Configuring VXLAN BGP EVPN

This chapter contains these sections:

About VXLAN BGP EVPN

About RD Auto

The auto-derived Route Distinguisher (rd auto) is based on the Type 1 encoding format as described in IETF RFC 4364 section 4.2 https://tools.ietf.org/html/rfc4364#section-4.2. The Type 1 encoding allows a 4-byte administrative field and a 2-byte numbering field. Within Cisco NX-OS, the auto derived RD is constructed with the IP address of the BGP Router ID as the 4-byte administrative field (RID) and the internal VRF identifier for the 2-byte numbering field (VRF ID).

The 2-byte numbering field is always derived from the VRF, but results in a different numbering scheme depending on its use for the IP-VRF or the MAC-VRF:

  • The 2-byte numbering field for the IP-VRF uses the internal VRF ID starting at 1 and increments. VRF IDs 1 and 2 are reserved for the default VRF and the management VRF respectively. The first custom defined IP VRF uses VRF ID 3.

  • The 2-byte numbering field for the MAC-VRF uses the VLAN ID + 32767, which results in 32768 for VLAN ID 1 and incrementing.

Example auto-derived Route Distinguisher (RD)

  • IP-VRF with BGP Router ID 192.0.2.1 and VRF ID 6 - RD 192.0.2.1:6

  • MAC-VRF with BGP Router ID 192.0.2.1 and VLAN 20 - RD 192.0.2.1:32787

About Route-Target Auto

The auto-derived Route-Target (route-target import/export/both auto) is based on the Type 0 encoding format as described in IETF RFC 4364 section 4.2 (https://tools.ietf.org/html/rfc4364#section-4.2). IETF RFC 4364 section 4.2 describes the Route Distinguisher format and IETF RFC 4364 section 4.3.1 refers that it is desirable to use a similar format for the Route-Targets. The Type 0 encoding allows a 2-byte administrative field and a 4-byte numbering field. Within Cisco NX-OS, the auto derived Route-Target is constructed with the Autonomous System Number (ASN) as the 2-byte administrative field and the Service Identifier (VNI) for the 4-byte numbering field.

2-byte ASN

The Type 0 encoding allows a 2-byte administrative field and a 4-byte numbering field. Within Cisco NX-OS, the auto-derived Route-Target is constructed with the Autonomous System Number (ASN) as the 2-byte administrative filed and the Service Identifier (VNI) for the 4-byte numbering field.

Examples of an auto derived Route-Target (RT):

  • IP-VRF within ASN 65001 and L3VNI 50001 - Route-Target 65001:50001

  • MAC-VRF within ASN 65001 and L2VNI 30001 - Route-Target 65001:30001

For Multi-AS environments, the Route-Targets must either be statically defined or rewritten to match the ASN portion of the Route-Targets.

https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-x/command_references/configuration_commands/b_N9K_Config_Commands_703i7x/b_N9K_Config_Commands_703i7x_chapter_010010.html#wp4498893710

4-byte ASN

The Type 0 encoding allows a 2-byte administrative field and a 4-byte numbering field. Within Cisco NX-OS, the auto-derived Route-Target is constructed with the Autonomous System Number (ASN) as the 2-byte administrative filed and the Service Identifier (VNI) for the 4-byte numbering field. With the ASN demand of 4-byte length and the VNI requiring 24-bit (3-bytes), the Sub-Field length within the Extended Community is exhausted (2-byte Type and 6-byte Sub-Field). As a result of the length and format constraint and the importance of the Service Identifiers (VNI) uniqueness, the 4-byte ASN is represented in a 2-byte ASN named AS_TRANS, as described in IETF RFC 6793 section 9 (https://tools.ietf.org/html/rfc6793#section-9). The 2-byte ASN 23456 is registered by the IANA (https://www.iana.org/assignments/iana-as-numbers-special-registry/iana-as-numbers-special-registry.xhtml) as AS_TRANS, a special purpose AS number that aliases 4-byte ASNs.

Example auto derived Route-Target (RT) with 4-byte ASN (AS_TRANS):

  • IP-VRF within ASN 65656 and L3VNI 50001 - Route-Target 23456:50001

  • MAC-VRF within ASN 65656 and L2VNI 30001 - Route-Target 23456:30001


Note


Beginning with Cisco NX-OS Release 9.2(1), auto derived Route-Target for 4-byte ASN is supported.


Guidelines and Limitations for VXLAN BGP EVPN

VXLAN BGP EVPN has the following guidelines and limitations:

  • The following guidelines and limitations apply to VXLAN/VTEP using BGP EVPN:

    • SPAN source or destination is supported on any port.

    For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x).

  • When SVI is enabled on a VTEP (flood and learn, or EVPN) regardless of ARP suppression, make sure that ARP-ETHER TCAM is carved using the hardware access-list tcam region arp-ether 256 double-wide command. This requirement does not apply to Cisco Nexus 9300-FX/FX2/FX3 and 9300-GX platform switches and Cisco Nexus 9500 platform switches with X97160YC-EX and 9700-FX/FX3 line cards.

Configuration recommendations

  • In a VXLAN EVPN setup, border nodes must be configured with unique route distinguishers, preferably using the auto rd command. Not using unique route distinguishers across all border nodes is not supported. The use of unique route distinguishers is strongly recommended for all VTEPs of a fabric.

  • Mobility Sequence number of a locally originated type-2 route (MAC/MAC-IP) can be mismatched between vPC peers, with one vTEP having a sequence number K while other vTEP in the same complex can have the same route with sequence number 0. This does not cause any functional impact and the traffic is not impacted even after the host moves.

  • For SVI-related triggers (such as shut/unshut or PIM enable/disable), a 30-second delay was added, allowing the Multicast FIB (MFIB) Distribution module (MFDM) to clear the hardware table before toggling between L2 and L3 modes or vice versa.

  • The VXLAN network identifier (VNID) 16777215 is reserved and should explicitly not be configured.

  • Non-Disruptive In Service Software Upgrade (ND-ISSU) is supported on Nexus 9300 with VXLAN enabled. For more information, see Cisco Nexus 9000 and 3000 Upgrade and ISSU Matrix.

  • Beginning with Cisco NX-OS Release 10.5(2)F, Ingress Replication and Multicast Underlay are supported on Cisco Nexus 9500 Series switches with N9K-X9736C-FX3 line card.

  • You can configure EVPN over segment routing or MPLS. See the Cisco Nexus 9000 Series NX-OS Label Switching Configuration Guide, Release 9.3(x) for more information.

  • You can use MPLS tunnel encapsulation using the new CLI encapsulation mpls command. You can configure the label allocation mode for the EVPN address family. See the Cisco Nexus 9000 Series NX-OS Label Switching Configuration Guide, Release 9.3(x) for more information.

  • It is recommended to use the vpc orphan-ports suspend command for single attached and/or routed devices on a Cisco Nexus 9000 platform switch acting as vPC VTEP.

  • Cisco Nexus supports Type-6 EVPN routes (for IPv4) based on earlier version of draft-ietf-bess-evpn-igmp-mld-proxy draft, where SMET flag field is set as optional.

  • Routing protocol adjacencies using Anycast Gateway SVIs is not supported.

  • When running VXLAN EVPN, any SVI for a VLAN extended over VXLAN must be configured with Anycast Gateway. Any other mode of operation is not supported.

Supported platform and releases for VXLAN BGP EVPN

  • VXLAN BGP EVPN is supported on the following Cisco Nexus 9300-FX/GX/FX2/FX3 platform switches.

  • VXLAN BGP EVPN is supported on Cisco Nexus 9500 platform switches with X97160YC-EX and 9700-FX/GX/FX3 line cards.

  • For the Cisco Nexus 9504 and 9508 with R-series line cards, VXLAN EVPN (Layer 2 and Layer 3) is only supported with the 9636C-RX and 96136YC-R line cards.

  • Beginning with NX-OS version 9.3(3), the Cisco Nexus 9300-GX switch supports VXLAN BGP EVPN for Layer-2 and Layer-3 Services with both Ingress Replication and Multicast in the underlay.

  • Beginning with Cisco NX-OS Release 10.2(1q)F, VXLAN EVPN is supported on Cisco Nexus N9KC9332D-GX2B platform switches.

  • Beginning with Cisco NX-OS Release 10.2(3)F, VXLAN EVPN is supported on Cisco Nexus 9364D-GX2A, and 9348D-GX2A platform switches.

  • Beginning with Cisco NX-OS Release 10.4(1)F, VXLAN EVPN is supported on Cisco Nexus 9348GC-FX3, 9348GC-FX3PH, and 9332D-H2R switches.

  • Beginning with Cisco NX-OS Release 10.4(2)F, VXLAN EVPN is supported on Cisco Nexus 93400LD-H1 switches.

  • Beginning with Cisco NX-OS Release 10.4(3)F, VXLAN EVPN is supported on Cisco Nexus 9364C-H1 switches.

  • Beginning with Cisco NX-OS Release 10.5(2)F, VXLAN EVPN (Layer 2 and Layer 3) is supported on Cisco Nexus 9500 Series switches with N9K-X9736C-FX3 line card.

  • Beginning with Cisco NX-OS Release 10.5(3)F, Cisco Nexus 9364E-SG2 and 9364E-SG2-Q switches support VXLAN BGP EVPN based VTEP endpoint information distribution.

  • Beginning with Cisco NX-OS Release 10.6(1)F, VXLAN BGP EVPN (Layer 2 and Layer 3) is supported on Cisco Nexus 9336C-SE1 switches.

Unsupported features

  • DHCP snooping (Dynamic Host Configuration Protocol snooping) is not supported on VXLAN VLANs.

  • RACLs are not supported on VXLAN uplink interfaces. VACLs are not supported on VXLAN de-capsulated traffic in egress direction; this applies for the inner traffic coming from network (VXLAN) towards the access (Ethernet).

    As a best practice, always use PACLs/VACLs for the access (Ethernet) to the network (VXLAN) direction. See the Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.3(x) for other guidelines and limitations for the VXLAN ACL feature.

  • The Cisco Nexus 9000 QoS buffer-boost feature is not applicable for VXLAN traffic.

Scale


Note


For information about VXLAN BGP EVPN scalability, see the Cisco Nexus 9000 Series NX-OS Verified Scalability Guide.


  • In a VXLAN EVPN setup that has 2K VNI scale and 3900 new VNI scaleconfiguration, the control plane down time may take more than 200 seconds. To avoid potential BGP flap, extend the graceful restart time to 300 seconds.

  • Beginning with Cisco NX-OS Release 10.2(2)F, the following scale limits are enhanced — Layer 2 VNIs, Extended Layer 2 VNIs, Layer 3 VNIs, SVI with Distributed Anycast Gateway, IPv4 and IPv6 host routes in internet-peering mode and the ECMP paths. For the VXLAN scale limit information, see the Cisco Nexus 9000 Series NX-OS Verified Scalability Guide, Release 10.2(2)F.

ARP suppression

  • The command clear ip arp interface vrf vrf-name force-delete on specific interface normally deletes entries from ARP belonging to that interface and will relearn on traffic. However, when ARP for same IP is resolved on all ECMP paths, force-deleting ARP entry belonging to one of the ECMP interface will result in automatic relearning of that entry unless that link is down.

  • IP unnumbered in EVPN underlay supports ECMP. Multiple IP unnumbered links are connected back to back between same switches. ARP will be resolved on all connected interfaces, thus providing ECMP.

  • ARP suppression is only supported for a VNI if the VTEP hosts the First-Hop Gateway (Distributed Anycast Gateway) for this VNI. The VTEP and the SVI for this VLAN have to be properly configured for the distributed Anycast Gateway operation, for example, global Anycast Gateway MAC address configured and Anycast Gateway feature with the virtual IP address on the SVI.

  • The ARP suppression setting must match across the entire fabric. For a specific VNID, all VTEPs must be either configured or not configured.

  • Beginning with Cisco NX-OS Release 10.5(2)F, ARP suppression is supported on Cisco Nexus 9500 Series switches with N9K-X9736C-FX3 line card.

  • Beginning with Cisco NX-OS Release 10.6(1)F, ARP suppression is supported on Cisco Nexus 9336C-SE1 switches.

VXLAN BGP EVPN fabrics with eBGP

  • For VXLAN BGP EVPN fabrics with eBGP, the following recommendations are applicable:

    • It is recommended to use loopbacks for the eBGP EVPN peering sessions (overlay control-plane).

    • It is a best practice to use the physical interfaces for eBGP IPv4/IPv6 peering sessions (underlay).

  • Only eBGP peering between a VTEP and external nodes (Edge Router, Core Router or VNF) is supported.

    • eBGP peering from the VTEP to the external node using a physical interface or subinterfaces is recommended and it is a best practice (external connectivity).

    • The eBGP peering from the VTEP to the external node can be in the default VRF or in a tenant VRF (external connectivity).

    • The eBGP peering from the VTEP to a external node over VXLAN must be in a tenant VRF and must use the update-source of a loopback interface (peering over VXLAN).

    • Using an SVI for eBGP peering from the VTEP to the External Node requires the VLAN to be local (not VXLAN extended).

NVE interface

  • Bind the NVE source-interface to a dedicated loopback interface and do not share this loopback with any function or peerings of Layer-3 protocols. A best practice is to use a dedicated loopback address for the VXLAN VTEP function.

  • You must bind NVE to a loopback address that is separate from other loopback addresses that are required by Layer 3 protocols. NVE and other Layer 3 protocols using the same loopback is not supported.

  • The NVE source-interface loopback is required to be present in the default VRF.

  • During the vPC Border Gateway boot up process the NVE source loopback interface undergoes the hold down timer twice instead of just once. This is a day-1 and expected behavior.

  • The value of the delay timer on NVE interface must be configured to a value that is less than the multi-site delay-restore timer.

Supported Templates

  • When configuring VXLAN BGP EVPN, only the "System Routing Mode: Default" is applicable for the following hardware platforms:

    • Cisco Nexus 9300 platform switches

    • Cisco Nexus 9300-FX/FX2/FX3 platform switches

    • Cisco Nexus 9300-GX/GX2/H2R/H1 platform switches

    • Cisco Nexus 9500 platform switches with X97160YC-EX andX9700-FX/GX/FX3 line cards

  • Changing the “System Routing Mode” requires a reload of the switch.

VXLAN uplinks

  • Starting from Cisco NX-OS Release 9.3(5), new VXLAN uplink capabilities are introduced:

    • A physical interface in default VRF is supported as VXLAN uplink.

    • A parent interface in default VRF, carrying subinterfaces with VRF and dot1q tags, is supported as VXLAN uplink.

    • A subinterface in any VRF and/or with dot1q tag remains not supported as VXLAN uplink.

    • An SVI in any VRF remains not supported as VXLAN uplink.

    • In vPC with physical peer-link, a SVI can be leveraged as backup underlay, default VRF only between the vPC members (infra-VLAN, system nve infra-vlans).

    • On a vPC pair, shutting down NVE or NVE loopback on one of the vPC nodes is not a supported configuration. This means that traffic failover on one-side NVE shut or one-side loopback shut is not supported.

    • FEX host interfaces remain not supported as VXLAN uplink and cannot have VTEPs connected (BUD node).

  • You need to configure the VXLAN uplink with ip unreachables in order to enable Path maximum transmission unit (MTU) discovery (PMTUD) in a VXLAN set up. PMTUD prevents fragmentation in the path between two endpoints by dynamically determining the lowest MTU along the path from the packet's source to its destination.

  • Cisco Nexus 9500 platform switches with 9700-FX or -GX or -FX3 line cards support 1G, 10G, 25G, 40G, 100G and 400G for VXLAN uplinks.

  • Cisco Nexus 9300-FX/FX2/FX3 and -GX support 1G, 10G, 25G, 40G, 100G and 400G for VXLAN uplinks.

  • Beginning with Cisco NX-OS Release 10.2(3)F, Cisco Nexus 9300-GX2 platform switches support 10G, 25G, 40G, 100G and 400G for VXLAN uplinks.

  • Beginning with Cisco NX-OS Release 10.4(1)F, Cisco Nexus 9332D-H2R switches support 10G, 25G, 40G, 100G and 400G for VXLAN uplinks.

  • Beginning with Cisco NX-OS Release 10.4(2)F, Cisco Nexus 93400LD-H1 switches support 10G, 25G, 40G, 100G and 400G for VXLAN uplinks.

  • Beginning with Cisco NX-OS Release 10.4(3)F, Cisco Nexus 9364C-H1 switches support 10G, 25G, 40G, 100G and 400G for VXLAN uplinks.

  • Beginning with Cisco NX-OS Release 10.6(1)F, Cisco Nexus 9336C-SE1 switches supports these uplinks:

    • Only Ethernet Port-channel routed interfaces are supported as uplinks.

    • SVI or L3-subinterfaces as uplinks are not supported

UDP port

  • The Cisco Nexus 9000 platform switches use standards conforming UDP port number 4789 for VXLAN encapsulation. This value is not configurable.

Gateway functionality

  • Gateway functionality for VXLAN to MPLS (LDP), VXLAN to MPLS-SR (Segment Routing) and VXLAN to SRv6 can be operated on the same Cisco Nexus 9000 Series platform.

    • VXLAN to MPLS (LDP) Gateway is supported on the Cisco Nexus 3600-R and the Cisco Nexus 9500 with R-Series line cards.

    • VXLAN to MPLS-SR Gateway is supported on the Cisco Nexus 9300-FX2/FX3/GX and Cisco Nexus 9500 with R-Series line cards.

    • Beginning with Cisco NX-OS Release 10.2(3)F, VXLAN to MPLS-SR Gateway is supported on the Cisco Nexus 9300-GX2 platform switches.

    • Beginning with Cisco NX-OS Release 10.4(1)F, VXLAN to MPLS-SR Gateway is supported on the Cisco Nexus 9332D-H2R switches.

    • Beginning with Cisco NX-OS Release 10.4(2)F, VXLAN to MPLS-SR Gateway is supported on the Cisco Nexus 93400LD-H1 switches.

    • Beginning with Cisco NX-OS Release 10.4(3)F, VXLAN to MPLS-SR Gateway is supported on the Cisco Nexus 9364C-H1 switches.

  • VXLAN to SRv6 is supported on the Cisco Nexus 9300-GX platform.

  • Beginning with Cisco NX-OS Release 10.2(3)F, VXLAN to SRv6 is supported on the Cisco Nexus 9300-GX2 platform switches.

  • Beginning with Cisco NX-OS Release 10.4(1)F, VXLAN to SRv6 is supported on the Cisco Nexus 9332D-H2R switches.

  • Beginning with Cisco NX-OS Release 10.4(2)F, VXLAN to SRv6 is supported on the Cisco Nexus 93400LD-H1 switches.

  • Beginning with Cisco NX-OS Release 10.4(3)F, VXLAN to SRv6 is supported on the Cisco Nexus 9364C-H1 switches.

VXLAN and GRE co-existence

  • Beginning with Cisco NX-OS Release 10.2(3)F, VXLAN and GRE co-existence is supported on Cisco Nexus 9300-FX/FX2/FX3/GX/GX2 switches, and N9K-C93108TC-FX3P, N9K-C93180YC-FX3, N9K-X9716D-GX switches. Only GRE RX path (decapsulation) is supported. GRE TX path (encapsulation) is not supported.

  • Beginning with Cisco NX-OS Release 10.4(1)F, VXLAN and GRE co-existence is supported on Cisco Nexus 9332D-H2R switches. Only GRE RX path (decapsulation) is supported. GRE TX path (encapsulation) is not supported.

  • Beginning with Cisco NX-OS Release 10.4(2)F, VXLAN and GRE co-existence is supported on Cisco Nexus 93400LD-H1 switches. Only GRE RX path (decapsulation) is supported. GRE TX path (encapsulation) is not supported.

  • Beginning with Cisco NX-OS Release 10.4(3)F, VXLAN and GRE co-existence is supported on Cisco Nexus 9364C-H1 switches. Only GRE RX path (decapsulation) is supported. GRE TX path (encapsulation) is not supported.

  • Beginning with Cisco NX-OS Release 10.5(2)F, VXLAN and GRE co-existence is supported on Cisco Nexus 9500 Series switches with N9K-X9736C-FX3 line card.

ECMP resilient hashing

  • Resilient hashing is supported on the following switch platform with a VXLAN VTEP configured:

    • Cisco Nexus 9300-FX/FX2/FX3/GX support ECMP resilient hashing.

    • Cisco Nexus 9300 with ALE uplink ports does not support resilient hashing.


    Note


    Resilient hashing is disabled by default.


  • Beginning with Cisco NX-OS Release 10.2(3)F, the ECMP resilient hashing is supported on the Cisco Nexus 9300-GX2 platform switches.

  • Beginning with Cisco NX-OS Release 10.4(1)F, the ECMP resilient hashing is supported on the Cisco Nexus 9300-H2R platform switches.

  • Beginning with Cisco NX-OS Release 10.4(2)F, the ECMP resilient hashing is supported on the Cisco Nexus 93400LD-H1 platform switches.

  • Beginning with Cisco NX-OS Release 10.4(3)F, the ECMP resilient hashing is supported on the Cisco Nexus 9364C-H1 switches.

ECMP

Static MAC support on BGP EVPN

  • Beginning with Cisco NX-OS Release 10.3(2)F, Static MAC for BGP EVPN is supported on Cisco Nexus 9300-FX/FXP/FX2/FX3/GX/GX2 Series switches.

  • Beginning with Cisco NX-OS Release 10.4(1)F, Static MAC for BGP EVPN is supported on Cisco Nexus 9300-H2R series switches.

  • Beginning with Cisco NX-OS Release 10.4(2)F, Static MAC for BGP EVPN is supported on Cisco Nexus 93400LD-H1 series switches.

  • Beginning with Cisco NX-OS Release 10.4(3)F, Static MAC for BGP EVPN is supported on Cisco Nexus 9364C-H1 switches.

  • The mac address-table static mac-address vlan vlan-id {[drop | interface {type slot/port} | port-channel number]} command is supported on BGP EVPN.

About VXLAN EVPN with Downstream VNI

Cisco NX-OS Release 9.3(5) introduces VXLAN EVPN with downstream VNI. In earlier releases, the VNI configuration must be consistent across all nodes in the VXLAN EVPN network in order to enable communication between them.

VXLAN EVPN with downstream VNI provides the following solutions:

  • Enables asymmetric VNI communication across nodes in a VXLAN EVPN network

  • Provides customers access to a common shared service outside of their domain (tenant VRF)

  • Supports communication between isolated VXLAN EVPN sites that have different sets of VNIs

Asymmetric VNIs

VXLAN EVPN with downstream VNI supports asymmetric VNI allocation.

The following figure shows an example of asymmetric VNIs. All three VTEPs have different VNIs configured for the same IP VRF or MAC VRF.

Figure 1. Asymmetric VNIs

Shared Services VRFs

VXLAN EVPN with downstream VNI supports shared services VRFs. It does so by importing multiple L3VRFs into a single local L3VRF and supporting disparate values of downstream L3VNIs on a per-peer basis.

For example, a DNS server needs to serve multiple hosts in a data center regardless of the tenant VRFs on which the hosts sit. The DNS server is attached to a shared services VRF, which is attached to an L3VNI. To access this server from any of the tenant VRFs, the switches must import the routes from the shared services VRF to the tenant VRF, even though the L3VNI associated to the shared services VRF is different from the L3VNI associated to the tenant VRF.

In the following figure, Tenant VRF A in Leaf-1 can communicate with Tenant VRF A in Leaf-2. However, Tenant VRF A requires access to a shared service sitting behind Leaf-3.

Figure 2. Shared Services VRFs

Multi-Site with Asymmetric VNIs

VXLAN EVPN with downstream VNI allows communication between sites that have different sets of VNIs. It does so by stitching the asymmetric VNIs at the border gateways.

In the following figure, DC-1 and DC-2 are asymmetric sites, and DC-3 is a symmetric site. Each site uses different VNIs within its site to communicate.

Figure 3. Multi-Site with Asymmetric VNIs

Guidelines and Limitations for VXLAN EVPN with Downstream VNI

VXLAN EVPN with downstream VNI has the following guidelines and limitations:

  • Cisco Nexus 9300-FX/FX2/FXP platform switches and Cisco Nexus 9500 platform switches with -FX/FX3 line cards support VXLAN EVPN with downstream VNI.

  • Beginning with Cisco NX-OS Release 9.3(7), Cisco Nexus 9300-GX platform switches support VXLAN EVPN with downstream VNI.

  • Beginning with Cisco NX-OS Release 10.2(3)F, the VXLAN EVPN with downstream VNI is supported on the Cisco Nexus 9300-FX3/GX2 platform switches.

  • Beginning with Cisco NX-OS Release 10.4(1)F, the VXLAN EVPN with downstream VNI is supported on the Cisco Nexus 9332D-H2R switches.

  • Beginning with Cisco NX-OS Release 10.4(2)F, the VXLAN EVPN with downstream VNI is supported on the Cisco Nexus 93400LD-H1 switches.

  • Beginning with Cisco NX-OS Release 10.4(3)F, the VXLAN EVPN with downstream VNI is supported on the Cisco Nexus 9364C-H1 switches.

  • Beginning with Cisco NX-OS Release 10.5(2)F, VXLAN EVPN with downstream VNI is supported on IPv6 underlay on Cisco Nexus 9300-FX, FX2, FX3, GX, GX2, H2R, H1 Series switches and 9500 Series switches with 9700-FX, FX3, and GX line cards.

  • Beginning with Cisco NX-OS Release 10.5(3)F, downstream VNI feature with VXLAN EVPN IPv4 underlay is supported on Cisco Nexus 9800 series switches acting as anycast BGW.

  • Downstream VNI is configured based on route-target export and import. The following conditions must be met to leverage Downstream VNI:

    • Downstream VNI requires the usage of different VRF (MAC-VRF or IP-VRF), each VRF must have a different VNI (Asymmetric VNI).

    • To import routes of a foreign VRF (MAC-VRF or IP-VRF) the appropriate route-target for the import into the local VRF must be configured.

    • The configuration of only auto-derived route-targets will not result in downstream VNI.

    • The export of VRF prefixes can be done by static or auto-derived route-target configuration.

    • The import of a foreign VRF's auto-derived route-target is supported.

    • The import of a foreign VRFs statically configured route-target is supported.

  • Downstream VNI is supported for the following underlay constellations:

    • For downstream VNI with Layer-3 VNI, the underlay can be ingress replication or multicast based.

    • For downstream VNI with Layer-2 VNI, the underlay must be in ingress replication. Multicast based underlay is not supported with downstream VNI of Layer-2 VNIs.

  • Downstream VNI requires to have consistent configuration:

    • All multi-site Border Gateway (BGW) in a site must have a consistent configuration.

    • All vPC members in a vPC domain must have consistent configuration.

  • The usage of downstream VNI with multi-site requires all BGW across all sites to run at least Cisco NX-OS Release 9.3(5).

  • For existing centralized VRF route leaking deployments, a brief traffic loss might occur during ISSU to Cisco NX-OS Release 9.3(5) or later.

  • For successful downgrade from Cisco NX-OS Release 9.3(5) to a prior release, ensure that the asymmetric VNI configuration has been removed. Downstream VNI is not supported before Cisco NX-OS Release 9.3(5) and hence traffic forwarding would be impacted.

  • For successful downgrade from Cisco NX-OS Release 10.5(2)F to a prior release, ensure that the IPv6 underlay with downstream VNI configuration is removed, otherwise traffic forwarding may be impacted.

  • Layer-3 VNIs (IP-VRF) can flexibly mapped between VNIs per peer.

    • VNI 50001 on VTEP1 can perform symmetric VNI with VNI 50001 and asymmetric VNI with VNI 50002 on VTEP2 at the same time.

    • VNI 50001 on VTEP1 can perform asymmetric VNI with VNI 50002 on VTEP2 and VNI 50003 on VTEP3.

    • VNI 50001 on VTEP1 can perform asymmetric VNI with VNI 50002 and VNI5003 on VTEP2 at the same time.

  • Layer-2 VNIs (MAC-VRF) can only be mapped to one VNI per peer.

    • VNI 30001 on VTEP1 can perform asymmetric VNI with VNI 30002 on VTEP2 and VNI 30003 on VTEP3.

    • VNI 30001 on VTEP1 cannot perform asymmetric VNI with VNI 30002 and VNI 3003 on VTEP2 at the same time.

  • iBGP sessions between vPC peer nodes in a VRF are not supported.

  • BGP peering across VXLAN and Downstream VNI support the following constellations:

    • BGP peering between symmetric VNI is supported by using loopbacks.

    • BGP peering between asymmetric VNI is supported if the VNIs are in a direct message relationship. A loopback from VNI 50001 (on VTEP1) can peer with a loopback in VNI 50002 (on VTEP2).

    • BGP peering between asymmetric VNI is supported if the VNIs are in a direct message relationship but on different VTEPs. A loopback from VNI 50001 (on VTEP1) can peer with a loopback in VNI 50002 (on VTEP2 and VTEP3).

    • BGP peering between asymmetric VNI is not supported if the VNIs are in a 1:N relationship. A loopback in VNI 50001 (VTEP1) can’t peer with a loopback in VNI 50002 (VTEP2) and VNI 50003 (VTEP3) at the same time.

  • VXLAN consistency checker is not supported for VXLAN EVPN with downstream VNI.

  • VXLAN EVPN with downstream VNI is currently not supported with the following feature combinations:

    • VXLAN static tunnels

    • TRM and TRM with Multi-Site

    • ESI-based multihoming

    • Seamless integration of EVPN with L3VPN (MPLS SR)

    • VXLAN policy-based routing (PBR)

    • IPv6 Underlay

  • Beginning with Cisco NX-OS Release 10.5(3)F, downstream VNI is supported with CloudSec VXLAN EVPN Tunnel Encryption on Cisco Nexus 9300-FX/FX2/FX3/GX/GX2/H2R/H1 Series switches and 9500 Series switches with 9700-FX/GX/FX3 line cards.

  • Make sure that you configure L2VNI SVI on Anycast BGW to enable DSVNI MAC-IP Layer 3 label translation in a multisite environment. The functionality of DSVNI is limited for reoriginated routes, which requires as association between L2VNI and VRF. You can associate using the VRF member command in L2VNI SVI.

  • Beginning with Cisco NX-OS Release 10.5(3)F, the DSVNI feature is enhanced with the introduction of the new associate-vrf vrf-name command, which explicitly maps a Layer 2 VLAN to a VRF, eliminating the need for SVI configuration on the BGW. For more information on the command usage, see Associating VLAN to VRF - L2 to L3 Mapping

    This feature enhancement is supported on Cisco Nexus 9300-FX/FX2/FX3/GX/GX2/H2R/H1 Series switches, 9800 Series switches, and 9500 Series switches with 9700-FX/GX/FX3 line cards.

    Beginning with Cisco NX-OS Release 10.6(1)F, this feature is supported on Cisco Nexus Nexus 9336C-SE1 switches.

Configuring VXLAN BGP EVPN

Enabling VXLAN

Enable VXLAN and the EVPN.

SUMMARY STEPS

  1. feature vn-segment
  2. feature nv overlay
  3. feature vn-segment-vlan-based
  4. feature interface-vlan
  5. nv overlay evpn

DETAILED STEPS

  Command or Action Purpose

Step 1

feature vn-segment

Enable VLAN-based VXLAN

Step 2

feature nv overlay

Enable VXLAN

Step 3

feature vn-segment-vlan-based

Enable VN-Segment for VLANs.

Step 4

feature interface-vlan

Enable Switch Virtual Interface (SVI).

Step 5

nv overlay evpn

Enable the EVPN control plane for VXLAN.

Configuring VLAN and VXLAN VNI


Note


Step 3 to Step 6 are optional for configuring the VLAN for VXLAN VNI and are only necessary in case of a custom route distinguisher or route-target requirement (not using auto derivation).


SUMMARY STEPS

  1. vlan number
  2. vn-segment number
  3. evpn
  4. vni number l2
  5. rd auto
  6. route-target both {auto | rt}

DETAILED STEPS

  Command or Action Purpose

Step 1

vlan number

Specify VLAN.

Step 2

vn-segment number

Map VLAN to VXLAN VNI to configure Layer 2 VNI under VXLAN VLAN.

Step 3

evpn

Enter EVI (EVPN Virtual Instance) configuration mode.

Step 4

vni number l2

Specify the Service Instance (VNI) for the EVI.

Step 5

rd auto

Specify the MAC-VRF's route distinguisher (RD).

Step 6

route-target both {auto | rt}

Configure the route target (RT) for import and export of MAC prefixes. The RT is used for a per-MAC-VRF prefix import/export policy. If you enter an RT, the following formats are supported: ASN2:NN, ASN4:NN, or IPV4:NN.

Note

 

Specifying the auto option is applicable only for IBGP.

Manually configured route targets are required for EBGP and for asymmetric VNIs.

Configuring New L3VNI Mode

Guidelines and Limitations for New L3VNI Mode

New L3VNI mode has the following configuration guidelines and limitations:

  • Beginning with Cisco NX-OS Release 10.2(3)F, the new L3VNI mode is supported on Cisco Nexus 9300-X Cloud Scale Switches.

  • interface vni config is optional (not needed if the PBR/NAT feature is not required).

  • VRF-VNI-L3 new configuration will implicitly create the L3VNI interface. By default, it will not show up in the show running command.


    Note


    Ensure that VRF-VNI-L3 is configured before configuring interface vni.


  • Following configuration are allowed on interface vni:

    • PBR/NAT

    • no interface vni

    • default interface vni (will remove PBR/NAT configuration if present)

  • The shut/no shut command is not allowed on interface vni. Performing shut/no shut command on VRF performs shut/no shut on L3VNI.

  • Performing no feature nv overlay with the new L3VNI configuration removes all vrf-vni-l3 config under VRF and cleanup the PBR/NAT configuration, if present. Any existing VRF configuration will not be removed.

  • VNI Configuration has the following guidelines and limitations:

    • Both old and new L3VNI mode configuration can coexist on the same switch.

    • For the VPC/VMCT system, same VNI config mode should be consistent across peers.

    • Post upgrade, the old L3VNI configuration holds good.

    • Beginning with Cisco NX-OS Release 10.3(1)F, TRM support for the new L3VNI is provided on Cisco Nexus 9300-X Cloud Scale Switches.

    • Config-replace and rollback are supported.

    • ISSU (ND) is supported for the new L3VNI.

  • PBR/NAT configuration on the new L3VNI has the following guidelines and limitations:

    • NAT configuration can be applied on the new interface vni.

    • PBR encap side policy is still configured on encap node interface SVI as existing.

    • PBR decap side policy for the new L3VNI now applies on interface vni for the corresponding L3VNI.

    • PBR config syntax on the new L3VNI is similar to SVI interface.

    • The no interface vni removes the PBR/NAT config first and then remove the interface vni.

    • The no interface vni will only remove the CLI from config, as long as VRF-VNI-L3 config is still present, the interface vni is still present at the back-end.

  • The following features are supported on the new L3VNI mode:

    • Leaf/VTEP features which use L3VNIs

      • VxLAN EVPN

        • IR and multicast.

        • IGMP Snooping

        • vPC

        • Distributed Anycast Gateway

      • MCT-less vPC

      • VxLAN Multisite

        • Cover all existing scenarios with Border Leaf, Border Spine and multi-site Border Gateway

        • Anycast BGW and vPC BGW

      • DSVNI

      • VxLAN NGOAM

    • VXLAN supported features: PBR, NAT, and QoS

    • VXLAN access features (QinVNI, SQinVNI, NIA, BUD-Node etc.)

    • 4K scale L2VNI for VXLAN Port VLAN-Mapping VXLAN feature.

  • Migration of L3VNI configuration has the following guidelines and limitations:

    • To migrate the L3VNI configuration from old to new, perform the following steps:

      1. Remove the VLAN, vlan-vnsegment and SVI configuration..

      2. Retain Interface nve1 member-vni-associate configuration.

      3. Add new VRF-VNI-L3 configuration. For more information, refer to Configuring New L3VNI Mode.

    • To migrate the L3VNI configuration from new to old, perform the following steps:

      1. Remove new VRF-VNI-L3 configuration.

      2. Create VLAN and vlan-vnsegment configuration.

      3. Retain Interface nve1 member-vni-associate configuration.

      4. Create SVI configuration for the L3VNI.

      5. Add member-vni under VRF configuration.

  • Upgrade and Downgrade have the following guidelines and limitations:

    • Upgrade:

      • The existing L3VNI configuration remains unchanged and continues to function properly.

      • You can configure additional L3VNIs with the new keyword L3 without VLAN association.

      • You can choose to migrate the existing L3VNI config one by one to the new L3VNI without VLAN association.

      • If needed, you can revert from new L3VNI config to old L3VNI config (with VLAN association).

      • ND ISSU is supported for new L3VNI future releases.

    • Downgrade:

      • If the new L3 VNI is configured, check and disable the new L3VNI configuration before performing downgrade.

      • Downgrade will be allowed only after removing all new L3VNI configuration.

Configuring New L3VNI Mode

This procedure enables the new L3VNI mode on the switch:

SUMMARY STEPS

  1. configure terminal
  2. vrf context vrf-name
  3. vni number l3
  4. member vni vni id associate-vrf
  5. (Optional) {ip | ipv6} policy route-map map-name
  6. (Optional) ip nat outside

DETAILED STEPS

  Command or Action Purpose

Step 1

configure terminal

Example:
switch# configure terminal
switch(config)#

Enters global configuration mode.

Step 2

vrf context vrf-name

Example:
switch(config)# vrf context vxlan-501

Configures the VRF.

Step 3

vni number l3

Example:
switch(config)# vni 500001  L3

Specifies the VNI.

L3 is the new keyword which indicates the new L3VNI mode.

Step 4

member vni vni id associate-vrf

Example:
switch(config)# interface nve1
switch(config-intf)# no shutdown
switch(config-intf)# member vni 500001 associate-vrf

Associates L3VNI to VRF.

Step 5

(Optional) {ip | ipv6} policy route-map map-name

Example:
switch(config)# interface vni 500001
Example:
For IPv4
switch(config-intf)# ip policy route-map IPV4_PBR_Appgroup
Example:
For IPv6
switch(config-intf)# ipv6 policy route-map IPV6_PBR_Appgroup
(Optional)

Assigns a route map for IPv4 or IPv6 policy-based routing to L3VNI interface.

Step 6

(Optional) ip nat outside

Example:
switch(config)# interface vni 500001
switch(config-intf)# ip nat outside
(Optional)

Assigns a route map for NAT to L3VNI interface.

Verifying New L3VNI Mode Configuration

To display the new L3VNI mode configuration information, perform the following task:

Command

Purpose

Show nve vni

Displays corresponding new l3vni state

Configuring VRF for VXLAN Routing

Configure the tenant VRF.


Note


Step 3 to step 6 are optional for configuring the VRF for VXLAN Routing and are only necessary in case of a custom route distinguisher or route-target requirement (not using auto derivation).


SUMMARY STEPS

  1. vrf context vrf-name
  2. vni number
  3. rd auto
  4. address-family {ipv4 | ipv6} unicast
  5. route-target both {auto | rt}
  6. route-target both {auto | rt} evpn

DETAILED STEPS

  Command or Action Purpose

Step 1

vrf context vrf-name

Configure the VRF.

Step 2

vni number

Specify the VNI.

Step 3

rd auto

Specify the IP-VRF's route distinguisher (RD).

Step 4

address-family {ipv4 | ipv6} unicast

Configure the IPv4 or IPv6 unicast address family.

Step 5

route-target both {auto | rt}

Configure the route target (RT) for import and export of IPv4 or IPv6 prefixes. The RT is used for a per-IP-VRF prefix import/export policy. If you enter an RT, the following formats are supported: ASN2:NN, ASN4:NN, or IPV4:NN.

Note

 

Specifying the auto option is applicable only for IBGP.

Manually configured route targets are required for EBGP and for asymmetric VNIs.

Step 6

route-target both {auto | rt} evpn

Configure the route target (RT) for import and export of IPv4 or IPv6 prefixes. The RT is used for a per-VRF prefix import/export policy. If you enter an RT, the following formats are supported: ASN2:NN, ASN4:NN, or IPV4:NN.

Note

 

Specifying the auto option is applicable only for IBGP.

Manually configured route targets are required for EBGP and for asymmetric VNIs.

Configuring VXLAN UDP Source Port

Configure the VXLAN UDP source port.

SUMMARY STEPS

  1. [no] vxlan udp src-port [high | rfc | low]

DETAILED STEPS

Command or Action Purpose

[no] vxlan udp src-port [high | rfc | low]

Allows to select the VXLAN UDP source port number range for VXLAN encapsulated packets.

high : This option sets the port number range to 0x8000-0xFFFF.

rfc : Beginning with Cisco NX-OS Release 10.4(1)F, the rfc option is provided to set the port number range to 0xC000-0xFFFF.

Note

 

The rfc option is available only on Cisco Nexus 9332D-H2R, 9364C-H1, and 93400LD-H1 switches.

low : Beginning with Cisco NX-OS Release 10.4(1)F, the low option is provided to set the port number range to default value (1024 to 32K-1). This is the default option. The no form of the high and rfc command is equivalent to the low command.

Note

 

The low option is available on all Cisco Nexus 9000 Series platform switches.

Configuring SVI for Core-facing VXLAN Routing

Configure the core-facing SVI VRF.

SUMMARY STEPS

  1. vlan number
  2. vn-segment number
  3. interface vlan-number
  4. mtu number
  5. vrf member vrf-name
  6. no {ip |ipv6} redirects
  7. ip forward
  8. ipv6 address use-link-local-only

DETAILED STEPS

  Command or Action Purpose

Step 1

vlan number

Specify VLAN.

Step 2

vn-segment number

Map VLAN to VXLAN VNI to configure Layer 3 VNI under VXLAN VLAN.

Step 3

interface vlan-number

Specify VLAN interface.

Step 4

mtu number

MTU size in bytes <68-9216>.

Step 5

vrf member vrf-name

Assign to VRF.

Step 6

no {ip |ipv6} redirects

Disable sending IP redirect messages for IPv4 and IPv6.

Step 7

ip forward

Enable IPv4 based lookup even when the interface VLAN has no IP address defined.

Step 8

ipv6 address use-link-local-only

Enable IPv6 forwarding.

Note

 

The IPv6 address use-link-local-only serves the same purpose as ip forward for IPv4. It enables the switch to perform an IP based lookup even when the interface VLAN has no IP address defined under it.

Configuring SVI for Host-Facing VXLAN Routing

Configure the SVI for hosts, acting as Distributed Default Gateway.

SUMMARY STEPS

  1. fabric forwarding anycast-gateway-mac address
  2. vlan number
  3. vn-segment number
  4. interface vlan-number
  5. vrf member vrf-name
  6. ip address address
  7. fabric forwarding mode anycast-gateway

DETAILED STEPS

  Command or Action Purpose

Step 1

fabric forwarding anycast-gateway-mac address

Configure distributed gateway virtual MAC address.

Note

 

One virtual MAC per VTEP.

Note

 

All VTEPs should have the same virtual MAC address.

Step 2

vlan number

Specify VLAN.

Step 3

vn-segment number

Specify vn-segment.

Step 4

interface vlan-number

Specify VLAN interface.

Step 5

vrf member vrf-name

Assign to VRF.

Step 6

ip address address

Specify IP address.

Step 7

fabric forwarding mode anycast-gateway

Associate SVI with anycast gateway under VLAN configuration mode.

Configuring the NVE Interface and VNIs Using Multicast

SUMMARY STEPS

  1. interface nve-interface
  2. source-interface loopback1
  3. host-reachability protocol bgp
  4. global mcast-group ip-address {L2 | L3}
  5. member vni vni
  6. mcast-group ip address
  7. member vni vni associate-vrf
  8. mcast-group address

DETAILED STEPS

  Command or Action Purpose

Step 1

interface nve-interface

Configure the NVE interface.

Step 2

source-interface loopback1

Binds the NVE source-interface to a dedicated loopback interface.

Step 3

host-reachability protocol bgp

This defines BGP as the mechanism for host reachability advertisement

Step 4

global mcast-group ip-address {L2 | L3}

Configures the mcast group globally (for all VNI) on a per-NVE interface basis. This applies and gets inherited s to all Layer 2 or Layer 3 VNIs.

Note

 

Layer3 macst group is only used for Tenant Routed Multicast (TRM).

Step 5

member vni vni

Add Layer 2 VNIs to the tunnel interface.

Step 6

mcast-group ip address

Configure the mcast group on a per-VNI basis. Add Layer 2 VNI specific mcast group and override the global set configuration.

Note

 

Instead of a mcast group, ingress replication can be configured.

Step 7

member vni vni associate-vrf

Add Layer-3 VNIs, one per tenant VRF, to the overlay.

Note

 

Required for VXLAN routing only.

Step 8

mcast-group address

Configure the mcast group on a per-VNI basis. Add Layer 3 VNI specific mcast group and override the global set configuration.

Configuring the Delay Timer on NVE Interface

Configuring the delay timer on NVE interface allows BGP to delay the fabric route advertisement to VRF peers and VRF peer routes to fabric so that there are no transient traffic drops seen when border leaf nodes come up after a switch reload. Configure this timer on NX-OS border leaf and AnyCast border gateway.

The value of the delay timer on NVE interface depends on the scale values of NVE peers, VNIs, routes, and so on. To find the timer value to be configured, find the time it took to program the last NVE peer after reload and add buffer time of 100 seconds to it. This buffer time also provides time for route-advertisement. Use the show forwarding internal trace nve-peer-history command to display the time stamp of each NVE peer installed.

Also, convergence will not be improved for fabric isolation on NX-OS border leaf even when this timer is configured.

SUMMARY STEPS

  1. configure terminal
  2. interface nve nve-interface
  3. fabric-ready time seconds
  4. show nve interface nve1 detail

DETAILED STEPS

  Command or Action Purpose

Step 1

configure terminal

Enters global configuration mode.

Step 2

interface nve nve-interface

Configures the NVE interface.

Step 3

fabric-ready time seconds

Specifies the delay timer value for NVE interface. The default value is 135 seconds.

Step 4

show nve interface nve1 detail

Displays the configured timer value.

Configuring VXLAN EVPN Ingress Replication

For VXLAN EVPN ingress replication, the VXLAN VTEP uses a list of IP addresses of other VTEPs in the network to send BUM (broadcast, unknown unicast and multicast) traffic. These IP addresses are exchanged between VTEPs through the BGP EVPN control plane.


Note


VXLAN EVPN ingress replication is supported on:

  • Cisco Nexus Series 9300 Series switches (7.0(3)I1(2) and later).

  • Cisco Nexus Series 9500 Series switches (7.0(3)I2(1) and later).


Before you begin: The following are required before configuring VXLAN EVPN ingress replication (7.0(3)I1(2) and later):

  • Enable VXLAN.

  • Configure VLAN and VXLAN VNI.

  • Configure BGP on the VTEP.

  • Configure RD and Route Targets for VXLAN Bridging.

SUMMARY STEPS

  1. interface nve-interface
  2. host-reachability protocol bgp
  3. global ingress-replication protocol bgp
  4. member vni vni associate-vrf
  5. member vni vni
  6. ingress-replication protocol bgp

DETAILED STEPS

  Command or Action Purpose

Step 1

interface nve-interface

Configure the NVE interface.

Step 2

host-reachability protocol bgp

This defines BGP as the mechanism for host reachability advertisement.

Step 3

global ingress-replication protocol bgp

Enables globally (for all VNI) the VTEP to exchange local and remote VTEP IP addresses on the VNI in order to create the ingress replication list. This enables sending and receiving BUM traffic for the VNI.

Note

 

Using ingress-replication protocol bgp avoids the need for any multicast configurations that might have been required for configuring the underlay.

Step 4

member vni vni associate-vrf

Add Layer-3 VNIs, one per tenant VRF, to the overlay.

Note

 

Required for VXLAN routing only.

Step 5

member vni vni

Add Layer 2 VNIs to the tunnel interface.

Step 6

ingress-replication protocol bgp

Enables the VTEP to exchange local and remote VTEP IP addresses on a oer VNI basis in order to create the ingress replication list. This enables sending and receiving BUM traffic for the VNI and override the global configuration.

Note

 

Instead of a ingress replication, mcast group can be configured.

Note

 

Using ingress-replication protocol bgp avoids the need for any multicast configurations that might have been required for configuring the underlay.

Configuring BGP on the VTEP

SUMMARY STEPS

  1. router bgp number
  2. router-id address
  3. neighbor address remote-as number
  4. address-family l2vpn evpn
  5. (Optional) Allowas-in
  6. send-community extended
  7. vrf vrf-name
  8. address-family ipv4 unicast
  9. maximum-paths path {ibgp}
  10. address-family ipv6 unicast
  11. maximum-paths path {ibgp}

DETAILED STEPS

  Command or Action Purpose

Step 1

router bgp number

Configure BGP.

Step 2

router-id address

Specify router address.

Step 3

neighbor address remote-as number

Define MPBGP neighbors. Under each neighbor define L2VPN EVPN.

Step 4

address-family l2vpn evpn

Configure address family Layer 2 VPN EVPN under the BGP neighbor.

Note

 

Address-family IPv4 EVPN for VXLAN host-based routing

Step 5

(Optional) Allowas-in

(Optional)

Only for EBGP deployment cases: Allows duplicate autonomous system (AS) numbers in the AS path. Configure this parameter on the leaf for eBGP when all leafs are using the same AS, but the spines have a different AS than leafs.

Step 6

send-community extended

Configures community for BGP neighbors.

Step 7

vrf vrf-name

Specify VRF.

Step 8

address-family ipv4 unicast

Configure the address family for IPv4.

Step 9

maximum-paths path {ibgp}

Enable ECMP for EVPN transported IP Prefixes within the IPv4 address-family of the respective VRF.

Step 10

address-family ipv6 unicast

Configure the address family for IPv6.

Step 11

maximum-paths path {ibgp}

Enable ECMP for EVPN transported IP Prefixes within the IPv6 address-family of the respective VRF.

Configuring iBGP for EVPN on the Spine

SUMMARY STEPS

  1. router bgp autonomous system number
  2. neighbor address remote-as number
  3. address-family l2vpn evpn
  4. send-community extended
  5. route-reflector-client
  6. retain route-target all
  7. address-family l2vpn evpn
  8. disable-peer-as-check
  9. route-map permitall out

DETAILED STEPS

  Command or Action Purpose

Step 1

router bgp autonomous system number

Specify BGP.

Step 2

neighbor address remote-as number

Define neighbor.

Step 3

address-family l2vpn evpn

Configure address family Layer 2 VPN EVPN under the BGP neighbor.

Step 4

send-community extended

Configures community for BGP neighbors.

Step 5

route-reflector-client

Enable Spine as Route Reflector.

Step 6

retain route-target all

Configure retain route-target all under address-family Layer 2 VPN EVPN [global].

Note

 

Required for eBGP. Allows the spine to retain and advertise all EVPN routes when there are no local VNI configured with matching import route targets.

Step 7

address-family l2vpn evpn

Configure address family Layer 2 VPN EVPN under the BGP neighbor.

Step 8

disable-peer-as-check

Disables checking the peer AS number during route advertisement. Configure this parameter on the spine for eBGP when all leafs are using the same AS but the spines have a different AS than leafs.

Note

 

Required for eBGP.

Step 9

route-map permitall out

Applies route-map to keep the next-hop unchanged.

Note

 

Required for eBGP.

Configuring eBGP for EVPN on the Spine

SUMMARY STEPS

  1. route-map NEXT-HOP-UNCH permit 10
  2. set ip next-hop unchanged
  3. router bgp autonomous system number
  4. address-family l2vpn evpn
  5. retain route-target all
  6. neighbor address remote-as number
  7. address-family l2vpn evpn
  8. disable-peer-as-check
  9. send-community extended
  10. route-map NEXT-HOP-UNCH out

DETAILED STEPS

  Command or Action Purpose

Step 1

route-map NEXT-HOP-UNCH permit 10

Configure route-map to keepthe next-hop unchanged for EVPN routes.

Step 2

set ip next-hop unchanged

Set next-hop address.

Note

 

When two next hops are enabled, next hop ordering is not maintained.

If one of the next hops is a VXLAN next hop and the other next hop is local reachable via FIB/AM/Hmm, the local next hop reachable via FIB/AM/Hmm is always taken irrespective of the order.

Directly/locally connected next hops are always given priority over remotely connected next hops.

Step 3

router bgp autonomous system number

Specify BGP.

Step 4

address-family l2vpn evpn

Configure address family Layer 2 VPN EVPN under the BGP neighbor.

Step 5

retain route-target all

Configure retain route-target all under address-family Layer 2 VPN EVPN [global].

Note

 

Required for eBGP. Allows the spine to retain and advertise all EVPN routes when there are no local VNI configured with matching import route targets.

Step 6

neighbor address remote-as number

Define neighbor.

Step 7

address-family l2vpn evpn

Configure address family Layer 2 VPN EVPN under the BGP neighbor.

Step 8

disable-peer-as-check

Disables checking the peer AS number during route advertisement. Configure this parameter on the spine for eBGP when all leafs are using the same AS but the spines have a different AS than leafs.

Step 9

send-community extended

Configures community for BGP neighbors.

Step 10

route-map NEXT-HOP-UNCH out

Applies route-map to keep the next-hop unchanged.

Suppressing ARP

The ARP request from a host is normally flooded in the VLAN. It is possible to optimize this flooding behavior by maintaining an ARP cache locally on an attached access switch and generating an ARP response from the information in the local cache. Thus, the ARP broadcast on the overlay or VLAN is prevented.

The cache of remote hosts is built by learning the IP-host or MAC-address information through BGP EVPN MAC route advertisement.

Upon receiving an ARP request, the local cache can be consulted to see if the response can be locally generated. If the cache lookup fails, then the ARP request can be flooded. This helps in the detection of silent hosts.

SUMMARY STEPS

  1. interface nve 1
  2. global suppress-arp
  3. member vni vni-id
  4. suppress-arp
  5. suppress-arp disable

DETAILED STEPS

  Command or Action Purpose

Step 1

interface nve 1

Create the network virtualization endpoint (NVE) interface.

Step 2

global suppress-arp

Configure to suppress ARP globally for all Layer 2 VNI.within the NVE interface.

Step 3

member vni vni-id

Specify VNI ID.

Step 4

suppress-arp

Configure to suppress ARP under Layer 2 VNI and overrides the global set default.

Step 5

suppress-arp disable

Disables the global setting of the ARP suppression on a specific VNI.

Disabling VXLANs

SUMMARY STEPS

  1. configure terminal
  2. no nv overlay evpn
  3. no feature vn-segment-vlan-based
  4. no feature nv overlay
  5. (Optional) copy running-config startup-config

DETAILED STEPS

  Command or Action Purpose

Step 1

configure terminal

Enters configuration mode.

Step 2

no nv overlay evpn

Disables EVPN control plane.

Step 3

no feature vn-segment-vlan-based

Disables the global mode for all VXLAN bridge domains

Step 4

no feature nv overlay

Disables the VXLAN feature.

Step 5

(Optional) copy running-config startup-config

(Optional)

Saves the change persistently through reboots and restarts by copying the running configuration to the startup configuration.

Duplicate Detection for IP and MAC Addresses

For IP addresses:

Cisco NX-OS supports duplicate detection for IP addresses. This enables the detection of duplicate IP addresses based on the number of moves in a given time-interval (seconds), if host appears simultaneously under two VTEP’s.

Simultaneous availability of host under two VTEP’s is detected by host mobility logic with 600 msec refresh timeout for IPv4 hosts and default refresh time out logic for IPv6 addresses (default is 3 seconds).

The default is 5 moves in 180 seconds. (Default number of moves is 5 moves. Default time-interval is 180 seconds.)

After the 5th move within 180 seconds, the switch starts a 30 second lock (hold down timer) before checking to see if the duplication still exists (an effort to prevent an increment of the sequence bit). This 30 second lock can occur 5 times within 24 hours (this means 5 moves in 180 seconds for 5 times) before the switch permanently locks or freezes the duplicate entry. (show fabric forwarding ip local-host-db vrf abc )

Wherever a host IP address is permanently frozen, a syslog message is written by HMM.
2021 Aug 26 01:08:26 leaf hmm: (vrf-name) [IPv4] Freezing potential duplicate host 20.2.0.30/32, reached recover count (5) threshold

The following are example commands to help the configuration of the number of VM moves in a specific time interval (seconds) for duplicate IP-detection:

Command

Description


switch(config)# fabric forwarding ?
      anycast-gateway-mac 
      dup-host-ip-addr-detection 

Available sub-commands:

  • Anycast gateway MAC of the switch.

  • To detect duplicate host addresses in n seconds.


switch(config)# fabric forwarding dup-host-ip-addr-detection ?
      <1-1000>  

The number of host moves allowed in n seconds. The range is 1 to 1000 moves; default is 5 moves.

    
switch(config)# fabric forwarding dup-host-ip-addr-detection 100 ?
      <2-36000>  

The duplicate detection timeout in seconds for the number of host moves. The range is 2 to 36000 seconds; default is 180 seconds.

    
switch(config)# fabric forwarding dup-host-ip-addr-detection 100 10

Detects duplicate host addresses (limited to 100 moves) in a period of 10 seconds.

For MAC addresses:

Cisco NX-OS supports duplicate detection for MAC addresses. This enables the detection of duplicate MAC addresses based on the number of moves in a given time-interval (seconds).

The default is 5 moves in 180 seconds. (Default number of moves is 5 moves. Default time-interval is 180 seconds.)

After the 5th move within 180 seconds, the switch starts a 30 second lock (hold down timer) before checking to see if the duplication still exists (an effort to prevent an increment of the sequence bit). This 30 second lock can occur 3 times within 24 hours (this means 5 moves in 180 seconds for 3 times) before the switch permanently locks or freezes the duplicate entry. (show l2rib internal permanently-frozen-list )

Wherever a MAC address is permanently frozen, a syslog message with written by L2RIB.


2017 Jul  5 10:27:34 leaf %$ VDC-1 %$  %USER-2-SYSTEM_MSG: Unfreeze limit (3) hit, MAC 0000.0033.3333in topo: 200 is permanently frozen - l2rib
2017 Jul  5 10:27:34 leaf %$ VDC-1 %$  %USER-2-SYSTEM_MSG: Detected duplicate host 0000.0033.3333, topology 200, during Local update, with host located at remote VTEP 1.2.3.4, VNI 2 - l2rib 
2017 Jul  5 10:27:34 leaf %$ VDC-1 %$  %USER-2-SYSTEM_MSG: Unfreeze limit (3) hit, MAC 0000.0033.3334in topo: 200 is permanently frozen - l2rib        
2017 Jul  5 10:27:34 leaf %$ VDC-1 %$  %USER-2-SYSTEM_MSG: Detected duplicate host 0000.0033.3334, topology 200, during Local update, with host l

MAC address remains in permanently frozen list until both local and remote entry exists.

Unconfiguring below commands will not disable permanently frozen functionality rather will change the parameters to default values.

  • l2rib dup-host-mac-detection

  • l2rib dup-host-recovery

The following are example commands to help the configuration of the number of VM moves in a specific time interval (seconds) for duplicate MAC-detection:

Command

Description


 switch(config)# l2rib dup-host-mac-detection ?
      <1-1000>  
      default   

Available sub-commands for L2RIB:

  • The number of host moves allowed in n seconds. The range is 1 to 1000 moves.

  • Default setting (5 moves in 180 in seconds).


 switch(config)# l2rib dup-host-mac-detection 100 ?
      <2-36000>  
 

The duplicate detection timeout in seconds for the number of host moves. The range is 2 to 36000 seconds; default is 180 seconds.

    
switch(config)# l2rib dup-host-mac-detection 100 10

Detects duplicate host addresses (limited to 100 moves) in a period of 10 seconds.

Configuring Event History Size for L2RIB

To set the event history size for the L2RIB component follow these steps:

SUMMARY STEPS

  1. configure terminal
  2. l2rib event-history { mac | mac-ip | loop-detection } size { default | medium | high | very-high }
  3. l2rib event-history { fl | imet | dme-oper } size { default | medium | high | very-high }
  4. clear l2rib event-history { mac | mac-ip | loop-detection } size { default | medium | high | very-high }

DETAILED STEPS

  Command or Action Purpose

Step 1

configure terminal

Example:

switch# configure terminal 

Enter global configuration mode.

Step 2

l2rib event-history { mac | mac-ip | loop-detection } size { default | medium | high | very-high }

Example:

switch(config)# l2rib event-history mac size low 

Sets the event history size for the L2RIB component.

Step 3

l2rib event-history { fl | imet | dme-oper } size { default | medium | high | very-high }

Example:

switch(config)# l2rib event-history fl size very-high 

Generates the event logs for specified L2RIB objects:

  • fl : L2RIB VXLAN Flood-list

  • imet : L2RIB IMET

  • dme-oper: L2RIB DME OPER

Note

 

Ensure to enable buffer size to very-high in large scaling environment.

Step 4

clear l2rib event-history { mac | mac-ip | loop-detection } size { default | medium | high | very-high }

Example:

switch(config)# clear l2rib event-history mac size low 

Clears the set event history size for the L2RIB component.

Associating VLAN to VRF - L2 to L3 Mapping

Beginning with Cisco NX-OS Release 10.5(3)F, the DSVNI feature is enhanced with the following new command for Layer 2 to Layer 3 mapping on the switch.

This feature has the following configuration limitations:

  • Layer 2 to Layer 3 mapping can be configured in any of the following two ways:

    • Configuring an SVI for a given Layer 2 VLAN

    • Associating VRF under VLAN mode.

  • If both mappings exist in a configuration file, preference is given to the SVI command.

  • Both L3VM and VLAN Manager ensure only one mapping is allowed.

  • If SVI config exists for a vlan, associate-vrf command will be rejected, and vice versa.

  • For VLAN range commands, if SVI configuration does not exist for all vlans in the range, the associate-vrf command is accepted. Otherwise, it is rejected.


    Note


    VLAN 1 is handled differently. If it has an associate-vrf command, the feature interface vlan cannot be enabled.


SUMMARY STEPS

  1. configure terminal
  2. vlan {vlan-id | vlan-range}
  3. associate-vrf vrf-name

DETAILED STEPS

  Command or Action Purpose

Step 1

configure terminal

Example:

switch# configure terminal
switch(config)#

Enters global configuration mode.

Step 2

vlan {vlan-id | vlan-range}

Example:

switch(config)# vlan 2
switch(config-vlan)#

Creates a VLAN or a range or VLANs.

Step 3

associate-vrf vrf-name

Example:

switch(config-vlan)# associate-vrf vrf-blue

Maps a Layer 2 VLAN to VRF.

Verifying the VXLAN BGP EVPN Configuration

To display the VXLAN BGP EVPN configuration information, enter one of the following commands:

Command

Purpose

show nve vrf

Displays VRFs and associated VNIs

show bgp l2vpn evpn

Displays routing table information.

show ip arp suppression-cache [detail | summary | vlan vlan | statistics ]

Displays ARP suppression information.

show vxlan interface

Displays VXLAN interface status.

show vxlan interface | count

Displays VXLAN VLAN logical port VP count.

Note

 

A VP is allocated on a per-port per-VLAN basis. The sum of all VPs across all VXLAN-enabled Layer 2 ports gives the total logical port VP count. For example, if there are 10 Layer 2 trunk interfaces, each with 10 VXLAN VLANs, then the total VXLAN VLAN logical port VP count is 10*10 = 100.

show l2route evpn mac [all | evi evi [bgp | local | static | vxlan | arp]]

Displays Layer 2 route information.

show l2route evpn fl all

Displays all fl routes.

show l2route evpn imet all

Displays all imet routes.

show l2route evpn mac-ip all

show l2route evpn mac-ip all detail

Displays all MAC IP routes.

show l2route topology

Displays Layer 2 route topology.

show l2route evpn ethernet-segment all detail

Displays detailed information about all Ethernet Segment Identifiers (ESIs) in an EVPN (Ethernet VPN) environment.


Note


Although the show ip bgp command is available for verifying a BGP configuration, as a best practice, it is preferable to use the show bgp command instead.


Verifying the VXLAN EVPN with Downstream VNI Configuration

To display the VXLAN EVPN with downstream VNI configuration information, enter one of the following commands:

Command

Purpose

show bgp evi l2-evi

Displays the VRF associated with an L2VNI.

show forwarding adjacency nve platform

Displays both symmetric and asymmetric NVE adjacencies with the corresponding DestInfoIndex.

show forwarding route vrf vrf

Displays the egress VNI or downstream VNI for each next-hop.

show ip route detail vrf vrf

Displays the egress VNI or downstream VNI for each next-hop.

show l2route evpn mac-ip all detail

Displays labeled next-hops that are present in the remote MAC routes.

show l2route evpn imet all detail

Displays the egress VNI associated with the remote peer.

show nve peers control-plane-vni peer-ip ip-address

Displays the egress VNI or downstream VNI for each NVE adjacency.

The following example shows sample output for the show bgp evi l2-evi command:

switch# show bgp evi 100
-----------------------------------------------
  L2VNI ID                     : 100 (L2-100)
  RD                           : 3.3.3.3:32867
  Secondary RD                 : 1:100
  Prefixes (local/total)       : 1/6
  Created                      : Jun 23 22:35:13.368170
  Last Oper Up/Down            : Jun 23 22:35:13.369005 / never
  Enabled                      : Yes
  Associated IP-VRF            : vni100
  Active Export RT list        :
        100:100
  Active Import RT list        :
        100:100

The following example shows sample output for the show forwarding adjacency nve platform command:

switch# show forwarding adjacency nve platform 
slot  1
=======
IPv4 NVE adjacency information

next_hop:12.12.12.12   interface:nve1 (0x49000001)  table_id:1
  Peer_id:0x49080002  dst_addr:12.12.12.12  src_addr:13.13.13.13  RefCt:1  PBRCt:0 Flags:0x440800
cp : TRUE, DCI peer: FALSE is_anycast_ip FALSE dsvni peer: FALSE
  HH:0x7a13f  DstInfoIndex:0x3002 
    tunnel init: unit-0:0x3 unit-1:0x0 

next_hop:12.12.12.12   interface:nve1 (0x49000001)  table_id:1
  Peer_id:0x49080002  dst_addr:12.12.12.12  src_addr:13.13.13.13  RefCt:1  PBRCt:0 Flags:0x10440800
cp : TRUE, DCI peer: FALSE is_anycast_ip FALSE dsvni peer: TRUE
  HH:0x7a142  DstInfoIndex:0x3ffd 
    tunnel init: unit-0:0x6 unit-1:0x0 
...

The following example shows sample output for the show forwarding route vrf vrf command:

switch# show forwarding route vrf vrf1000

slot  1
=======

IPv4 routes for table vrf1000/base

--------------+-------------------+--------------+-----------------+-----------------
Prefix        | Next-hop          | Interface    | Labels          | Partial Install 
--------------+-------------------+--------------+-----------------+-----------------
…..
10.1.1.11/32    12.12.12.12         nve1        dsvni: 301000    
10.1.1.20/32    123.123.123.123     nve1        dsvni: 301000    
10.1.1.21/32    30.30.30.30         nve1        dsvni: 301000    
10.1.1.30/32    10.1.1.30           Vlan10

The following example shows sample output for the show ip route detail vrf vrf command:

switch# show ip route detail vrf default
IP Route Table for VRF "default"
  '*' denotes best ucast next-hop
  '**' denotes best mcast next-hop
  '[x/y]' denotes [preference/metric]
  '%<string>' in via output denotes VRF <string>
 
193.0.1.0/24, ubest/mbest: 4/0
      *via 30.1.0.2, Eth1/1, [100/0], 00:00:05, urib_dt6-client1 segid: 6544, tunnelid: 0x7b9 encap: VXLAN
 
      *via 30.1.1.2, Eth1/1, [100/0], 00:00:05, urib_dt6-client1 segid: 6545, (Asymmetric) tunnelid: 0x7ba encap: VXLAN
 
      *via 30.1.2.2, Eth1/1, [100/0], 00:00:05, urib_dt6-client1 segid: 6546, (Asymmetric) tunnelid: 0x7bb encap: VXLAN

The following example shows sample output for the show l2route evpn mac-ip all detail command:

switch# show l2route evpn mac-ip all
Flags -(Rmac):Router MAC (Stt):Static (L):Local (R):Remote (V):vPC link 
(Dup):Duplicate (Spl):Split (Rcv):Recv(D):Del Pending (S):Stale (C):Clear
(Ps):Peer Sync (Ro):Re-Originated (Orp):Orphan 
Topology Mac Address    Host IP   Prod   Flags Seq No  Next-Hops 
-------- -------------- --------  ------ ----- ------- ----------------------------
5        0000.0005.1301 1.3.13.1  BGP    --     0      102.1.13.1 (Label: 2000005) 
5        0000.0005.1401 1.3.14.1  BGP    --     0      102.1.145.1 (Label: 2000005)

Beginning with Cisco NX-OS Release 10.5(3)F, the labeled nexthop and an asymmetric VNI flag is added as shown. For symmetric VNI, labels and flags will not be shown as part of nexthops for EAD and PL.
switch# show l2route mac-ip all detail 
Flags -(Rmac):Router MAC (Stt):Static (L):Local (R):Remote
(Dup):Duplicate (Spl):Split (Rcv):Recv(D):Del Pending (S):Stale (C):Clear
(Ps):Peer Sync (Ro):Re-Originated (Orp):Orphan (Asy):Asymmetric (Gw):Gateway
(Bh):Blackhole
(Piporp): Directly connected Orphan to PIP based vPC BGW
(Pipporp): Orphan connected to peer of PIP based vPC BGW
Topology    Mac Address    Host IP                                 Prod   Flags              Seq No     Next-Hops                              
----------- -------------- --------------------------------------- ------ ----------------- ---------- --------------------------------------
100         abcd.ef12.3455 5.5.5.5                                 BGP    PS,                2         1.1.1.10 (Label: 10000)(Flags: Asy)
            ESI : 0300.0000.0000.6400.0319 

The following example shows sample output for the show l2route evpn imet all detail command:

switch# show l2route evpn imet all 

Flags- (F): Originated From Fabric, (W): Originated from WAN

Topology ID VNI         Prod  IP Addr     Flags  
----------- ----------- ----- ----------- ---------
3           2000003     BGP   102.1.13.1    - 
3           2000003     BGP   102.1.31.1    - 
3           2000003     BGP   102.1.32.1    - 
3           2000003     BGP   102.1.145.1   - 

The following example shows sample output for the show nve peers control-plane-vni command. In this example, 3000003 is the downstream VNI.

switch# show nve peers control-plane-vni peer-ip 203.1.1.1
Peer       VNI     Learn-Source Gateway-MAC     Peer-type  Egress-VNI SW-BD  State                 
---------  -----   ------------ --------------- ---------- ---------- -----  ----------------------
203.1.1.1  2000003 BGP          f40f.1b6f.f8db   FAB        3000003      3005   peer-vni-add-complete

Example of VXLAN BGP EVPN (iBGP)

An example of a VXLAN BGP EVPN (iBGP):

Figure 4. VXLAN BGP EVPN Topology (iBGP)


iBGP between Spine and Leaf

  • Spine (9504-A)

    • Enable the EVPN control plane

      nv overlay evpn
    • Enable the relevant protocols

      
      feature ospf
      feature bgp
      feature pim
      
    • Configure Loopback for local Router ID, PIM, and BGP

      
      interface loopback0
        ip address 10.1.1.1/32
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
      
    • Configure Loopback for Anycast RP

      
      interface loopback1
        ip address 100.1.1.1/32
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
      
    • Configure Anycast RP

      
      
      ip pim rp-address 100.1.1.1 group-list 224.0.0.0/4
      ip pim anycast-rp 100.1.1.1 10.1.1.1
      ip pim anycast-rp 100.1.1.1 20.1.1.1
      
    • Enable OSPF for underlay routing

      
      router ospf 1
      
    • Configure interfaces for Spine-leaf interconnect

      
      interface Ethernet4/2
        ip address 192.168.1.42/24
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
        no shutdown
       
      interface Ethernet4/3
        ip address 192.168.2.43/24
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
        no shutdown
       
    • Configure BGP

      
      router bgp 65535
      router-id 10.1.1.1
        neighbor 30.1.1.1 remote-as 65535
          update-source loopback0
          address-family l2vpn evpn
            send-community both
            route-reflector-client
        neighbor 40.1.1.1 remote-as 65535
          update-source loopback0
          address-family l2vpn evpn
            send-community both
            route-reflector-client
      
  • Spine (9504-B)

    • Enable the EVPN control plane

      
      
      nv overlay evpn
      
    • Enable the relevnt Protocols

      
      feature ospf
      feature bgp
      feature pim
      
    • Configure Loopback for local Router ID, PIM, and BGP

      interface loopback0
        ip address 20.1.1.1/32
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
      
    • Configure Loopback for AnycastRP

      interface loopback1
        ip address 100.1.1.1/32
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
      
    • Configure Anycast RP

      
      
      ip pim rp-address 100.1.1.1 group-list 224.0.0.0/4
      ip pim anycast-rp 100.1.1.1 10.1.1.1
      ip pim anycast-rp 100.1.1.1 20.1.1.1
       
      
    • Enable OSPF for underlayrouting

      router ospf 1
    • Configure interfaces for Spine-leaf interconnect

      interface Ethernet4/2
        ip address 192.168.3.42/24
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
        no shutdown
      
      interface Ethernet4/3
        ip address 192.168.4.43/24
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
        no shutdown
       
    • Configure BGP

      router bgp 65535
        router-id 20.1.1.1
        neighbor 30.1.1.1 remote-as 65535
          update-source loopback0
          address-family l2vpn evpn
            send-community both
            route-reflector client
        neighbor 40.1.1.1 remote-as 65535
          update-source loopback0
          address-family l2vpn evpn
            send-community both
            route-reflector client
      
  • Leaf (9396-A)

    • Enable the EVPN control plane

      
      nv overlay evpn
      
    • Enable the relevant protocols

      
      feature ospf
      feature bgp
      feature pim
      feature interface-vlan
      
      
    • Enable VXLAN with distributed anycast-gateway using BGP EVPN

      
      feature vn-segment-vlan-based
      feature nv overlay
      fabric forwarding anycast-gateway-mac 0000.2222.3333
      
    • Enabling OSPF for underlay routing

      
      router ospf 1
      
    • Configure Loopback for local Router ID, PIM, and BGP

      interface loopback0
        ip address 30.1.1.1/32
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
      
    • Configure Loopback for local VTEP IP

      
      interface loopback1
        ip address 33.1.1.1/32
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
      
    • Configure interfaces for Spine-leaf interconnect

      
      interface Ethernet2/2
        no switchport
        ip address 192.168.1.22/24
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
        no shutdown
      
      interface Ethernet2/3
        no switchport
        ip address 192.168.3.23/24
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
        shutdown
       
    • Configure route-map to Redistribute Host-SVI (Silent Host)

      route-map HOST-SVI permit 10
        match tag 54321
      
    • Configure PIM RP

      
      
      ip pim rp-address 100.1.1.1 group-list 224.0.0.0/4
      
      
    • Create VLANs

      vlan 1001-1002
    • Create overlay VRF VLAN and configure vn-segment

      
      vlan 101
        vn-segment 900001
      
    • Create overlay VRF VLAN and configure vn-segment

      
      
      vlan 101
        vn-segment 900001
      
      
    • Configure Core-facing SVI for VXLAN routing

      interface vlan101
       no shutdown
        vrf member vxlan-900001
        ip forward
        no ip redirects
        ipv6 address use-link-local-only
        no ipv6 redirects
      
    • Create VLAN and provide mapping to VXLAN

      
      vlan 1001
        vn-segment 2001001
      vlan 1002
        vn-segment 2001002
      
      
    • Create VRF and configure VNI

      
      vrf context vxlan-900001
        vni 900001
        rd auto
        

      Note


      The rd auto and route-target commands are automatically configured unless one or more are entered as overrides.


      \
      address-family ipv4 unicast
            route-target both auto
            route-target both auto evpn
          address-family ipv6 unicast
            route-target both auto
            route-target both auto evpn
      
    • Create server facing SVI and enable distributed anycast-gateway.

      
      interface vlan1001
        no shutdown
        vrf member vxlan-900001
        ip address 4.1.1.1/24 tag 54321
        ipv6 address 4:1:0:1::1/64 tag 54321
        fabric forwarding mode anycast-gateway
      
      interface vlan1002
        no shutdown
        vrf member vxlan-900001
        ip address 4.2.2.1/24 tag 54321
        ipv6 address 4:2:0:1::1/64 tag 54321
        fabric forwarding mode anycast-gateway
       
    • Configure ACL TCAM region for ARP suppression


      Note


      The hardware access-list tcam region arp-ether 256 double-wide command is not needed for Cisco Nexus 9300-FX/FX2/FX3 and 9300-GX platform switches.


      
      hardware access-list tcam region arp-ether 256 double-wide 
      

      Note


      You can choose either of the following two options for creating the NVE interface. Use Option 1 for a small number of VNIs. Use Option 2 to leverage the simplified configuration mode.


      Create the network virtualization endpoint (NVE) interface

      Option 1

      
      interface nve1  
      no shutdown
        source-interface loopback1
        host-reachability protocol bgp
        member vni 900001 associate-vrf
        member vni 2001001
          mcast-group 239.0.0.1
        member vni 2001002
          mcast-group 239.0.0.1
      
      

      Option 2

      
      
      interface nve1
        source-interface loopback1
        host-reachability protocol bgp
        global mcast-group 239.0.0.1 L2
        member vni 2001001
        member vni 2001002
        member vni 2001007-2001010
      
      
    • Configure interfaces for hosts/servers

      
      
      interface Ethernet1/47
        switchport
        switchport access vlan 1002
      
      interface Ethernet1/48
        switchport
        switchport access vlan 1001
      
      
    • Configure BGP

      
      router bgp 65535
        router-id 30.1.1.1
        neighbor 10.1.1.1 remote-as 65535
          update-source loopback0
          address-family l2vpn evpn
            send-community both
        neighbor 20.1.1.1 remote-as 65535
          update-source loopback0
          address-family l2vpn evpn
            send-community both
        vrf vxlan-900001
          address-family ipv4 unicast
            redistribute direct route-map HOST-SVI
          address-family ipv6 unicast
            redistribute direct route-map HOST-SVI
      

      Note


      The following commands in EVPN mode do not need to be entered.


      evpn                                         
        vni 2001001 l2
        vni 2001002 l2

      Note


      The rd auto and route-target auto commands are automatically configured unless one or more are entered as overrides.


      rd auto
          route-target import auto
          route-target export auto
           
      

      Note


      The rd auto and route-target commands are automatically configured unless you want to use them to override the import or export options.



      Note


      The following commands in EVPN mode do not need to be entered.


      
      evpn
        vni 2001001 l2
          rd auto
          route-target import auto
          route-target export auto
        vni 2001002 l2
          rd auto
          route-target import auto
          route-target export auto
      
  • Leaf (9396-B)

    • Enable the EVPN control plane

      
      
      
      nv overlay evpn
    • Enable the relevant protocols

      
      
      feature ospf
      feature bgp
      feature pim
      feature interface-vlan
      
    • Enable VxLAN with distributed anycast-gateway using BGP EVPN

      
      feature vn-segment-vlan-based
      feature nv overlay
      fabric forwarding anycast-gateway-mac 0000.2222.3333
      
    • Enabling OSPF for underlayrouting

      router ospf 1
    • Configure Loopback for local Router ID, PIM, and BGP

      interface loopback0
        ip address 40.1.1.1/32
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
      
    • Configure Loopback for local VTEP IP

      
      interface loopback1
        ip address 44.1.1.1/32
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
      
    • Configure interfaces for Spine-leaf interconnect

      interface Ethernet2/2
        no switchport
        ip address 192.168.3.22/24
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
        no shutdown
      
      interface Ethernet2/3
        no switchport
        ip address 192.168.4.23/24
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
        shutdown
      
    • Configure route-map to Redistribute Host-SVI (Silent Host)

      route-map HOST-SVI permit 10
        match tag 54321
      
    • Configure PIM RP

      
      
      ip pim rp-address 100.1.1.1 group-list 224.0.0.0/4
      
       
    • Create VLANs

      vlan 1001-1002
    • Create overlay VRF VLAN and configure vn-segment

      
      vlan 101
        vn-segment 900001
      
    • Configure Core-facing SVI for VXLAN routing

      interface vlan101
       no shutdown
        vrf member vxlan-900001
        ip forward
        no ip redirects
        ipv6 address use-link-local-only
        no ipv6 redirects
      
    • Create VLAN and provide mapping to VXLAN

      
      vlan 1001
        vn-segment 2001001
      vlan 1002
        vn-segment 2001002
      
    • Create VRF and configure VNI

      
      vrf context vxlan-900001
        vni 900001
        rd auto 
        

      Note


      The rd auto and route-target commands are automatically configured unless one or more are entered as overrides.


      
        address-family ipv4 unicast
          route-target both auto
          route-target both auto evpn
        address-family ipv6 unicast
          route-target both auto
          route-target both auto evpn
      
    • Create server facing SVI and enable distributed anycast-gateway

      interface vlan1001
        no shutdown
        vrf member vxlan-900001
        ip address 4.1.1.1/24
        ipv6 address 4:1:0:1::1/64
        fabric forwarding mode anycast-gateway
      
      interface vlan1002
        no shutdown
        vrf member vxlan-900001
        ip address 4.2.2.1/24
        ipv6 address 4:2:0:1::1/64
        fabric forwarding mode anycast-gateway
      
    • Configure ACL TCAM region for ARP suppression


      Note


      The hardware access-list tcam region arp-ether 256 double-wide command is not needed for Cisco Nexus 9300-FX/FX2/FX3 and 9300-GX platform switches.


      
      
      hardware access-list tcam region arp-ether 256 double-wide 
      

      Note


      You can choose either of the following two command procedures for creating the NVE interfaces. Use Option 1 for a small number of VNIs. Use Option 2 to leverage the simplified configuration mode.


      Create the network virtualization endpoint (NVE) interface

      Option 1

      
      
      interface nve1
        no shutdown
        source-interface loopback1
        host-reachability protocol bgp
        member vni 900001 associate-vrf
        member vni 2001001
          mcast-group 239.0.0.1
        member vni 2001002
          mcast-group 239.0.0.1
      
      
      

      Option 2

      
      interface nve1
        interface nve1
        source-interface loopback1
        host-reachability protocol bgp
        global mcast-group 239.0.0.1 L2
        member vni 2001001
        member vni 2001002
        member vni 2001007-2001010
      
      
      
    • Configure interfaces for hosts/servers

      
      
      interface Ethernet1/47
        switchport
        switchport access vlan 1002
      
      interface Ethernet1/48
        switchport
        switchport access vlan 1001
      
      
    • Configure BGP

      
      router bgp 65535
        router-id 40.1.1.1
        neighbor 10.1.1.1 remote-as 65535
          update-source loopback0
          address-family l2vpn evpn
            send-community both
        neighbor 20.1.1.1 remote-as 65535
          update-source loopback0
          address-family l2vpn evpn
            send-community both
        vrf vxlan-900001
        vrf vxlan-900001
          address-family ipv4 unicast
            redistribute direct route-map HOST-SVI
          address-family ipv6 unicast
            redistribute direct route-map HOST-SVI
      

      Note


      The following commands in EVPN mode do not need to be entered.

      evpn
        vni 2001001 l2
        vni 2001002 l2
      


      Note


      The rd auto and route-target commands are automatically configured unless one or more are entered as overrides.

          
      rd auto
          route-target import auto
          route-target export auto
      


      Note


      The following commands in EVPN mode do not need to be entered.

      evpn
        vni 2001001 l2
          rd auto
          route-target import auto
          route-target export auto
        vni 2001002 l2
          rd auto
          route-target import auto
          route-target export auto
      

  • Configure interface vlan on Border Gateway (BGW)

    interface vlan101
      no shutdown
      vrf member evpn-tenant-3103101
      no ip redirects
      ip address 101.1.0.1/16
      ipv6 address cafe:101:1::1/48
      no ipv6 redirects
      fabric forwarding mode anycast-gateway
    

Note


When you have iBGP session between BGWs and EBGP fabric is used, you need to configure the route-map to make VIP or VIP_R route advertisement with higher AS-PATH when local VIP or VIP_R is down (due to reload or fabric link flap). A sample route-map configuration is provided below. In this example 192.0.2.1 is VIP address and 198.51.100.1 is BGP VIP route's nexthop learned from same BGW site.

ip prefix-list vip_ip seq 5 permit 192.0.2.1/32 
ip prefix-list vip_route_nh seq 5 permit 198.51.100.1/32

route-map vip_ip permit 5
  match ip address prefix-list vip_ip 
  match ip next-hop prefix-list vip_route_nh 
  set as-path prepend 5001 5001 5001 
route-map vip_ip permit 10

Example of VXLAN BGP EVPN (eBGP)

An example of a VXLAN BGP EVPN (eBGP):

Figure 5. VXLAN BGP EVPN Topology (eBGP)


eBGP between Spine and Leaf

  • Spine (9504-A)

    • Enable the EVPN control plane

      nv overlay evpn
    • Enable the relevant protocols

      
      feature bgp
      feature pim
    • Configure Loopback for local Router ID, PIM, and BGP

      interface loopback0
        ip address 10.1.1.1/32 tag 12345
        ip pim sparse-mode
      
    • Configure Loopback for Anycast RP

      
      interface loopback1
        ip address 100.1.1.1/32 tag 12345
        ip pim sparse-mode
      
    • Configure Anycast RP

      
      
      ip pim rp-address 100.1.1.1 group-list 224.0.0.0/4
      ip pim anycast-rp 100.1.1.1 10.1.1.1
      ip pim anycast-rp 100.1.1.1 20.1.1.1
      
    • Configure route-map used by eBGP for Spine

      
      route-map NEXT-HOP-UNCH permit 10
        set ip next-hop unchanged
      
    • Configure route-map to Redistribute Loopback

      route-map LOOPBACK permit 10
        match tag 12345
      
    • Configure interfaces for Spine-leaf interconnect

      
      interface Ethernet4/2
        ip address 192.168.1.42/24
        ip pim sparse-mode
        no shutdown
      
      interface Ethernet4/3
        ip address 192.168.2.43/24
        ip pim sparse-mode
        no shutdown
      
       
    • Configure the BGP overlay for the EVPN address family.

      
      router bgp 100
        router-id 10.1.1.1
        address-family l2vpn evpn
          nexthop route-map NEXT-HOP-UNCH
          retain route-target all
        neighbor 30.1.1.1 remote-as 200
          update-source loopback0
          ebgp-multihop 3
          address-family l2vpn evpn
            send-community both
            disable-peer-as-check
            route-map NEXT-HOP-UNCH out
        neighbor 40.1.1.1 remote-as 200
          update-source loopback0
          ebgp-multihop 3
          address-family l2vpn evpn
            send-community both
            disable-peer-as-check
            route-map NEXT-HOP-UNCH out
      
      
    • Configure BGP underlay for the IPv4 unicast address family.

      
       address-family ipv4 unicast
          redistribute direct route-map LOOPBACK
        neighbor 192.168.1.22 remote-as 200
          update-source ethernet4/2
          address-family ipv4 unicast
            allowas-in
            disable-peer-as-check
        neighbor 192.168.2.23 remote-as 200
          update-source ethernet4/3
          address-family ipv4 unicast
            allowas-in
            disable-peer-as-check
            
  • Spine (9504-B)

    • Enable the EVPN control plane

      
      
      nv overlay evpn
      
      
    • Enable the relevant protocols

      
      
      feature bgp
      feature pim
      
      
    • Configure Loopback for local Router ID, PIM, and BGP

      interface loopback0
        ip address 20.1.1.1/32 tag 12345
        ip pim sparse-mode
      
    • Configure Loopback for AnycastRP

      interface loopback1
        ip address 100.1.1.1/32 tag 12345
        ip pim sparse-mode
      
    • Configure Anycast RP

      
      
      ip pim rp-address 100.1.1.1 group-list 224.0.0.0/4
      ip pim anycast-rp 100.1.1.1 10.1.1.1
      ip pim anycast-rp 100.1.1.1 20.1.1.1
      
      
    • Configure route-map used by eBGP for Spine

      
      route-map NEXT-HOP-UNCH permit 10
        set ip next-hop unchanged
      
    • Configure route-map to Redistribute Loopback

      route-map LOOPBACK permit 10
        match tag 12345
      
    • Configure interfaces for Spine-leaf interconnect

      
      interface Ethernet4/2
        no switchport
        ip address 192.168.3.42/24
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
        no shutdown
      
      interface Ethernet4/3
        no switchport
        ip address 192.168.4.43/24
        ip router ospf 1 area 0.0.0.0
        ip pim sparse-mode
        shutdown
       
    • Configure BGP overlay for the EVPN address family

      
      router bgp 100
        router-id 20.1.1.1
        address-family l2vpn evpn
          nexthop route-map NEXT-HOP-UNCH
          retain route-target all
        neighbor 30.1.1.1 remote-as 200
          update-source loopback0
          ebgp-multihop 3
          address-family l2vpn evpn
            send-community both
            disable-peer-as-check
            route-map NEXT-HOP-UNCH out
        neighbor 40.1.1.1 remote-as 200
          update-source loopback0
          ebgp-multihop 3
          address-family l2vpn evpn
            send-community both
            disable-peer-as-check
            route-map NEXT-HOP-UNCH out
      
      
    • Configure the BGP underlay for the IPv4 unicast address family.

      
        address-family ipv4 unicast
          redistribute direct route-map LOOPBACK
        neighbor 192.168.3.22 remote-as 200
          update-source ethernet4/2
          address-family ipv4 unicast
            allowas-in
            disable-peer-as-check
        neighbor 192.168.4.43 remote-as 200
          update-source ethernet4/3
          address-family ipv4 unicast
            allowas-in
            disable-peer-as-check
            
  • Leaf (9396-A)

    • Enable the EVPN control plane.

      nv overlay evpn
      
    • Enable the relevant protocols.

      
      
      feature bgp
      feature pim
      feature interface-vlan
      
      
    • Enable VXLAN with distributed anycast-gateway using BGP EVPN.

      
      feature vn-segment-vlan-based
      feature nv overlay
      fabric forwarding anycast-gateway-mac 0000.2222.3333
      
      
    • Enabling OSPF for underlay routing.

      router ospf 1
    • Configure Loopback for local Router ID, PIM, and BGP.

      interface loopback0
        ip address 30.1.1.1/32
        ip pim sparse-mode
      
    • Configure Loopback for VTEP.

      interface loopback1
        ip address 33.1.1.1/32
        ip pim sparse-mode
      
    • Configure interfaces for Spine-leaf interconnect.

      interface Ethernet2/2
        no switchport
        ip address 192.168.1.22/24
        ip pim sparse-mode
        no shutdown
      
      interface Ethernet2/3
        no switchport
        ip address 192.168.4.23/24
        ip pim sparse-mode
        shutdown
      
    • Configure route-map to Redistribute Host-SVI (Silent Host).

      route-map HOST-SVI permit 10
        match tag 54321
      
    • Enable PIM RP.

      
      
      ip pim rp-address 100.1.1.1 group-list 224.0.0.0/4
      
    • Create VLANs.

      
      vlan 1001-1002
      
      
    • Create overlay VRF VLAN and configure vn-segment.

      vlan 101
        vn-segment 900001
      
    • Configure core-facing SVI for VXLAN routing.

      interface vlan101
       no shutdown
        vrf member vxlan-900001
        ip forward
        no ip redirects
        ipv6 address use-link-local-only
        no ipv6 redirects
      
    • Create VLAN and provide mapping toVXLAN.

      vlan 1001
        vn-segment 2001001
      vlan 1002
        vn-segment 2001002
      
    • Create VRF and configure VNI

      
      vrf context vxlan-900001
        vni 900001
        rd auto
        

      Note


      The rd auto and route-target commands are automatically configured unless one or more are entered as overrides.


            
          address-family ipv4 unicast
            route-target both auto
            route-target both auto evpn
          address-family ipv6 unicast
            route-target both auto
            route-target both auto evpn
       
      
      
    • Create server facing SVI and enable distributed anycast-gateway

      
      
      interface vlan1001
        no shutdown
        vrf member vxlan-900001
        ip address 4.1.1.1/24 tag 54321
        ipv6 address 4:1:0:1::1/64 tag 54321
        fabric forwarding mode anycast-gateway
      
      interface vlan1002
        no shutdown
        vrf member vxlan-900001
        ip address 4.2.2.1/24 tag 54321
        ipv6 address 4:2:0:1::1/64 tag 54321
        fabric forwarding mode anycast-gateway
      
       
      
    • Configure ACL TCAM region for ARP suppression


      Note


      The hardware access-list tcam region arp-ether 256 double-wide command is not needed for Cisco Nexus 9300-FX/FX2/FX3 and 9300-GX platform switches.


      
      hardware access-list tcam region arp-ether 256 double-wide 
      

      Note


      You can choose either of the following two options for creating the NVE interface. Use Option 1 for a small number of VNIs. Use Option 2 to leverage the simplified configuration mode.


      Create the network virtualization endpoint (NVE) interface

      Option 1

      
      
      
      interface nve1
        no shutdown
        source-interface loopback1
        host-reachability protocol bgp
        member vni 900001 associate-vrf
        member vni 2001001
          mcast-group 239.0.0.1
        member vni 2001002
          mcast-group 239.0.0.1
        
      

      Option 2

      
      
      
      
      interface nve1
        source-interface loopback1
        host-reachability protocol bgp
        global mcast-group 239.0.0.1 L2
        member vni 2001001
        member vni 2001002
        member vni 2001007-2001010
      
      
    • Configure interfaces for hosts/servers.

      
      
      interface Ethernet1/47
        switchport
        switchport access vlan 1002
      
      interface Ethernet1/48
        switchport
        switchport access vlan 1001
      
    • Configure BGP underlay for the IPv4 unicast address family.

      
      
      router bgp 200
        router-id 30.1.1.1
        address-family ipv4 unicast
          redistribute direct route-map LOOPBACK
        neighbor 192.168.1.42 remote-as 100
          update-source ethernet2/2
          address-family ipv4 unicast
            allowas-in
            disable-peer-as-check
        neighbor 192.168.4.43 remote-as 100
          update-source ethernet2/3
          address-family ipv4 unicast
            allowas-in
            disable-peer-as-check
      
      
    • Configure BGP overlay for the EVPN address family.

        address-family l2vpn evpn
          nexthop route-map NEXT-HOP-UNCH
          retain route-target all
        neighbor 10.1.1.1 remote-as 100
          update-source loopback0
          ebgp-multihop 3
          address-family l2vpn evpn
            send-community both
            disable-peer-as-check
            route-map NEXT-HOP-UNCH out
        neighbor 20.1.1.1 remote-as 100
          update-source loopback0
          ebgp-multihop 3
          address-family l2vpn evpn
            send-community both
            disable-peer-as-check
            route-map NEXT-HOP-UNCH out
        vrf vxlan-900001
      

      Note


      The following commands in EVPN mode do not need to be entered.

      evpn                                         
        vni 2001001 l2
        vni 2001002 l2


      Note


      The rd auto and route-target auto commands are automatically configured unless one or more are entered as overrides.

      rd auto
      route-target import auto
      route-target export auto
        


      Note


      The following commands in EVPN mode do not need to be entered.

      evpn
        vni 2001001 l2
          rd auto
          route-target import auto
          route-target export auto
        vni 2001002 l2
          rd auto
          route-target import auto
          route-target export auto
      

  • Leaf (9396-B)

    • Enable the EVPN control plane.

      
      
      nv overlay evpn
      
    • Enable the relevant protocols.

      
      
      feature bgp
      feature pim
      feature interface-vlan
      
    • Enable VXLAN with distributed anycast-gateway using BGP EVPN.

      feature vn-segment-vlan-based
      feature nv overlay
      fabric forwarding anycast-gateway-mac 0000.2222.3333
      
    • Enabling OSPF for underlay routing.

      router ospf 1
    • Configure Loopback for local Router ID, PIM, and BGP.

      interface loopback0
        ip address 40.1.1.1/32
        ip pim sparse-mode
      
    • Configure Loopback for VTEP.

      interface loopback1
        ip address 44.1.1.1/32
        ip pim sparse-mode
      
    • Configure interfaces for Spine-leaf interconnect.

      interface Ethernet2/2
        no switchport
        ip address 192.168.3.22/24
        ip pim sparse-mode
        no shutdown
      
      interface Ethernet2/3
        no switchport
        ip address 192.168.2.23/24
        ip pim sparse-mode
        shutdown
      
    • Configure route-map to Redistribute Host-SVI (Silent Host).

      route-map HOST-SVI permit 10
        match tag 54321
      
    • Enable PIM RP

      
      
      ip pim rp-address 100.1.1.1 group-list 224.0.0.0/4
      
      
    • Create VLANs

      
      vlan 1001-1002
    • Create overlay VRF VLAN and configure vn-segment.

      
      vlan 101
        vn-segment 900001
      
    • Configure core-facing SVI for VXLAN routing.

      interface vlan101
       no shutdown
        vrf member vxlan-900001
        ip forward
        no ip redirects
        ipv6 address use-link-local-only
        no ipv6 redirects
      
    • Create VLAN and provide mapping to VXLAN.

      
      vlan 1001
        vn-segment 2001001
      vlan 1002
        vn-segment 2001002
      
    • Create VRF and configure VNI

      
      vrf context vxlan-900001
        vni 900001
        rd auto
        
        

      Note


      The following commands are automatically configured unless one or more are entered as overrides.


      
          address-family ipv4 unicast
            route-target both auto
            route-target both auto evpn
          address-family ipv6 unicast
            route-target both auto
            route-target both auto evpn
      
    • Create server facing SVI and enable distributed anycast-gateway.

      interface vlan1001
        no shutdown
        vrf member vxlan-900001
        ip address 4.1.1.1/24 tag 54321
        ipv6 address 4:1:0:1::1/64 tag 54321
        fabric forwarding mode anycast-gateway
      
      interface vlan1002
        no shutdown
        vrf member vxlan-900001
        ip address 4.2.2.1/24 tag 54321
        ipv6 address 4:2:0:1::1/64 tag 54321
        fabric forwarding mode anycast-gateway
      
    • Configure ACL TCAM region for ARP suppression


      Note


      The hardware access-list tcam region arp-ether 256 double-wide command is not needed for Cisco Nexus 9300-FX/FX2/FX3 and 9300-GX platform switches.


      
      
      hardware access-list tcam region arp-ether 256 double-wide 
      

      Note


      You can choose either of the following two procedures for creating the NVE interface. Use Option 1 for a small number of VNIs. Use Option 2 to leverage the simplified configuration mode.


      Create the network virtualization endpoint (NVE) interface.

      Option 1

      
      
      
      interface nve1
        no shutdown
        source-interface loopback1
        host-reachability protocol bgp
        member vni 900001 associate-vrf
        member vni 2001001
          mcast-group 239.0.0.1
        member vni 2001002
          mcast-group 239.0.0.1
      
      
      

      Option 2

      
      
      
      interface nve1
        source-interface loopback1
        host-reachability protocol bgp
        global mcast-group 239.0.0.1 L2
        member vni 2001001
        member vni 2001002
        member vni 2001007-2001010
      
        
      
    • Configure interfaces for hosts/servers

      
      
      interface Ethernet1/47
        switchport
        switchport access vlan 1002
      
      interface Ethernet1/48
        switchport
        switchport access vlan 1001
      
    • Configure BGP underlay for the IPv4 unicast address family.

      router bgp 200
        router-id 40.1.1.1
        address-family ipv4 unicast
          redistribute direct route-map LOOPBACK
        neighbor 192.168.3.42 remote-as 100
          update-source ethernet2/2
          address-family ipv4 unicast
            allowas-in
            disable-peer-as-check
        neighbor 192.168.2.43 remote-as 100
          update-source ethernet2/3
          address-family ipv4 unicast
            allowas-in
            disable-peer-as-check
      
    • Configure BGP overlay for the EVPN address family.

        address-family l2vpn evpn
          nexthop route-map NEXT-HOP-UNCH
          retain route-target all
        neighbor 10.1.1.1 remote-as 100
          update-source loopback0
          ebgp-multihop 3
          address-family l2vpn evpn
            send-community both
            disable-peer-as-check
            route-map NEXT-HOP-UNCH out
        neighbor 20.1.1.1 remote-as 100
          update-source loopback0
          ebgp-multihop 3
          address-family l2vpn evpn
            send-community both
            disable-peer-as-check
            route-map NEXT-HOP-UNCH out
        vrf vxlan-900001
      

    Note


    The following commands in EVPN mode do not need to be entered.

    evpn                                         
      vni 2001001 l2
      vni 2001002 l2


    Note


    The rd auto and route-target auto commands are automatically configured unless one or more are entered as overrides.

    rd auto
    route-target import auto
    route-target export auto
      


    Note


    The following commands in EVPN mode do not need to be entered.

    evpn
      vni 2001001 l2
        rd auto
        route-target import auto
        route-target export auto
      vni 2001002 l2
        rd auto
        route-target import auto
        route-target export auto
    

Example Show Commands

  • show nve peers

    
    9396-B# show nve peers
    Interface Peer-IP          State LearnType Uptime   Router-Mac      
    --------- ---------------  ----- --------- -------- -----------------
    nve1      30.1.1.1         Up    CP        00:00:38 6412.2574.9f27  
     
  • show nve vni

    
    9396-B# show nve vni
    Codes: CP - Control Plane        DP - Data Plane         
           UC - Unconfigured         
          
    Interface VNI      Multicast-group   State Mode Type [BD/VRF]      Flags
    --------- -------- ----------------- ----- ---- ------------------ -----
    nve1      900001   n/a               Up    CP   L3 [vxlan-900001]      
    nve1      2001001  225.4.0.1         Up    CP   L2 [1001]            
    nve1      2001002  225.4.0.1         Up    CP   L2 [1002]           
    
  • show ip arp suppression-cache detail

    
    9396-B# show ip arp suppression-cache detail
     
    Flags: + - Adjacencies synced via CFSoE
           L - Local Adjacency
           R - Remote Adjacency
           L2 - Learnt over L2 interface
     
    Ip Address      Age      Mac Address    Vlan Physical-ifindex    Flags
     
    4.1.1.54        00:06:41 0054.0000.0000 1001 Ethernet1/48        L
    4.1.1.51        00:20:33 0051.0000.0000 1001 (null)              R
    4.2.2.53        00:06:41 0053.0000.0000 1002 Ethernet1/47        L
    4.2.2.52        00:20:33 0052.0000.0000 1002 (null)              R
    

    Note


    The show vxlan interface command is not supported for the Cisco Nexus 9300-FX/FX2/FX3, and 9300-GX platform switches.


  • show vxlan interface

    
    9396-B# show vxlan interface
    Interface       Vlan    VPL Ifindex     LTL             HW VP
    =========       ====    ===========     ===             =====
    Eth1/47         1002    0x4c07d22e      0x10000         5697
    Eth1/48         1001    0x4c07d02f      0x10001         5698
    
  • show bgp l2vpn evpn summary

    
    leaf3# show bgp l2vpn evpn summary
    BGP summary information for VRF default, address family L2VPN EVPN
    BGP router identifier 40.0.0.4, local AS number 10
    BGP table version is 60, L2VPN EVPN config peers 1, capable peers 1
    21 network entries and 21 paths using 2088 bytes of memory
    BGP attribute entries [8/1152], BGP AS path entries [0/0]
    BGP community entries [0/0], BGP clusterlist entries [1/4]
    
    Neighbor        V    AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down
    State/PfxRcd    
    40.0.0.1        4    10    8570    8565       60    0    0    5d22h 6
    leaf3# 
    
  • show bgp l2vpn evpn

    
    leaf3# show bgp l2vpn evpn
    BGP routing table information for VRF default, address family L2VPN EVPN
    BGP table version is 60, local router ID is 40.0.0.4
    Status: s-suppressed, x-deleted, S-stale, d-dampened, h-history, *-valid,
    >-best
    Path type: i-internal, e-external, c-confed, l-local, a-aggregate, r-redist,
    I-injected
    Origin codes: i - IGP, e - EGP, ? - incomplete, | - multipath, & - backup
    
       Network            Next Hop            Metric     LocPrf     Weight Path
    Route Distinguisher: 40.0.0.2:32868
    *>i[2]:[0]:[10001]:[48]:[0000.8816.b645]:[0]:[0.0.0.0]/216
                          40.0.0.2                          100          0 i
    *>i[2]:[0]:[10001]:[48]:[0011.0000.0034]:[0]:[0.0.0.0]/216
                          40.0.0.2                          100          0 i
    
  • show l2route evpn mac all

    
    leaf3# show l2route evpn mac all
    Topology    Mac Address    Prod   Next Hop (s)
    ----------- -------------- ------ ---------------
    101         0000.8816.b645 BGP    40.0.0.2
    101         0001.0000.0033 Local  Ifindex 4362086
    101         0001.0000.0035 Local  Ifindex 4362086
    101         0011.0000.0034 BGP    40.0.0.2
    
  • show l2route evpn mac-ip all

    
    leaf3# show l2route evpn mac-ip all
    Topology ID Mac Address    Prod Host IP                 Next Hop (s)
    ----------- -------------- ---- ------------------------------------------------------
    101         0011.0000.0034 BGP  5.1.3.2                      40.0.0.2
    102         0011.0000.0034 BGP  5.1.3.2                      40.0.0.2
    
  • show l2route evpn startup-route all [detail]

    
    Flags - (V4):IPv4 Bcast address (V6):IPv6 Bcast address
    (D):Del Pending (S):Stale (C):Clear
    Topology ID Source Group (SG)                                                                                    Flags       NFN Bitmap
    ----------- ---------------------------------------------------------------------------------------------------- ----------- ----------
    100         (0.0.0.0, 255.255.255.255)                                                                           V4          8
                Delivery SG: (11.1.1.2, 21.1.1.2)
                DCI Delivery SG: (11.1.1.3, 21.1.1.3)
    1162        (::, ff00::)                                                                                         V6          8
                Delivery SG: (4901:11:11::11:11, ff1e:225:0:1::1)
                DCI Delivery SG: (4901:11:11::11:11, ::)
    
  • show l2route evpn startup-route evi <vpn-id> [detail]

    
    Flags - (V4):IPv4 Bcast address (V6):IPv6 Bcast address
    (D):Del Pending (S):Stale (C):Clear
    Topology ID Source Group (SG)                                                                                    Flags       NFN Bitmap
    ----------- ---------------------------------------------------------------------------------------------------- ----------- ----------
    1162        (::, ff00::)                                                                                         V6          8
                Delivery SG: (4901:11:11::11:11, ff1e:225:0:1::1)
                DCI Delivery SG: (4901:11:11::11:11, ::)
    
  • show l2route evpn ethernet-segment all detail

    ESI                         Orig Rtr. IP Addr   Prod    Ifindex NFNBitmapDF Election
    -------------------------   ----------------	----    ------- ----------  --------
    0300.0000.0000.0d00.0309    2.11.51.1           VXLAN   nve     11024       Modulus
    
    0300.0000.0000.0dff.0309    2.11.51.1           VXLAN   nve     11024       Modulus
    
    0300.0000.0000.0d00.0309    2.11.51.4           BGP     N/A     512         Per Flow
    0300.0000.0000.0dff.0309    2.11.51.4           BGP     N/A     512         Per Flow

Configuring ND Suppression

ND Suppression on the Overlay

Multicast Neighbor Solicitation packets from host to another host are flooded over the BGP/EVPN VXLAN Core when hosts are behind two different VXLAN peers.

The ND Suppression cache is built by:

  • Snooping NS request in the hosts and populating the ND Suppression cache with source IP and MAC bindings in the request.

  • Learning IPv6-Host or MAC address information through BGP EVPN MAC route advertisements.

With ND Suppression, for host to host communication behind two different VXLAN peers, if the remote host is not learned in the suppression cache initially, then NS packets are flooded over the BGP/EVPN VXLAN Core. However, once the ND Suppression cache on a switch S1 is populated with the remote host, any subsequent Neighbor Solicitation request packet for the remote host in the hosts behind S1 are proxied by the Switch S1 thereby preventing the flooding of Neighbor Solicitation packet over the BGP-EVPN/VXLAN core

For ND Suppression cache scale values, see Cisco Nexus 9000 Series NX-OS Verified Scalability Guide.

Guidelines and Limitations for ND Suppression

ND suppression has the following configuration guidelines and limitations:

  • Beginning with Cisco NX-OS Release 10.3(1)F, the Cisco Nexus 9300-X Cloud Scale switches supports the ND Suppression feature only on plain BGP EVPN.

  • Beginning with Cisco NX-OS Release 10.5(2)F, ND suppression is supported on Cisco Nexus 9500 Series switches with N9K-X9736C-FX3 line card.

  • ND Suppression is not supported with BGP-EVPN feature variants like Multisite, Virtual MCT, IRB, Centralized Gateway, Firewall Clustering, vPC.

  • For link-local addresses of hosts, ND Suppression is not supported and instead multicast NS for link local address of hosts are flooded over the core of BGP EVPN VXLAN network.

  • ND Suppression gets enabled on all VNIs on which suppress-arp is enabled.

  • ND Suppression CLI knob must be enabled only under the following conditions:

    • The suppress-arp must be enabled on a VNI and there must be an SVI associated with this VNI/VLAN. Also, this SVI must be in up state and must have both IPv4 and IPv6 address enabled.

    • ND Suppression will not work in the following conditions:

      • If SVI not present for the VLAN/VNI on which suppress-arp/suppress nd is enabled.

      • If SVI associated with VLAN VNI on which suppress-arp/suppress nd is enabled is down.

      • If SVI associated with VLAN/VNI on which suppress-arp/suppress nd is enabled has only IPv4 and no IPv6 address.

      • If SVI associated with VLAN/VNI on which suppress-arp/suppress nd is enabled has only IPv6 and no IPv4 address.

        In all the above conditions, host to host traffic can potentially be dropped.

  • For ND Suppression VACL to work, increase the SUP TCAM size to 768 or above using the hardware access-list tcam region sup-tcam 768 command.

  • If the installed Cisco NX-OS switch does not support ND suppression, ensure that Anycast Gateway MAC addresses across sites are identical.

Configuring ND Suppression

This procedure describes how to enable/disable the ND suppression feature on the NVE interface.

Before you begin

Ensure that ARP suppression is enabled.

SUMMARY STEPS

  1. configure terminal
  2. hardware access-list tcam region ing-sup 768
  3. copy running-config startup-config
  4. reload
  5. configure terminal
  6. interface nve 1
  7. [no]suppress nd

DETAILED STEPS

  Command or Action Purpose

Step 1

configure terminal

Example:

switch# configure terminal

Enters global configuration mode.

Step 2

hardware access-list tcam region ing-sup 768

Example:

switch# hardware access-list tcam region ing-sup 768

Carves the Ingress SUP TCAM size to 768.

Step 3

copy running-config startup-config

Example:

switch# copy running-config startup-config

Copies the running configuration to the startup configuration.

Step 4

reload

Example:

switch# reload

Reloads the switch.

Step 5

configure terminal

Example:

switch# configure terminal

Enters global configuration mode.

Step 6

interface nve 1

Example:

switch(config)# interface nve 1
switch(config-if-nve)#

Enters interface nve configuration mode.

Step 7

[no]suppress nd

Example:

switch(config-if-nve)# suppress nd

Configures ND Suppression for all ARP enabled VNIs.

Option no disables the ND Suppression for all ARP enabled VNIs.


Note


  • When global suppress arp command is configured, ND Suppression is enabled on all VNIs.

  • When global suppress arp command is not configured and instead per VNI suppress arp command is configured, then ND Suppression is enabled on all VNIs on which ARP suppression is configured.

  • When enabling suppress arp command on a vPC pair, ensure steps 1-4 on both peers are complete before enabling the feature.


Verifying the ND Suppression Configuration

To display the ND Suppression configuration information, enter one of the following commands:

Command

Purpose

show run nv overlay

Displays the ND suppression configuration status.

show nve vni

Displays whether the ND suppression config has been enabled for ARP enabled VNIs.

show nve internal export nve

Displays whether the ND suppression config has been enabled or not in SDB.

show nve internal export vni

Displays the ND suppression state per VNI in SDB.

show ipv6 nd suppression-cache detail command.

Displays the ICMPv6 cache entries that are present in local.

show ipv6 nd suppression-cache remote

Displays the ICMPv6 cache entries that are present in remote.

show ipv6 nd suppression-cache summary

Displays the IPv6 cache entries summary of both local and remote.

show ipv6 nd suppression-cache statistics

Displays the IPv6 ND suppression cache statistics.

show ipv6 nd suppression-cache vlan "vlan_id"

Displays the details of IPv6 ND Suppression cache entries for a particular VLAN.

The following example shows sample output for the show run nv overlay command:
switch(config-if-nve)# sh run nv overlay
!Command: show running-config nv overlay
!Running configuration last done at: Sat Mar 19 01:07:49 2022
!Time: Sat Mar 19 01:10:00 2022

version 10.2(3) Bios:version 07.68
feature nv overlay

vlan 101-110,200-203,500-501

interface nve1
  no shutdown
  host-reachability protocol bgp
  suppress nd
  global suppress-arp
The following example shows sample output for the show nve vni command:
switch(config-if-nve-vni)# sh nve vni
Codes: CP - Control Plane        DP - Data Plane
       UC - Unconfigured         SA - Suppress ARP
       S-ND Suppress ND
       SU - Suppress Unknown Unicast
       Xconn - Crossconnect
       MS-IR - Multisite Ingress Replication
       HYB - Hybrid IRB mode

Interface VNI      Multicast-group   State Mode Type [BD/VRF]      Flags
--------- -------- ----------------- ----- ---- ------------------ -----
nve1      5000     239.2.0.2         Up    CP   L2 [500]           SA S-ND
The following example shows sample output for the show nve internal export nve command:
switch(config-if-nve-vni)# sh nve internal export nve

NVE Interface information.
+---------------------------------------------------------+
Interface: nve1, Admin State: Up,
   State: nve-intf-add-complete, Encap: vxlan
   Source interface: loopback3, VRF: default,
   Anycast-interface: <none>
   Mcast-routing src intf <none>
   Primary IP: 4.4.4.4, Secondary IP: 0.0.0.0,
   VNI-VRF: default, Allow-Src-Lpbk-Down: No,
   Advertise MAC route: No,
   Virtual-rMAC: 0000.0000.0000,
   Mcast-routing Primary IP: 0.0.0.0
   Suppress ND: 1
   Host-reachability: CP
   unknown-peer-forwarding-mode: disable
   VNI assignment mode: n/a
   Multisite bgw-if: <none> (ip: 0.0.0.0, admin/oper state: Down/Down)
    src-node-last-notify: None
    anycast-node-last-notify: None
    mcast-src-node-last-notify: None
    multi-src-node-last-notify: None

+---------------------------------------------------------+
The following example shows sample output for the show nve internal export vni command:
switch(config-if-nve-vni)# sh nve internal export vni

NVE VNI Information.
+---------------------------------------------------------+
 VNI: 5000 [500] Mgroup: 239.2.0.2 Provision-State: vni-add-complete
  Primary: 4.4.4.4 Secondary: 0.0.0.0 SRC-VRF: default
  Encap: vxlan Repl-mode: Mcast
  Suppress ARP: SP Suppress ND: Enabled Mode: CP, VNI-VRF: <FALSE>  [vrf-id 0] [vrf flags 0x0]
  Suppress Unknown-Unicast: FALSE
  X-connect : Disabled
  [VNI local configs] SA : TRUE, Mcast-group : TRUE, IR proto BGP: FALSE
  Config Src: CLI, VNI flags: 0x0
  Spine-AGW: Disabled, HYBRID: Disabled
  Multisite optimized IR: Disabled
  Multisite DCI Group Unknown Address

+---------------------------------------------------------+

The following example shows sample output for the show ipv6 nd suppression-cache detail command:

switch(config)# show ipv6 nd suppression-cache detail 

Flags: + - Adjacencies synced via CFSoE
       L - Local Adjacency
       R - Remote Adjacency
       L2 - Learnt over L2 interface
       PS - Added via L2RIB, Peer Sync
       RO - Dervied from L2RIB Peer Sync Entry

IPv6 Address      Age      Mac Address    Vlan Physical-ifindex    Flags    Remote Vtep Addrs

172:11:1:1::51  00:00:18 acf2.c5f6.7641   11 Ethernet1/51        L
172:11:1:1::201 00:06:14 0000.0011.1111   11 (null)              R        30.100.1.1
172:11:1:1::101 00:06:14 74a0.2f1d.d481   11 (null)              R        10.10.11.11

The following example shows sample output for the show ipv6 nd suppression-cache local command:

switch(config)# show ipv6 nd suppression-cache local

Flags: + - Adjacencies synced via CFSoE
       L - Local Adjacency
       R - Remote Adjacency
       L2 - Learnt over L2 interface

Ip Address      Age      Mac Address    Vlan Physical-ifindex    Flags

172:11:1:1::51  00:00:23 acf2.c5f6.7641   11 Ethernet1/51        L

The following example shows sample output for the show ipv6 nd suppression-cache remote command:

switch(config)# show ipv6 nd suppression-cache remote

Flags: + - Adjacencies synced via CFSoE
       L - Local Adjacency
       R - Remote Adjacency
       L2 - Learnt over L2 interface
       PS - Added via L2RIB, Peer Sync
       RO - Dervied from L2RIB Peer Sync Entry

IPv6 Address      Age      Mac Address    Vlan Physical-ifindex    Flags    Remote Vtep Addrs

172:11:1:1::201 00:06:24 0000.0011.1111   11 (null)              R        30.100.1.1
172:11:1:1::101 00:06:24 74a0.2f1d.d481   11 (null)              R        10.10.11.11

The following example shows sample output for the show ipv6 nd suppression-cache statistics command:

switch(config)# show ipv6 nd suppression-cache statistics

ND packet statistics for suppression-cache

Suppressed:

Total: 1
L3 mode :       Requests 1, Replies 1
                Flood ND Probe 0

Received:
Total: 1
 L3 mode:       NS 1, Non-local NA 0
                Non-local NS 0

Mobility Requests:
Total: 0
 L3 mode:       Remote-to-local 0, Local-to-remote 0
                Remote-to-remote 0

RARP Signal Refresh: 0

ND suppression-cache Local entry statistics
Adds 3, Deletes 0

The following example shows sample output for the show ipv6 nd suppression-cache summary command:

switch(config)# show ipv6 nd suppression-cache summary

IPV6 ND suppression-cache Summary
Remote              :2
Local               :1
Total               :3

The following example shows sample output for the show ipv6 nd suppression-cache vlan "vlan_id" command:

switch(config)# show ipv6 nd suppression-cache vlan 11

Flags: + - Adjacencies synced via CFSoE
       L - Local Adjacency
       R - Remote Adjacency
       L2 - Learnt over L2 interface
       PS - Added via L2RIB, Peer Sync
       RO - Dervied from L2RIB Peer Sync Entry

IPv6 Address      Age      Mac Address    Vlan Physical-ifindex    Flags    Remote Vtep Addrs

172:11:1:1::51  00:00:40 acf2.c5f6.7641   11 Ethernet1/51        L
172:11:1:1::201 00:06:36 0000.0011.1111   11 (null)              R        30.100.1.1
172:11:1:1::101 00:06:36 74a0.2f1d.d481   11 (null)              R        10.10.11.11

VXLAN BGP EVPN with RFC 5549 Underlay

VXLAN BGP EVPN with RFC 5549 Underlay Overview

The VXLAN BGP EVPN with RFC 5549 underlay feature is introduced for deployments where you already have a VXLAN IPv4 network infrastructure and must integrate IPv6 functionality.

The RFC 5549 enables the advertisement of underlay IPv4 prefixes using BGP with an IPv6 address as the next hop, effectively allowing IPv4 connectivity to be established over an IPv6 underlay network.

Benefits of VXLAN BGP EVPN with RFC 5549 Underlay

  • Helps your network against the exhaustion of IPv4 addresses.

  • Enhances scalability and efficiency by integrating IPv6 into the VXLAN IPv4 network infrastructure.

  • Offers simpler, more direct communication between devices.

  • Provides sub-second convergence.

  • Supports the border spine gateway to leaf topology.

Supported Platform and Release for VXLAN BGP EVPN with RFC 5549 Underlay

Feature Release Platform
VXLAN BGP EVPN with RFC 5549 Underlay on single-site 10.2(3)F Cisco Nexus 9000 Series switches

Functionalities of VXLAN BGP EVPN with RFC 5549 Underlay

This section describes how the VXLAN BGP EVPN with RFC 5549 underlay functions on a single-site environment.

VTEP IPv4 Address Advertisement

The VTEP addresses are advertised in BGP with RFC 5549 underlay such that the IPv4 VTEP addresses are routed using the following IPv6 enabled interfaces.

  • Link-local address (LLA): In this type of BGP peering configuration, BGP uses the interface's link-local address to establish IPv6 sessions, allowing for the advertisement of IPv4 addresses through them. This approach eliminates the necessity for configuring global addresses on interfaces.

  • Global IPv6 address: In this type of BGP peering configuration, BGP creates a standard IPv6 neighbor relationship using the global IPv6 address of the directly connected interface. Therefore, it is required to configure a global IPv6 address on the directly connected interface for the peering to be established.

VXLAN EVPN Services Advertisement over IPv4 or IPv6 Session

When VTEPs IPv4 reachability is advertised with RFC 5549 underlay, an EVPN IPv4 or EVPN IPv6 BGP session must be created to advertise VXLANv4 services on a single-site environment.

VXLAN BGP EVPN with RFC 5549 Underlay on Single-Site

On Single-Site, the VXLAN BGP EVPN with RFC 5549 Underlay supports node to node communication as shown in the diagram.

The VTEP IPv4 address is advertised using IPv6 address (LLA or Global address) as the next-hop address in RFC 5549 underlay.

Figure 6. Leaf and Spine Fabric (iBGP)
Figure 7. Leaf and Spine Fabric (eBGP)

The following use cases of EVPN VXLAN session over RFC5549 are supported:

  1. Use case 1:

    • Underlay BGP session: BGP session uses IPv6 link-local or IPv6 global address.

    • Overlay EVPN session: EVPN session uses IPv4 between the loopbacks.

    • VTEP: IPv4 address.

  2. Use case 2:

    • Underlay BGP session: BGP session uses IPv6 link-local or IPv6 global address.

    • Overlay EVPN session: EVPN session uses IPv6 between the loopbacks.

    • VTEP: IPv6 address.

  3. Use case 3:

    • Underlay BGP session and Overlay EVPN session: Both uses Single TCP session over IPv6 link-local or IPv6 global address.

    • VTEP: IPv4 address.

  4. Use case 4:

    • Underlay BGP session: BGP session uses IPv6 link-local or IPv6 global address.

    • Overlay EVPN session: EVPN session uses IPv6 between the loopbacks.

    • VTEP: IPv4 address.

Supported Combination of RFC 5549 and IPv4 over Core and DC Fabric

Use case

DC Fabric

Core

Supported Release

Single-Site

RFC 5549

IPv4

10.2(3)F

Guidelines for VXLAN BGP EVPN with RFC 5549 Underlay

  • VTEP must be from the same address family of IPv4.

  • VTEP loop-back address must be an IPv4 address.

  • All the nodes including BGW, Core, and spine must be upgraded to Release 10.2(3)F or higher.

  • Beginning with Cisco NX-OS Release 10.6(1)F, RFC5549 underlay is supported on Cisco Nexus 9364E-SG2-Q and 9364E-SG2-O switches.

Supported and Unsupported Features of VXLAN BGP EVPN with RFC 5549 Underlay

Following are the supported and unsupported features for VXLAN BGP EVPN with RFC 5549 Underlay on single-site:

Features Supported Release

Supported or Not Supported

NGOAM 10.2(3)F

Supported

vPC 10.2(3)F

Supported

Ingress Replication 10.2(3)F

Supported

Overlay TCP Session 10.2(3)F

Supported

ARP Suppression 10.2(3)F

Supported

BFD 10.2(3)F

Supported

vPC VIP and PIP on leaf 10.2(3)F

Supported

IPv4 over RFC 5549 with default VRF 10.2(3)F

Supported

Overlay: eBGP EVPN IPv4 loopback peering with loopbacks 10.2(3)F

Supported

Route Leaking: Host addresses and between non default customer VRFs (On Leaf) 10.2(3)F

Supported

DSVNI 10.5(1)F

Supported

vMCT 10.5(1)F

Supported

Border Spine

10.5(2)F

Supported

EVPN IPv6 session with IPv4 VTEP over RFC5549 underlay

10.5(2)F

Supported

Flood and Learn deployment

10.5(3)F

Not Supported

IPv4 and IPv6 overlay multicast

10.5(3)F

Not Supported

vPC based multihoming

10.5(3)F

Not Supported

VLAN based Layer 3 VNI configuration

10.5(3)F

Not Supported

VXLAN IPv6 underlay

10.5(3)F

Not Supported

PIMv4 PIMv6 ASM /Bidir Multicast underlay

10.5(3)F

Not Supported

Multicast underlay BUD node support

10.5(3)F

Not Supported

IGMP / MLD snooping

10.5(3)F

Not Supported

TRMv4/v6, and TRM data MDT support (ASIC limitation)

10.5(3)F

Not Supported

ND suppression

10.5(3)F

Not Supported

PVNF

10.5(3)F

Not Supported

VXLAN PBR support

10.5(3)F

Not Supported

VXLAN QoS policy

10.5(3)F

Not Supported

Base L3 QoS policies

10.5(3)F

Not Supported

VXLAN peer-based total packet/byte counters

10.5(3)F

Not Supported

Separate counters for unicast, multicast and broadcast traffic

10.5(3)F

Not Supported

DSVNI and route leak

10.5(3)F

Not Supported

Non-VXLAN access features

  • QinVNI, selective QinVNI

  • Port-VLAN mapping

  • Multitag

  • Xconnect

  • L2PT/VXLAN

  • Private VLAN

  • Port Security

10.5(3)F

Not Supported

VXLAN ESI multihoming

10.5(3)F

Not Supported

Firewall clustering with VXLAN

10.5(3)F

Not Supported

Southbound loop detection

10.5(3)F

Not Supported

SGACL

10.5(3)F

Not Supported

VXLAN Consistency Checker

10.5(3)F

Not Supported

VXLAN TE

10.5(3)F

Not Supported

IPv4 over RFC 5549 with tenant VRF

-

Not Supported

IPv4 VNF: IPv4 services over IPv4 PE-CE BGP session

-

Not Supported

RFC 5549 VNF: IPv4 services over IPv6 PE-CE BGP session

-

Not Supported

IPv6 VNF: IPv6 services over IPv6 PE-CE BGP session

-

Not Supported

ND Suppression

-

Not Supported

Multicast/TRM

-

Not Supported

Underlay multicast

-

Not Supported

Policy Based Routing

-

Not Supported

New L3VNI config

-

Not Supported

Group Policy Option

-

Not Supported

First Hop Security

-

Not Supported

PVLAN over VXLAN

-

Not Supported

Configuring VXLAN BGP EVPN with RFC 5549 Underlay on Single-Site

You can perform the configuration of VXLAN BGP EVPN with RFC 5549 underlay using LLA or global IPv6 address on a single-site environment.

To configure VXLAN BGP EVPN with RFC 5549 underlay, follow these steps:

Procedure


Step 1

configure terminal

Example:

VTEP# config terminal
VTEP(config)#

Enters global configuration mode.

Step 2

interface ethernet port

Example:

VTEP(config)# interface ethernet1/2
VTEP(config-if)#

Enters Link local interface configuration mode for RFC 5549.

Step 3

ip forward

Example:

VTEP(config-if)# ip forward

Enables IPv4 based lookup even when the interface VLAN has no IP address defined.

Step 4

To generate link-local address, use any of the following options:

  • Link-local IPv6 address

    OR
  • Global IPv6 address

  1. To configure LLA, use any of the following options:

  • ipv6 link-local LL_ipv6_address (Manual option)

    OR

  • ipv6 address use-link-local-only (Auto option)

    OR

  • ipv6 link-local use-bia (Auto option)

Example:

VTEP(config-if)# ipv6 link-local fe80::1111:2222:2222:3101 

OR

VTEP(config-if)# ipv6 address use-link-local-only

OR

VTEP(config-if)# ipv6 link-local use-bia 

Configures the link-local IPv6 address for the interface based on the specified choice.

OR

  1. Global IPv6 address: By default generates the LLA

    Example:

    ipv6 address ipv6_address

    VTEP(config-if)# ipv6 address 2000:1:1::1/64 

    Configures the Global IPv6 address for the interface.

Step 5

exit

Example:

VTEP(config-if)# exit
VTEP(config)#

Exits the interface configuration mode.

Step 6

router bgp as-number

Example:

VTEP(config)# router bgp 1
VTEP(config-router)#

Enters BGP router configuration mode.

Step 7

neighbor [ipv6_address | ethernet port]

Example:

VTEP(config-router)# neighbor ethernet1/2 

Configures a BGP neighbor for an interface.

Step 8

remote-as value

Example:

VTEP(config-router)# remote-as 2
VTEP(config-router-neighbor)#

Configures remote peer's autonomous system number for BGP neighbor.

Step 9

address-family ipv4 unicast

Example:

VTEP(config-router-neighbor)# address-family ipv4 unicast
VTEP(config-router-neighbor-af)#

Configures the IPv4 unicast address family as specified.

Step 10

address-family ipv6 unicast

Example:

VTEP(config-router-neighbor-af)# address-family ipv6 unicast

Configures the IPv6 unicast address family as specified.

Step 11

address-family l2vpn evpn

Example:

VTEP(config-router-neighbor-af)# address-family l2vpn evpn

Configures address family Layer 2 VPN EVPN under the BGP neighbor.

Step 12

(Optional) Allowas-in number-of-occurrences-of-AS-number

Example:

VTEP(config-router-neighbor-af)# Allowas-in 3

Only for eBGP deployment cases: Allows duplicate autonomous system (AS) numbers in the AS path. Configure this parameter on the leaf for eBGP when all leafs are using the same AS, but the spines have a different AS than leafs.

Step 13

send-community both

Example:

VTEP(config-router-neighbor-af)# send-community both

Configures community for BGP neighbors.

Step 14

disable-peer-as-check

Example:

VTEP(config-router-neighbor-af)# disable-peer-as-check

Disables checking the peer AS number during route advertisement. Configure this parameter on the spine for eBGP when all leafs are using the same AS but the spines have a different AS than leafs.

Note

 

This command is required for eBGP. For more information on eBGP configuration, see eBGP Underlay IP Network.

Step 15

router bgp as-number

Example:

Spine(config)# router bgp 2
Spine(config-router)#

Enters BGP router configuration mode.

Step 16

neighbor [ipv6_address | ethernet port]

Example:

Spine(config-router)# neighbor ethernet1/1
Spine(config-router-neighbor)#

Configures a BGP neighbor for an interface.

Step 17

remote-as value

Example:

Spine(config-router-neighbor)# remote-as 1

Configures remote peer's autonomous system number for BGP neighbor.

Step 18

address-family ipv4 unicast

Example:

Spine(config-router-neighbor)# address-family ipv4 unicast
config-router-neighbor-af

Configures the IPv4 unicast address family as specified.

Step 19

address-family ipv6 unicast

Example:

Spine(config-router-neighbor-af)# address-family ipv6 unicast

Configures the IPv6 unicast address family as specified.

Step 20

address-family l2vpn evpn

Example:

Spine(config-router-neighbor-af)# address-family l2vpn evpn

Configures address family Layer 2 VPN EVPN under the BGP neighbor.

Step 21

disable-peer-as-check

Example:

Spine(config-router-neighbor-af)# disable-peer-as-check

Disables checking the peer AS number during route advertisement. Configure this parameter on the spine for eBGP when all leafs are using the same AS but the spines have a different AS than leafs.

Note

 

This command is required for eBGP. For more information on eBGP configuration, see eBGP Underlay IP Network.

Step 22

send-community both

Example:

Spine(config-router-neighbor-af)# send-community both

Configures community for BGP neighbors.

Step 23

route-map NEXT-HOP-UNCH out

Example:

Spine(config-router-neighbor-af)# route-map NEXT-HOP-UNCH out

Applies route-map to keep the next-hop unchanged.


Examples of VXLAN BGP EVPN with RFC 5549 Underlay

Example of VXLAN BGP EVPN with RFC 5549 Underlay for Single-Site

  • The following example shows how the IPv4 address is advertised over the IPv6 interface from Spine to Leaf using LLA address:

    spine# show ip route 10.1.1.0
    IP Route Table for VRF "default"
    '*' denotes best ucast next-hop
    '**' denotes best mcast next-hop
    '[x/y]' denotes [preference/metric]
    '%<string>' in via output denotes VRF <string>
    
    10.1.1.0/24, ubest/mbest: 1/0
        *via fe80::1111:2222:2222:131%default, Eth1/2, [200/0], 6d09h, bgp-2, internal, tag 2
    
  • The following example shows how the IPv4 address is advertised over the IPv6 interface from Spine to Leaf using global IPv6 address:
    spine# show ip route 10.2.2.0
    IP Route Table for VRF "default"
    '*' denotes best ucast next-hop
    '**' denotes best mcast next-hop
    '[x/y]' denotes [preference/metric]
    '%<string>' in via output denotes VRF <string>
    
    10.2.2.0/24, ubest/mbest: 1/0
        *via 30:3:1::1%default, Eth1/2, [200/0], 6d09h, bgp-2, external, tag 2
    
  • The following example shows reachability of IPv4 VTEP over IPv6 LLA next-hop followed by an IPv4 overlay route with IPv4 VTEP as next-hop in RFC 5549 underlay:
    vtep1# show nve peers 
    ! shows all the IPv4 VTEPs
    
    Interface Peer-IP                                 State LearnType Uptime   Router-Mac       
    --------- --------------------------------------  ----- --------- -------- -----------------
    nve1      2.2.2.2                                 Up    CP        1d12h    5214.bc4d.1b08   
    nve1      3.3.3.2                                 Up    CP        1d12h    5267.54a7.1b08   
    nve1      4.4.4.2                                 Up    CP        1d12h    52ad.917e.1b08   
    
    vtep1# show ip route 3.3.3.2 
    ! The remote VTEP is reachable via the IPv6 LLA in underlay
    IP Route Table for VRF "default"
    '*' denotes best ucast next-hop
    '**' denotes best mcast next-hop
    '[x/y]' denotes [preference/metric]
    '%<string>' in via output denotes VRF <string>
    
    3.3.3.2/32, ubest/mbest: 1/0
        *via fe80::a111:2222:3333:e11%default, Eth1/1, [20/0], 1d12h, bgp-1, external, tag 2
    
    vtep1# show ip route 100.1.3.1 vrf vrF_Flow1_1 
    !The prefix route is reachable via the IPv4 VTEP
    IP Route Table for VRF "VRF_Flow1_1"
    '*' denotes best ucast next-hop
    '**' denotes best mcast next-hop
    '[x/y]' denotes [preference/metric]
    '%<string>' in via output denotes VRF <string>
    
    100.1.3.1/32, ubest/mbest: 1/0
        *via 3.3.3.2%default, [20/0], 1d12h, bgp-1, external, tag 2, segid: 501001 tunnelid: 0x3030302 encap: VXLAN
    
    ! Following single session is used for both IPv6 underlay as well as L2VPN EVPN IPv6 session for the overlay
    vtep1# show bgp sessions  
    ! Shows the ipv6 link local sessions
    
    Total peers 16, established peers 16
    ASN 1
    VRF default, local ASN 1
    peers 2, established peers 2, local router-id 1.1.1.1
    State: I-Idle, A-Active, O-Open, E-Established, C-Closing, S-Shutdown
    
    Neighbor        ASN    Flaps LastUpDn|LastRead|LastWrit St Port(L/R)  Notif(S/R)
    fe80::a111:2222:3333:e11%Ethernet1/1
                        2 0     1d12h   |00:00:28|00:00:31 E   179/43226      0/0
    fe80::b111:2222:3333:e11%Ethernet1/2
                        2 0     1d12h   |00:00:27|00:00:21 E   179/26264      0/0