            Originator: 192.0.14.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      
        Path type: internal, path is valid, not best reason: Router Id, no labeled nexthop, anycast NH
                   Imported from 192.0.16.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          198.51.100.1 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.16.1:256 ENCAP:8
                Router MAC:f839.184d.48c7
            Originator: 192.0.16.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      
        Advertised path-id 1
        Path type: internal, path is valid, is best path, no labeled nexthop, in rib, anycast NH
                   Imported from 192.0.13.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          198.51.100.1 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.13.1:256 ENCAP:8
                Router MAC:4880.0290.0727
            Originator: 192.0.13.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      
        Path type: internal, path is valid, not best reason: Router Id, no labeled nexthop, anycast NH
                   Imported from 192.0.15.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          198.51.100.1 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 ENCAP:8 Router MAC:4880.0290.01af
            Originator: 192.0.15.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      L2RIB:
      Leaf7# show l2route evpn mac-ip evi 1001 detail
      
      Topology    Mac Address    Host IP                              Prod   Flags              Seq No     Next-Hops
      ----------- -------------- ------------------------------------ ------ ----------------- ---------- --------------------------
      1001        0010.0100.1301 10.1.13.1                            BGP    --                 0         198.51.100.1 (Label: 2001001)
                  Sent To: ARP
                  Encap-type:1
      L2FM
      Leaf7# show mac address-table vlan 1001
      VLAN     MAC Address      Type      age       Secure   NTFY   Ports
      ---------+-----------------+--------+---------+------+----+------------------
      C 1001     0010.0100.1301   dynamic  NA         F      F    nve1(198.51.100.1)
      
      URIB:
      Leaf7# show ip route 10.1.13.1 detail vrf 3001
      
      10.1.13.1/32, ubest/mbest: 1/0
          Extended Community: 0x1b 1c 01 03 65 01 0d 01 01 00 00 00 00 00 00 00 00 00 03 00 00 34 56 34 56 00 00 01
          *via 198.51.100.1%default, [200/0], 00:56:42, bgp-1, internal, tag 1, segid: 3003001 tunnelid: 0x67018601 encap: VXLAN
      
                BGP-EVPN: VNI=3003001 (EVPN)
               client-specific data: 579
               recursive next hop: 198.51.100.1/32%default
               extended route information: BGP origin AS 1 BGP peer AS 1
      FIB:
      Leaf7# show forwarding ipv4 route 10.1.13.1 vrf 3001
      
      ------------------+-----------------------------------------+----------------------+-----------------+-----------------
      Prefix            | Next-hop                                | Interface            | Labels          | Partial Install
      ------------------+-----------------------------------------+----------------------+-----------------+-----------------
      10.1.13.1/32         198.51.100.1                      nve1                    vni:   3003001

Verification of PIP mode

This section details the verification steps for ESI multi-homing PIP Mode. The validation covers the advertisement and synchronization of EVPN Type-1 (EAD-ES) and Type-2 (MAC-IP) routes across local and remote VTEPs using a PIP.

  1. EVPN EAD-ES route advertisements

    • Local route (from Leaf3): Shows how a local Leaf (Leaf 3) advertises its Type-1 EAD-ES route for ESI 0300.0034.5634.5600.0001 to its BGP peers (Spines). The command show l2route evpn ead es on Leaf3 confirms the local route (Prod: VXLAN) with its next-hop. The command show bgp l2vpn evpn route-type 1 on Leaf3 shows the locally originated Type-1 route with the correct ESI and next-hop.

      Figure 24. Verification of PIP mode – Local route
      Example for BGP component:
      Leaf3# show bgp l2vpn evpn route-type 1
      
      Route Distinguisher: 192.0.13.1:7817   (EAD-ES [0300.0034.5634.5600.0001 7817])
      BGP routing table entry for [1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152, version 154
      Paths: (1 available, best #1)
      Flags: (0x000002) (high32 00000000) on xmit-list, is not in l2rib/evpn
      Multipath: eBGP iBGP
      
        Advertised path-id 1
        Path type: local, path is valid, is best path, no labeled nexthop
        AS-Path: NONE, path locally originated
          192.0.2.1 (metric 0) from 0.0.0.0 (192.0.13.1)
            Origin IGP, MED not set, localpref 100, weight 32768
            Received label 0
            Extcommunity: RT:1:2001001 RT:1:2001002 ENCAP:8 ESI:0:000000
      
        Path-id 1 advertised to peers:
          192.0.2.21         192.0.2.22
      Example for L2RIB component:
      Leaf3# show l2route evpn ead es
      
      Topology ID   Prod   ESI                       Sent To      Num PLs      Flags
      ------------- ------ ------------------------- ---------- -------- ----------
      4294967294    VXLAN  0300.0034.5634.5600.0001   BGP        0       A
                    Next-Hops: 192.0.2.1
    • Remote route (received by Leaf 3): Shows how a Leaf (Leaf 3 ) receives Type-1 EAD-ES routes from its ESI peers (Leaf 4, Leaf 5, and Leaf 6) within a 4-way ESI cluster. The command show bgp l2vpn evpn route-type 1 on Leaf 3 displays multiple paths for the same ESI, originating from different ESI peers (192.0.2.2, 192.0.2.3, 192.0.2.4), indicating successful reception of remote routes. The command show l2route evpn ead es on Leaf 3 confirms the presence of these remote ESI routes (Prod: BGP) with multiple next-hops.

      Figure 25. Verification of PIP mode – Remote route
      Example for BGP component:
      Leaf3# show bgp l2vpn evpn route-type 1
      
      Route Distinguisher: 192.0.13.1:65534    (L2VNI 0)
      BGP routing table entry for [1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152, version 3434
      Paths: (3 available, best #3)
      Flags: (0x000012) (high32 00000000) on xmit-list, is in l2rib/evpn, is not in HW
      Multipath: eBGP iBGP
      
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.2.10:7817:[1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.3 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2001001 RT:1:2001002 ENCAP:8 ESI:0:000000
            Originator: 192.0.2.10 Cluster list: 192.0.2.21
      
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.16.1:7817:[1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.4 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2001001 RT:1:2001002 ENCAP:8 ESI:0:000000
            Originator: 192.0.16.1 Cluster list: 192.0.2.21
      
        Advertised path-id 1
        Path type: internal, path is valid, is best path, no labeled nexthop, in rib
                   Imported from 192.0.14.1:7817:[1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.2 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2001001 RT:1:2001002 ENCAP:8 ESI:0:000000
            Originator: 192.0.14.1 Cluster list: 192.0.2.21
      Example for L2RIB component:
      Leaf3# show l2route evpn ead es
      Topology ID   Prod   ESI                       Sent To    Num PLs  Flags
      ------------- ------ ------------------------- ---------- -------- ----------
      4294967294    BGP    0300.0034.5634.5600.0001   -          0       A
                    Next-Hops: 192.0.2.2
                               192.0.2.3
                               192.0.2.4
    • Remote VTEP (ESI-RX, Leaf 7): Verifies that a remote VTEP (Leaf 7), which is an ESI-RX VTEP, correctly receives Type-1 EAD-ES routes from all members of the 4-way ESI MH cluster (Leaf 3, Leaf4, Leaf 5, and Leaf 6). The command show bgp l2vpn evpn route-type 1 on Leaf 7 shows four available paths for the ESI, each originating from a different Leaf in the ESI cluster (192.0.2.1, 192.0.2.2, 192.0.2.3, 192.0.2.4). The commands show l2route evpn ead es and show l2route evpn path-list all detail on Leaf 7 confirm the multiple next-hops for the ESI, indicating proper ECMP path installation.

      Figure 26. Verification of PIP mode – Remote VTEP (ESI-RX)
      Example for BGP component:
      Leaf7# show bgp l2vpn evpn route-type 1
      
      Route Distinguisher: 192.0.17.1:65534    (L2VNI 0)
      BGP routing table entry for [1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152, version 2645
      Paths: (4 available, best #3)
      Flags: (0x000012) (high32 00000000) on xmit-list, is in l2rib/evpn, is not in HW
      Multipath: eBGP iBGP
      
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.2.10:7817:[1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.3 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2001001 RT:1:2001002 ENCAP:8 ESI:0:000000
            Originator: 192.0.2.10 Cluster list: 192.0.2.21
      
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.16.1:7817:[1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.4 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2001001 RT:1:2001002 ENCAP:8 ESI:0:000000
            Originator: 192.0.16.1 Cluster list: 192.0.2.21
      
        Advertised path-id 1
        Path type: internal, path is valid, is best path, no labeled nexthop, in rib
                   Imported from 192.0.13.1:7817:[1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.1 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2001001 RT:1:2001002 ENCAP:8 ESI:0:000000
            Originator: 192.0.13.1 Cluster list: 192.0.2.21
      
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.14.1:7817:[1]:[0300.0034.5634.5600.0001]:[0xffffffff]/152
        AS-Path: NONE, path sourced internal to AS
          192.0.2.2 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 0
            Extcommunity: RT:1:2001001 RT:1:2001002 ENCAP:8 ESI:0:000000
            Originator: 192.0.14.1 Cluster list: 192.0.2.21
      Example for L2RIB component:
      Leaf7# show l2route evpn ead es
      
      Topology ID   Prod   ESI                       Sent To    Num PLs  Flags
      ------------- ------ ------------------------- ---------- -------- ----------
      4294967294    BGP    0300.0034.5634.5600.0001   -          2       A
                    Next-Hops: 192.0.2.1
                               192.0.2.2
                               192.0.2.3
                               192.0.2.4
      
      
      
      Leaf7# show l2route evpn path-list all detail
      
      Topology ID  Prod   ESI                       ECMP Label Flags  Client Ctx  MACs       Sent To
      ------------ ------ ------------------------- ---------- ------ ----------- ---------- ----------
      1001         None   0300.0034.5634.5600.0001  3          A      0           15         UFDM
                           CP Next-Hops: 192.0.2.1 , 192.0.2.2 , 192.0.2.3 , 192.0.2.4
                           Gbl EAD Next-Hops: 192.0.2.1 (1,R)
                                              192.0.2.2 (3,R)
                                              192.0.2.3 (2,R)
                                              192.0.2.4 (5,R)
                           Res Next-Hops: 192.0.2.1
                                          192.0.2.2
                                          192.0.2.3
                                          192.0.2.4
                           Bkp Next-Hops:
                           Res Next-Hops from UFDM: 192.0.2.1
                                                    192.0.2.2
                                                    192.0.2.3
                                                    192.0.2.4
                           Bkp Next-Hops from UFDM:
  2. Verification of NVE Ethernet Segment

    Figure 27. PIP mode - NVE Ethernet Segment verification
    • NVE Ethernet Segment verification: Validates the state and configuration of the NVE Ethernet Segment on Leaf3. show nve ethernet-segment summary and show nve ethernet-segment on Leaf3 confirm the ESI 0300.0034.5634.5600.0001 is "Up," associated with port-channel1, and lists details like active VLANs/VNIs, DF (Designated Forwarder) list (192.0.2.1, 192.0.2.2, 192.0.2.3, 192.0.2.4), and ESI type.
      Leaf3# show nve ethernet-segment summary
      ESI                              Parent interface   ES State
      ------------------------------   ------------------ ----------
      0300.0034.5634.5600.0001         port-channel1      Up
      
      
      
      Leaf3# show nve ethernet-segment
      
      ESI: 0300.0034.5634.5600.0001
         Parent interface: port-channel1
        ES State: Up
        Port-channel state: Up
        NVE Interface: nve1
         NVE State: Up
         Host Learning Mode: control-plane
        Active Vlans: 1001-1002
         DF Vlans:
         Active VNIs: 2001001-2001002
        DF BDs: N/A
         DF VNIs: N/A
         Number of ES members: 4
        My ordinal: 0
        DF timer start time: 00:00:00
        DF timer expiry: 17:11:42
        Config State: config-applied
        DF List: 192.0.2.1 192.0.2.2 192.0.2.3 192.0.2.4
        Bounce peer : 192.0.2.2
        ES route added to L2RIB: True
        EAD/ES routes added to L2RIB: True
        EAD/EVI route timer age: not running [Disabled]
        EAD/EVI timer duration: 00:05:00
        ESI type: Ether-segment
        ESI DF election mode: Per-flow
    • NVE Interface Detail: Provides detailed information about the NVE interface (nve1) on Leaf3, including its state, encapsulation (VXLAN), host learning mode (control-plane), source interface (loopback1 with IP 192.0.2.1), and ESI multihoming delay-restore times.
      Leaf3# show nve interface nve 1 detail
      
      Interface: nve1, State: Up, encapsulation: VXLAN
       VPC Capability: VPC-VIP-Only [not-notified]
       Local Router MAC: 4880.0290.0727
       Host Learning Mode: Control-Plane
       Source-Interface: loopback1 (primary: 192.0.2.1, secondary: 0.0.0.0)
       Source Interface State: Up
       Virtual RMAC Advertisement: No
       NVE Flags:
       Interface Handle: 0x49000001
       Source Interface hold-down-time: 180
       Source Interface hold-up-time: 30
       Remaining hold-down time: 0 seconds
       Virtual Router MAC: N/A
       Interface state: nve-intf-add-complete
       ESI multihoming delay-restore time: 180 seconds
       ESI multihoming delay-restore time left: 0 seconds
       ESI multihoming FRR anycast source IP: 203.0.113.1
       Fabric convergence time: 135 seconds
       Fabric convergence time left: 0 seconds
  3. EVPN Type-2 route advertisement (MAC-IP)

    • Local VTEP to ESI peers (peer sync): Shows how a local VTEP (Leaf5) advertises a Type-2 MAC-IP route for a host (MAC 0010.0100.1301, IP 10.1.13.1) connected to the ESI. The commands show mac address-table and show ip arp on Leaf 5 confirm the host's MAC and IP. The command show l2route evpn mac-ip evi 1001 detail on Leaf 5 shows the route as locally learned (Prod: HMM, Flags: L) and sent to BGP, with the associated ESI. The command show bgp l2vpn evpn 10.1.13.1 on Leaf 5 confirms the locally originated Type-2 route, including its labels (L2VNI 2001001, L3VNI 3003001) and ESI.

      Figure 28. Verification of PIP mode - Local VTEP to ESI peers (peer sync)
      L2FM:
      Leaf5# show mac address-table vlan 1001
      VLAN     MAC Address      Type      age     Secure NTFY Ports
      ---------+-----------------+--------+---------+------+----+------------------
      C 1001     0010.0100.1301   dynamic  NA         F      F    Po1
      ARP:
      Leaf5# show ip arp vrf 3001
      
      Address         Age       MAC Address     Interface       Flags
      10.1.13.1       00:18:43  0010.0100.1301  Vlan1001
      L2RIB:
      Leaf5# show l2route evpn mac-ip evi 1001 detail
      
      Topology    Mac Address    Host IP                              Prod   Flags              Seq No     Next-Hops
      ----------- -------------- ------------------------------------ ------ ----------------- ---------- --------------------------
      1001        0010.0100.1301 10.1.13.1                            HMM    L,                 0          Local
                  L3-Info: 3003001
                  Sent To: BGP            
                  ESI : 0300.0034.5634.5600.0001
      BGP:
      Leaf5# show bgp l2vpn evpn 10.1.13.1
      
      Route Distinguisher: 192.0.2.10:33768    (L2VNI 2001001)
      <SNIP>
        Advertised path-id 1
        Path type: local, path is valid, is best path, no labeled nexthop
        AS-Path: NONE, path locally originated
          192.0.2.3 (metric 0) from 0.0.0.0 (192.0.2.10)
            Origin IGP, MED not set, localpref 100, weight 32768
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 ENCAP:8 Router MAC:4880.0290.01af
            ESI: 0300.0034.5634.5600.0001
      
        Path-id 1 advertised to peers:
          192.0.2.21         192.0.2.22
    • ESI-MH Peer VTEP (Peer Sync): Shows how a peer VTEP (Leaf 6) receives the Type-2 route for the same host via peer synchronization. The command show bgp l2vpn evpn 10.1.13.1 on Leaf 6 shows the route imported from the peer (192.0.2.10, which is Leaf5's IP), with mh_peer_synced flag. The command show l2route evpn mac-ip evi 1001 detail on Leaf 6 shows the route received via BGP (Prod: BGP, Flags: PS) with the next-hop pointing to Leaf5's VTEP IP.

      Figure 29. Verification of PIP mode - ESI-MH Peer VTEP (Peer Sync)
      BGP:
      Leaf6# show bgp l2vpn evpn 10.1.13.1
      
      Route Distinguisher: 192.0.16.1:33768    (L2VNI 2001001)
      <SNIP>
        Path type: internal, path is valid, not best reason: Local ESI, mh_peer_synced, no labeled nexthop, in rib
                   Imported from 192.0.2.10:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.3 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 ENCAP:8 Router MAC:4880.0290.01af
            Originator: 192.0.2.10 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      L2RIB:
      Leaf6# show l2route evpn mac-ip evi 1001 detail
      
      Topology    Mac Address    Host IP                              Prod   Flags              Seq No     Next-Hops
      ----------- -------------- ------------------------------------ ------ ----------------- ---------- --------------------------
      1001        0010.0100.1301 10.1.13.1                            BGP    PS,                0          192.0.2.3 (Label: 2001001)
                  Sent To: ARP
                  ESI : 0300.0034.5634.5600.0001
                  Port-Channel Info: Po1
                  Encap-type:1
    • ESI-MH Remote VTEP (Re-Origination): Validates that a VTEP (Leaf6) within the ESI cluster re-originates the Type-2 route to remote VTEPs. The command show bgp l2vpn evpn 10.1.13.1 on Leaf 6 shows the locally originated path for 10.1.13.1 with its own VTEP IP (192.0.2.4) as the next-hop, indicating re-origination. The command show l2route evpn mac-ip evi 1001 detail on Leaf 6 shows both the peer-synced (PS) route and the re-originated (RO) route.

      Figure 30. Verification of PIP mode - ESI-MH Remote VTEP (Re-Origination)
      BGP:
      Leaf6# show bgp l2vpn evpn 10.1.13.1
      Route Distinguisher: 192.0.16.1:33768    (L2VNI 2001001)
      <SNIP>
       Advertised path-id 1
       Path type: local, path is valid, is best path, no labeled nexthop
        AS-Path: NONE, path locally originated
          192.0.2.4 (metric 0) from 0.0.0.0 (192.0.16.1)
            Origin IGP, MED not set, localpref 100, weight 32768
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.16.1:256 ENCAP:8
                Router MAC:f839.184d.48c7
            ESI: 0300.0034.5634.5600.0001
       Path-id 1 advertised to peers:
          192.0.2.21         192.0.2.22
      L2RIB:
      Leaf6# show l2route evpn mac-ip evi 1001 detail
      
      Topology    Mac Address    Host IP                              Prod   Flags              Seq No     Next-Hops
      ----------- -------------- ------------------------------------ ------ ----------------- ---------- --------------------------
      1001        0010.0100.1301 10.1.13.1                            BGP    PS,                0          192.0.2.4 (Label: 2001001)
                  Sent To: ARP
                  ESI : 0300.0034.5634.5600.0001
                  Port-Channel Info: Po1
                  Encap-type:1
      
      1001        0010.0100.1301 10.1.13.1                            HMM    RO,                0         Local
                  L3-Info: 3003001
                  Sent To: BGP
                  ESI : 0300.0034.5634.5600.0001
    • Re-Origination Verification (Local VTEP): Shows how a local VTEP (Leaf 5) receives re-originated Type-2 routes from other ESI peers (Leaf 3, Leaf 4, and Leaf6). The command show bgp l2vpn evpn 10.1.13.1 on Leaf 5 displays multiple paths for the host, imported from various ESI peers, each flagged as mh_peer_reoriginated.
      Figure 31. Verification of PIP mode - ESI-MH Local VTEP (Re-Origination)
      Leaf5# show bgp l2vpn evpn 10.1.13.1
      
      Route Distinguisher: 192.0.2.10:33768    (L2VNI 2001001)
      <SNIP>
        Path type: internal, path is valid, not best reason: Router Id, mh_peer_reoriginated, no labeled nexthop
                   Imported from 192.0.14.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.2 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.14.1:256 ENCAP:8
                Router MAC:f839.1867.df6b
            Originator: 192.0.14.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      
        Path type: internal, path is valid, not best reason: Router Id, mh_peer_reoriginated, no labeled nexthop
                   Imported from 192.0.16.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.4 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.16.1:256 ENCAP:8
                Router MAC:f839.184d.48c7
            Originator: 192.0.16.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      
        Path type: internal, path is valid, not best reason: Local ESI, mh_peer_reoriginated, no labeled nexthop
                   Imported from 192.0.13.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.1 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.13.1:256 ENCAP:8
                Router MAC:4880.0290.0727
            Originator: 192.0.13.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
    • To Remote VTEP (ESI-RX, Leaf 7): Confirms that a remote VTEP (Leaf 7) receives all Type-2 routes for the host from the 4-way ESI MH cluster. The command show bgp l2vpn evpn 10.1.13.1 on Leaf 7 shows four available paths for the host, each pointing to a different VTEP in the ESI cluster (192.0.2.1, 192.0.2.2, 192.0.2.3, 192.0.2.4).

      Figure 32. Verification of PIP mode - Remote VTEP (ESI-RX)
      BGP:
      Leaf7# show bgp l2vpn evpn 10.1.13.1
      
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.2.10:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.3 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.2.10:256 ENCAP:8
                Router MAC:4880.0290.01af
            Originator: 192.0.2.10 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.14.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.2 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.14.1:256 ENCAP:8
                Router MAC:f839.1867.df6b
            Originator: 192.0.14.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      
        Advertised path-id 1
        Path type: internal, path is valid, is best path, no labeled nexthop, in rib
                   Imported from 192.0.13.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.1 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 SOO:192.0.13.1:256 ENCAP:8
                Router MAC:4880.0290.0727
            Originator: 192.0.13.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      
        Path type: internal, path is valid, not best reason: Router Id, multipath, no labeled nexthop, in rib
                   Imported from 192.0.16.1:33768:[2]:[0]:[0]:[48]:[0010.0100.1301]:[32]:[10.1.13.1]/272
        AS-Path: NONE, path sourced internal to AS
          192.0.2.4 (metric 9) from 192.0.2.21 (192.0.2.21)
            Origin IGP, MED not set, localpref 100, weight 0
            Received label 2001001 3003001
            Extcommunity: RT:1:2001001 RT:1:3003001 ENCAP:8 Router MAC:f839.184d.48c7
            Originator: 192.0.16.1 Cluster list: 192.0.2.21
            ESI: 0300.0034.5634.5600.0001
      L2RIB:
      Leaf7# show l2route evpn mac-ip evi 1001 detail
      
      Topology    Mac Address    Host IP                              Prod   Flags              Seq No     Next-Hops
      ----------- -------------- ------------------------------------ ------ ----------------- ---------- --------------------------
      1001        0010.0100.1301 10.1.13.1                            BGP    --                 0         192.0.2.1 (Label: 2001001)
                                                                                                          192.0.2.2 (Label: 2001001)
                                                                                                          192.0.2.3 (Label: 2001001)
                                                                                                          192.0.2.4 (Label: 2001001)
                  Sent To: ARP
                  ESI : 0300.0034.5634.5600.0001
                  Encap-type:1
      L2FM
      Leaf7# show mac address-table vlan 1001
      VLAN     MAC Address      Type      age       Secure   NTFY   Ports
      ---------+-----------------+--------+---------+------+----+------------------
      C 1001     0010.0100.1301   dynamic  NA         F      F    nve1(192.0.2.1 192.0.2.2 192.0.2.3 192.0.2.4)
      
      URIB:
      Leaf7# show ip route 10.1.13.1 detail vrf 3001
      
      10.1.13.1/32, ubest/mbest: 4/0
          Extended Community: 0x1b 1c 01 03 65 01 0f 01 01 00 00 00 00 00 00 00 00 00 03 00 00 34 56 34 56 00 00 01
          *via 192.0.2.1%default, [200/0], 1d00h, bgp-1, internal, tag 1, segid: 3003001 tunnelid: 0x66010d01 encap: VXLAN
      
                BGP-EVPN: VNI=3003001 (EVPN)
               client-specific data: 125
               recursive next hop: 192.0.2.1/32%default
               extended route information: BGP origin AS 1 BGP peer AS 1
          *via 192.0.2.2%default, [200/0], 1d00h, bgp-1, internal, tag 1, segid: 3003001 tunnelid: 0x66010e01 encap: VXLAN
      
                BGP-EVPN: VNI=3003001 (EVPN)
               client-specific data: 138
               recursive next hop: 192.0.2.2/32%default
               extended route information: BGP origin AS 1 BGP peer AS 1
          *via 192.0.2.3%default, [200/0], 1d00h, bgp-1, internal, tag 1, segid: 3003001 tunnelid: 0x66010f01 encap: VXLAN
      
                BGP-EVPN: VNI=3003001 (EVPN)
               client-specific data: 1e9
               recursive next hop: 192.0.2.3/32%default
               extended route information: BGP origin AS 1 BGP peer AS 1
          *via 192.0.2.4%default, [200/0], 1d00h, bgp-1, internal, tag 1, segid: 3003001 tunnelid: 0x66011001 encap: VXLAN
      
                BGP-EVPN: VNI=3003001 (EVPN)
               client-specific data: a2
               recursive next hop: 192.0.2.4/32%default
               extended route information: BGP origin AS 1 BGP peer AS 1
      FIB:
      Leaf7# show forwarding ipv4 route 10.1.13.1 vrf 3001
      
      ------------------+-----------------------------------------+----------------------+-----------------+-----------------
      Prefix            | Next-hop                                | Interface            | Labels          | Partial Install
      ------------------+-----------------------------------------+----------------------+-----------------+-----------------
      10.1.13.1/32
                           192.0.2.1         nve1
                           192.0.2.2         nve1
                           192.0.2.3         nve1
                           192.0.2.4         nve1

IGMP or MLD Snooping with ESI - EVPN Type-7 and Type-8 route

This section describes how to configure the IGMP or MLD Snooping with ESI feature on Cisco NX-OS devices.

IGMP or MLD Snooping with ESI

IGMP or MLD snooping with ESI supports the synchronization of IGMP and MLD membership reports and leave messages between ESI peers, as specified in RFC 9251.

The supported synchronizations include:

  • Multicast Membership Report Synch Route (Type-7)

  • Multicast Leave Synch Route (Type-8)

EVPN Type-7 and Type-8 route synchronization support 2-way, 3-way, and 4-way ESI multi-homing with PIP or VIP modes.

EVPN route Type-7 (ReportSync route)

EVPN Type-7 routes synchronize membership report information learned on the ESI port-channel between ESI peers, as specified in RFC 9251.

  • The local node that receives the membership report originates the Type-7 route.

  • ESI peers install the ESI port as the Outgoing Interface (OIF) for the (S,G) learned remotely.

  • The originating node is responsible for withdrawing the Type-7 route when the OIF expires on the local node.

EVPN route Type-8 (LeaveSync routes)

EVPN Type-8 LeaveSync routes are used to synchronize the leaves received on a local node to remote nodes as specified in RFC 9251.

  • As part of leave processing, the node that receives the leave message sends a group-specific query on the ESI port to solicit a membership report from any other hosts on that port.

  • Leave information, including a leave max-response-time, is advertised as an EVPN Type-8 route.

  • Local and remote nodes start a leave timer to give hosts time to send a membership report in response to the group-specific query that originated on the ESI port. If a membership report is received from a host before the leave timer expires, the ESI port and report-sync state are maintained for the snooped IGMP route. If not, the ESI port is removed as an OIF for the snooped IGMP route after the leave timer expires.


    Note


    • The leave response timer on the originating node is adjusted to account for expected delays in sending the BGP message to ESI peers. This ensures that all ESI peers wait for approximately the same amount of time for a membership report response to the group-specific query originated on receipt of the leave while the leave timer is running.

    • The original membership report, leave message, and response to the group-specific query can each be received by different ESI peers, as supported by RFC 9251.


  • The originating node that advertises the Type-8 route is responsible for withdrawing it.

EVPN Type-7 (Wildcard routes)

  • EVPN Type-7 supports advertisement of a (*,*) wildcard route between ESI peers.

  • The wildcard route is needed for two cases

    • An external querier is present on the ESI port, and the external querier wins the querier election based on querier IP address that is performed with the VTEP.

    • A PIM router that sends PIM hellos is present on the ESI port.

  • A wildcard route is needed for these two cases because membership reports from hosts on the ESI port may only be received by the external querier or PIM router. Therefore, the VTEP might be unaware of some or all (*,G) or (S,G) joins received from hosts on the ESI port. The resolution is to install the (*,*) wildcard route with the ESI port as an OIF for the route. This ensures that all multicast traffic is forwarded to the ESI port.

  • Type-7 routes are used to synchronize the wildcard (,) route across ESI peers because only one VTEP in the ESI complex is aware that the ESI port is associated with the (,) route. This occurs because only one VTEP in the ESI complex participates in the querier election with the external querier. Similarly, only one VTEP in the ESI complex receives the PIM hellos from the PIM router. The Type-7 EVPN (*,*) report-sync message ensures that all ESI peers are aware that the ESI port is associated with a (*,*) route, and that remote ESI peers also install the wildcard (*,*) route with the ESI port as an OIF for that route.

  • The EVPN Type (*,*) route is withdrawn when the VTEP stops receiving PIM hellos from the PIM router, when the external querier is removed, or when the VTEP wins the querier election due to its IP address over the ESI port.


    Note


    While PIM router on the ESI port is supported, configuring an SVI with PIM sparse-mode enabled on the VTEP is not supported. Configuring an SVI with PIM sparse-mode causes the VTEP to function in L3 TRM mode, which is not currently supported.


Supported L2 multicast topologies and IGMP control flows

The following information describes the supported L2 multicast topologies and IGMP control flows for EVPN route Type-7 and route Type-8.

The EVPN route Type-7 and EVPN route Type-8 support 2-way, 3-way, and 4-way ESI with external querier and external PIM router on ESI port. However, you cannot configure PIM sparse mode on the VTEP ESI port SVI.

The supported L2 multicast topologies are as follows:

ESI Topology with no external querier or router

This topology contains these key components:

  • Receiver R: Connected to the access switch or ESI port channel..

  • VTEPs: VTEP1, VTEP2, VTEP3 that are part of the ESI, and remote VTEP4.

Figure 33. ESI Topology with no external querier or router

The process involves these steps:

  • Membership report handling: When Receiver R sends a membership report, it is transmitted via the access switch or ESI port-channel and received by a VTEP, such as VTEP1. VTEP1 processes the report by sending a Type-7 Report Synchronization route to its ESI peers, VTEP2 and VTEP3. It also sends a Type-6 EVPN route to notify the remote VTEP4, as shown in the topology. After receiving the Type-7 route, VTEP2 and VTEP3 also send a Type-6 EVPN route. Currently, the Designated Forwarder (DF) is not the only VTEP that exclusively originates the Type-6 route, as specified in RFC 9251. As a result, each ESI peer originates redundant SMET routes containing the same information.

  • Leave message handling: When Receiver R sends a leave message, it is received by a VTEP, such as VTEP1. VTEP1 initiates the leave message handling procedure and originates a group-specific query. It then sends a Type-8 route to its ESI peers, including VTEP2 and VTEP3. Subsequently, all involved VTEPs begin the leave synchronization procedure described in RFC 9251. As a result, the leave message is propagated across the network, preparing the system for the withdrawal of routes, if necessary.

  • Post leave synchronization phase: If no membership report is received during the synchronization procedure, VTEP1, which sent the initial Type-7 report synchronization route, withdraws the Type-7 route from its ESI peers, VTEP2 and VTEP3. Similarly, VTEP1 withdraws the Type-8 leave synchronization route it sent to its ESI peers. As a result, the Type-6 SMET route is also withdrawn by VTEP1, VTEP2, and VTEP3 from the remote VTEP4, completing the route cleanup process and ensuring proper synchronization across the topology.

ESI Topology with external querier on ESI port

Figure 34. ESI Topology with external querier on ESI port

In this topology, an external querier has won the querier election and is the only node sending an IGMP general query. Since membership reports from the receiver R are sent only towards the port on which there is a querier, membership reports are not seen by the VTEPs. However, one of the VTEPs in the ESI complex, for example, VTEP1 that has participated in the querier election is aware that there is an external querier that has won the querier election; this VTEP marks the ESI port as an “mrouter port”. That VTEP (VTEP1) then originates a Type-7 (*,*) report-sync route to other ESI peers, which also correspondingly add the ESI port as an mrouter port. Separately, a Type-6 EVPN (*,*) route is sent by ESI peers to the remote VTEP4, as shown.

When the external querier is removed, or if the VTEPs that are part of the ESI win the querier election, the VTEP that originated the Type-7 (*,*) route withdraws the route from its ESI peers. Note that in this situation, since there is no ‘leave’ associated with the origination of the Type-7 (*,*) route , there will be no Type-8 (*,*) route sent by any of the ESI peers.

ESI topology with PIM router on ESI port

Figure 35. ESI topology with PIM router on ESI port

In this topology, the PIM router is detected when one of the VTEPs in the ESI complex sees a PIM hello, for example, VTEP1, and marks the ESI port as an “mrouter port.” This occurs regardless of whether the VTEPs in the ESI complex or the PIM router has won the querier election. The VTEP that sees the PIM hello will originate a Type-7 (*,*) route to other ESI peers, which will then also consider the ESI port as an mrouter port. Separately, a Type-6 EVPN (*,*) route is sent by ESI peers to the remote VTEP4, as shown.

When the PIM router is removed, the VTEP that originated the Type-7 (*,*) route withdraws the route from its ESI peers. Note that in this situation, since there is no ‘leave’ associated with the Type-7 (*,*) route, there is no Type-8 (*,*) route sent by any of the ESI peers.


Restriction


The VTEP must not be configured with PIM sparse-mode for this topology to operate.


Guidelines and limitations for IGMP and MLD snooping with ESI

This section summarizes the supported behaviors, requirements, and restrictions for configuring IGMP and MLD snooping with ESI:

Configuration requirements

Enable both the advertise evpn multicast and evpn multihoming commands to originate Type 7 (ReportSync) and Type 8 (Leavesync) routes.

Operational behavior

  • Multiple query packets, one from each ESI switch peer, reach the host. However, responses typically reach only one ESI node. This behavior does not impact traffic, but future optimization may reduce duplicate queries across ESI nodes.

  • The Querier version and Querier IP address must be consistent and configured identically across all ESI nodes and peers.

  • During leave processing, the node that receives a leave message from a host sends a group-specific query and advertises a Type 8 Leavesync route to ESI peers. Nodes that receive a leavesync perform leave procedures without sending further leavesync messages.

  • During Joinsync withdrawal, remote nodes that receive the withdrawal send a query on the ESI port to check for memberships on that port.

IPv4 and IPv6 multicast support

  • IPv4 multicast and IR underlay are supported.

  • IPv6 multicast and IR underlay are not supported.

  • PIM SVI configuration on an ESI port is not supported for Layer 2 multicast functionality.

IGMP and MLD snooping ESI synchronization command outputs

These commands display synchronization status and events for IGMP and MLD snooping in an ESI multi-homing EVPN environment. The command outputs include these fields:

  • VLAN: VLAN ID associated with the multicast event.

  • VNI: VXLAN Network Identifier for the event.

  • ESI: Ethernet Segment Identifier, indicates multi-homing or single-homing segment.

  • Group: Multicast group address (IPv4 or IPv6).

  • Source: Multicast source address.

  • Local/Remote: Specifies whether the report/event was learned on the local device or from a remote ESI peer.

  • Flags: Include mode (I), Exclude mode (E), IGMP/MLD version (v2, v3, etc.).

  • MRT,sec: Maximum Response Time in seconds (for leave events).

IGMP Snooping EVPN report synchronization

The show ip igmp snooping evpn report-sync command displays detailed information about the synchronization status of IGMP multicast reports in an ESI multi-homing environment.

The output provides critical insights such as the associated VLAN, multicast group, source IP, and whether the report was learned locally or from a remote ESI peer.

switch# show ip igmp snooping evpn report-sync
Flags: I - Include Source, E - Exclude Source
       v2 - IGMPv2, v3 - IGMPv3

VLAN       VNI        ESI                      Group                    Source               Local/Remote   Flags                  
500        10500      0300.0a00.0b00.0e00.00ce 232.0.20.1               192.0.2.15             Remote       I v3 
509        10509      0300.0a00.0b00.0e00.00cf 232.0.29.1               192.0.2.44             Local        I v3
version (v2 or v3) being used.

Summary of IGMP Report Synchronization for VLAN 500 and VLAN 509

For VLAN 500, the IGMP report for multicast group 232.0.20.1 (source 192.0.2.15) was synchronized from a remote EVPN peer. This report is associated with the ESI 0300.0a00.0b00.0e00.00ce and uses IGMPv3 in Include mode.

For VLAN 509, the IGMP report for multicast group 232.0.29.1 (source 192.0.2.44) was synchronized locally on the device. This report is associated with the ESI 0300.0a00.0b00.0e00.00cf and also uses IGMPv3 in Include mode.

MLD Snooping EVPN report synchronization

The show ipv6 mld snooping evpn report-sync command displays details about the synchronization status of MLD (IPv6 multicast) reports in an ESI multi-homing environment.

This output helps monitor multicast group membership for IPv6 traffic and indicates whether reports were learned locally or from remote EVPN peers.

switch# show ipv6 mld snooping evpn report-sync
Flags: I - Include Source, E - Exclude Source
       v1 - MLDv1, v2 - MLDv2

VLAN       VNI        ESI                      Group                    Source                   Local/Remote Flags                  
509        10509      0300.0a00.0b00.0e00.00cf 2001:DB8::32                 2001:DB8::9              Local        I v2

The MLD report for VLAN 509 tracks the IPv6 multicast group 2001:DB8::32 with source 2001:DB8::9. It is associated with the ESI 0300.0a00.0b00.0e00.00cf, was learned locally on the device, and uses MLDv2 in Include mode (I v2).

IGMP Snooping EVPN leave synchronization

This command displays details about the synchronization of IGMP leave messages for IPv4 multicast groups.
switch# show ip igmp snooping evpn leave-sync
Flags: I - Include Source, E - Exclude Source
       v2 - IGMPv2, v3 - IGMPv3

VLAN       VNI        ESI                      Group                    Source                   Local/Remote Flags        MRT,sec   
500        10500      0300.0a00.0b00.0e00.00ce 232.0.20.1               192.0.2.35             Remote                    0
509        10509      0300.0a00.0b00.0e00.00cf 232.0.29.1               192.0.2.44             Local        I v3         2

VLAN 500: The leave event for multicast group 232.0.20.1 (source 192.0.2.35) was learned from a remote EVPN peer, with an MRT of 0 seconds, indicating the group is about to be cleared.

VLAN 509: The leave event for multicast group 232.0.29.1 (source 192.0.2.44) was learned locally, using IGMPv3 in Include mode (I v3), with an MRT of 2 seconds.

MLD Snooping EVPN leave synchronization

This command provides details about the synchronization of MLD (Multicast Listener Discovery) leave messages for IPv6 multicast groups. Below is an example of the command output:
switch# show ipv6 mld snooping evpn leave-sync 
Flags: I - Include Source, E - Exclude Source
       v1 - MLDv1, v2 - MLDv2

VLAN       VNI        ESI                      Group                    Source                   Local/Remote Flags        MRT,sec   
509        10509      0300.0a00.0b00.0e00.00cf 2001:DB8::32            2001:DB8::9              Local        I v2         2

VLAN 509: The leave event for IPv6 multicast group 2001:DB8::32 (source 2001:DB8::9) was learned locally, using MLDv2 in Include mode (I v2), with an MRT of 2 seconds.

ECMP reuse

This section describes how to configure the ECMP reuse feature on Cisco NX-OS devices.

ECMP reuse

ECMP reuse is a scale optimization feature that:

  • provides ECMP and adjacency sharing capability among different L3VNIs or VRFs.

  • allows sharing ECMP resources for IPv4 and IPv6 prefixes within same VRF, and

  • reduces the adjacency and ECMP resource usage to handle workloads more efficiently.

Use this feature only if you want to optimize overlay ECMP resources when overlay ECMP resources are exhausted in ESI PIP mode. For more information on enabling this feature, see Enable ECMP reuse section.

Guidelines and limitations for ECMP reuse

This section summarizes the supported behaviors, requirements, and restrictions for configuring ECMP reuse:

  • Only new style L3VNIs (VNIs configured with “l3” keyword under “vrf context”) are supported. The VN-segment associated with a VLAN is not supported.

  • A system reload is required to either enable or disable the ECMP reuse feature.

Enable ECMP reuse

When overlay ECMP resources are exhausted in ESI PIP mode, enable ECMP Reuse to optimize overlay ECMP resources.

Follow these steps to enable or disable the overlay ECMP reuse.

Before you begin

Ensure that Layer 3 VNIs are configured with new L3VNI. For more information on configuration, see Configuring Layer 3 Tenant Routed Multicast.

Procedure


Step 1

Enter global configuration mode.

Use the configure terminal command.

Example:

switch# configure terminal
switch(config)#

Step 2

(Optional) Enable ECMP reuse.

Use the system nve ecmp-reuse command.

Example:

switch(config)# system nve ecmp-reuse

To disable ECMP reuse if needed, use the no system nve ecmp-reuse command.

Step 3

Copy the running configuration to the startup configuration.

Use the copy running-config startup-config command.

Example:

switch(config)# copy running-config startup-config

Step 4

Reload the switch.

Use the reload command.

Example:

switch(config)# reload

ECMP reuse is enabled and active after the switch reloads.

Layer 2 Gateway Spanning Tree Protocol

This section describes how to configure the Layer 2 Gateway Spanning Tree Protocol (L2G-STP) feature on Cisco NX-OS devices.

Layer 2 Gateway Spanning Tree Protocol

A Layer 2 Gateway Spanning Tree Protocol (L2G-STP) is a network protocol that

  • builds a loop-free topology to prevent broadcast storms in VXLAN EVPN multi-homing environments,

  • enables all VTEPs to present as a single logical root bridge in the network, and

  • automatically applies root guard and manages bridge priority to maintain central control of spanning tree operations.

L2G-STP is disabled by default. You must enable it using the spanning-tree domain enable command for VTEPs to function as a pseudo-root for downstream switches. When enabled, the VXLAN fabric emulates a single bridge, maintaining stability, redundancy, and loop prevention throughout the fabric. Bridge IDs are composed of a consistent MAC address and bridge priority, which allows all participating switches to appear as one logical root. Root guard ensures the overlay remains the persistent root even in the presence of superior spanning tree information from access switches.

Example

Suppose multiple VTEPs participate in a VXLAN EVPN multi-homing scenario. When L2G-STP is enabled, all these VTEPs act as a single root to downstream switches. This approach centralizes control, prevents root conflicts or loops, and allows redundancy and rapid failover.

Figure 36. Topology of L2G-STP

Best practice for moving to Layer 2 Gateway STP

Follow these best practices when moving to Layer 2 Gateway STP:

  • Enable root guard by default on all access ports when using Layer 2 Gateway STP.

  • Ensure all VTEPs in the VXLAN fabric act as a single pseudo-root switch for southbound Layer 2 switches.

  • Configure all access ports from VTEPs that connect to southbound Layer 2 switches so that those ports remain in the Desg FWD state by default.

  • Make sure all ports on southbound Layer 2 switches connecting to VTEPs are either in the root-port FWD or Altn BLK state.

  • Activate root guard if superior spanning-tree information is received from southbound Layer 2 switches. This action puts ports in the BLK L2GW_Inc state to secure the root on the VXLAN fabric and prevent loops.

  • Configure an explicit domain ID to enable spanning-tree BPDU tunneling across the fabric.

  • Set all VTEPs to the lowest spanning-tree priority among all switches in the spanning-tree domain, making all VTEPs the root bridge so the entire VXLAN fabric appears as one virtual bridge.

  • Do not enable ESI interfaces in spanning-tree edge mode if Layer 2 Gateway STP needs to run across the VTEP and access layer.

  • You can continue to use ESIs or orphans (single-homed hosts) in spanning-tree edge mode for direct connections to hosts/servers that do not run Spanning Tree Protocol.

  • Configure all VTEPs connected by a common customer access layer in the same Layer 2 Gateway STP domain.

  • Remember: The Layer 2 Gateway STP domain scope is global, and all ESIs on a given VTEP can participate in only one domain.

  • Ensure that mappings between Multiple Spanning Tree (MST) instances and VLANs are consistent across VTEPs within a Layer 2 Gateway STP domain.

  • Do not directly connect non-Layer 2 Gateway STP-enabled VTEPs to Layer 2 Gateway STP-enabled VTEPs. This connection may cause conflicts due to unwanted BPDU propagation and may also steer the root outside.

  • Ensure that the root of a configured STP domain local to the VXLAN fabric is always a VTEP within the fabric.

  • After upgrading to the latest build, retain spanning-tree edge mode and BPDU filter configurations on Cisco Nexus switches and southbound Layer 2 switches.

  • Enable Layer 2 Gateway STP on all switches with recommended priority and MST instance mapping as needed. Use the commands spanning-tree domain enable and spanning-tree mst instance-id priority 8192.

  • First, remove BPDU filter configurations on the switch side. Then, remove BPDU filter configurations and spanning-tree edge mode on the southbound Layer 2 switch.

Enable Layer 2 Gateway STP on a switch

Enable Spanning Tree Protocol (STP) in Layer 2 gateway mode to prevent loops and ensure proper network path selection on a switch.

Follow these steps to enable Layer 2 Gateway STP on a switch.

Procedure


Step 1

Enter global configuration mode.

Use the configure terminal command.

Example:

switch# configure terminal
switch(config)#

Step 2

Enable the Spanning Tree Protocol mode.

Use the spanning-tree mode [rapid-pvst | mst] command.

Example:

switch(config)# spanning-tree mode mst

To disable, use no spanning-tree mode [rapid-pvst | mst] command.

Step 3

Enable Layer 2 Gateway STP.

Use the spanning-tree domain [enable | domain identifier] command.

Table 6. Spanning tree domain options

Option

Description

Example

enable

Enable Layer 2 Gateway STP.

switch(config)# spanning-tree domain enable
domain identifier

Enable Layer 2 Gateway STP and set explicit domain ID to tunnel encoded BPDUs.

switch(config)# spanning-tree domain 1

Note

 

Before reconfiguring, use the no spanning-tree domain enable command to restore to default.

Example:
switch(config)# spanning-tree domain 1
switch(config)# no spanning-tree domain enable
switch(config)# spanning-tree domain enable

Step 4

Configure Spanning Tree Protocol priority.

Use the spanning-tree [mst id | vlan id] priority value command.

Example:

switch(config)# spanning-tree mst 1 priority 8192
switch(config)# spanning-tree vlan 1001 1 priority 8192

To remove the priority, use the no spanning-tree [mst id | vlan id] priority value command.

Step 5

Verify the STP configuration.

Use the show spanning-tree summary

Example:

switch(config)# show spanning-tree summary

For sample verification examples, see Troubleshooting Layer 2 Gateway STP configurations.


What to do next

Verify STP status. For more information, see Troubleshooting Layer 2 Gateway STP configurations.

Troubleshooting Layer 2 Gateway STP configurations

These examples show how Layer 2 Gateway STP configurations affect bridge priority, root guard handling, and port roles.

Spanning-tree priority settings

Each Layer 2 Gateway STP VLAN uses a default spanning-tree priority of 8192, which is lower than the priority used by most customer edge devices. This setting makes the VTEP the spanning-tree root. Priorities increase in steps of 4096.

  • For example, a calculated priority may be: 8192 (base) + 0 (instance ID) = 8192.

  • You can use the show spanning-tree command to confirm that the VTEP is the root.

    switch# show spanning-tree summary
    Switch is in mst mode (IEEE Standard)
    Root bridge for: MST0000
    L2 Gateway STP bridge for: MST0000 
    L2 Gateway Domain ID: 1 
    Port Type Default                        is disable
    Edge Port [PortFast] BPDU Guard Default  is disabled
    Edge Port [PortFast] BPDU Filter Default is disabled
    Bridge Assurance                         is enabled
    Loopguard Default                        is disabled
    Pathcost method used                     is long
    PVST Simulation                          is enabled
    STP-Lite                                 is disabled
    
    Name                   Blocking Listening Learning Forwarding STP Active
    ---------------------- -------- --------- -------- ---------- ----------
    MST0000                      0         0        0         12         12
    ---------------------- -------- --------- -------- ---------- ----------
    1 mst                        0         0        0         12         12
    
    switch# show spanning-tree vlan 1001
    
    MST0000
      Spanning tree enabled protocol mstp
    
      Root ID    Priority    8192
                 Address     c84c.75fa.6001   !L2G-STP reserved mac+ domain id
                 This bridge is the root
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    
      Bridge ID  Priority    8192   (priority 8192 sys-id-ext 0)
                 Address     c84c.75fa.6001
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec

Root guard and inconsistent state

  • VTEP access ports use root guard.

  • If the port receives a superior BPDU, it enters the 'L2 Gateway inconsistent' state until the condition clears. Log messages show these events, and interface states marked '*L2GW_Inc' in show spanning-tree output indicate inconsistency due to BPDUs.

    2016 Aug 29 19:14:19 TOR9-leaf4 %$ VDC-1 %$ %STP-2-L2GW_BACKBONE_BLOCK: L2 Gateway Backbone port inconsistency blocking port Ethernet1/1 on MST0000.
    2016 Aug 29 19:14:19 TOR9-leaf4 %$ VDC-1 %$ %STP-2-L2GW_BACKBONE_BLOCK: L2 Gateway Backbone port inconsistency blocking port port-channel13 on MST0000. 
    switch# show spanning-tree
    
    MST0000
      Spanning tree enabled protocol mstp
      Root ID    Priority    8192
                 Address     c84c.75fa.6001
                 This bridge is the root
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    
      Bridge ID  Priority    8192   (priority 8192 sys-id-ext 0)
                 Address     c84c.75fa.6001
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    
    Interface        Role Sts Cost      Prio.Nbr   Type
    ---------------- ---- --- --------- -------- --------------------------------
    Po1              Desg FWD 20000     128.4096  Edge P2p
    Po2              Desg FWD 20000     128.4097  Edge P2p
    Po3              Desg FWD 20000     128.4098  Edge P2p
    Po12            Desg BKN*2000       128.4107  P2p *L2GW_Inc
    Po13            Desg BKN*1000       128.4108  P2p *L2GW_Inc
    Eth1/1          Desg BKN*2000       128.1     P2p *L2GW_Inc
    

Disabling Layer 2 Gateway STP

  • To disable STP, enter the command: spanning-tree domain disable

  • After you disable STP, the bridge MAC address resets to the system MAC address. The VTEP may not remain the root, and access switches can become the root.

    switch(config)# spanning-tree domain disable
    
    switch# show spanning-tree summary
    Switch is in mst mode (IEEE Standard)
    Root bridge for: none
    L2 Gateway STP                           is disabled
    Port Type Default                        is disable
    Edge Port [PortFast] BPDU Guard Default  is disabled
    Edge Port [PortFast] BPDU Filter Default is disabled
    Bridge Assurance                         is enabled
    Loopguard Default                        is disabled
    Pathcost method used                     is long
    PVST Simulation                          is enabled
    STP-Lite                                 is disabled
    
    Name                   Blocking Listening Learning Forwarding STP Active
    ---------------------- -------- --------- -------- ---------- ----------
    MST0000                      4         0        0          8         12
    ---------------------- -------- --------- -------- ---------- ----------
    1 mst                        4         0        0          8         12
    
    switch# show spanning-tree vlan 1001
    MST0000
      Spanning tree enabled protocol mstp
      Root ID    Priority    4096
                 Address     00c8.8ba6.5073
                 Cost        0
                 Port        4108 (port-channel13)
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    
      Bridge ID  Priority    8192   (priority 8192 sys-id-ext 0)
                 Address     5897.bd1d.db95
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    

When STP is disabled, access ports behave in the following ways:

  • With STP disabled, VTEP access ports function as regular spanning-tree ports and receive BPDUs from access switches.

  • When you disable STP, ports lose rapid forwarding. Each port must complete a proposal or agreement handshake before it enters the forwarding state.