Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide
9.3(x)
First Published: 2019-07-20
Last Modified: 2020-12-18
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS REFERENCED IN THIS DOCUMENTATION ARE SUBJECT TO CHANGE WITHOUT NOTICE.
EXCEPT AS MAY OTHERWISE BE AGREED BY CISCO IN WRITING, ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS DOCUMENTATION ARE
PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED.
The Cisco End User License Agreement and any supplemental license terms govern your use of any Cisco software, including this product documentation, and are located at:
http://www.cisco.com/go/softwareterms.Cisco product warranty information is available at http://www.cisco.com/go/warranty. US Federal Communications Commission Notices are found
here http://www.cisco.com/c/en/us/products/us-fcc-notice.html.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any products and features described herein as in development or available at a future date remain in varying stages of development and will be offered on a when-and if-available basis. Any
such product or feature roadmaps are subject to change at the sole discretion of Cisco and Cisco will have no liability for delay in the delivery or failure to deliver any products or feature
roadmap items that may be set forth in this document.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based
on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language
that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com
go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any
other company. (1721R)
© 2019–2020 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 1 Overview 1
Licensing Requirements 1
VXLAN Overview 1
Cisco Nexus 9000 as Hardware-Based VXLAN Gateway 2
VXLAN Encapsulation and Packet Format 2
VXLAN Tunnel 3
VXLAN Tunnel Endpoint 3
Underlay Network 3
Overlay Network 3
Distributed Anycast Gateway 3
Control Plane 4
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
iii
Contents
Configuring VXLAN 23
Enabling VXLANs 23
Mapping VLAN to VXLAN VNI 23
Creating and Configuring an NVE Interface and Associate VNIs 23
Configuring a VXLAN VTEP in vPC 24
Configuring Static MAC for VXLAN VTEP 26
Disabling VXLANs 27
Configuring BGP EVPN Ingress Replication 28
Configuring Static Ingress Replication 28
VXLAN and IP-in-IP Tunneling 29
Configuring VXLAN Static Tunnels 32
About VXLAN Static Tunnels 32
Guidelines and Limitations for VXLAN Static Tunnels 32
Enabling VXLAN Static Tunnels 33
Configuring VRF Overlay for Static Tunnels 34
Configuring a VRF for VXLAN Routing 34
Configuring the L3 VNI for Static Tunnels 35
Configuring the Tunnel Profile 36
Verifying VXLAN Static Tunnels 37
Example Configurations for VXLAN Static Tunnels 37
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
iv
Contents
Guidelines and Limitations for VXLAN with IPv6 in the Underlay (VXLANv6) 90
Information About vPC and VXLAN with IPv6 in the Underlay (VXLANv6) 91
Information About vPC Peer Keepalive and VXLAN with IPv6 in the Underlay (VXLANv6) 92
Configuring the VTEP IP Address 93
Configuring vPC for VXLAN with IPv6 in the Underlay (VXLANv6) 94
Example Configurations for VXLAN with IPv6 in the Underlay (VXLANv6) 95
Verifying VXLAN with IPv6 in the Underlay (VXLANv6) 97
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
v
Contents
Centralized VRF Route-Leaking Brief - Shared Internet with VRF Default 131
Configuring Centralized VRF Route-Leaking - Shared Internet with VRF Default 132
Configuring VRF Default on Border Node 132
Configuring BGP Instance for VRF Default on the Border Node 132
Configuring Custom VRF on Border Node 133
Configuring Filter for Permitted Prefixes from VRF Default on the Border Node 133
Configuring Custom VRF Context on the Border Node - 2 134
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
vi
Contents
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
vii
Contents
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
viii
Contents
Configuring a TRM Border Leaf Node for RP Everywhere with PIM Anycast 213
Configuring an External Router for RP Everywhere with PIM Anycast 215
Configuring RP Everywhere with MSDP Peering 217
Configuring a TRM Leaf Node for RP Everywhere with MSDP Peering 218
Configuring a TRM Border Leaf Node for RP Everywhere with MSDP Peering 219
Configuring an External Router for RP Everywhere with MSDP Peering 221
Configuring Layer 3 Tenant Routed Multicast 223
Configuring TRM on the VXLAN EVPN Spine 227
Configuring Tenant Routed Multicast in Layer 2/Layer 3 Mixed Mode 229
Configuring Layer 2 Tenant Routed Multicast 234
Configuring TRM with vPC Support 235
Configuring TRM with vPC Support (Cisco Nexus 9504-R and 9508-R) 238
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
ix
Contents
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
x
Contents
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
xi
Contents
CHAPTER 20 Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP) 341
Information About Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP) 341
Guidelines and Limitations for Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP)
341
CHAPTER 21 Configuring Seamless Integration of EVPN with L3VPN (MPLS SR) 347
Information About Configuring Seamless Integration of EVPN with L3VPN (MPLS SR) 347
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
xii
Contents
Guidelines and Limitations for Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
349
Configuring the Handoff Node for Seamless Integration of EVPN (TRM) with MVPN 367
PIM/IGMP Configuration for the Handoff Node 367
BGP Configuration for the Handoff Node 368
VXLAN Configuration for the Handoff Node 369
MVPN Configuration for the Handoff Node 370
CoPP Configuration for the Handoff Node 371
Configuration Example for Seamless Integration of EVPN (TRM) with MVPN 372
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
xiii
Contents
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
xiv
Contents
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
xv
Contents
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
xvi
Preface
This preface includes the following sections:
• Audience, on page xvii
• Document Conventions, on page xvii
• Related Documentation for Cisco Nexus 9000 Series Switches, on page xviii
• Documentation Feedback, on page xviii
• Communications, Services, and Additional Information, on page xviii
Audience
This publication is for network administrators who install, configure, and maintain Cisco Nexus switches.
Document Conventions
Command descriptions use the following conventions:
Convention Description
bold Bold text indicates the commands and keywords that you enter literally
as shown.
Italic Italic text indicates arguments for which you supply the values.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
xvii
Preface
Related Documentation for Cisco Nexus 9000 Series Switches
Convention Description
variable Indicates a variable for which you supply values, in context where italics
cannot be used.
string A nonquoted set of characters. Do not use quotation marks around the
string or the string includes the quotation marks.
Convention Description
screen font Terminal sessions and information the switch displays are in screen font.
boldface screen font Information that you must enter is in boldface screen font.
italic screen font Arguments for which you supply values are in italic screen font.
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments
to [email protected]. We appreciate your feedback.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
xviii
Preface
Preface
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
xix
Preface
Preface
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
xx
CHAPTER 1
Overview
This chapter contains the following sections:
• Licensing Requirements, on page 1
• VXLAN Overview, on page 1
• Cisco Nexus 9000 as Hardware-Based VXLAN Gateway, on page 2
• VXLAN Encapsulation and Packet Format, on page 2
• VXLAN Tunnel, on page 3
• VXLAN Tunnel Endpoint, on page 3
• Underlay Network, on page 3
• Overlay Network, on page 3
• Distributed Anycast Gateway, on page 3
• Control Plane, on page 4
Licensing Requirements
For a complete explanation of Cisco NX-OS licensing recommendations and how to obtain and apply licenses,
see the Cisco NX-OS Licensing Guide.
VXLAN Overview
Virtual Extensible LAN (VXLAN) provides a way to extend Layer 2 networks across a Layer 3 infrastructure
using MAC-in-UDP encapsulation and tunneling. This feature enables virtualized and multitenant data center
fabric designs over a shared common physical infrastructure.
VXLAN has the following benefits:
• Flexible placement of workloads across the data center fabric.
It provides a way to extend Layer 2 segments over the underlying shared Layer 3 network infrastructure
so that tenant workloads can be placed across physical pods in a single data center. Or even across several
geographically divers data centers.
• Higher scalability to allow more Layer 2 segments.
VXLAN uses a 24-bit segment ID, the VXLAN network identifier (VNID). This allows a maximum of
16 million VXLAN segments to coexist in the same administrative domain. In comparison, traditional
VLANs use a 12-bit segment ID that can support a maximum of 4096 VLANs.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
1
Overview
Cisco Nexus 9000 as Hardware-Based VXLAN Gateway
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
2
Overview
VXLAN Tunnel
VXLAN Tunnel
A VXLAN encapsulated communication between two devices where they encapsulate and decapsulate an
inner Ethernet frame, is called a VXLAN tunnel. VXLAN tunnels are stateless since they are UDP encapsulated.
Underlay Network
The VXLAN segments are independent of the underlying physical network topology. Conversely, the underlying
IP network, often referred to as the underlay network, is independent of the VXLAN overlay. The underlay
network forwards the VXLAN encapsulated packets based on the outer IP address header. The outer IP address
header has the initiating VTEP's IP interface as the source IP address and the terminating VTEP's IP interface
as the destination IP address.
The primary purpose of the underlay in the VXLAN fabric is to advertise the reachability of the Virtual Tunnel
Endpoints (VTEPs). The underlay also provides a fast and reliable transport for the VXLAN traffic.
Overlay Network
In broadcast terms, an overlay is a virtual network that is built on top of an underlay network infrastructure.
In a VXLAN fabric, the overlay network is built of a control plane and the VXLAN tunnels. The control plane
is used to advertise MAC address reachability. The VXLAN tunnels transport the Ethernet frames between
the VTEPs.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
3
Overview
Control Plane
Control Plane
There are two widely adopted control planes that are used with VXLAN:
• Optimal East-West traffic between servers within and across data centers
• East-West traffic between servers, or virtual machines, is achieved by most specific routing at the
first hop router. First hop routing is done at the access layer. Host routes must be exchanged to
ensure most specific routing to and from servers or hosts. Virtual machine (VM) mobility is supported
by detecting new endpoint attachment when a new MAC address/IP address is seen directly connected
to the local switch. When the local switch sees the new MAC/IP, it signals the new location to rest
of the network.
• A standards-based control plane that can be deployed independent of a specific fabric controller.
• The MPBGP EVPN control plane approach provides:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
4
Overview
Control Plane
• IP reachability information for the tunnel endpoints associated with a segment and the hosts
behind a specific tunnel endpoint.
• Distribution of host MAC reachability to reduce/eliminate unknown unicast flooding.
• Distribution of host IP/MAC bindings to provide local ARP suppression.
• Host mobility.
• A single address family (MPBGP EVPN) to distribute both L2 and L3 route reachability
information.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
5
Overview
Control Plane
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
6
CHAPTER 2
Configuring VXLAN
This chapter contains the following sections:
• Guidelines and Limitations for VXLAN, on page 7
• Considerations for VXLAN Deployment, on page 13
• vPC Considerations for VXLAN Deployment, on page 15
• Network Considerations for VXLAN Deployments, on page 19
• Considerations for the Transport Network, on page 20
• Considerations for Tunneling VXLAN, on page 21
• Configuring VXLAN, on page 23
• VXLAN and IP-in-IP Tunneling, on page 29
• Configuring VXLAN Static Tunnels, on page 32
Table 1: ACL Options for VXLAN Traffic on Cisco Nexus 92300YC, 92160YC-X, 93120TX, 9332PQ, and 9348GC-FXP Switches
ACL Direction ACL Type VTEP Type Port Type Flow Traffic Type Supported
Direction
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
7
Configuring VXLAN
Guidelines and Limitations for VXLAN
ACL Direction ACL Type VTEP Type Port Type Flow Traffic Type Supported
Direction
• For scale environments, the VLAN IDs related to the VRF and Layer-3 VNI (L3VNI) must be reserved
with the system vlan nve-overlay id command.
• NLB in the unicast, multicast, and IGMP multicast modes is not supported on Cisco Nexus 9000 switch
VXLAN VTEPs. The work-around is to move the NLB cluster behind the intermediary device (which
supports NLB in the respective mode) and inject the cluster IP address as an external prefix into the
VXLAN fabric.
• Support added for MultiAuth Change of Authorization (CoA). For more information, see the Cisco Nexus
9000 Series NX-OS Security Configuration Guide, Release 9.3(x).
• The lacp vpc-convergence command can be configured in VXLAN and non-VXLAN environments
that have vPC port channels to hosts that support LACP.
• PIM BiDir for VXLAN underlay with and without vPC is supported.
The following features are not supported when PIM BiDir for VXLAN underlay is configured:
• Flood and Learn VXLAN
• Tenant Routed Multicast (TRM)
• VXLAN EVPN Multi-Site
• VXLAN EVPN Multihoming
• vPC attached VTEPs
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
8
Configuring VXLAN
Guidelines and Limitations for VXLAN
• When entering the no feature pim command, NVE ownership on the route is not removed so the route
stays and traffic continues to flow. Aging is done by PIM. PIM does not age out entries having a VXLAN
encap flag.
• Fibre Channel over Ethernet (FCoE) N-port Virtualization (NPV) can coexist with VXLAN on different
fabric uplinks but on the same or different front-panel ports on Cisco Nexus 93180YC-EX and
93180YC-FX switches.
Fibre Channel N-port Virtualization (NPV) can coexist with VXLAN on different fabric uplinks but on
the same or different front-panel ports on Cisco Nexus 93180YC-FX switches. VXLAN can exist only
on the Ethernet front-panel ports and not on the FC front-panel ports.
• VXLAN is supported on the Cisco Nexus 9348GC-FXP switch.
• VXLAN is not supported on the Cisco Nexus 92348GC switch.
• When SVI is enabled on a VTEP (flood and learn, or EVPN), make sure that ARP-ETHER TCAM is
carved using the hardware access-list tcam region arp-ether 256 command. This requirement does
not apply to Cisco Nexus 9200, 9300-EX, 9300-FX/FX2/FX3, and 9300-GX platform switches and Cisco
9500 Series switches with 9700-EX line cards.
• For information regarding the load-share keyword usage for PBR with VXLAN, see the Guidelines
and Limitations for Policy-Based Routing section of the Cisco Nexus 9000 Series NX-OS Unicast Routing
Configuration Guide, Release 9.3(x).
• Beginning with Cisco NX-OS Release 9.3(3), ARP suppression is supported for Cisco Nexus 9300-GX
platform switches.
• Beginning with Cisco NX-OS Release 9.3(5), ARP suppression is supported with reflective relay for
Cisco Nexus 9364C, 9300-EX, 9300-FX/FX2/FXP, and 9300-GX platform switches. For information
on reflective relay, see the Cisco Nexus 9000 Series NX-OS Layer 2 Switching Configuration Guide.
• Beginning with Cisco NX-OS Release 9.3(6), VXLAN flood and learn mode is supported for Cisco
Nexus 9300-GX platform switches.
• For the Cisco Nexus 9504 and 9508 switches with -R line cards, VXLAN Layer 2 Gateway is supported
on the 9636C-RX line card. VXLAN and MPLS cannot be enabled on the Cisco Nexus 9508 switch at
the same time.
• For the Cisco Nexus 9504 and 9508 switches with -R line cards, if VXLAN is enabled, the Layer 2
Gateway cannot be enabled when there is any line card other than the 9636C-RX.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
9
Configuring VXLAN
Guidelines and Limitations for VXLAN
• For the Cisco Nexus 9504 and 9508 switches with -R line cards, PIM/ASM is supported in the underlay
ports. PIM/Bidir is not supported. For more information, see the Cisco Nexus 9000 Series NX_OS Multicast
Routing Configuration Guide, Release 9.3(x).
• For the Cisco Nexus 9504 and 9508 switches with -R line cards, IPv6 hosts routing in the overlay is
supported.
• For the Cisco Nexus 9504 and 9508 switches with -R line cards, ARP suppression is supported.
• The load-share keyword has been added to the Configuring a Route Policy procedure for the PBR over
VXLAN feature.
For more information, see the Cisco Nexus 9000 Series NX_OS Unicast Routing Configuration Guide,
Release 9.x.
• The lacp vpc-convergence command is added for better convergence of Layer 2 EVPN VXLAN:
interface port-channel10
switchport
switchport mode trunk
switchport trunk allowed vlan 1001-1200
spanning-tree port type edge trunk
spanning-tree bpdufilter enable
lacp vpc-convergence
vpc 10
• Port-VLAN with VXLAN is supported on Cisco Nexus 9300-EX and 9500 Series switches with 9700-EX
line cards with the following exceptions:
• Only Layer 2 (no routing) is supported with port-VLAN with VXLAN on these switches.
• No inner VLAN mapping is supported.
• The system nve ipmc CLI command is not applicable to the Cisco 9200 and 9300-EX platform switches
and Cisco 9500 platform switches with 9700-EX line cards.
• Bind NVE to a loopback address that is separate from other loopback addresses that are required by
Layer 3 protocols. A best practice is to use a dedicated loopback address for VXLAN. This best practice
should be applied not only for the vPC VXLAN deployment, but for all VXLAN deployments.
• To remove configurations from an NVE interface, we recommend manually removing each configuration
rather than using the default interface nve command.
• show commands with the internal keyword are not supported.
• FEX ports do not support IGMP snooping on VXLAN VLANs.
• VXLAN is supported for the Cisco Nexus 93108TC-EX and 93180YC-EX switches and for Cisco Nexus
9500 Series switches with the X9732C-EX line card.
• DHCP snooping (Dynamic Host Configuration Protocol snooping) is not supported on VXLAN VLANs.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
10
Configuring VXLAN
Guidelines and Limitations for VXLAN
• RACLs are not supported on Layer 3 uplinks for VXLAN traffic. Egress VACLs support is not available
for de-capsulated packets in the network to access direction on the inner payload.
As a best practice, use PACLs/VACLs for the access to the network direction.
• The QoS buffer-boost feature is not applicable for VXLAN traffic.
• The following limitations apply to releases prior to Cisco NX-OS Release 9.3(5):
• SVI and subinterfaces as uplinks are not supported.
• VTEPs do not support VXLAN-encapsulated traffic over subinterfaces, regardless of VRF
participation or IEEE 802.1Q encapsulation.
• VTEPs do not support VXLAN-encapsulated traffic over parent interfaces if subinterfaces are
configured, regardless of VRF participation.
• Mixing subinterfaces for VXLAN and non-VXLAN VLANs is not supported.
• Beginning with Cisco NX-OS Release 9.3(5), VTEPs support VXLAN-encapsulated traffic over parent
interfaces if subinterfaces are configured. This feature is supported for VXLAN flood and learn, VXLAN
EVPN, VXLAN EVPN Multi-Site, and DCI. As shown in the following configuration example, VXLAN
traffic is forwarded on the parent interface (eth1/1) in the default VRF, and L3 IP (non-VXLAN) traffic
is forwarded on subinterfaces (eth1/1.10) in the tenant VRF.
interface ethernet 1/1
description VXLAN carrying interface
no switchport
ip address 10.1.1.1/30
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
11
Configuring VXLAN
Guidelines and Limitations for VXLAN
• Cisco Nexus 9300 Series switches with 100G uplinks only support VXLAN switching/bridging.
Cisco Nexus 9200, Cisco Nexus 9300-EX, and Cisco Nexus 9300-FX, and Cisco Nexus 9300-FX2
platform switches do not have this restriction.
• For Cisco Nexus 9504 and 9508 switches with -R line cards, the L3VNI's VLAN must be added on the
vPC peer-link trunk's allowed VLAN list.
• Native VLANs for VXLAN are not supported. All traffic on VXLAN Layer 2 trunks needs to be tagged.
This limitation applies to Cisco Nexus 9300 and 9500 switches with 95xx line cards. This limitation does
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
12
Configuring VXLAN
Considerations for VXLAN Deployment
not apply to Cisco Nexus 9200, 9300-EX, 9300-FX, and 9500 platform switches with -EX or -FX line
cards.
The following example shows how to reserve the VLAN IDs related to the VRF and the Layer-3 VNI:
system vlan nve-overlay id 2000
vlan 2000
vn-segment 50000
interface Vlan2000
vrf member MYVRF_50000
ip forward
ipv6 forward
Note The system vlan nve-overlay id command should be used for a VRF or a Layer-3
VNI (L3VNI) only. Do not use this command for regular VLANs or Layer-2
VNIs (L2VNI).
• When configuring VXLAN BGP EVPN, only the "System Routing Mode: Default" is applicable for the
following hardware platforms:
• Cisco Nexus 9200 platform switches
• Cisco Nexus 9300 platform switches
• Cisco Nexus 9300-EX platform switches
• Cisco Nexus 9300-FX/FX2/FX3 platform switches
• Cisco Nexus 9300-GX platform switches
• Cisco Nexus 9500 platform switches with X9500 line cards
• Cisco Nexus 9500 platform switches with X9700-EX/FX line cards
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
13
Configuring VXLAN
Considerations for VXLAN Deployment
Note When configuring SVI with flood and learn mode on the central gateway leaf, it
is mandatory to configure hardware access-list tcam region arp-ether size
double-wide. (You must decrease the size of an existing TCAM region before
using this command.)
For example:
hardware access-list tcam region arp-ether 256 double-wide
Note Configuring the hardware access-list tcam region arp-ether size double-wide
is not required on Cisco Nexus 9200 Series switches.
• When configuring ARP suppression with BGP-EVPN, use the hardware access-list tcam region
arp-ether size double-wide command to accommodate ARP in this region. (You must decrease the size
of an existing TCAM region before using this command.)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
14
Configuring VXLAN
vPC Considerations for VXLAN Deployment
Note This step is required for Cisco Nexus 9300 switches (NFE/ALE) and Cisco Nexus
9500 switches with N9K-X9564PX, N9K-X9564TX, and N9K-X9536PQ line
cards. This step is not needed with Cisco Nexus 9200 switches, Cisco Nexus
9300-EX switches, or Cisco Nexus 9500 switches with N9K-X9732C-EX line
cards.
• VXLAN tunnels cannot have more than one underlay next hop on a given underlay port. For example,
on a given output underlay port, only one destination MAC address can be derived as the outer MAC on
a given output port.
This is a per-port limitation, not a per-tunnel limitation. This means that two tunnels that are reachable
through the same underlay port cannot drive two different outer MAC addresses.
• When changing the IP address of a VTEP device, you must shut the NVE interface before changing the
IP address.
• As a best practice, the RP for the multicast group should be configured only on the spine layer. Use the
anycast RP for RP load balancing and redundancy.
The following is an example of an anycast RP configuration on spines:
• Static ingress replication and BGP EVPN ingress replication do not require any IP Multicast routing in
the underlay.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
15
Configuring VXLAN
vPC Considerations for VXLAN Deployment
• If a ping is initiated to the attached hosts on VXLAN VLAN from a vPC VTEP node, the source IP
address used by default is the anycast IP that is configured on the SVI. This ping can fail to get a response
from the host in case the response is hashed to the vPC peer node. This issue can happen when a ping is
initiated from a VXLAN vPC node to the attached hosts without using a unique source IP address. As a
workaround for this situation, use VXLAN OAM or create a unique loopback on each vPC VTEP and
route the unique address via a backdoor path.
• The loopback address used by NVE needs to be configured to have a primary IP address and a secondary
IP address.
The secondary IP address is used for all VXLAN traffic that includes multicast and unicast encapsulated
traffic.
• vPC peers must have identical configurations.
• Consistent VLAN to vn-segment mapping.
• Consistent NVE1 binding to the same loopback interface
• Using the same secondary IP address.
• Using different primary IP addresses.
• For multicast, the vPC node that receives the (S, G) join from the RP (rendezvous point) becomes the
DF (designated forwarder). On the DF node, encap routes are installed for multicast.
Decap routes are installed based on the election of a decapper from between the vPC primary node and
the vPC secondary node. The winner of the decap election is the node with the least cost to the RP.
However, if the cost to the RP is the same for both nodes, the vPC primary node is elected.
The winner of the decap election has the decap mroute installed. The other node does not have a decap
route installed.
• On a vPC device, BUM traffic (broadcast, unknown-unicast, and multicast traffic) from hosts is replicated
on the peer-link. A copy is made of every native packet and each native packet is sent across the peer-link
to service orphan-ports connected to the peer vPC switch.
To prevent traffic loops in VXLAN networks, native packets ingressing the peer-link cannot be sent to
an uplink. However, if the peer switch is the encapper, the copied packet traverses the peer-link and is
sent to the uplink.
Note Each copied packet is sent on a special internal VLAN (VLAN 4041 or VLAN
4046).
• When the peer-link is shut, the loopback interface used by NVE on the vPC secondary is brought down
and the status is Admin Shut. This is done so that the route to the loopback is withdrawn on the upstream
and that the upstream can divert all traffic to the vPC primary.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
16
Configuring VXLAN
vPC Considerations for VXLAN Deployment
Note Orphans connected to the vPC secondary will experience loss of traffic for the
period that the peer-link is shut. This is similar to Layer 2 orphans in a vPC
secondary of a traditional vPC setup.
• When peer-link is no-shut, the NVE loopback address is brought up again and the route is advertised
upstream, attracting traffic.
• For vPC, the loopback interface has two IP addresses: the primary IP address and the secondary IP
address.
The primary IP address is unique and is used by Layer 3 protocols.
The secondary IP address on loopback is necessary because the interface NVE uses it for the VTEP IP
address. The secondary IP address must be same on both vPC peers.
• The vPC peer-gateway feature must be enabled on both peers to facilitate NVE RMAC/VMAC
programming on both peers. For peer-gateway functionality, at least one backup routing SVI is required
to be enabled across peer-link and also configured with PIM. This provides a backup routing path in the
case when VTEP loses complete connectivity to the spine. Remote peer reachability is re-routed over
peer-link in his case. In BUD node topologies, the backup SVI needs to be added as a static OIF for each
underlay multicast group.
switch# sh ru int vlan 2
interface Vlan2
description backupl_svi_over_peer-link
no shutdown
ip address 30.2.1.1/30
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
ip igmp static-oif route-map match-mcast-groups
Note In BUD node topologies, the backup SVI needs to be added as a static OIF for
each underlay multicast group.
The SVI must be configured on bot vPC peers and requires PIM to be enabled.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
17
Configuring VXLAN
vPC Considerations for VXLAN Deployment
• Redundant anycast RPs configured in the network for multicast load-balancing and RP redundancy are
supported on vPC VTEP topologies.
• As a best practice, when changing the secondary IP address of an anycast vPC VTEP, the NVE interfaces
on both the vPC primary and the vPC secondary must be shut before the IP changes are made.
• When SVI is enabled on a VTEP (flood and learn, or EVPN) regardless of ARP suppression, make sure
that ARP-ETHER TCAM is carved using the hardware access-list tcam region arp-ether 256
double-wide command. This requirement does not apply to Cisco Nexus 9200, 9300-EX, and
9300-FX/FX2/FX3 and 9300-GX platform switches and Cisco Nexus 9500 platform switches with
9700-EX line cards.
• The show commands with the internal keyword are not supported.
• DHCP snooping (Dynamic Host Configuration Protocol snooping) is not supported on VXLAN VLANs.
• RACLs are not supported on Layer 3 uplinks for VXLAN traffic. Egress VACLs support is not available
for de-capsulated packets in the network to access direction on the inner payload.
As a best practice, use PACLs/VACLs for the access to the network direction.
See the Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.3(x) for other guidelines
and limitations for the VXLAN ACL feature.
• QoS classification is not supported for VXLAN traffic in the network to access direction on the Layer
3 uplink interface.
See the Cisco Nexus 9000 Series NX-OS Quality of Service Configuration Guide, Release 9.3(x) for
other guidelines and limitations for the VXLAN QoS feature.
• The QoS buffer-boost feature is not applicable for VXLAN traffic.
• Beginning with Cisco NX-OS Release 9.3(5), VTEPs support VXLAN-encapsulated traffic over parent
interfaces if subinterfaces are configured.
• VTEPs do not support VXLAN encapsulated traffic over subinterfaces. This is regardless of VRF
participation or IEEE802.1Q encapsulation.
• Mixing subinterfaces for VXLAN and non-VXLAN VLANs is not supported.
• Point-to-multipoint Layer 3 and SVI uplinks are not supported.
• Using the ip forward command enables the VTEP to forward the VXLAN de-capsulated packet destined
to its router IP to the SUP/CPU.
• Before configuring it as an SVI, the backup VLAN needs to be configured on Cisco Nexus 9200, 9300-EX,
and 9300-FX/FX2/FX3 and 9300-GX platform switches as an infra-VLAN with the system nve
infra-vlans command.
• VXLAN is supported on Cisco Nexus 9500 platform switches with the following line cards:
• 9564PX
• 9564TX
• 9536PQ
• 9732C-EX
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
18
Configuring VXLAN
Network Considerations for VXLAN Deployments
• When Cisco Nexus 9500 platform switches are used as VTEPs, 100G line cards are not supported on
Cisco Nexus 9500 platform switches. This limitation does not apply to a Cisco Nexus 9500 switch with
9700-EX or -FX line cards.
• Cisco Nexus 9300 platform switches with 100G uplinks only support VXLAN switching/bridging. Cisco
Nexus 9200 and Cisco Nexus 9300-EX/FX/FX2 platform switches do not have this restriction.
• The VXLAN UDP port number is used for VXLAN encapsulation. For Cisco Nexus NX-OS, the UDP
port number is 4789. It complies with IETF standards and is not configurable.
• For Cisco Nexus 9200 platform switches that have the Application Spine Engine (ASE2). There exists
a Layer 3 VXLAN (SVI) throughput issue. There is a data loss for packets of sizes 99 - 122.
• The VXLAN network identifier (VNID) 16777215 is reserved and should not be configured explicitly.
• VXLAN supports In Service Software Upgrade (ISSU).
• VXLAN ISSU is not supported on the Cisco Nexus 9300-GX platform switches.
• VXLAN does not support coexistence with the GRE tunnel feature or the MPLS (static or segment
routing) feature.
• VTEP connected to FEX host interface ports is not supported.
• Resilient hashing (port-channel load-balancing resiliency) and VXLAN configurations are not compatible
with VTEPs using ALE uplink ports.
• When ARP suppression is enabled or disabled in a vPC setup, a down time is required because the global
VXLAN vPC consistency checker will fail and the VLANs will be suspended if ARP suppression is
disabled or enabled on only one side.
Note For information about VXLAN BGP EVPN scalability, see the Cisco Nexus 9000 Series NX-OS Verified
Scalability Guide, Release 9.3(x).
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
19
Configuring VXLAN
Considerations for the Transport Network
1550-byte packets at a minimum. Jumbo-frame support in the transport network is required if the overlay
applications tend to use larger frame sizes than 1500 bytes.
• ECMP and LACP Hashing Algorithms in the Transport Network
As described in a previous section, Cisco Nexus 9000 Series Switches introduce a level of entropy in
the source UDP port for ECMP and LACP hashing in the transport network. As a way to augment this
implementation, the transport network uses an ECMP or LACP hashing algorithm that takes the UDP
source port as an input for hashing, which achieves the best load-sharing results for VXLAN encapsulated
traffic.
• Multicast Group Scaling
The VXLAN implementation on Cisco Nexus 9000 Series Switches uses multicast tunnels for broadcast,
unknown unicast, and multicast traffic forwarding. Ideally, one VXLAN segment mapping to one IP
multicast group is the way to provide the optimal multicast forwarding. It is possible, however, to have
multiple VXLAN segments share a single IP multicast group in the core network. VXLAN can support
up to 16 million logical Layer 2 segments, using the 24-bit VNID field in the header. With one-to-one
mapping between VXLAN segments and IP multicast groups, an increase in the number of VXLAN
segments causes a parallel increase in the required multicast address space and the amount of forwarding
states on the core network devices. At some point, multicast scalability in the transport network can
become a concern. In this case, mapping multiple VXLAN segments to a single multicast group can help
conserve multicast control plane resources on the core devices and achieve the desired VXLAN scalability.
However, this mapping comes at the cost of suboptimal multicast forwarding. Packets forwarded to the
multicast group for one tenant are now sent to the VTEPs of other tenants that are sharing the same
multicast group. This causes inefficient utilization of multicast data plane resources. Therefore, this
solution is a trade-off between control plane scalability and data plane efficiency.
Despite the suboptimal multicast replication and forwarding, having multiple-tenant VXLAN networks
to share a multicast group does not bring any implications to the Layer 2 isolation between the tenant
networks. After receiving an encapsulated packet from the multicast group, a VTEP checks and validates
the VNID in the VXLAN header of the packet. The VTEP discards the packet if the VNID is unknown
to it. Only when the VNID matches one of the VTEP’s local VXLAN VNIDs, does it forward the packet
to that VXLAN segment. Other tenant networks will not receive the packet. Thus, the segregation between
VXLAN segments is not compromised.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
20
Configuring VXLAN
Considerations for Tunneling VXLAN
For Cisco Nexus 9200, 9300-EX, and 9300-FX/FX2/FX3 and 9300-GX platform switches, the use of the
system nve infra-vlans command is required. Otherwise, VXLAN traffic (IP/UDP 4789) is actively treated
by the switch. The following scenarios are a non-exhaustive list but most commonly seen, where the need for
a system nve infra-vlans definition is required.
Every VLAN that is not associated with a VNI (vn-segment) is required to be configured as a system nve
infra-vlans in the following cases:
In the case of VXLAN flood and learn as well as VXLAN EVPN, the presence of non-VXLAN VLANs could
be related to:
• An SVI related to a non-VXLAN VLAN is used for backup underlay routing between vPC peers via a
vPC peer-link (backup routing).
• An SVI related to a non-VXLAN VLAN is required for connecting downstream routers (external
connectivity, dynamic routing over vPC).
• An SVI related to a non-VXLAN VLAN is required for per Tenant-VRF peering (L3 route sync and
traffic between vPC VTEPs in a Tenant VRF).
• An SVI related to a non-VXLAN VLAN is used for first-hop routing toward endpoints (Bud-Node).
In the case of VXLAN flood and learn, the presence of non-VXLAN VLANs could be related to:
• An SVI related to a non-VXLAN VLAN is used for an underlay uplink toward the spine (Core port).
The rule of defining VLANs as system nve infra-vlans can be relaxed for special cases such as:
• An SVI related to a non-VXLAN VLAN that does not transport VXLAN traffic (IP/UDP 4789).
• Non-VXLAN VLANs that are not associated with an SVI or not transporting VXLAN traffic (IP/UDP
4789).
Note You must not configure certain combinations of infra-VLANs. For example, 2 and 514, 10 and 522, which
are 512 apart. This is specifically but not exclusive to the “Core port” scenario that is described for VXLAN
flood and learn.
Note * Not required for static ingress replication or BGP EVPN ingress replication.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
21
Configuring VXLAN
Considerations for Tunneling VXLAN
Nested VXLAN (Host Overlay over Network Overlay) support has been added starting with Cisco NX-OS
Release 7.0(3)I7(4) and Cisco NX-OS Release 9.2(2) on the Cisco Nexus 9200, 9300-EX, 9300-FX, and
9300-FX2 platform switches. It is also supported for Cisco Nexus 9300-FX3 platform switches starting with
Cisco NX-OS Release 9.3(5).
Figure 2: Host Overlay
To provide Nested VXLAN support, the switch hardware and software must differentiate between two different
VXLAN profiles:
• VXLAN originated behind the Hardware VTEP for transport over VXLAN BGP EVPN (nested VXLAN)
• VXLAN originated behind the Hardware VTEP to integrated with VXLAN BGP EVPN (BUD Node)
The detection of the two different VXLAN profiles is automatic and no specific configuration is needed for
nested VXLAN. As soon as VXLAN encapsulated traffic arrives in a VXLAN enabled VLAN, the traffic is
transported over the VXLAN BGP EVPN enabled DC Fabric.
The following attachment modes are supported for Nested VXLAN:
• Untagged traffic (in native VLAN on a trunk port or on an access port)
• Tagged traffic (tagged VLAN on a IEEE 802.1Q trunk port)
• Untagged and tagged traffic that is attached to a vPC domain
• Untagged traffic on a Layer 3 interface of a Layer 3 port-channel interface
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
22
Configuring VXLAN
Configuring VXLAN
Configuring VXLAN
Enabling VXLANs
Procedure
Step 3 [no] feature vn-segment-vlan-based Configures the global mode for all VXLAN
bridge domains.
Step 4 (Optional) copy running-config startup-config Saves the change persistently through reboots
and restarts by copying the running
configuration to the startup configuration.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
23
Configuring VXLAN
Configuring a VXLAN VTEP in vPC
Procedure
Step 7 Define a PIM RP address for the underlay multicast group range.
switch(config)# ip pim rp-address 192.168.100.1 group-list 224.0.0/4
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
24
Configuring VXLAN
Configuring a VXLAN VTEP in vPC
Step 10 Create the SVI used for the backup routed path over the vPC peer-link.
switch(config)# interface vlan 10
switch(config-if)# ip address 10.10.10.1/30
switch(config-if)# ip router ospf UNDERLAY area 0
switch(config-if)# ip pim sparse-mode
switch(config-if)# no ip redirects
switch(config-if)# mtu 9216
(Optional)switch(config-if)# ip igmp static-oif route-map match-mcast-groups
switch(config-if)# no shutdown
(Optional)switch(config)# route-map match-mcast-gropus permit 10
(Optional)switch(config-route-map)# match ip multicast group 225.1.1.1/32
Step 12 Create a primary IP address for the data plane loopback interface.
switch(config)# interface loopback 1
switch(config-if)# description Data_Plane_loopback
switch(config-if)# ip address z.z.z.z/32
switch(config-if)# ip router ospf process tag area area id
switch(config-if)# ip pim sparse-mode
switch(config-if)# no shutdown
Step 14 Configure the IPv4 address for the remote end of the vPC peer-keepalive link.
switch(config-vpc-domain)# peer-keepalive destination 172.28.230.85
Note The system does not form the vPC peer link until you configure a vPC peer-keepalive link
Note Disable IP redirects on all interface-vlans of this vPC domain for correct operation of this feature.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
25
Configuring VXLAN
Configuring Static MAC for VXLAN VTEP
Note Disable IP redirects on all interface-vlans of this vPC domain for correct operation of this feature.
Step 17 Enable IP ARP synchronize under the vPC domain to facilitate faster ARP table population following device
reload.
switch(config-vpc-domain)# ip arp synchronize
Step 18 (Optional) Enable IPv6 nd synchronization under the vPC domain to facilitate faster nd table population
following device reload.
switch(config-vpc-domain)# ipv6 nd synchronize
Step 19 Create the vPC peer-link port-channel interface and add two member interfaces.
switch(config)# interface port-channel 1
switch(config-if)# switchport
switch(config-if)# switchport mode trunk
switch(config-if)# switchport trunk allowed vlan 1,10,100-200
switch(config-if)# mtu 9216
switch(config-if)# vpc peer-link
switch(config-if)# no shutdown
switch(config-if)# interface Ethernet 1/1 , 1/21
switch(config-if)# switchport
switch(config-if)# mtu 9216
switch(config-if)# channel-group 1 mode active
switch(config-if)# no shutdown
Note Static MAC cannot be configured for a control plane with a BGP EVPN-enabled VNI.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
26
Configuring VXLAN
Disabling VXLANs
Procedure
Step 2 mac address-table static mac-address vni Specifies the MAC address pointing to the
vni-id interface nve x peer-ip ip-address remote VTEP.
Step 4 (Optional) copy running-config startup-config Saves the change persistently through reboots
and restarts by copying the running
configuration to the startup configuration.
Step 5 (Optional) show mac address-table static Displays the static MAC addresses pointing to
interface nve x the remote VTEP.
Example
The following example shows the output for a static MAC address configured for VXLAN VTEP:
switch# show mac address-table static interface nve 1
Legend:
* - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
age - seconds since last seen,+ - primary entry using vPC Peer-Link,
(T) - True, (F) - False
VLAN MAC Address Type age Secure NTFY Ports
---------+-----------------+--------+---------+------+----+------------------
* 501 0047.1200.0000 static - F F nve1(33.1.1.3)
* 601 0049.1200.0000 static - F F nve1(33.1.1.4)
Disabling VXLANs
Procedure
Step 2 no feature vn-segment-vlan-based Disables the global mode for all VXLAN bridge
domains
Step 4 (Optional) copy running-config startup-config Saves the change persistently through reboots
and restarts by copying the running
configuration to the startup configuration.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
27
Configuring VXLAN
Configuring BGP EVPN Ingress Replication
Procedure
Step 5 ingress-replication protocol bgp Enables BGP EVPN with ingress replication
for the VNI.
Procedure
Step 3 member vni [vni-id | vni-range] Maps VXLAN VNIs to the NVE interface.
Step 4 ingress-replication protocol static Enables static ingress replication for the VNI.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
28
Configuring VXLAN
VXLAN and IP-in-IP Tunneling
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
29
Configuring VXLAN
VXLAN and IP-in-IP Tunneling
Cisco Nexus 9300-FX2 platform switches support the coexistence of VXLAN and IP-in-IP tunneling with
the following limitations:
• VXLAN must be configured in the default VRF.
• Coexistence is supported on VXLAN with the EVPN control plane.
• IP-in-IP tunneling must be configured in the non-default VRF and is supported only in decapsulate-any
mode.
Note If you try to enable VXLAN when a decapsulate-any tunnel is configured in the
default VRF, an error message appears. It states that VXLAN and IP-in-IP
tunneling can coexist only for a decapsulate-any tunnel in the non-default VRF
and to remove the configuration.
• Point-to-point GRE tunnels are not supported. If you try to configure point-to-point tunnels, an error
message appears indicating that VXLAN and IP-in-IP tunneling can coexist only for a decapsulate-any
tunnel.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
30
Configuring VXLAN
VXLAN and IP-in-IP Tunneling
• Typically to configure a tunnel, you need to provide the two endpoints. However, decapsulate-any is a
receive-only tunnel, so you need to provide only the source IP address or source interface name. The
tunnel terminates on any IP interface in the same VRF.
• Tunnel statistics don't support egress counters.
• VXLAN and IP-in-IP tunnels can't share the same source loopback interface. Each tunnel must have its
own source loopback interface.
interface loopback 0
description VXLAN-loopback
ip address 125.125.125.125/32
interface Tunnel1
vrf member tunnel
ip address 55.55.55.1/24
tunnel mode ipip decapsulate-any ip
tunnel source loopback100
tunnel use-vrf tunnel
no shutdown
interface nve1
host-reachability protocol bgp
source-interface loopback0
global mcast-group 224.1.1.1 L2
global mcast-group 225.3.3.3 L3
member vni 10000
suppress-arp
ingress-replication protocol bgp
member vni 55500 associate-vrf
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
31
Configuring VXLAN
Configuring VXLAN Static Tunnels
Static tunnels are supported per VRF. Each VRF can have a dedicated L3VNI to transport a packet with proper
encapsulation and decapsulation on the switch and the software VTEP, the static peer. Typically, the static
peer is a Cisco Nexus 1000V or bare-metal server with one or more VMs terminating one or more VNIs.
However, a static peer can be any customer-developed device that complies with RFC 7348, Virtual eXtensible
Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3
Networks. Because the customer provides the static peer and a control plane protocol is not present, you must
ensure that the static peer forwards the VXLAN-related configuration and routes to the correct hosts.
Beginning with Cisco NX-OS Release 9.3(5), this feature supports the handling of packets coming in and
going out of the tunnel. Specifically, it allows the Nexus switch to send packets to the hosts or other switches
over the tunnel. In Cisco NX-OS Releases 9.3(3) and 9.3(4), VXLAN static tunnels support communication
only from the local host to the remote host.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
32
Configuring VXLAN
Enabling VXLAN Static Tunnels
interface Vlan802
no shutdown
vrf member vrfvxlan5201
ip address 103.33.1.1/16
fabric forwarding mode anycast-gateway
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
33
Configuring VXLAN
Configuring VRF Overlay for Static Tunnels
What to do next
Configure the VRF overlay VLAN for VXLAN routing over Static Tunnels.
Procedure
What to do next
Configure the VRF for VXLAN Routing over the Static Tunnel.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
34
Configuring VXLAN
Configuring the L3 VNI for Static Tunnels
What to do next
Configure the L3 VNI for the host.
Procedure
Step 3 vrf member vrf-name Assign the VLAN interface to the tenant VRF.
Example:
switch(config-if)# vrf member cust1
Warning: Deleted all L3 config on
interface Vlan2001
switch(config-if)#
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
35
Configuring VXLAN
Configuring the Tunnel Profile
What to do next
Configure the tunnel profile.
Procedure
Step 2 encapsulation {VXLAN | VXLAN-GPE | SRv6} Set the appropriate encapsulation type for the
tunnel profile.
Example:
switch(config-tnl-profile)# encapsulation Note In NX-OS release 9.3(3), only
vxlan encapsulation type vxlan is
switch(config-tnl-profile)# supported.
Step 4 route vrf tenant-vrf destination-host-prefix Create the tunnel route by specifying the
destination-vtep-ip-address next-hop-vrf destination software VTEP and entering the
destination-vtep-vrf vni vni-number route information for the VNI and destination
dest-vtep-mac destination-vtep-mac-address VTEP MAC address.
Example: Note The route vrf command accepts one
switch(tunnel-profile)# route vrf cust1 destination-vtep-mac-address per
101.1.1.2/32 7.7.7.1 next-hop-vrf destination-vtep-ip-address across
default vni 20001 dest-vtep-mac all the routes. If you configure
f80f.6f43.036c additional routes, they are cached as
switch(tunnel-profile)#
errored routes and a error syslog is
generated for each.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
36
Configuring VXLAN
Verifying VXLAN Static Tunnels
Procedure
Step 2 show ip route tenant-vrf-name Shows route information for the VRF
connecting to the software VTEP. For example,
you can use this command when a route
unreachable error occurs to verify that a
route exists for a VRF's tunnel.
Step 3 show running-config ofm Shows the running config for the OFM feature
and static tunnels. You can use this command
when a route unreachable error occurs
to check whether the route information for the
destination VTEP is present.
What to do next
In addition to VXLAN verification, you can use SPAN to check the ports and source VLANs for packets
traversing the switch.
NX-OS CLI
vlan 2001
vlan 2001
vn-segment 20001
interface Vlan2001
no shutdown
vrf member vrf1601
ip forward
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
37
Configuring VXLAN
Example Configurations for VXLAN Static Tunnels
feature ofm
tunnel-profile test
encapsulation vxlan
source-interface loopback1
route vrf cust1 101.1.1.2/32 7.7.7.1 next-hop-vrf default vni 20001 dest-vtep-mac
f80f.6f43.036c
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
38
CHAPTER 3
Configuring VXLAN BGP EVPN
This chapter contains the following sections:
• Information About VXLAN BGP EVPN, on page 39
• Guidelines and Limitations for VXLAN BGP EVPN, on page 41
• Information About VXLAN EVPN with Downstream VNI, on page 44
• Guidelines and Limitations for VXLAN EVPN with Downstream VNI, on page 46
• Configuring VXLAN BGP EVPN, on page 48
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
39
Configuring VXLAN BGP EVPN
About Route-Target Auto
For Multi-AS environments, the Route-Targets must either be statically defined or rewritten to match the
ASN portion of the Route-Targets.
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-x/command_references/
configuration_commands/b_N9K_Config_Commands_703i7x/b_N9K_Config_Commands_703i7x_chapter_
010010.html#wp4498893710
4-byte ASN
The Type 0 encoding allows a 2-byte administrative field and a 4-byte numbering field. Within Cisco NX-OS,
the auto-derived Route-Target is constructed with the Autonomous System Number (ASN) as the 2-byte
administrative filed and the Service Identifier (VNI) for the 4-byte numbering field. With the ASN demand
of 4-byte length and the VNI requiring 24-bit (3-bytes), the Sub-Field length within the Extended Community
is exhausted (2-byte Type and 6-byte Sub-Field). As a result of the length and format constraint and the
importance of the Service Identifiers (VNI) uniqueness, the 4-byte ASN is represented in a 2-byte ASN named
AS_TRANS, as described in IETF RFC 6793 section 9 (https://tools.ietf.org/html/rfc6793#section-9). The
2-byte ASN 23456 is registered by the IANA (https://www.iana.org/assignments/
iana-as-numbers-special-registry/iana-as-numbers-special-registry.xhtml) as AS_TRANS, a special purpose
AS number that aliases 4-byte ASNs.
Example auto derived Route-Target (RT) with 4-byte ASN (AS_TRANS):
• IP-VRF within ASN 65656 and L3VNI 50001 - Route-Target 23456:50001
• MAC-VRF within ASN 65656 and L2VNI 30001 - Route-Target 23456:30001
Note Beginning with Cisco NX-OS Release 9.2(1), auto derived Route-Target for 4-byte ASN is supported.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
40
Configuring VXLAN BGP EVPN
Guidelines and Limitations for VXLAN BGP EVPN
For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration
Guide, Release 9.3(x).
• When SVI is enabled on a VTEP (flood and learn, or EVPN) regardless of ARP suppression, make sure
that ARP-ETHER TCAM is carved using the hardware access-list tcam region arp-ether 256
double-wide command. This requirement does not apply to Cisco Nexus 9200, 9300-EX, and
9300-FX/FX2/FX3 and 9300-GX platform switches and Cisco Nexus 9500 platform switches with
9700-EX/FX line cards.
• For the Cisco Nexus 9504 and 9508 with R-series line cards, VXLAN EVPN (Layer 2 and Layer 3) is
only supported with the 9636C-RX and 96136YC-R line cards..
• You can configure EVPN over segment routing or MPLS. See the Cisco Nexus 9000 Series NX-OS
Label Switching Configuration Guide, Release 9.3(x) for more information.
• You can use MPLS tunnel encapsulation using the new CLI encapsulation mpls command. You can
configure the label allocation mode for the EVPN address family. See the Cisco Nexus 9000 Series
NX-OS Label Switching Configuration Guide, Release 9.3(x) for more information.
• In a VXLAN EVPN setup that has 2K VNI scale configuration, the control plane down time may take
more than 200 seconds. To avoid potential BGP flap, extend the graceful restart time to 300 seconds.
• Starting from Cisco NX-OS Release 9.3(5), new VXLAN uplink capabilities are introduced:
• A physical interface in default VRF is supported as VXLAN uplink.
• A parent interface in default VRF, carrying subinterfaces with VRF and dot1q tags, is supported as
VXLAN uplink.
• A subinterface in any VRF and/or with dot1q tag remains not supported as VXLAN uplink.
• An SVI in any VRF remains not supported as VXLAN uplink.
• In vPC with physical peer-link, a SVI can be leveraged as backup underlay, default VRF only
between the vPC members (infra-VLAN, system nve infra-vlans).
• FEX host interfaces remain not supported as VXLAN uplink and cannot have VTEPs connected
(BUD node).
• In a VXLAN EVPN setup, border nodes must be configured with unique route distinguishers, preferably
using the auto rd command. Not using unique route distinguishers across all border nodes is not supported.
The use of unique route distinguishers is strongly recommended for all VTEPs of a fabric.
• ARP suppression is only supported for a VNI if the VTEP hosts the First-Hop Gateway (Distributed
Anycast Gateway) for this VNI. The VTEP and the SVI for this VLAN have to be properly configured
for the distributed Anycast Gateway operation, for example, global Anycast Gateway MAC address
configured and Anycast Gateway feature with the virtual IP address on the SVI.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
41
Configuring VXLAN BGP EVPN
Guidelines and Limitations for VXLAN BGP EVPN
• DHCP snooping (Dynamic Host Configuration Protocol snooping) is not supported on VXLAN VLANs.
• RACLs are not supported on VXLAN uplink intefaces. VACLs are not supported on VXLAN
de-capsulated traffic in egress direction; this applies for the inner traffic coming from network (VXLAN)
towards the access (Ethernet).
As a best practice, always use PACLs/VACLs for the access (Ethernet) to the network (VXLAN) direction.
See the Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.3(x) for other guidelines
and limitations for the VXLAN ACL feature.
• The Cisco Nexus 9000 QoS buffer-boost feature is not applicable for VXLAN traffic.
• For VXLAN BGP EVPN fabrics with EBGP, the following recommendations are applicable:
• It is recommended to use loopbacks for the EBGP EVPN peering sessions (overlay control-plane).
• It is a best practice to use the physical interfaces for EBGP IPv4/IPv6 peering sessions (underlay).
• Bind the NVE source-interface to a dedicated loopback interface and do not share this loopback with
any function or peerings of Layer-3 protocols. A best practice is to use a dedicated loopback address for
the VXLAN VTEP function.
• The NVE source-interface loopback is required to be present in the default VRF.
• Only EBGP peering between a VTEP and external nodes (Edge Router, Core Router or VNF) is supported.
• EBGP peering from the VTEP to the external node using a physical interface or subinterfaces is
recommended and it is a best practice (external connectivity).
• The EBGP peering from the VTEP to the external node can be in the default VRF or in a tenant
VRF (external connectivity).
• The EBGP peering from the VTEP to a external node over VXLAN must be in a tenant VRF and
must use the update-source of a loopback interface (peering over VXLAN).
• Using an SVI for EBGP peering on a from the VTEP to the External Node requires the VLAN to
be local (not VXLAN extended).
• When configuring VXLAN BGP EVPN, only the "System Routing Mode: Default" is applicable for the
following hardware platforms:
• Cisco Nexus 9200 platform switches
• Cisco Nexus 9300 platform switches
• Cisco Nexus 9300-EX platform switches
• Cisco Nexus 9300-FX/FX2/FX3 platform switches
• Cisco Nexus 9300-GX platform switches
• Cisco Nexus 9500 platform switches with X9500 line cards
• Cisco Nexus 9500 platform switches with X9700-EX and X9700-FX line cards
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
42
Configuring VXLAN BGP EVPN
Guidelines and Limitations for VXLAN BGP EVPN
• Beginning with NX-OS version 9.3(3), the Cisco Nexus 9300-GX switch supports VXLAN BGP EVPN
for Layer-2 and Layer-3 Services with both Ingress Replication and Multicast in the underlay.
• VXLAN is supported on Cisco Nexus 9500 platform switches with the following line cards:
• 9500-R
• 9564PX
• 9564TX
• 9536PQ
• 9700-EX
• 9700-FX
• Cisco Nexus 9500 platform switches with 9700-EX or -FX line cards support 1G, 10G, 25G, 40G, 100G
and 400G for VXLAN uplinks.
• Cisco Nexus 9200 and 9300-EX/FX/FX2/FX3 and -GX support 1G, 10G, 25G, 40G, 100G and 400G
for VXLAN uplinks.
• The Cisco Nexus 9000 platform switches use standards conforming UDP port number 4789 for VXLAN
encapsulation. This value is not configurable.
• The Cisco Nexus 9200 platform switches with Application Spine Engine (ASE2) have throughput
constrains for packet sizes of 99-122 bytes; packet drops might be experienced.
• The VXLAN network identifier (VNID) 16777215 is reserved and should explicitly not be configured.
• Non-Disruptive In Service Software Upgrade (ND-ISSU) is supported on Nexus 9300 with VXLAN
enabled. Exception is ND-ISSU support for Cisco Nexus 9300-FX3 and 9300-GX platform switch.
• Gateway functionality for VXLAN to MPLS (LDP), VXLAN to MPLS-SR (Segment Routing) and
VXLAN to SRv6 can be operated on the same Cisco Nexus 9000 Series platform.
• VXLAN to MPLS (LDP) Gateway is supported on the Cisco Nexus 3600-R and the Cisco Nexus
9500 with R-Series line cards.
• VXLAN to MPLS-SR Gateway is supported on the Cisco Nexus 9300-FX2/FX3/GX and Cisco
Nexus 9500 with R-Series line cards.
• VXLAN to SRv6 is supported on the Cisco Nexus 9300-GX platform.
• VXLAN and GRE co-existence remains not supported on Cisco Nexus 9300-EX/FX/FX2/FX3/GX
and Cisco Nexus 9500 with 9700-EX and -FX line cards.
• Multiple Tunnel Encapsulations (VXLAN, GRE and/or MPLS, static label or segment routing) can
not co-exist on the same Cisco Nexus 9000 Series switch with Network Forwarding Engine (NFE).
• Resilient hashing is supported on the following switch platform with a VXLAN VTEP configured:
• Cisco Nexus 9300-EX/FX/FX2/FX3/GX support ECMP resilient hashing.
• Cisco Nexus 9300 with ALE uplink ports does not support resilient hashing.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
43
Configuring VXLAN BGP EVPN
Information About VXLAN EVPN with Downstream VNI
• It is recommended to use the vpc orphan-ports suspend command for single attached and/or routed
devices on a Cisco Nexus 9000 platform switch acting as vPC VTEP.
Note For information about VXLAN BGP EVPN scalability, see the Cisco Nexus 9000 Series NX-OS Verified
Scalability Guide.
Asymmetric VNIs
VXLAN EVPN with downstream VNI supports asymmetric VNI allocation.
The following figure shows an example of asymmetric VNIs. All three VTEPs have different VNIs configured
for the same IP VRF or MAC VRF.
Figure 4: Asymmetric VNIs
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
44
Configuring VXLAN BGP EVPN
Shared Services VRFs
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
45
Configuring VXLAN BGP EVPN
Guidelines and Limitations for VXLAN EVPN with Downstream VNI
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
46
Configuring VXLAN BGP EVPN
Guidelines and Limitations for VXLAN EVPN with Downstream VNI
• For downstream VNI with Layer-3 VNI, the underlay can be ingress replication or multicast based.
• For downstream VNI with Layer-2 VNI, the underlay must be in ingress replication. Multicast based
underlay is not supported with downstream VNI of Layer-2 VNIs.
• The usage of downstream VNI with multi-site requires all BGW across all sites to run at least Cisco
NX-OS Release 9.3(5).
• For existing centralized VRF route leaking deployments, a brief traffic loss might occur during ISSU to
Cisco NX-OS Release 9.3(5) or later.
• For successful downgrade from Cisco NX-OS Release 9.3(5) to a prior release, ensure that the asymmetric
VNI configuration has been removed. Downstream VNI is not supported prior to Cisco NX-OS Release
9.3(5) and hence traffic forwarding would be impacted.
• Layer-3 VNIs (IP-VRF) can flexibly mapped between VNIs per peer.
• VNI 50001 on VTEP1 can perform symmetric VNI with VNI 50001 and asymmetric VNI with VNI
50002 on VTEP2 at the same time.
• VNI 50001 on VTEP1 can perform asymmetric VNI with VNI 50002 on VTEP2 and VNI 50003
on VTEP3.
• VNI 50001 on VTEP1 can perform asymmetric VNI with VNI 50002 and VNI5003 on VTEP2 at
the same time.
• Layer-2 VNIs (MAC-VRF) can only be mapped to one VNI per peer.
• VNI 30001 on VTEP1 can perform asymmetric VNI with VNI 30002 on VTEP2 and VNI 30003
on VTEP3.
• VNI 30001 on VTEP1 cannot perform asymmetric VNI with VNI 30002 and VNI 3003 on VTEP2
at the same time.
• BGP peering across VXLAN and Downstream VNI support the following constellations:
• BGP peering between symmetric VNI is supported by using loopbacks.
• BGP peering between asymmetric VNI is supported if the VNIs are in a 1:1 relationship. A loopback
from VNI 50001 (on VTEP1) can peer with a loopback in VNI 50002 (on VTEP2).
• BGP peering between asymmetric VNI is supported if the VNIs are in a 1:1 relationship but on
different VTEPs. A loopback from VNI 50001 (on VTEP1) can peer with a loopback in VNI 50002
(on VTEP2 and VTEP3).
• BGP peering between asymmetric VNI is not supported if the VNIs are in a 1:N relationship. A
loopback in VNI 50001 (VTEP1) can’t peer with a loopback in VNI 50002 (VTEP2) and VNI 50003
(VTEP3) at the same time.
• VXLAN consistency checker is not supported for VXLAN EVPN with downstream VNI.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
47
Configuring VXLAN BGP EVPN
Configuring VXLAN BGP EVPN
• VXLAN EVPN with downstream VNI is currently not supported with the following feature combinations:
• VXLAN static tunnels
• TRM and TRM with Multi-Site
• CloudSec VXLAN EVPN Tunnel Encryption
• ESI-based multihoming
• Seamless integration of EVPN with L3VPN (MPLS SR)
• VXLAN policy-based routing (PBR)
Procedure
Step 5 nv overlay evpn Enable the EVPN control plane for VXLAN.
Note Step 3 to Step 6 are optional for configuring the VLAN for VXLAN VNI and are only necessary in case of
a custom route distinguisher or route-target requirement (not using auto derivation).
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
48
Configuring VXLAN BGP EVPN
Configuring VRF for VXLAN Routing
Step 4 vni number l2 Specify the Service Instance (VNI) for the EVI.
Step 6 route-target both {auto | rt} Configure the route target (RT) for import and
export of MAC prefixes. The RT is used for a
per-MAC-VRF prefix import/export policy. If
you enter an RT, the following formats are
supported: ASN2:NN, ASN4:NN, or IPV4:NN.
Note Specifying the auto option is
applicable only for IBGP.
Note Step 3 to step 6 are optional for configuring the VRF for VXLAN Routing and are only necessary in case of
a custom route distinguisher or route-target requirement (not using auto derivation).
Procedure
Step 4 address-family {ipv4 | ipv6} unicast Configure the IPv4 or IPv6 unicast address
family.
Step 5 route-target both {auto | rt} Configure the route target (RT) for import and
export of IPv4 or IPv6 prefixes. The RT is used
for a per-IP-VRF prefix import/export policy.
If you enter an RT, the following formats are
supported: ASN2:NN, ASN4:NN, or IPV4:NN.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
49
Configuring VXLAN BGP EVPN
Configuring SVI for Core-facing VXLAN Routing
Step 6 route-target both {auto | rt} evpn Configure the route target (RT) for import and
export of IPv4 or IPv6 prefixes. The RT is used
for a per-VRF prefix import/export policy. If
you enter an RT, the following formats are
supported: ASN2:NN, ASN4:NN, or IPV4:NN.
Note Specifying the auto option is
applicable only for IBGP.
Manually configured route targets
are required for EBGP and for
asymmetric VNIs.
Procedure
Step 6 no {ip |ipv6} redirects Disable sending IP redirect messages for IPv4
and IPv6.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
50
Configuring VXLAN BGP EVPN
Configuring SVI for Host-Facing VXLAN Routing
Procedure
Step 8 fabric forwarding mode anycast-gateway Associate SVI with anycast gateway under
VLAN configuration mode.
Step 2 host-reachability protocol bgp This defines BGP as the mechanism for host
reachability advertisement
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
51
Configuring VXLAN BGP EVPN
Configuring VXLAN EVPN Ingress Replication
Step 4 member vni vni Add Layer 2 VNIs to the tunnel interface.
Step 6 member vni vni associate-vrf Add Layer-3 VNIs, one per tenant VRF, to the
overlay.
Note Required for VXLAN routing only.
Before you begin: The following are required before configuring VXLAN EVPN ingress replication
(7.0(3)I1(2) and later):
• Enable VXLAN.
• Configure VLAN and VXLAN VNI.
• Configure BGP on the VTEP.
• Configure RD and Route Targets for VXLAN Bridging.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
52
Configuring VXLAN BGP EVPN
Configuring BGP on the VTEP
Procedure
Step 2 host-reachability protocol bgp This defines BGP as the mechanism for host
reachability advertisement.
Step 3 global ingress-replication protocol bgp Enables globally (for all VNI) the VTEP to
exchange local and remote VTEP IP addresses
on the VNI in order to create the ingress
replication list. This enables sending and
receiving BUM traffic for the VNI.
Note Using ingress-replication protocol
bgp avoids the need for any multicast
configurations that might have been
required for configuring the
underlay.
Step 4 member vni vni associate-vrf Add Layer-3 VNIs, one per tenant VRF, to the
overlay.
Note Required for VXLAN routing only.
Step 5 member vni vni Add Layer 2 VNIs to the tunnel interface.
Step 6 ingress-replication protocol bgp Enables the VTEP to exchange local and remote
VTEP IP addresses on a oer VNI basis in order
to create the ingress replication list. This enables
sending and receiving BUM traffic for the VNI
and override the global configuration.
Note Instead of a ingress replication,
mcast group can be configured.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
53
Configuring VXLAN BGP EVPN
Configuring BGP on the VTEP
Step 4 address-family l2vpn evpn Configure address family Layer 2 VPN EVPN
under the BGP neighbor.
Note Address-family IPv4 EVPN for
VXLAN host-based routing
Step 8 address-family ipv4 unicast Configure the address family for IPv4.
Step 11 address-family ipv6 unicast Configure the address family for IPv6.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
54
Configuring VXLAN BGP EVPN
Configuring iBGP for EVPN on the Spine
Step 7 address-family l2vpn evpn Configure address family Layer 2 VPN EVPN
under the BGP neighbor.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
55
Configuring VXLAN BGP EVPN
Configuring eBGP for EVPN on the Spine
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
56
Configuring VXLAN BGP EVPN
Suppressing ARP
Suppressing ARP
Suppressing ARP includes changing the size of the ACL ternary content addressable memory (TCAM) regions
in the hardware.
Note For information on configuring ACL TCAM regions, see the Configuring IP ACLs chapter of the Cisco Nexus
9000 Series NX-OS Security Configuration Guide.
Procedure
Disabling VXLANs
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
57
Configuring VXLAN BGP EVPN
Duplicate Detection for IP and MAC Addresses
Step 5 (Optional) copy running-config startup-config Saves the change persistently through reboots
and restarts by copying the running
configuration to the startup configuration.
• Wherever a MAC address is permanently frozen, a syslog message with written by L2RIB.
2017 Jul 5 10:27:34 leaf %$ VDC-1 %$ %USER-2-SYSTEM_MSG: Unfreeze limit (3) hit, MAC
0000.0033.3333in topo: 200 is permanently frozen - l2rib
2017 Jul 5 10:27:34 leaf %$ VDC-1 %$ %USER-2-SYSTEM_MSG: Detected duplicate host
0000.0033.3333, topology 200, during Local update, with host located at remote VTEP
1.2.3.4, VNI 2 - l2rib
2017 Jul 5 10:27:34 leaf %$ VDC-1 %$ %USER-2-SYSTEM_MSG: Unfreeze limit (3) hit, MAC
0000.0033.3334in topo: 200 is permanently frozen - l2rib
2017 Jul 5 10:27:34 leaf %$ VDC-1 %$ %USER-2-SYSTEM_MSG: Detected duplicate host
0000.0033.3334, topology 200, during Local update, with host l
The following are example commands to help the configuration of the number of VM moves in a specific
time interval (seconds) for duplicate IP-detection:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
58
Configuring VXLAN BGP EVPN
Verifying the VXLAN BGP EVPN Configuration
Command Description
Available sub-commands:
switch(config)# fabric forwarding ?
anycast-gateway-mac • Anycast gateway MAC of the
dup-host-ip-addr-detection switch.
• To detect duplicate host addresses
in n seconds.
The following are example commands to help the configuration of the number of VM moves in a specific
time interval (seconds) for duplicate MAC-detection:
Command Description
Command Purpose
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
59
Configuring VXLAN BGP EVPN
Verifying the VXLAN EVPN with Downstream VNI Configuration
Command Purpose
show vxlan interface | count Displays VXLAN VLAN logical port VP count.
Note A VP is allocated on a per-port per-VLAN
basis. The sum of all VPs across all
VXLAN-enabled Layer 2 ports gives the
total logical port VP count. For example,
if there are 10 Layer 2 trunk interfaces,
each with 10 VXLAN VLANs, then the
total VXLAN VLAN logical port VP count
is 10*10 = 100.
show l2route evpn mac [all | evi evi [bgp | local | Displays Layer 2 route information.
static | vxlan | arp]]
Note Although the show ip bgp command is available for verifying a BGP configuration, as a best practice, it is
preferable to use the show bgp command instead.
Command Purpose
show bgp evi l2-evi Displays the VRF associated with an L2VNI.
show forwarding adjacency nve platform Displays both symmetric and asymmetric NVE
adjacencies with the corresponding DestInfoIndex.
show forwarding route vrf vrf Displays the egress VNI or downstream VNI for each
next-hop.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
60
Configuring VXLAN BGP EVPN
Verifying the VXLAN EVPN with Downstream VNI Configuration
Command Purpose
show ip route detail vrf vrf Displays the egress VNI or downstream VNI for each
next-hop.
show l2route evpn mac-ip all detail Displays labeled next-hops that are present in the
remote MAC routes.
show l2route evpn imet all detail Displays the egress VNI associated with the remote
peer.
show nve peers control-plane-vni peer-ip ip-address Displays the egress VNI or downstream VNI for each
NVE adjacency.
The following example shows sample output for the show bgp evi l2-evi command:
switch# show bgp evi 100
-----------------------------------------------
L2VNI ID : 100 (L2-100)
RD : 3.3.3.3:32867
Secondary RD : 1:100
Prefixes (local/total) : 1/6
Created : Jun 23 22:35:13.368170
Last Oper Up/Down : Jun 23 22:35:13.369005 / never
Enabled : Yes
Associated IP-VRF : vni100
Active Export RT list :
100:100
Active Import RT list :
100:100
The following example shows sample output for the show forwarding adjacency nve platform command:
switch# show forwarding adjacency nve platform
slot 1
=======
IPv4 NVE adjacency information
The following example shows sample output for the show forwarding route vrf vrf command:
switch# show forwarding route vrf vrf1000
slot 1
=======
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
61
Configuring VXLAN BGP EVPN
Verifying the VXLAN EVPN with Downstream VNI Configuration
--------------+-------------------+--------------+-----------------+-----------------
Prefix | Next-hop | Interface | Labels | Partial Install
--------------+-------------------+--------------+-----------------+-----------------
…..
10.1.1.11/32 12.12.12.12 nve1 dsvni: 301000
10.1.1.20/32 123.123.123.123 nve1 dsvni: 301000
10.1.1.21/32 30.30.30.30 nve1 dsvni: 301000
10.1.1.30/32 10.1.1.30 Vlan10
The following example shows sample output for the show ip route detail vrf vrf command:
switch# show ip route detail vrf default
IP Route Table for VRF "default"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%<string>' in via output denotes VRF <string>
The following example shows sample output for the show l2route evpn mac-ip all detail command:
switch# show l2route evpn mac-ip all
Flags -(Rmac):Router MAC (Stt):Static (L):Local (R):Remote (V):vPC link
(Dup):Duplicate (Spl):Split (Rcv):Recv(D):Del Pending (S):Stale (C):Clear
(Ps):Peer Sync (Ro):Re-Originated (Orp):Orphan
Topology Mac Address Host IP Prod Flags Seq No Next-Hops
-------- -------------- -------- ------ ----- ------- ----------------------------
5 0000.0005.1301 1.3.13.1 BGP -- 0 102.1.13.1 (Label: 2000005)
5 0000.0005.1401 1.3.14.1 BGP -- 0 102.1.145.1 (Label: 2000005)
The following example shows sample output for the show l2route evpn imet all detail command:
switch# show l2route evpn imet all
The following example shows sample output for the show nve peers control-plane-vni command. In this
example, 3000003 is the downstream VNI.
switch# show nve peers control-plane-vni peer-ip 203.1.1.1
Peer VNI Learn-Source Gateway-MAC Peer-type Egress-VNI SW-BD State
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
62
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (IBGP)
feature ospf
feature bgp
feature pim
interface loopback0
ip address 10.1.1.1/32
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
63
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (IBGP)
interface loopback1
ip address 100.1.1.1/32
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
• Configure Anycast RP
router ospf 1
interface Ethernet4/2
ip address 192.168.1.42/24
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
no shutdown
interface Ethernet4/3
ip address 192.168.2.43/24
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
no shutdown
• Configure BGP
• Spine (9504-B)
• Enable the EVPN control plane
nv overlay evpn
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
64
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (IBGP)
feature ospf
feature bgp
feature pim
• Configure Anycast RP
interface Ethernet4/3
ip address 192.168.4.43/24
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
no shutdown
• Configure BGP
router bgp 65535
router-id 20.1.1.1
neighbor 30.1.1.1 remote-as 65535
update-source loopback0
address-family l2vpn evpn
send-community both
route-reflector client
neighbor 40.1.1.1 remote-as 65535
update-source loopback0
address-family l2vpn evpn
send-community both
route-reflector client
• Leaf (9396-A)
• Enable the EVPN control plane
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
65
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (IBGP)
nv overlay evpn
feature ospf
feature bgp
feature pim
feature interface-vlan
feature vn-segment-vlan-based
feature nv overlay
fabric forwarding anycast-gateway-mac 0000.2222.3333
router ospf 1
interface Ethernet2/2
no switchport
ip address 192.168.1.22/24
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
no shutdown
interface Ethernet2/3
no switchport
ip address 192.168.3.23/24
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
shutdown
• Configure PIM RP
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
66
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (IBGP)
• Create VLANs
vlan 1001-1002
vlan 101
vn-segment 900001
vlan 101
vn-segment 900001
vlan 1001
vn-segment 2001001
vlan 1002
vn-segment 2001002
Note The rd auto and route-target commands are automatically configured unless
one or more are entered as overrides.
\
address-family ipv4 unicast
route-target both auto
route-target both auto evpn
address-family ipv6 unicast
route-target both auto
route-target both auto evpn
interface vlan1001
no shutdown
vrf member vxlan-900001
ip address 4.1.1.1/24 tag 54321
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
67
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (IBGP)
interface vlan1002
no shutdown
vrf member vxlan-900001
ip address 4.2.2.1/24 tag 54321
ipv6 address 4:2:0:1::1/64 tag 54321
fabric forwarding mode anycast-gateway
Note The hardware access-list tcam region arp-ether 256 double-wide command
is not needed for Cisco Nexus 9300-EX and 9300-FX/FX2/FX3 and 9300-GX
platform switches.
•
Note You can choose either of the following two options for creating the NVE interface.
Use Option 1 for a small number of VNIs. Use Option 2 to leverage the simplified
configuration mode.
interface nve1
no shutdown
source-interface loopback1
host-reachability protocol bgp
member vni 900001 associate-vrf
member vni 2001001
mcast-group 239.0.0.1
member vni 2001002
mcast-group 239.0.0.1
Option 2
interface nve1
source-interface loopback1
host-reachability protocol bgp
global mcast-group 239.0.0.1 L2
member vni 2001001
member vni 2001002
member vni 2001007-2001010
interface Ethernet1/47
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
68
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (IBGP)
switchport
switchport access vlan 1002
interface Ethernet1/48
switchport
switchport access vlan 1001
• Configure BGP
evpn
vni 2001001 l2
vni 2001002 l2
Note The rd auto and route-target auto commands are automatically configured
unless one or more are entered as overrides.
rd auto
route-target import auto
route-target export auto
Note The rd auto and route-target commands are automatically configured unless
you want to use them to override the import or export options.
evpn
vni 2001001 l2
rd auto
route-target import auto
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
69
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (IBGP)
• Leaf (9396-B)
• Enable the EVPN control plane
nv overlay evpn
feature ospf
feature bgp
feature pim
feature interface-vlan
feature vn-segment-vlan-based
feature nv overlay
fabric forwarding anycast-gateway-mac 0000.2222.3333
interface Ethernet2/3
no switchport
ip address 192.168.4.23/24
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
shutdown
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
70
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (IBGP)
• Configure PIM RP
• Create VLANs
vlan 1001-1002
vlan 101
vn-segment 900001
vlan 1001
vn-segment 2001001
vlan 1002
vn-segment 2001002
Note The rd auto and route-target commands are automatically configured unless
one or more are entered as overrides.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
71
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (IBGP)
ip address 4.1.1.1/24
ipv6 address 4:1:0:1::1/64
fabric forwarding mode anycast-gateway
interface vlan1002
no shutdown
vrf member vxlan-900001
ip address 4.2.2.1/24
ipv6 address 4:2:0:1::1/64
fabric forwarding mode anycast-gateway
Note The hardware access-list tcam region arp-ether 256 double-wide command
is not needed for Cisco Nexus 9300-EX and 9300-FX/FX2/FX3 and 9300-GX
platform switches.
•
Note You can choose either of the following two command procedures for creating
the NVE interfaces. Use Option 1 for a small number of VNIs. Use Option 2 to
leverage the simplified configuration mode.
interface nve1
no shutdown
source-interface loopback1
host-reachability protocol bgp
member vni 900001 associate-vrf
member vni 2001001
mcast-group 239.0.0.1
member vni 2001002
mcast-group 239.0.0.1
Option 2
interface nve1
interface nve1
source-interface loopback1
host-reachability protocol bgp
global mcast-group 239.0.0.1 L2
member vni 2001001
member vni 2001002
member vni 2001007-2001010
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
72
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (IBGP)
interface Ethernet1/47
switchport
switchport access vlan 1002
interface Ethernet1/48
switchport
switchport access vlan 1001
• Configure BGP
Note The rd auto and route-target commands are automatically configured unless
one or more are entered as overrides.
rd auto
route-target import auto
route-target export auto
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
73
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
feature bgp
feature pim
interface loopback1
ip address 100.1.1.1/32 tag 12345
ip pim sparse-mode
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
74
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
• Configure Anycast RP
interface Ethernet4/2
ip address 192.168.1.42/24
ip pim sparse-mode
no shutdown
interface Ethernet4/3
ip address 192.168.2.43/24
ip pim sparse-mode
no shutdown
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
75
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
allowas-in
disable-peer-as-check
neighbor 192.168.2.23 remote-as 200
update-source ethernet4/3
address-family ipv4 unicast
allowas-in
disable-peer-as-check
• Spine (9504-B)
• Enable the EVPN control plane
nv overlay evpn
feature bgp
feature pim
• Configure Anycast RP
interface Ethernet4/2
no switchport
ip address 192.168.3.42/24
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
no shutdown
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
76
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
interface Ethernet4/3
no switchport
ip address 192.168.4.43/24
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
shutdown
• Configure the BGP underlay for the IPv4 unicast address family.
• Leaf (9396-A)
• Enable the EVPN control plane.
nv overlay evpn
feature bgp
feature pim
feature interface-vlan
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
77
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
feature vn-segment-vlan-based
feature nv overlay
fabric forwarding anycast-gateway-mac 0000.2222.3333
interface Ethernet2/3
no switchport
ip address 192.168.4.23/24
ip pim sparse-mode
shutdown
• Create VLANs.
vlan 1001-1002
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
78
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
Note The rd auto and route-target commands are automatically configured unless
one or more are entered as overrides.
interface vlan1001
no shutdown
vrf member vxlan-900001
ip address 4.1.1.1/24 tag 54321
ipv6 address 4:1:0:1::1/64 tag 54321
fabric forwarding mode anycast-gateway
interface vlan1002
no shutdown
vrf member vxlan-900001
ip address 4.2.2.1/24 tag 54321
ipv6 address 4:2:0:1::1/64 tag 54321
fabric forwarding mode anycast-gateway
Note The hardware access-list tcam region arp-ether 256 double-wide command
is not needed for Cisco Nexus 9300-EX and 9300-FX/FX2/FX3 and 9300-GX
platform switches.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
79
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
•
Note You can choose either of the following two options for creating the NVE interface.
Use Option 1 for a small number of VNIs. Use Option 2 to leverage the simplified
configuration mode.
interface nve1
no shutdown
source-interface loopback1
host-reachability protocol bgp
member vni 900001 associate-vrf
member vni 2001001
mcast-group 239.0.0.1
member vni 2001002
mcast-group 239.0.0.1
Option 2
interface nve1
source-interface loopback1
host-reachability protocol bgp
global mcast-group 239.0.0.1 L2
member vni 2001001
member vni 2001002
member vni 2001007-2001010
interface Ethernet1/47
switchport
switchport access vlan 1002
interface Ethernet1/48
switchport
switchport access vlan 1001
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
80
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
Note The rd auto and route-target auto commands are automatically configured
unless one or more are entered as overrides.
rd auto
route-target import auto
route-target export auto
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
81
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
• Leaf (9396-B)
• Enable the EVPN control plane.
nv overlay evpn
feature bgp
feature pim
feature interface-vlan
interface Ethernet2/3
no switchport
ip address 192.168.2.23/24
ip pim sparse-mode
shutdown
• Enable PIM RP
• Create VLANs
vlan 1001-1002
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
82
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
vlan 101
vn-segment 900001
vlan 1001
vn-segment 2001001
vlan 1002
vn-segment 2001002
Note The following commands are automatically configured unless one or more are
entered as overrides.
interface vlan1002
no shutdown
vrf member vxlan-900001
ip address 4.2.2.1/24 tag 54321
ipv6 address 4:2:0:1::1/64 tag 54321
fabric forwarding mode anycast-gateway
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
83
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
Note The hardware access-list tcam region arp-ether 256 double-wide command
is not needed for Cisco Nexus 9300-EX and 9300-FX/FX2/FX3 and 9300-GX
platform switches.
•
Note You can choose either of the following two procedures for creating the NVE
interface. Use Option 1 for a small number of VNIs. Use Option 2 to leverage
the simplified configuration mode.
interface nve1
no shutdown
source-interface loopback1
host-reachability protocol bgp
member vni 900001 associate-vrf
member vni 2001001
mcast-group 239.0.0.1
member vni 2001002
mcast-group 239.0.0.1
Option 2
interface nve1
source-interface loopback1
host-reachability protocol bgp
global mcast-group 239.0.0.1 L2
member vni 2001001
member vni 2001002
member vni 2001007-2001010
interface Ethernet1/47
switchport
switchport access vlan 1002
interface Ethernet1/48
switchport
switchport access vlan 1001
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
84
Configuring VXLAN BGP EVPN
Example of VXLAN BGP EVPN (EBGP)
Note The rd auto and route-target auto commands are automatically configured
unless one or more are entered as overrides.
rd auto
route-target import auto
route-target export auto
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
85
Configuring VXLAN BGP EVPN
Example Show Commands
•
Note The show vxlan interface command is not supported for the Cisco Nexus
9300-EX, 9300-FX/FX2/FX3, and 9300-GX platform switches.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
86
Configuring VXLAN BGP EVPN
Example Show Commands
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
87
Configuring VXLAN BGP EVPN
Example Show Commands
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
88
CHAPTER 4
Configuring VXLAN with IPv6 in the Underlay
(VXLANv6)
This chapter contains the following sections:
• Information About Configuring VXLAN with IPv6 in the Underlay (VXLANv6) , on page 89
• Guidelines and Limitations for VXLAN with IPv6 in the Underlay (VXLANv6) , on page 90
• Information About vPC and VXLAN with IPv6 in the Underlay (VXLANv6), on page 91
• Information About vPC Peer Keepalive and VXLAN with IPv6 in the Underlay (VXLANv6), on page
92
• Configuring the VTEP IP Address, on page 93
• Configuring vPC for VXLAN with IPv6 in the Underlay (VXLANv6), on page 94
• Example Configurations for VXLAN with IPv6 in the Underlay (VXLANv6), on page 95
• Verifying VXLAN with IPv6 in the Underlay (VXLANv6), on page 97
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
89
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Guidelines and Limitations for VXLAN with IPv6 in the Underlay (VXLANv6)
VXLAN with IPv6 in the Underlay (VXLANv6) supports the following features:
• Address Resolution Protocol (ARP) suppression in the overlay
• Access Control List (ACL) Quality of Service (QoS)
• Border Node with VRF-Lite
• Dynamic Host Configuration Protocol (DHCP)
• Guestshell support
• Internet Group Management Protocol (IGMP) Snooping in the overlay
• Virtual Extensible Local Area Network (VXLAN) Operation, Administration, and Maintenance (OAM)
• Storm Control for host ports (Access Side)
• Virtual Port Channel (vPC) with VIP and PIP support
VXLAN with IPv6 in the Underlay (VXLANv6) does not support the following features:
• Bidirectional Forwarding Detection (BFD)
• Centralized Route Leak
• Cisco Data Center Network Manager (DCNM) integration
• Cross Connect
• EVPN Multi-homing with Ethernet Segment (ES)
• Fabric Extender (FEX) attached to a VXLAN-enabled switch.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
90
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Information About vPC and VXLAN with IPv6 in the Underlay (VXLANv6)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
91
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Information About vPC Peer Keepalive and VXLAN with IPv6 in the Underlay (VXLANv6)
The VMAC must be managed by the administrator just like the VIP/PIP and must be unique in the fabric. All
the preceding behavior is for VXLAN with IPv6 in the Underlay (VXLANv6) only and nothing changes about
VMAC creation and advertisement for VXLAN IPv4 in the underlay.
The default behavior is that vMAC is autogenerated from the configured VIP and advertised. There is no need
to use the virtual-rmac command as previously described except for interoperability cases. There is no need
to use the existing advertise virtual-rmac command for VXLAN with IPv6 in the Underlay (VXLANv6).
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
92
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Configuring the VTEP IP Address
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
93
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Configuring vPC for VXLAN with IPv6 in the Underlay (VXLANv6)
Note The anycast loopback command is used only for VXLAN with IPv6 in the Underlay (VXLANv6).
Procedure
Step 3 source-interface loopback src-if anycast The source interface must be a loopback
loopback any-if interface that is configured on the switch with
a valid /128 IP address. This /128 IP address
Example:
must be known by the transient devices in the
switch(config-if-nve)# source interface transport network and the remote VTEPs. This
loopback 1 anycast loopback 2
is accomplished by advertising it through a
dynamic routing protocol in the transport
network.
Note The IPv6 address on loopback1, the
primary IP address (PIP), and
loopback2, the secondary IP address
()VIP), must be a /128 address.
The VTEP IP address cannot be a
link local IPv6 address.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
94
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Example Configurations for VXLAN with IPv6 in the Underlay (VXLANv6)
BGP Underlay
Note BGP IPv6 neighbor must support L2VPN EVPN address-family session.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
95
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Example Configurations for VXLAN with IPv6 in the Underlay (VXLANv6)
Note The router ID in VXLAN with IPv6 in the Underlay (VXLANv6) must be an IPv4 address.
The BGP router ID is a 32-bit value that is often represented by an IPv4 address. By default, Cisco NX-OS
sets the router ID to the IPv4 address of a loopback interface on the router. For VXLAN with IPv6 in the
Underlay (VXLANv6), none of the loopbacks need to have an IPv4 address in which case the default selection
of router ID does not happen correctly. You can configure the router ID manually to an IPv4 address.
BGP RD (Route distinguisher) which is 64 bits in length can be configured using the autonomous system
number of the 4-byte IP address. For VXLAN with IPv6 in the Underlay (VXLANv6), when using an IP
address for configuring RD, you must use IPv4 as in the case of VXLAN IPv4.
feature bgp
nv overlay evpn
OSPFv3 Underlay
feature ospfv3
IS-IS Underlay
router isis Enterprise
is-type level-1
net 49.0001.0000.0000.0003.00
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
96
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Verifying VXLAN with IPv6 in the Underlay (VXLANv6)
Command Purpose
show nve peers Displays the peering time and VNI information for
VTEP peers.
show nve vni ingress-replication Displays NVE VNI ingress replication information.
show nve peers 2018:1015::abcd:1234:3 int nv1 Displays NVE peers counter information.
counters
show bgp l2vpn evpn 1012.0383.9600 Displays BGP L2VPN information for route type 2.
show bgp l2vpn evpn 303:304::1 Displays BGP L2VPN EVPN for route type 3.
show bgp l2vpn evpn 5.116.204.0 Displays BGP L2VPN EVPN for route type 5.
show l2route evpn imet all detail Displays L2route EVPN imet detail.
show l2route mac-ip all detail Displays MAC address and host IP address.
show ip route 1.191.1.0 vrf vxlan-10101 Displays route table for VRF.
show forwarding ipv4 route 1.191.1.0 detail vrf Displays forwarding information.
vxlan-10101
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
97
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Verifying VXLAN with IPv6 in the Underlay (VXLANv6)
Command Purpose
show forwarding nve l3 ecmp Displays forwarding NVE Layer 3 ECMP information.
Up
Example of the show nve vni ingress-replication
Command
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
98
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Verifying VXLAN with IPv6 in the Underlay (VXLANv6)
Example of the show nve peers ipv6-address int nv1 counters Command .
switch# show nve peers 2018:2015::abcd:1234:3 int nve 1 counters
Peer IP: 2018:1015::abcd:1234:3
TX
0 unicast packets 0 unicast bytes
0 multicast packets 0 multicast bytes
RX
0 unicast packets 0 unicast bytes
0 multicast packets 0 multicast bytes
Advertised path-id 1
Path type: local, path is valid, is best path, no labeled nexthop
AS-Path: NONE, path locally originated
303:304::1 (metric 0) from 0:: (30.3.1.1)
Origin IGP, MED not set, localpref 100, weight 32768
Received label 2001300
Extcommunity: RT:2:2001300 ENCAP:8
Advertised path-id 1
Path type: local, path is valid, is best path, no labeled nexthop
AS-Path: NONE, path locally originated
303:304::1 (metric 0) from 0:: (30.3.1.1)
Origin IGP, MED not set, localpref 100, weight 32768
Received label 2001300 3003901
Extcommunity: RT:2:2001300 RT:2:3003901 ENCAP:8 Router MAC:0600.0000.0001
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
99
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Verifying VXLAN with IPv6 in the Underlay (VXLANv6)
Multipath: iBGP
Advertised path-id 1
Path type: local, path is valid, is best path, no labeled nexthop
AS-Path: NONE, path locally originated
303:304::1 (metric 0) from 0:: (30.3.1.1)
Origin IGP, MED not set, localpref 100, weight 32768
Extcommunity: RT:2:2000002 ENCAP:8
PMSI Tunnel Attribute:
flags: 0x00, Tunnel type: Ingress Replication
Label: 2000002, Tunnel Id: 303:304::1
Path type: internal, path is valid, not best reason: Neighbor Address, no labeled nexthop
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported to 2 destination(s)
Imported paths list: evpn-tenant-0301 default
Gateway IP: 0.0.0.0
AS-Path: 65001 5300 , path sourced external to AS
3::52 (metric 200) from 2::21 (2.0.0.21)
Origin IGP, MED not set, localpref 100, weight 0
Received label 3003301
Extcommunity: RT:2:3003301 ENCAP:8 Router MAC:f80b.cb53.4897
Originator: 2.0.0.52 Cluster list: 2.0.0.21
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
100
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Verifying VXLAN with IPv6 in the Underlay (VXLANv6)
Plane; (Bfd)=BFD over Vxlan; (Bgp)=BGP EVPN; (Of)=Open Flow mode; (Mix)=Open Flow IR mixed
mode; (Acst)=Anycast GW on spine;
Topology ID Topology Name Attributes
----------- ------------- ----------
101 Vxlan-10101 VNI: 10101
Encap:1 IOD:0 IfHdl:1224736769
VTEP IP: 5001:1::1:1:7
Emulated IP: ::
Emulated RO IP: 0.0.0.0
TX-ID: 2004 (Rcvd Ack: 0)
RMAC: 00fe.c83e.84a7, VRFID: 3
VMAC: 00fe.c83e.84a7
VMAC RO: 0000.0000.0000
Flags: L3cp, Sub_Flags: --, Prev_Flags: -
Topology ID VNI Prod IP Addr Eth Tag PMSI-Flags Flags Type Label(VNI) Tunnel
ID NFN Bitmap
----------- ----- ----- -------------- ------- ---------- ------- ---- -----------
------------- ----------
901 10901 BGP 4999:1::1:1:1 0 0 - 6 10901
4999:1::1:1:1
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
101
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Verifying VXLAN with IPv6 in the Underlay (VXLANv6)
Example of the show forwarding ipv4 route 1.191.1.0 detail vrf vxlan-10101 Command
switch# show forwarding ipv4 route 1.191.1.0 detail vrf vxlan-10101
slot 1
=======
Prefix 1.191.1.0/29, No of paths: 2, Update time: Mon Apr 15 15:38:17 2019
5001:1::1:1:1 nve1
5001:1::1:1:2 nve1
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
102
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Verifying VXLAN with IPv6 in the Underlay (VXLANv6)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
103
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Verifying VXLAN with IPv6 in the Underlay (VXLANv6)
no 100
0x0 1225261061 5001:1::1:2:102 nve1 0000.5500.0002 URIB merge-done
no 100
0x0 1225261065 5001:1::1:2:103 nve1 0000.5500.0003 URIB merge-done
no 100
0x0 1225261066 5001:1::1:2:104 nve1 0000.5500.0004 URIB merge-done
no 100
0x0 1225261067 5001:1::1:2:105 nve1 0000.5500.0005 URIB merge-done
no 100
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
104
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Verifying VXLAN with IPv6 in the Underlay (VXLANv6)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
105
Configuring VXLAN with IPv6 in the Underlay (VXLANv6)
Verifying VXLAN with IPv6 in the Underlay (VXLANv6)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
106
CHAPTER 5
Configuring External VRF Connectivity and Route
Leaking
This chapter contains the following sections:
• Configuring External VRF Connectivity, on page 107
• Configuring Route Leaking, on page 121
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
107
Configuring External VRF Connectivity and Route Leaking
Guidelines and Limitations for External VRF Connectivity and Route Leaking
Guidelines and Limitations for External VRF Connectivity and Route Leaking
The following guidelines and limitations apply to external Layer 3 connectivity for VXLAN BGP EVPN
fabrics:
• Support is added for Cisco Nexus 9504 and 9508 platform switches with Cisco Nexus 96136YC-R and
9636C-RX line cards.
• A physical Layer 3 interface (parent interface) can be used for external Layer 3 connectivity (that is,
VRF default).
• The parent interface to multiple subinterfaces cannot be used for external Layer 3 connectivity (that is,
Ethernet1/1 for a VRF default). You can use a subinterface instead.
• Beginning with Cisco NX-OS Release 9.3(5), VTEPs support VXLAN-encapsulated traffic over parent
interfaces if subinterfaces are configured.
• VTEPs do not support VXLAN-encapsulated traffic over subinterfaces, regardless of VRF participation
or IEEE 802.1Q encapsulation.
• Mixing subinterfaces for VXLAN and non-VXLAN VLANs is not supported.
Procedure
Step 3 vni number Specify the VNI. The VNI associated with the
VRF is often referred to as a Layer 3 VNI,
L3VNI, or L3VPN. The L3VNI is configured
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
108
Configuring External VRF Connectivity and Route Leaking
Configuring the L3VNI's Fabric Facing VLAN and SVI on the Border Node
Step 5 address-family {ipv4 | ipv6} unicast Configure the IPv4 or IPv6 unicast address
family.
Step 6 route-target both {auto | rt} Configure the route target (RT) for import and
export of IPv4 prefixes. The RT is used for a
per-VRF prefix import/export policy. If you
enter an RT, the following formats are
supported: ASN2:NN, ASN4:NN, or IPV4:NN.
Manually configured RTs are required to
support asymmetric VNIs.
Step 7 route-target both {auto | rt} evpn Configure the route target (RT) for import and
export of IPv4 prefixes. The RT is used for a
per-VRF prefix import/export policy. If you
enter an RT, the following formats are
supported: ASN2:NN, ASN4:NN, or IPV4:NN.
Manually configured RTs are required to
support asymmetric VNIs.
Configuring the L3VNI's Fabric Facing VLAN and SVI on the Border Node
Procedure
Step 2 vlan number Specify the VLAN id that is used for the
L3VNI.
Step 3 vn-segment number Map the L3VNI to the VLAN for VXLAN
EVPN routing.
Step 4 interface vlan-number Specify the SVI (Switch Virtual Interface) for
VXLAN EVPN routing.
Step 6 vrf member vrf-name Map the SVI to the matching VRF context.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
109
Configuring External VRF Connectivity and Route Leaking
Configuring the VTEP on the Border Node
Procedure
Step 3 member vni vni associate-vrf Add Layer-3 VNIs, one per tenant VRF, to the
overlay.
Configuring the BGP VRF Instance on the Border Node for IPv4 per-VRF Peering
Procedure
Step 6 maximum-paths ibgp number Enabling equal cost multipathing (ECMP) for
iBGP prefixes. The range for number if 1 to
64. The default is 1.
Step 8 neighbor address remote-as number Define eBGP neighbor IPv4 address and
remote Autonomous-System (AS) number.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
110
Configuring External VRF Connectivity and Route Leaking
Configuring the BGP VRF Instance on the Border Node for IPv6 per-VRF Peering
Step 10 address-family ipv4 unicast Activate the IPv4 address family for IPv4
prefix exchange.
Configuring the BGP VRF Instance on the Border Node for IPv6 per-VRF Peering
Procedure
Step 6 maximum-paths ibgp number Enabling equal cost multipathing (ECMP) for
iBGP prefixes.
Step 8 neighbor address remote-as number Define eBGP neighbor IPv6 address and
remote Autonomous-System (AS) number.
Configuring the Sub-Interface Instance on the Border Node for Per-VRF Peering - Version 1
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
111
Configuring External VRF Connectivity and Route Leaking
VXLAN BGP EVPN - Default-Route, Route Filtering on External Connectivity
Step 7 encapsulation dot1q number Configure the VLAN ID for the sub-interface.
The number argument can have a value from
1 to 3967.
Step 8 vrf member vrf-name Map the Sub-Interface to the matching VRF
context.
Procedure
Configuring the BGP VRF Instance on the Border Node for IPv4/IPv6 Default-Route Advertisement
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
112
Configuring External VRF Connectivity and Route Leaking
Configuring Route Filtering for IPv4 Default-Route Advertisement
Step 8 neighbor addressremote-as number Define eBGP neighbor IPv4 address and
remote Autonomous-System (AS) number.
Step 10 address-family {ipv4 | ipv6} unicast Activate the IPv4 or IPv6 address family for
IPv4/IPv6 prefix exchange.
Step 11 route-map name out Attach route-map for egress route filtering.
Procedure
Step 2 ip prefix-list name seq 5 permit 0.0.0.0/0 Configure IPv4 prefix-list for default-route
filtering.
Step 3 route-map name deny 10 Create route-map with leading deny statement
to prevent the default-route of being advertised
via External Connectivity.
Step 4 match ip address prefix-list name Match against the IPv4 prefix-list that contains
the default-route.
Step 5 route-map name permit 1000 Create route-map with trailing allow statement
to advertise non-matching routes via External
Connectivity.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
113
Configuring External VRF Connectivity and Route Leaking
Configuring Route Filtering for IPv6 Default-Route Advertisement
Procedure
Step 2 ipv6 prefix-list name seq 5 permit 0::/0 Configure IPv6 prefix-list for default-route
filtering.
Step 3 route-map name deny 10 Create route-map with leading deny statement
to prevent the default-route of being advertised
via External Connectivity.
Step 4 match ipv6 address prefix-list name Match against the IPv6 prefix-list that contains
the default-route.
Step 5 route-map name permit 1000 Create route-map with trailing allow statement
to advertise non-matching routes via External
Connectivity.
Configuring the BGP VRF Instance on the Border Node for IPv4/IPv6 Host-Route Filtering
Procedure
Step 4 neighbor address remote-as number Define eBGP neighbor IPv4/IPv6 address and
remote Autonomous-System (AS) number.
Step 6 address-family {ipv4 | ipv6} unicast Activate the IPv4 or IPv6 address family for
IPv4/IPv6 prefix exchange.
Step 7 route-map name out Attach route-map for egress route filtering.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
114
Configuring External VRF Connectivity and Route Leaking
Configuring Route Filtering for IPv4 Host-Route Advertisement
Procedure
Step 2 ip prefix-list name seq 5 permit 0.0.0.0/0 eq Configure IPv4 prefix-list for host-route
32 filtering.
Step 3 route-map name deny 10 Create route-map with leading deny statement
to prevent the default-route of being advertised
via External Connectivity.
Step 4 match ip address prefix-list name Match against the IPv4 prefix-list that contains
the host-route.
Step 5 route-map name permit 1000 Create route-map with trailing allow statement
to advertise non-matching routes via external
connectivity.
Procedure
Step 2 ipv6 prefix-list name seq 5 permit 0::/0 eq Configure IPv4 prefix-list for host-route
128 filtering.
Step 3 route-map name deny 10 Create route-map with leading deny statement
to prevent the default-route of being advertised
via External Connectivity.
Step 4 match ipv6 address prefix-list name Match against the IPv4 prefix-list that contains
the host-route.
Step 5 route-map name permit 1000 Create route-map with trailing allow statement
to advertise non-matching routes via External
Connectivity.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
115
Configuring External VRF Connectivity and Route Leaking
Example - Configuring VXLAN BGP EVPN with eBGP for VRF-lite
must be consistent across the VXLAN BGP EVPN fabric. For the ease of reading, the VRF and interface
enumeration will be consistently used.
The configuration examples represents a IPv4 and IPv6 dual-stack approach; IPv4 or IPv6 can be substituted
of each other.
vrf context myvrf_50001
vni 50001
rd auto
address-family ipv4 unicast
route-target both auto
route-target both auto evpn
address-family ipv6 unicast
route-target both auto
route-target both auto evpn
!
vlan 2000
vn-segment 50001
!
interface Vlan2000
no shutdown
mtu 9216
vrf member myvrf_50001
no ip redirects
ip forward
ipv6 address use-link-local-only
no ipv6 redirects
!
interface nve1
no shutdown
host-reachability protocol bgp
source-interface loopback1
member vni 50001 associate-vrf
!
router bgp 65002
vrf myvrf_50001
router-id 10.2.0.6
address-family ipv4 unicast
advertise l2vpn evpn
maximum-paths ibgp 2
maximum-paths 2
address-family ipv6 unicast
advertise l2vpn evpn
maximum-paths ibgp 2
maximum-paths 2
neighbor 10.31.95.95
remote-as 65099
address-family ipv4 unicast
neighbor 2001::95/64
remote-as 65099
address-family ipv4 unicast
!
interface Ethernet1/3
no switchport
no shutdown
interface Ethernet1/3.2
encapsulation dot1q 2
vrf member myvrf_50001
ip address 10.31.95.31/24
ipv6 address 2001::31/64
no shutdown
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
116
Configuring External VRF Connectivity and Route Leaking
Configuring Default-Route, Route Filtering on External Connectivity
neighbor 10.31.95.95
remote-as 65099
address-family ipv4 unicast
route-map extcon-rmap-filter out
neighbor 2001::95/64
remote-as 65099
address-family ipv4 unicast
route-map extcon-rmap-filter-v6 out
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
117
Configuring External VRF Connectivity and Route Leaking
Configuring VXLAN BGP EVPN with OSPF for VRF-lite
neighbor 10.31.95.31
remote-as 65002
address-family ipv4 unicast
neighbor 2001::31/64
remote-as 65002
address-family ipv4 unicast
!
interface Ethernet1/3
no switchport
no shutdown
interface Ethernet1/3.2
encapsulation dot1q 2
vrf member myvrf_50001
ip address 10.31.95.95/24
Ipv6 address 2001::95/64
no shutdown
Procedure
Step 7 redistribute ospf name route-map name Define redistribution from OSPF into BGP.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
118
Configuring External VRF Connectivity and Route Leaking
Configuring the OSPF on the Border Node for Per-VRF Peering
Procedure
Configuring the Sub-Interface Instance on the Border Node for Per-VRF Peering - Version 2
Procedure
Step 7 encapsulation dot1q number Configure the VLAN ID for the sub-interface.
The range is from 2 to 4093.
Step 8 vrf member vrf-name Map the Sub-Interface to the matching VRF
context.
Step 11 ip router ospf name area area-id Configure the OSPF instance.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
119
Configuring External VRF Connectivity and Route Leaking
Example - Configuration VXLAN BGP EVPN with OSPF for VRF-lite
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
120
Configuring External VRF Connectivity and Route Leaking
Configuring Route Leaking
encapsulation dot1q 2
vrf member myvrf_50001
ip address 10.31.95.31/24
ip ospf network point-to-point
ip router ospf EXT area 0.0.0.0
no shutdown
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
121
Configuring External VRF Connectivity and Route Leaking
Configuring Centralized VRF Route-Leaking - Specific Prefixes between Custom VRF
• Configured less specific prefixes (aggregates) are advertised from the Routing-Block to the remaining
VTEPs in the respective destination VRF.
• BGP EVPN does not export prefixes that were previously imported to prevent the occurrence of routing
loops.
Figure 10: Centralized VRF Route-Leaking - Specific Prefixes with Custom VRF
ConfiguringCentralizedVRFRoute-Leaking-SpecificPrefixesbetweenCustom
VRF
Configuring VRF Context on the Routing-Block VTEP
This procedure applies equally to IPv6.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
122
Configuring External VRF Connectivity and Route Leaking
Configuring the BGP VRF instance on the Routing-Block
Step 5 address-family ipv4 unicast Configure the IPv4 unicast address family.
Step 6 route-target both {auto | rt} Configure the route target (RT) for import and
export of IPv4 prefixes. The RT is used for a
per-VRF prefix import/export policy. If you
enter an RT, the following formats are
supported: ASN2:NN, ASN4:NN, or IPV4:NN.
Manually configured RTs are required to
support asymmetric VNIs.
Step 7 route-target both {auto | rt} evpn Configure the route target (RT) for import and
export of IPv4 prefixes. The RT is used for a
per-VRF prefix import/export policy. If you
enter an RT, the following formats are
supported: ASN2:NN, ASN4:NN, or IPV4:NN.
Manually configured RTs are required to
support asymmetric VNIs.
Step 8 route-target import rt-from-different-vrf Configure the RT for importing IPv4 prefixes
from the leaked-from VRF. The following
formats are supported: ASN2:NN, ASN4:NN,
or IPV4:NN.
Step 9 route-target import rt-from-different-vrf evpn Configure the RT for importing IPv4 prefixes
from the leaked-from VRF. The following
formats are supported: ASN2:NN, ASN4:NN,
or IPV4:NN.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
123
Configuring External VRF Connectivity and Route Leaking
Example - Configuration Centralized VRF Route-Leaking - Specific Prefixes Between Custom VRF
Step 6 aggregate-address prefix/mask Create less specific prefix aggregate into the
destination VRF.
Step 7 maximum-paths ibgp number Enabling equal cost multipathing (ECMP) for
iBGP prefixes.
Example - Configuration Centralized VRF Route-Leaking - Specific Prefixes Between Custom VRF
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
124
Configuring External VRF Connectivity and Route Leaking
Centralized VRF Route-Leaking Brief - Shared Internet with Custom VRF
ip forward
!
interface nve1
no shutdown
host-reachability protocol bgp
source-interface loopback1
member vni 51010 associate-vrf
member vni 51020 associate-vrf
!
router bgp 65002
vrf Blue
address-family ipv4 unicast
advertise l2vpn evpn
aggregate-address 10.20.0.0/16
maximum-paths ibgp 2
Maximum-paths 2
vrf Red
address-family ipv4 unicast
advertise l2vpn evpn
aggregate-address 10.10.0.0/16
maximum-paths ibgp 2
Maximum-paths 2
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
125
Configuring External VRF Connectivity and Route Leaking
Configuring Centralized VRF Route-Leaking - Shared Internet with Custom VRF
Figure 11: Centralized VRF Route-Leaking - Shared Internet with Custom VRF
Procedure
Step 4 ip route 0.0.0.0/0 next-hop Configure the default route in the shared internet
VRF to the external router.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
126
Configuring External VRF Connectivity and Route Leaking
Configuring Shared Internet BGP Instance on the Border Node
Step 6 address-family ipv4 unicast Configure the IPv4 unicast address family. This
configuration is required for IPv4 over VXLAN
with IPv4 underlay.
Step 7 route-target both {auto | rt} Configure the route target (RT) for the import
and export of EVPN and IPv4 prefixes. If you
enter an RT, the following formats are
supported: ASN2:NN, ASN4:NN, or IPV4:NN.
Manually configured RTs are required to
support asymmetric VNIs.
Step 8 route-target both shared-vrf-rt evpn Configure a special route target (RT) for the
import and export of the shared IPv4 prefixes.
An additional import/export map for further
qualification is supported.
Procedure
Step 6 aggregate-address prefix/mask Create less specific prefix aggregate into the
destination VRF.
Step 7 maximum-paths ibgp number Enabling equal cost multipathing (ECMP) for
iBGP prefixes.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
127
Configuring External VRF Connectivity and Route Leaking
Configuring Custom VRF Context on the Border Node - 1
Procedure
Step 2 ip prefix-list name seq 5 permit 0.0.0.0/0 Configure IPv4 prefix-list for default-route
filtering.
Step 3 route-map name deny 10 Create route-map with leading deny statement
to prevent the default-route of being leaked.
Step 4 match ip address prefix-list name Match against the IPv4 prefix-list that contains
the default-route.
Step 5 route-map name permit 20 Create route-map with trailing allow statement
to advertise non-matching routes via
route-leaking.
Procedure
Step 3 vni number Specify the VNI. The VNI associated with the
VRF is often referred to as Layer 3 VNI,
L3VNI, or L3VPN. The L3VNI is configured
as the common identifier across the participating
VTEPs.
Step 6 address-family ipv4 unicast Configure the IPv4 address family. This
configuration is required for IPv4 over VXLAN
with IPv4 underlay.
Step 7 route-target both {auto | rt} Configure the route target (RT) for the import
and export of IPv4 prefixes within the IPv4
address family The RT is used for a per-VRF
prefix import/export policy. If you enter an RT,
the following formats are supported: ASN2:NN,
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
128
Configuring External VRF Connectivity and Route Leaking
Configuring Custom VRF Instance in BGP on the Border Node
Step 8 route-target both {auto | rt} evpn Configure the route target (RT) for the import
and export of IPv4 prefixes within the IPv4
address family The RT is used for a per-VRF
prefix import/export policy. If you enter an RT,
the following formats are supported: ASN2:NN,
ASN4:NN, or IPV4:NN. Manually configured
RTs are required to support asymmetric VNIs.
Procedure
Step 7 maximum-paths ibgp number Enabling equal cost multipathing (ECMP) for
iBGP prefixes.
Example - Configuration Centralized VRF Route-Leaking - Shared Internet with Custom VRF
An example of Centralized VRF route-leaking with Shared Internet VRF
Configuring VXLAN BGP EVPN Border Node for Shared Internet VRF
The VXLAN BGP EVPN Border Node provides a centralized Shared Internet VRF. The leaking configuration
is localized such that control-plane leaking and data-path forwarding following the same path. Most significantly
is the VRF configuration of the Border Node and the advertisement of the default-route and less specific
prefixes (aggregates) into the respective destination VRFs.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
129
Configuring External VRF Connectivity and Route Leaking
Example - Configuration Centralized VRF Route-Leaking - Shared Internet with Custom VRF
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
130
Configuring External VRF Connectivity and Route Leaking
Centralized VRF Route-Leaking Brief - Shared Internet with VRF Default
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
131
Configuring External VRF Connectivity and Route Leaking
Configuring Centralized VRF Route-Leaking - Shared Internet with VRF Default
Figure 12: Centralized VRF Route-Leaking - Shared Internet with VRF Default
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
132
Configuring External VRF Connectivity and Route Leaking
Configuring Custom VRF on Border Node
Procedure
Procedure
Step 2 ip prefix-list name seq 5 permit 0.0.0.0/0 Configure IPv4 prefix-list for default-route
filtering.
Step 3 route-map name deny 10 Create route-map with leading deny statement
to prevent the default-route of being leaked.
Step 4 match ip address prefix-list name Match against the IPv4 prefix-list that contains
the default-route.
Step 5 route-map name permit 20 Create route-map with trailing allow statement
to advertise non-matching routes via
route-leaking.
Configuring Filter for Permitted Prefixes from VRF Default on the Border Node
This procedure applies equally to IPv6.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
133
Configuring External VRF Connectivity and Route Leaking
Configuring Custom VRF Context on the Border Node - 2
Procedure
Step 3 vni number Specify the VNI. The VNI associated with the
VRF is often referred to as Layer 3 VNI,
L3VNI, or L3VPN. The L3VNI is configured
as the common identifier across the
participating VTEPs.
Step 6 address-family ipv4 unicast Configure the IPv4 address family. This
configuration is required for IPv4 over
VXLAN with IPv4 underlay.
Step 7 route-target both {auto | rt} Configure the route target (RT) for the import
and export of EVPN and IPv4 prefixes within
the IPv4 address family. If you enter an RT,
the following formats are supported:
ASN2:NN, ASN4:NN, or IPV4:NN. Manually
configured RTs are required to support
asymmetric VNIs.
Step 8 route-target both {auto | rt} evpn Configure the route target (RT) for the import
and export of EVPN and IPv4 prefixes within
the IPv4 address family. If you enter an RT,
the following formats are supported:
ASN2:NN, ASN4:NN, or IPV4:NN. Manually
configured RTs are required to support
asymmetric VNIs.
Step 9 route-target both shared-vrf-rt Configure a special route target (RT) for the
import/export of the shared IPv4 prefixes. An
additional import/export map for further
qualification is supported.
Step 10 route-target both shared-vrf-rt evpn Configure a special route target (RT) for the
import/export of the shared IPv4 prefixes. An
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
134
Configuring External VRF Connectivity and Route Leaking
Configuring Custom VRF Instance in BGP on the Border Node
Step 11 import vrf default map name Permits all routes, from VRF default, from
being imported into the custom VRF according
to the specific route-map.
Procedure
Step 7 maximum-paths ibgp number Enabling equal cost multipathing (ECMP) for
iBGP prefixes.
Example - Configuration Centralized VRF Route-Leaking - VRF Default with Custom VRF
An example of Centralized VRF route-leaking with VRF default
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
135
Configuring External VRF Connectivity and Route Leaking
Example - Configuration Centralized VRF Route-Leaking - VRF Default with Custom VRF
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
136
Configuring External VRF Connectivity and Route Leaking
Example - Configuration Centralized VRF Route-Leaking - VRF Default with Custom VRF
maximum-paths ibgp 2
maximum-paths 2
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
137
Configuring External VRF Connectivity and Route Leaking
Example - Configuration Centralized VRF Route-Leaking - VRF Default with Custom VRF
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
138
CHAPTER 6
Configuring BGP EVPN Filtering
This chapter contains the following sections:
• About BGP EVPN Filtering, on page 139
• Guidelines and Limitations for BGP EVPN Filtering, on page 140
• Configuring BGP EVPN Filtering, on page 140
• Verifying BGP EVPN Filtering, on page 157
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
139
Configuring BGP EVPN Filtering
Guidelines and Limitations for BGP EVPN Filtering
update message. The default value is 0.0.0.0. When it's set to any other value, the next hop on the route
in the VRF context changes to the gateway IP address specified.
• Using table maps: You can configure table maps to filter MAC routes downloaded to the Layer 2 Routing
Information Base (L2RIB).
The rest of this chapter provides information on configuring and applying these options.
To configure the table map, you can perform the following tasks:
• Configuring a MAC List and a Route Map that Matches the MAC List, on page 153
• Applying the Table Map, on page 154
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
140
Configuring BGP EVPN Filtering
Matching Based on EVPN Route Type
Procedure
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
141
Configuring BGP EVPN Filtering
Matching Based on RMAC Extended Community
Procedure
Step 2 ip extcommunity-list standard list-name Add an extcommunity list entry. The list-name
{deny | permit} rmac mac-addr argument must not exceed 63 characters.
Example:
switch(config)# ip extcommunity-list
standard EXTCOMM_LIST_RMAC permit rmac
a8b4.56e4.7edf
Step 4 match extcommunity list-name Match the extended community list name.
Example:
switch(config-route-map)# match
extcommunity EXTCOMM_LIST_RMAC
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
142
Configuring BGP EVPN Filtering
Setting the EVPN Next-Hop IP Address
Procedure
Step 3 set ip next-hop next-hop Set the IP address of the EVPN IP next hop.
Example:
switch(config-route-map)# set ip next-hop
209.165.200.226
Step 4 set ipv6 next-hop next-hop Set the IPv6 next-hop address.
Example:
switch(config-route-map)# set ipv6
next-hop 2001:0DB8::1
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
143
Configuring BGP EVPN Filtering
Applying the Route Map at the Inbound or Outbound Level
Procedure
Step 2 router bgp as-num Enables a routing process. The range of as-num
is from 1 to 65535.
Example:
switch(config)# router bgp 100
Step 5 route-map route-map {in | out} Apply the route map to the neighbor.
Example:
switch(config-router-neighbor-af)#
route-map ROUTE_MAP_1 in
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
144
Configuring BGP EVPN Filtering
BGP EVPN Filtering Configuration Examples
1. The following output shows the routes in the EVPN table and a type-2 EVPN MAC route before the route
map is applied.
leaf1(config)# show bgp l2vpn evpn
BGP routing table information for VRF default, address family L2VPN EVPN
BGP table version is 12, Local Router ID is 1.1.1.1
Status: s-suppressed, x-deleted, S-stale, d-dampened, h-history, *-valid, >-best
Path type: i-internal, e-external, c-confed, l-local, a-aggregate, r-redist, I-injected
Origin codes: i - IGP, e - EGP, ? - incomplete, | - multipath, & - backup, 2 - best2
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
145
Configuring BGP EVPN Filtering
BGP EVPN Filtering Configuration Examples
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 1.1.1.1:32868 (L2VNI 101)
BGP routing table entry for [2]:[0]:[0]:[48]:[aaaa.aaaa.aaaa]:[32]:[101.0.0.3]/2
72, version 12
Paths: (1 available, best #1)
Flags: (0x000212) (high32 00000000) on xmit-list, is in l2rib/evpn, is not in HW
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop, in rib
Imported from 3.3.3.3:32868:[2]:[0]:[0]:[48]:[aaaa.aaaa.aaaa]:[32]:
[101.0.0.3]/272
AS-Path: NONE, path sourced internal to AS
33.33.33.33 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin IGP, MED not set, localpref 100, weight 0
Received label 101 100
Extcommunity: RT:100:100 RT:100:101 SOO:33.33.33.33:0 ENCAP:8
Router MAC:52fc.d83a.1b08
Originator: 3.3.3.3 Cluster list: 101.101.101.101
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported to 3 destination(s)
Imported paths list: vni100 default default
AS-Path: NONE, path sourced internal to AS
33.33.33.33 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin IGP, MED not set, localpref 100, weight 0
Received label 101 100
Extcommunity: RT:100:100 RT:100:101 SOO:33.33.33.33:0 ENCAP:8
Router MAC:52fc.d83a.1b08
Originator: 3.3.3.3 Cluster list: 101.101.101.101
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported from 3.3.3.3:32868:[2]:[0]:[0]:[48]:[aaaa.aaaa.aaaa]:[32]:
[101.0.0.3]/272
AS-Path: NONE, path sourced internal to AS
33.33.33.33 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin IGP, MED not set, localpref 100, weight 0
Received label 101 100
Extcommunity: RT:100:100 RT:100:101 SOO:33.33.33.33:0 ENCAP:8
Router MAC:52fc.d83a.1b08
Originator: 3.3.3.3 Cluster list: 101.101.101.101
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
146
Configuring BGP EVPN Filtering
BGP EVPN Filtering Configuration Examples
3. The following example shows how to apply the route map to the EVPN peer as an inbound route map.
leaf1(config-router-neighbor-af)# show run bgp
4. The following output shows the routes in the EVPN table and a type-2 EVPN MAC route after the route
map is applied.
leaf1(config)# show bgp l2vpn evpn
BGP routing table information for VRF default, address family L2VPN EVPN
BGP table version is 19, Local Router ID is 1.1.1.1
Status: s-suppressed, x-deleted, S-stale, d-dampened, h-history, *-valid, >-best
Path type: i-internal, e-external, c-confed, l-local, a-aggregate, r-redist, I-injected
Origin codes: i - IGP, e - EGP, ? - incomplete, | - multipath, & - backup, 2 - best2
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
147
Configuring BGP EVPN Filtering
BGP EVPN Filtering Configuration Examples
33.33.33.33 100 0 i
*>l[5]:[0]:[0]:[24]:[10.0.0.0]/224
1.1.1.1 0 100 32768 ?
*>l[5]:[0]:[0]:[24]:[100.0.0.0]/224
1.1.1.1 0 100 32768 ?
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop, in rib
Imported from 3.3.3.3:32868:[2]:[0]:[0]:[48]:[aaaa.aaaa.aaaa]:[32]:
[101.0.0.3]/272
AS-Path: NONE, path sourced internal to AS
33.33.33.33 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin IGP, MED not set, localpref 100, weight 0
Received label 101 100
Extcommunity: RT:100:100 RT:100:101 SOO:33.33.33.33:0 ENCAP:8
Router MAC:52fc.c310.2e80
Originator: 3.3.3.3 Cluster list: 101.101.101.101
Path-id 1 not advertised to any peer
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported to 3 destination(s)
Imported paths list: vni100 default default
AS-Path: NONE, path sourced internal to AS
33.33.33.33 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin IGP, MED not set, localpref 100, weight 0
Received label 101 100
Extcommunity: RT:100:100 RT:100:101 SOO:33.33.33.33:0 ENCAP:8
Router MAC:52fc.c310.2e80
Originator: 3.3.3.3 Cluster list: 101.101.101.101
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported from 3.3.3.3:32868:[2]:[0]:[0]:[48]:[aaaa.aaaa.aaaa]:[32]:
[101.0.0.3]/272
AS-Path: NONE, path sourced internal to AS
33.33.33.33 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin IGP, MED not set, localpref 100, weight 0
Received label 101 100
Extcommunity: RT:100:100 RT:100:101 SOO:33.33.33.33:0 ENCAP:8
Router MAC:52fc.c310.2e80
Originator: 3.3.3.3 Cluster list: 101.101.101.101
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
148
Configuring BGP EVPN Filtering
BGP EVPN Filtering Configuration Examples
In a similar manner, you can use the other EVPN-specific match and set clauses with existing route-map
options to filter EVPN routes as required.
Example 2
The following example shows how EVPN route filtering can be used to redirect traffic to a different VTEP
than the one from which the EVPN route was learned. It involves setting the next-hop IP address and the
RMAC of the route to the one corresponding to the other VTEP.
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported to 2 destination(s)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
149
Configuring BGP EVPN Filtering
BGP EVPN Filtering Configuration Examples
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported to 2 destination(s)
Imported paths list: evpn-tenant-0002 default
Gateway IP: 0.0.0.0
AS-Path: 150 , path sourced external to AS
2.2.2.2 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin incomplete, MED 0, localpref 100, weight 0
Received label 3003002
Extcommunity: RT:1:3003002 ENCAP:8 Router MAC:5254.0090.433e
Originator: 2.2.2.2 Cluster list: 101.101.101.101
Path type: internal, path is valid, not best reason: Router Id, no labeled nexthop
Imported from 2.2.2.2:4:[5]:[0]:[0]:[32]:[11.11.11.11]/224
Gateway IP: 0.0.0.0
AS-Path: 150 , path sourced external to AS
2.2.2.2 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin incomplete, MED 0, localpref 100, weight 0
Received label 3003002
Extcommunity: RT:1:3003002 ENCAP:8 Router MAC:5254.0090.433e
Originator: 2.2.2.2 Cluster list: 101.101.101.101
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported from 1.1.1.1:3:[5]:[0]:[0]:[32]:[11.11.11.11]/224
Gateway IP: 0.0.0.0
AS-Path: 150 , path sourced external to AS
1.1.1.1 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin incomplete, MED 0, localpref 100, weight 0
Received label 3003002
Extcommunity: RT:1:3003002 ENCAP:8 Router MAC:5254.0074.caf5
Originator: 1.1.1.1 Cluster list: 101.101.101.101
Advertised path-id 1
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
150
Configuring BGP EVPN Filtering
BGP EVPN Filtering Configuration Examples
2. To redirect traffic to the other VTEP leaf-2, you can set the next hop and RMAC on the 11.11.11.11/32
route with a route-map configuration.
bl1(config-route-map)# show run rpm
3. After applying the route map at the inbound level at BL1, the following are the route outputs for route
11.11.11.11/32.
bl1(config-router-neighbor-af)# show bgp l2 e 11.11.11.11
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 1.1.1.1:3
BGP routing table entry for [5]:[0]:[0]:[32]:[11.11.11.11]/224, version 81
Paths: (1 available, best #1)
Flags: (0x000002) (high32 00000000) on xmit-list, is not in l2rib/evpn, is not in HW
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported to 2 destination(s)
Imported paths list: evpn-tenant-0002 default
Gateway IP: 0.0.0.0
AS-Path: 150 , path sourced external to AS
2.2.2.2 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin incomplete, MED 0, localpref 100, weight 0
Received label 3003002
Extcommunity: RT:1:3003002 ENCAP:8 Router MAC:5254.0090.433e
Originator: 1.1.1.1 Cluster list: 101.101.101.101
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
151
Configuring BGP EVPN Filtering
BGP EVPN Filtering Configuration Examples
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported to 2 destination(s)
Imported paths list: evpn-tenant-0002 default
Gateway IP: 0.0.0.0
AS-Path: 150 , path sourced external to AS
2.2.2.2 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin incomplete, MED 0, localpref 100, weight 0
Received label 3003002
Extcommunity: RT:1:3003002 ENCAP:8 Router MAC:5254.0090.433e
Originator: 2.2.2.2 Cluster list: 101.101.101.101
Path type: internal, path is valid, not best reason: Router Id, no labeled nexthop
Imported from 2.2.2.2:4:[5]:[0]:[0]:[32]:[11.11.11.11]/224
Gateway IP: 0.0.0.0
AS-Path: 150 , path sourced external to AS
2.2.2.2 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin incomplete, MED 0, localpref 100, weight 0
Received label 3003002
Extcommunity: RT:1:3003002 ENCAP:8 Router MAC:5254.0090.433e
Originator: 2.2.2.2 Cluster list: 101.101.101.101
Advertised path-id 1
Path type: internal, path is valid, is best path, no labeled nexthop
Imported from 1.1.1.1:3:[5]:[0]:[0]:[32]:[11.11.11.11]/224
Gateway IP: 0.0.0.0
AS-Path: 150 , path sourced external to AS
2.2.2.2 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin incomplete, MED 0, localpref 100, weight 0
Received label 3003002
Extcommunity: RT:1:3003002 ENCAP:8 Router MAC:5254.0090.433e
Originator: 1.1.1.1 Cluster list: 101.101.101.101
Advertised path-id 1
Path type: local, path is valid, is best path, no labeled nexthop
Gateway IP: 0.0.0.0
AS-Path: 150 , path sourced external to AS
3.3.3.3 (metric 0) from 0.0.0.0 (3.3.3.3)
Origin incomplete, MED 0, localpref 100, weight 0
Received label 3003003
Extcommunity: RT:1:3003003 ENCAP:8 Router MAC:5254.006a.435b
Originator: 1.1.1.1 Cluster list: 101.101.101.101
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
152
Configuring BGP EVPN Filtering
Configuring a Table Map
101.101.101.101
After the next hop and RMAC value are set using the route map, the traffic that was earlier directed through
1.1.1.1 is now directed through 2.2.2.2.
Configuring a MAC List and a Route Map that Matches the MAC List
Procedure
Step 4 match mac-list mac-list-name Match entries of MAC lists. The maximum
length is 63 characters.
Example:
switch(config-route-map)# match mac-list
MAC_LIST_1
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
153
Configuring BGP EVPN Filtering
Applying the Table Map
Procedure
Step 3 vni vni-id l2 Configure the Ethernet VPN ID. The range of
vni-id is from 1 to 16777214.
Example:
switch(config-evpn)# vni 101 l2
Step 4 table-map route-map-name [filter] Apply table maps at the EVPN VNI
configuration level. If the filter option is
Example:
specified, any route that gets denied by the
switch(config-evpn-evi)# table-map route-map validation isn't downloaded into the
ROUTE_MAP_1 filter
L2RIB.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
154
Configuring BGP EVPN Filtering
Table Map Configuration Example
1. The following example shows the output for routes in the EVPN table and MAC routes in the L2RIB
before the route map is applied.
leaf1(config)# show bgp l2vpn evpn
BGP routing table information for VRF default, address family L2VPN EVPN
BGP table version is 25, Local Router ID is 1.1.1.1
Status: s-suppressed, x-deleted, S-stale, d-dampened, h-history, *-valid, >-best
Path type: i-internal, e-external, c-confed, l-local, a-aggregate, r-redist, I-injected
Origin codes: i - IGP, e - EGP, ? - incomplete, | - multipath, & - backup, 2 - best2
2. The following example shows how to configure the route map to filter MAC route aaaa.aaaa.aaaa.
leaf1(config)# show run rpm
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
155
Configuring BGP EVPN Filtering
Table Map Configuration Example
3. The following example shows how to apply the route map at the BGP EVPN level.
leaf1(config-evpn-evi)# show run bgp | section evpn
evpn
vni 101 l2
table-map TABLE_MAP_FILTER filter
rd auto
route-target import auto
route-target export auto
route-target both auto evpn
4. The following example shows the output for routes in the EVPN table and MAC routes in the L2RIB after
the table map is configured.
leaf1(config-evpn-evi)# show bgp l2vpn evpn
BGP routing table information for VRF default, address family L2VPN EVPN
BGP table version is 26, Local Router ID is 1.1.1.1
Status: s-suppressed, x-deleted, S-stale, d-dampened, h-history, *-valid, >-best
Path type: i-internal, e-external, c-confed, l-local, a-aggregate, r-redist, I-injected
Origin codes: i - IGP, e - EGP, ? - incomplete, | - multipath, & - backup, 2 - best2
Network Next Hop Metric LocPrf Weight Path
Route Distinguisher: 1.1.1.1:32868 (L2VNI 101)
*>i[2]:[0]:[0]:[48]:[aaaa.aaaa.aaaa]:[32]:[101.0.0.3]/272
33.33.33.33 100 0 i
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
156
Configuring BGP EVPN Filtering
Verifying BGP EVPN Filtering
Command Purpose
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
157
Configuring BGP EVPN Filtering
Verifying BGP EVPN Filtering
Example of the show bgp l2vpn evpn aaaa.aaaa.aaaa command to view detailed information about EVPN
route aaaa.aaaa.aaaa:
switch(config-evpn-evi)# show bgp l2 e aaaa.aaaa.aaaa
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 1.1.1.1:32868 (L2VNI 101)
BGP routing table entry for [2]:[0]:[0]:[48]:[aaaa.aaaa.aaaa]:[32]:[101.0.0.3]/2
72, version 11
Paths: (1 available, best #1)
Flags: (0x000202) (high32 00000000) on xmit-list, is not in l2rib/evpn, table-ma
p filtered, is not in HW
Advertised path-id 1
Path type: internal, path is valid, is best path, remote nh not installed, no
labeled nexthop
Imported from 3.3.3.3:32868:[2]:[0]:[0]:[48]:[aaaa.aaaa.aaaa]:[32]:
[101.0.0.3]/272
AS-Path: NONE, path sourced internal to AS
33.33.33.33 (metric 81) from 101.101.101.101 (101.101.101.101)
Origin IGP, MED not set, localpref 100, weight 0
Received label 101 100
Extcommunity: RT:100:100 RT:100:101 SOO:33.33.33.33:0 ENCAP:8
Router MAC:5254.009b.4275
Originator: 3.3.3.3 Cluster list: 101.101.101.101
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
158
CHAPTER 7
Configuring VXLAN OAM
This chapter contains the following sections:
• VXLAN OAM Overview, on page 159
• About VXLAN EVPN Loop Detection and Mitigation, on page 163
• Guidelines and Limitations for VXLAN NGOAM, on page 164
• Guidelines and Limitations for VXLAN EVPN Loop Detection and Mitigation, on page 164
• Configuring VXLAN OAM, on page 165
• Configuring NGOAM Profile, on page 168
• Configuring VXLAN EVPN Loop Detection and Mitigation, on page 169
• Detecting Loops and Bringing Up Ports On Demand, on page 170
• Configuration Examples for VXLAN EVPN Loop Detection and Mitigation, on page 171
The ICMP channel helps to reach the traditional hosts or switches that do not support the new OAM packet
formats. The NVO3 draft Tissa channels helps to reach the supported hosts or switches and carries the important
diagnostic information. The VXLAN NVO3 draft Tissa OAM messages may be identified via the reserved
OAM EtherType or by using a well-known reserved source MAC address in the OAM packets depending on
the implementation on different platforms. This constitutes a signature for recognition of the VXLAN OAM
packets. The VXLAN OAM tools are categorized as shown in table below.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
159
Configuring VXLAN OAM
Loopback (Ping) Message
Category Tools
Ping
Check the network reachability (Ping command):
• From Leaf 1 (VTEP 1) to Leaf 2 (VTEP 2) (ICMP or NVO3 draft Tissa channel)
• From Leaf 1 (VTEP 1) to VM 2 (host attached to another VTEP) (ICMP or NVO3 draft Tissa channel)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
160
Configuring VXLAN OAM
Traceroute or Pathtrace Message
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
161
Configuring VXLAN OAM
Traceroute or Pathtrace Message
intermediate device does not support the NVO3 draft Tissa channel, the pathtrace behaves as a simple traceroute
and it provides only the hop information.
Traceroute
Trace the path that is traversed by the packet in the VXLAN overlay using Traceroute command:
• Traceroute uses the ICMP packets (channel-1), encapsulated in the VXLAN encapsulation to reach the
host
Pathtrace
Trace the path that is traversed by the packet in the VXLAN overlay using the NVO3 draft Tissa channel with
Pathtrace command:
• Pathtrace uses special control packets like NVO3 draft Tissa or TISSA (channel-2) to provide additional
information regarding the path (for example, ingress interface and egress interface). These packets
terminate at VTEP and they does not reach the host. Therefore, only the VTEP responds.
• Beginning with NX-OS release 9.3(3), the Received field of the show ngoam pathtrace statistics
summary command indicates all pathtrace requests received by the node on which the command is
executed regardless of whether the request was destined to that node.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
162
Configuring VXLAN OAM
About VXLAN EVPN Loop Detection and Mitigation
Because loops can lead to incorrect local MAC address learning, this phase also flushes the local and
remote MAC addresses. Doing so removes any MAC addresses that are incorrectly learned.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
163
Configuring VXLAN OAM
Guidelines and Limitations for VXLAN NGOAM
In the previous figure, MAC addresses can be incorrectly learned because packets from hosts sitting behind
the remote leaf (Leaf3) can reach both Leaf1 and Leaf2 from the access side. As a result, the hosts
incorrectly appear local to Leaf1 and Leaf2, which causes the leafs to learn their MAC addresses.
3. Loop Recovery: Once a loop is detected on a particular port or VLAN and the recovery interval has passed,
recovery probes are sent to determine if the loop still exists. When NGOAM recovers from the loop, a
syslog message similar to the following appears:
2020 Jan 14 09:59:38 Leaf1 %NGOAM-4-SLD_LOOP_GONE: Loop cleared - Enabling vlan 1001
:: Eth1/3
• VXLAN EVPN loop detection and mitigation is supported in both STP and STP-less environments.
• To be able to detect loops across sites for VXLAN EVPN Multi-Site deployments, the ngoam
loop-detection command needs to be configured on all border gateways in the site where the feature is
being deployed.
• VXLAN EVPN loop detection and mitigation isn't supported with the following features:
• Private VLANs
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
164
Configuring VXLAN OAM
Configuring VXLAN OAM
• VLAN translation
• ESI-based multihoming
• VXLAN Cross Connect
• Q-in-VNI
• EVPN segment routing (Layer 2)
Note Ports or VLANs configured with these features must be excluded from VXLAN
EVPN loop detection and mitigation. You can use the disable {vlan vlan-range}
[port port-range] command to exclude them.
Procedure
Step 3 switch(config)# hardware access-list tcam For Cisco Nexus 9300 platform switches with
region arp-ether 256 double-wide Network Forwarding Engine (NFE), configure
the TCAM region for ARP-ETHER using this
command. This step is essential to program the
ACL rule in the hardware and it is a prerequisite
before installing the ACL rule.
Note Configuring the TCAM region
requires the node to be rebooted.
Step 4 switch(config)# ngoam install acl Installs the NGOAM Access Control List
(ACL).
Note This command is deprecated
beginning with Cisco NX-OS
Release 9.3(5) and is required only
for earlier releases.
Step 5 (Optional) bcm-shell module 1 "fp show For Cisco Nexus 9300 Series switches with
group 62" Network Forwarding Engine (NFE), complete
this verification step. After entering the
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
165
Configuring VXLAN OAM
Configuring VXLAN OAM
Example
See the following examples of the configuration topology.
Figure 16: VXLAN Network
VXLAN OAM provides the visibility of the host at the switch level, that allows a leaf to ping the
host using the ping nve command.
The following example displays how to ping from Leaf 1 to VM2 via Spine 1.
Sender handle: 34
! sport 40673 size 39,Reply from 209.165.201.5,time = 3 ms
! sport 40673 size 39,Reply from 209.165.201.5,time = 1 ms
! sport 40673 size 39,Reply from 209.165.201.5,time = 1 ms
! sport 40673 size 39,Reply from 209.165.201.5,time = 1 ms
! sport 40673 size 39,Reply from 209.165.201.5,time = 1 ms
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/4/18 ms
Total time elapsed 49 ms
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
166
Configuring VXLAN OAM
Configuring VXLAN OAM
Note The source ip-address 1.1.1.1 used in the above example is a loopback interface that is configured
on Leaf 1 in the same VRF as the destination ip-address. For example, the VRF in this example is
vni-31000.
The following example displays how to traceroute from Leaf 1 to VM 2 via Spine 1.
Sender handle: 42
TTL Code Reply IngressI/f EgressI/f State
======================================================================
1 !Reply from 209.165.201.3, Eth5/5/1 Eth5/5/2 UP/UP
2 !Reply from 209.165.201.4, Eth1/3 Unknown UP/DOWN
The following example displays how to MAC ping from Leaf 2 to Leaf 1 using NVO3 draft Tissa
channel:
switch# ping nve mac 0050.569a.7418 2901 ethernet 1/51 profile 4 verbose
The following example displays how to pathtrace based on a payload from Leaf 2 to Leaf 1:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
167
Configuring VXLAN OAM
Configuring NGOAM Profile
switch# pathtrace nve ip unknown vrf vni-31000 payload mac-addr 0050.569a.d927 0050.569a.a4fa
ip 209.165.201.5 209.165.201.1 port 15334 12769 proto 17 payload-end
Procedure
Step 2 switch(config)# [no] ngoam profile Configures OAM profile. The range for the
<profile-id> profile-id is <1 – 1023>. This command does
not have a default value. Enters the
config-ngoam-profile submode to configure
NGOAM specific commands.
Note All profiles have default values and
the show run all CLI command
displays them. The default values are
not visible through the show run
CLI command.
switch(config-ng-oam-profile)# ?
description Configure description of
the profile
dot1q Encapsulation dot1q/bd
flow Configure ngoam flow
hop Configure ngoam hop count
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
168
Configuring VXLAN OAM
Configuring VXLAN EVPN Loop Detection and Mitigation
Example
See the following examples for configuring an NGOAM profile and for configuring NGOAM flow.
switch(config)#
ngoam profile 1
oam-channel 1
flow forward
payload pad 0x2
sport 12345, 54321
switch(config-ngoam-profile)#flow {forward }
Enters config-ngoam-profile-flow submode to configure forward flow entropy specific
information
Procedure
Step 2 switch(config)# [no] ngoam loop-detection Enables VXLAN EVPN loop detection and
mitigation for all VLANs or ports. This feature
is disabled by default.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
169
Configuring VXLAN OAM
Detecting Loops and Bringing Up Ports On Demand
Step 6 (Optional) switch# show ngoam Displays the loop-detection configuration and
loop-detection summary current loop summary.
What to do next
Configure a QoS policy on the spine. (For an example configuration, see Configuration Examples for VXLAN
EVPN Loop Detection and Mitigation, on page 171).
Procedure
Step 2 (Optional) switch# ngoam loop-detection Brings up the VLANs or ports that were blocked
bringup {vlan vlan-range} [port port-range] earlier. This command also clears any entries
stuck in the NGOAM.
Note It can take up to two port-recovery
intervals for the ports to come up
after a loop is cleared. You can speed
up the recovery by manually
overriding the timer with the ngoam
loop-detection bringup vlan {vlan
vlan-range} [port port-range]
command.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
170
Configuring VXLAN OAM
Configuration Examples for VXLAN EVPN Loop Detection and Mitigation
The following example shows how to disable VXLAN EVPN loop detection and mitigation on specific VLANs
or VLAN ports:
switch(config-ng-oam-loop-detection)# disable vlan 1200 port ethernet 1/1
switch(config-ng-oam-loop-detection)# disable vlan 1300
The following example hows to configure a QoS policy on the spine and apply it to all of the spine interfaces
to which the loop-detection-enabled leaf is connected:
class-map type qos match-any Spine-DSCP56
match dscp 56
policy-map type qos Spine-DSCP56
class Spine-DSCP56
set qos-group 7
interface Ethernet1/31
mtu 9216
no link dfe adaptive-tuning
service-policy type qos input Spine-DSCP5663
no ip redirects
ip address 27.4.1.2/24
ip router ospf 200 area 0.0.0.0
ip pim sparse-mode
no shutdown
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
171
Configuring VXLAN OAM
Configuration Examples for VXLAN EVPN Loop Detection and Mitigation
The following sample output shows the loop-detection configuration and current loop summary:
switch# show ngoam loop-detection summary
Loop detection:enabled
Periodic probe interval: 200
Port recovery interval: 300
Number of vlans: 1
Number of ports: 1
Number of loops: 1
Number of ports blocked: 1
Number of vlans disabled: 0
Number of ports disabled: 0
Total number of probes sent: 214
Total number of probes received: 102
Next probe window start: Thu May 14 15:14:23 2020 (0 seconds)
Next recovery window start: Thu May 14 15:54:23 2020 (126 seconds)
The following sample output shows the loop-detection status for the specified VLANs or ports with and
without the history option:
switch# show ngoam loop-detection status
VlanId Port Status NumLoops Detection Time ClearedTime
====== ====== ========== ========= ============================= ===============
100 Eth1/3 BLOCKED 1 Tue Apr 14 20:07:50.313 2020 Never
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
172
CHAPTER 8
Configuring vPC Multihoming
This chapter contains the following sections:
• Advertising Primary IP Address, on page 173
• BorderPE Switches in a vPC Setup, on page 174
• DHCP Configuration in a vPC Setup, on page 174
• IP Prefix Advertisement in vPC Setup, on page 174
The advertise-pip command lets BGP use the PIP as next-hop when advertising prefix routes or leaf-generated
routes if vPC is enabled.
VMAC (virtual-mac) is used with VIP and system MAC is used with PIP when the VIP/PIP feature is enabled.
With the advertise-pip and advertise virtual-rmac commands enabled, type 5 routes are advertised with
PIP and type 2 routes are still advertised with VIP. In addition, VMAC will be used with VIP and system
MAC will be used with PIP.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
173
Configuring vPC Multihoming
BorderPE Switches in a vPC Setup
Note The advertise-pip and advertise-virtual-rmac commands must be enabled and disabled together for this
feature to work properly. If you enable or disable one and not the other, it is considered an invalid configuration.
For Cisco Nexus 9504 and 9508 switches with -R line cards, always configure advertise virtual-rmac without
advertise-pip.
On a vPC enabled leaf or border leaf switch, by default all Layer-3 routes are advertised with the secondary
IP address (VIP) of the leaf switch VTEP as the BGP next-hop IP address. Prefix routes and leaf switch
generated routes are not synced between vPC leaf switches. Using the VIP as the BGP next-hop for these
types of routes can cause traffic to be forwarded to the wrong vPC leaf or border leaf switch and black-holed.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
174
Configuring vPC Multihoming
IP Prefix Advertisement in vPC Setup
The provision to use the primary IP address (PIP) as the next-hop when advertising prefix routes or loopback
interface routes in BGP on vPC enabled leaf or border leaf switches allows users to select the PIP as BGP
next-hop when advertising these types of routes, so that traffic is always forwarded to the right vPC enabled
leaf or border leaf switch.
The configuration command for advertising the PIP is advertise-pip.
The following is a sample configuration:
switch(config)# router bgp 100
address-family 12vpn evpn
advertise-pip
interface nve 1
advertise virtual-rmac
The advertise-pip command lets BGP use the PIP as next-hop when advertising prefix routes or leaf generated
routes if vPC is enabled.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
175
Configuring vPC Multihoming
IP Prefix Advertisement in vPC Setup
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
176
CHAPTER 9
Configuring Multi-Site
This chapter contains the following sections:
• About VXLAN EVPN Multi-Site, on page 177
• Dual RD Support for Multi-Site, on page 178
• Guidelines and Limitations for VXLAN EVPN Multi-Site, on page 178
• Enabling VXLAN EVPN Multi-Site, on page 180
• Configuring Dual RD Support for Multi-Site, on page 182
• Configuring VNI Dual Mode, on page 183
• Configuring Fabric/DCI Link Tracking, on page 184
• Configuring Fabric External Neighbors, on page 185
• Configuring VXLAN EVPN Multi-Site Storm Control, on page 186
• Multi-Site with vPC Support, on page 187
• Configuration Example for Multi-Site with Asymmetric VNIs, on page 194
• TRM with Multi-Site, on page 195
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
177
Configuring Multi-Site
Dual RD Support for Multi-Site
nodes with the same site identifier. BGWs on one hand are also part of the site-specific EVPN domain and
on the other hand a part of a common EVPN domain to interconnect with BGWs from other sites. For a given
site, these BGWs facilitate site-specific nodes to visualize all other sites to be reachable only via them. This
means:
• Site-local bridging domains are interconnected only via BGWs with bridging domains from other sites.
• Site-local routing domains are interconnected only via BGWs with routing domains from other sites.
• Site-local flood domains are interconnected only via BGWs with flood domains from other sites.
Selective Advertisement is defined as the configuration of the per-tenant information on the BGW. Specifically,
this means IP VRF or MAC VRF (EVPN instance). In cases where external connectivity (VRF-lite) and EVPN
Multi-Site coexist on the same BGW, the advertisements are always enabled.
In this case, you can either manually configure the secondary RD value or disable dual RDs. For more
information, see Configuring Dual RD Support for Multi-Site, on page 182.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
178
Configuring Multi-Site
Guidelines and Limitations for VXLAN EVPN Multi-Site
Note Cisco Nexus 9500 platform switches with -R/RX line cards don't support VXLAN
EVPN Multi-Site.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
179
Configuring Multi-Site
Enabling VXLAN EVPN Multi-Site
• If different Anycast Gateway MAC addresses are configured across sites, enable ARP suppression for
all VLANs that have been extended.
• Bind NVE to a loopback address that is separate from loopback addresses that are required by Layer 3
protocols. A best practice is to use a dedicated loopback address for the NVE source interface (PIP VTEP)
and Multi-Site source interface (anycast and virtual IP VTEP).
• PIM BiDir is not supported for fabric underlay multicast replication with VXLAN Multi-Site.
• FEX is not supported on a vPC BGW and Anycast BGW.
• Beginning with Cisco NX-OS Release 9.3(5), VTEPs support VXLAN-encapsulated traffic over parent
interfaces if subinterfaces are configured. This feature is supported for VXLAN EVPN Multi-Site and
DCI. DCI tracking can be enabled only on the parent interface.
• Beginning with Cisco NX-OS Release 9.3(5), VXLAN EVPN Multi-Site supports asymmetric VNIs.
For more information, see Multi-Site with Asymmetric VNIs, on page 45 and Configuration Example
for Multi-Site with Asymmetric VNIs, on page 194.
• The following guidelines and limitations apply to dual RD support for Multi-Site:
• Dual RDs are supported beginning with Cisco NX-OS Release 9.3(5).
• Dual RDs are enabled automatically for Cisco Nexus 9332C, 9364C, 9300-EX, and
9300-FX/FX2/FXP platform switches and Cisco Nexus 9500 platform switches with -EX/FX line
cards that have VXLAN EVPN Multi-Site enabled.
• To use CloudSec or other features that require PIP advertisement for Multi-Site reoriginated routes,
configure BGP additional paths on the route server if dual RDs are enabled on the BGW, or disable
dual RDs.
• Sending secondary RD additional paths at the BGW node isn't supported.
• During an ISSU, the number of paths for the leaf nodes might double temporarily while all BGWs
are being upgraded.
• Beginning with Cisco NX-OS Release 9.3(5), if you disable the host-reachability protocol bgp command
under the NVE interface in a VXLAN EVPN Multi-Site topology, the NVE interface stays operationally
down.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
180
Configuring Multi-Site
Enabling VXLAN EVPN Multi-Site
Step 5 host-reachability protocol bgp Defines BGP as the mechanism for host
reachability advertisement.
Example:
switch(config-if-nve)# host-reachability
protocol bgp
Step 6 multisite border-gateway interface loopback Defines the loopback interface used for the
vi-num BGW virtual IP address (VIP). The
border-gateway interface must be a loopback
Example:
interface that is configured on the switch with
switch(config-if-nve)# multisite a valid /32 IP address. This /32 IP address must
border-gateway interface loopback 100
be known by the transient devices in the
transport network and the remote VTEPs. This
requirement is accomplished by advertising it
through a dynamic routing protocol in the
transport network. This loopback must be
different than the source interface loopback.
The range of vi-num is from 0 to 1023.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
181
Configuring Multi-Site
Configuring Dual RD Support for Multi-Site
Procedure
Step 3 [no] rd dual id [2-bytes] Defines the first 2 bytes of the secondary RD.
The ID must be the same across the Multi-Site
Example:
BGWs. The range is from 1 to 65535.
switch(config-router)# rd dual id 1
Note If necessary, you can use the no rd
dual command to disable dual RDs
and fall back to a single RD.
Step 4 (Optional) show bgp evi evi-id Displays the secondary RD configured as part
of the rd dual id [2-bytes] command for the
Example:
specified EVI.
switch(config-router)# show bgp evi 100
Example
The following example shows sample output for the show bgp evi evi-id command:
switch# show bgp evi 100
-----------------------------------------------
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
182
Configuring Multi-Site
Configuring VNI Dual Mode
Note In cases where only a Layer 3 extension is configured on the BGW, an additional loopback interface is required.
The loopback interface must be present in the same VRF instance on all BGWs and with an individual IP
address per BGW. Ensure that the loopback interface's IP address is redistributed into BGP EVPN, especially
toward Site-External.
For more information about configuring multicast or ingress replication for a large number of VNIs, see
Example of VXLAN BGP EVPN (EBGP), on page 74.
Procedure
Step 3 member vni vni-range Configures the virtual network identifier (VNI).
The range for vni-range is from 1 to 16,777,214.
Example:
The value of vni-range can be a single value
switch(config-if-nve)# member vni 200 like 5000 or a range like 5001-5008.
Note Enter one of the Step 4 or Step 5
commands.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
183
Configuring Multi-Site
Configuring Fabric/DCI Link Tracking
Step 5 ingress-replication protocol bgp Enables BGP EVPN with ingress replication
for the VNI within the fabric.
Example:
switch(config-if-nve-vni)#
ingress-replication protocol bgp
Procedure
Step 2 interface ethernet port Enters interface configuration mode for the DCI
or fabric interface.
Example:
switch(config)# interface ethernet1/1 Note Enter one of the following
commands in Step 3 or Step 4.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
184
Configuring Multi-Site
Configuring Fabric External Neighbors
Procedure
Step 4 peer-type fabric-external Enables the next hop rewrite for Multi-Site.
Defines site external BGP neighbors for EVPN
Example:
exchange. The default for peer-type is
switch(config-router-neighbor)# peer-type fabric-internal.
fabric-external
Note The peer-type fabric-external
command is required only for
VXLAN Multi-Site BGWs. It is not
required for pseudo BGWs.
Step 5 address-family l2vpn evpn Configures the address family Layer 2 VPN
EVPN under the BGP neighbor.
Example:
switch(config-router-neighbor)#
address-family l2vpn evpn
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
185
Configuring Multi-Site
Configuring VXLAN EVPN Multi-Site Storm Control
Note For information on access port storm control, see the Cisco Nexus 9000 Series NX-OS Layer 2 Configuration
Guide.
Procedure
Step 2 [no] evpn storm-control {broadcast | Configures the storm suppression level as a
multicast | unicast} {level level} number from 0–100.
Example: 0 means that all traffic is dropped, and 100
switch(config)# evpn storm-control means that all traffic is allowed. For any value
unicast level 10 in between, the unknown unicast traffic rate is
restricted to a percentage of available
Example: bandwidth. For example, a value of 10 means
switch(config)# evpn storm-control that the traffic rate is restricted to 10% of the
unicast level 10.20 available bandwidth, and anything above that
rate is dropped.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
186
Configuring Multi-Site
Multi-Site with vPC Support
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
187
Configuring Multi-Site
Configuring Multi-Site with vPC Support
Step 7 ip pim rp-address address group-list range Defines a PIM RP address for the underlay
multicast group range.
Example:
switch(config)# ip pim rp-address
100.100.100.1 group-list 224.0.0/4
Step 8 vpc domain domain-id Creates a vPC domain on the device and enters
vpn-domain configuration mode for
Example:
configuration purposes. There is no default.
switch(config)# vpc domain 1 The range is from 1 to 1000.
Step 11 peer-keepalive destination ip-address Configures the IPv4 address for the remote
end of the vPC peer-keepalive link.
Example:
switch(config-vpc-domain)# Note The system does not form the vPC
peer-keepalive destination 172.28.230.85 peer link until you configure a vPC
peer-keepalive link.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
188
Configuring Multi-Site
Configuring Multi-Site with vPC Support
Step 14 Create the vPC peer-link. Creates the vPC peer-link port-channel
interface and adds two member interfaces to
Example:
it.
switch(config)# interface port-channel
1
switch(config)# switchport
switch(config)# switchport mode trunk
switch(config)# switchport trunk allowed
vlan 1,10,100-200
switch(config)# mtu 9216
switch(config)# vpc peer-link
switch(config)# no shut
Step 17 Create the SVI. Creates the SVI used for the backup routed
path over the vPC peer-link.
Example:
switch(config)# interface vlan 10
switch(config)# ip address 10.10.10.1/30
switch(config)# ip router ospf process
UNDERLAY area 0
switch(config)# ip pim sparse-mode
switch(config)# no ip redirects
switch(config)# mtu 9216
switch(config)# no shutdown
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
189
Configuring Multi-Site
Configuring Multi-Site with vPC Support
Step 19 evpn multisite border-gateway ms-id Configures the site ID for a site/fabric. The
range of values for ms-id is 1 to
Example:
281474976710655. The ms-id must be the
switch(config)# evpn multisite same in all BGWs within the same fabric/site.
border-gateway 100
Step 21 source-interface loopback src-if Defines the source interface, which must be a
loopback interface with a valid /32 IP address.
Example:
This /32 IP address must be known by the
switch(config-if-nve)# source-interface transient devices in the transport network and
loopback 0
the remote VTEPs. This requirement is
accomplished by advertising the address
through a dynamic routing protocol in the
transport network.
Step 22 host-reachability protocol bgp Defines BGP as the mechanism for host
reachability advertisement.
Example:
switch(config-if-nve)# host-reachability
protocol bgp
Step 23 multisite border-gateway interface loopback Defines the loopback interface used for the
vi-num BGW virtual IP address (VIP). The BGW
interface must be a loopback interface that is
Example:
configured on the switch with a valid /32 IP
switch(config-if-nve)# multisite address. This /32 IP address must be known
border-gateway interface loopback 100
by the transient devices in the transport
network and the remote VTEPs. This
requirement is accomplished by advertising
the address through a dynamic routing protocol
in the transport network. This loopback must
be different than the source interface loopback.
The range of vi-num is from 0 to 1023.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
190
Configuring Multi-Site
Configuring Peer Link as Transport in Case of Link Failure
Step 28 ip address ip-address secondary Configures the secondary IP address for the
loopback interface.
Example:
switch(config-if)# ip address
198.0.2.1/32 secondary
Note This configuration is required to use the peer link as a backup link during fabric and/or DCI link failures.
Procedure
Step 2 system nve infra-vlans vlan-range Specifies VLANs used by all SVI interfaces
for uplink and vPC peer-links in VXLAN as
Example:
infra-VLANs. You should not configure
switch(config)# system nve infra-vlans certain combinations of infra-VLANs. For
7
example, 2 and 514, 10 and 522, which are
512 apart.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
191
Configuring Multi-Site
Configuring Peer Link as Transport in Case of Link Failure
Step 9 ip ospf cost cost Configures the OSPF cost metric for this
interface.
Example:
switch(config-if)# ip ospf cost 100
Step 11 ip router ospf instance area area-number Configures the routing process for the IP on
an interface and specifies an area.
Example:
switch(config-if)# ip router ospf 1 area
0.0.0.0
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
192
Configuring Multi-Site
Verifying the Multi-Site with vPC Support Configuration
show vpc consistency-parameters global Displays the status of those parameters that must be
consistent across all vPC interfaces.
show vpc consistency-parameters vni Displays configuration information for VNIs under
the NVE interface that must be consistent across both
vPC peers.
vPC domain id : 1
Peer status : peer adjacency formed ok (<--- peer up)
vPC keep-alive status : peer is alive
Configuration consistency status : success (<----- CC passed)
Per-vlan consistency status : success (<---- per-VNI CCpassed)
Type-2 consistency status : success
vPC role : secondary
Number of vPCs configured : 1
Peer Gateway : Enabled
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled, timer is off.(timeout = 240s)
Delay-restore status : Timer is off.(timeout = 30s)
Delay-restore SVI status : Timer is off.(timeout = 10s)
Operational Layer3 Peer-router : Disabled
[...]
Legend:
Type 1 : vPC will be suspended in case of mismatch
Legend:
Type 1 : vPC will be suspended in case of mismatch
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
193
Configuring Multi-Site
Configuration Example for Multi-Site with Asymmetric VNIs
Note This configuration example assumes that basic Multi-Site configurations are already in place.
Note You must have VLAN-to-VRF mapping on the BGW. This requirement is necessary to maintain
L2VNI-to-L3VNI mapping, which is needed for reorigination of MAC-IP routes at BGWs.
Layer 3 Configuration
In the BGW node of site 1, configure the common RT 201:301 for stitching the two sites using L3VNI 201
and L3VNI 301:
vrf context vni201
vni 201
address-family ipv4 unicast
route-target both auto evpn
route-target import 201:301 evpn
route-target export 201:301 evpn
In the BGW node of site 2, configure the common RT 201:301 for stitching the two sites using L3VNI 201
and L3VNI 301:
vrf context vni301
vni 301
address-family ipv4 unicast
route-target both auto evpn
route-target import 201:301 evpn
route-target export 201:301 evpn
Layer 2 Configuration
In the BGW node of site 1, configure the common RT 222:333 for stitching the two sites using L2VNI 200
and L2VNI 300:
evpn
vni 200 l2
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
194
Configuring Multi-Site
TRM with Multi-Site
rd auto
route-target import auto
route-target import 222:333
route-target export auto
route-target export 222:333
For proper reorigination of L3 labels of MAC-IP routes, associate the VRF (L3VNI) to the L2VNI:
interface Vlan 200
vrf member vni201
In the BGW node of site 2, configure the common RT 222:333 for stitching the two sites using L2VNI 200
and L2VNI 300:
evpn
vni 300 l2
rd auto
route-target import auto
route-target import 222:333
route-target export auto
route-target export 222:333
For proper reorigination of L3 labels of MAC-IP routes, associate the VRF (L3VNI) to the L2VNI:
interface vlan 300
vrf member vni301
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
195
Configuring Multi-Site
Information About Configuring TRM with Multi-Site
to send traffic toward remote sites. The IR destination IP is the VIP-R of the remote site. Each site that has
the receiver gets only one copy from the source site.
On the remote site, the BGW that receives the inter-site multicast traffic from the core forwards the traffic
toward the fabric side. The DF check is not done from the core to fabric direction because non-DF can also
receive the VIP-R copy from the source site.
Figure 17: TRM with Multi-Site Topology, BL External Multicast Connectivity
Beginning with Cisco NX-OS Release 9.3(3), TRM with Multi-Site supports BGW connections to the external
multicast network in addition to the BL connectivity, which is supported in previous releases. Forwarding
occurs as documented in the previous example, except the exit point to the external multicast network can
optionally be provided through the BGW.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
196
Configuring Multi-Site
Guidelines and Limitations for TRM with Multi-Site
Figure 18: TRM with Multi-Site Topology, BGW External Multicast Connectivity
• Cisco Nexus 9300-GX platform switches don't support TRM with Multi-Site.
• TRM with Multi-Site supports the following features:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
197
Configuring Multi-Site
Guidelines and Limitations for TRM with Multi-Site
• Only ingress replication is supported between DCI peers across the core.
• Border routers reoriginate MVPN routes from fabric to core and from core to fabric.
• Only eBGP peering between border gateways of different sites is supported.
• Each site must have a local RP for the TRM underlay.
• Keep each site's underlay unicast routing isolated from another site's underlay unicast routing. This
requirement also applies to Multi-Site.
• MVPN address family must be enabled between BGWs.
• When configuring BGW connections to the external multicast fabric, be aware of the following:
• The multicast underlay must be configured between all BGWs on the fabric side even if the site
doesn’t have any leafs in the fabric site.
• Sources and receivers that are Layer3-attached through VRF-Lite links to the BGW-BL nodes of a
single site need to have reachability through the external Layer 3 network. If there's a Layer 3-attached
source on BGBL-Node1 and a Layer 3-attached receiver on BGBL-Node2 for the same site, the
traffic between these two endpoints flows through the external Layer 3 network and not through
the fabric.
• External multicast networks should be connected only through the BGW or BL. If a deployment
requires external multicast network connectivity from both the BGW and BL at the same site, make
sure that external routes that are learned from the BGW are preferred over the BL. To do so, the
BGW must have a lower MED and a higher OSPF cost (on the external links) than the BL.
The following figure shows a site with external network connectivity through BGW-BLs and an
internal leaf (BL). The path to the external source should be through BGW-BL41 or BGW-BL42
(rather than through BL9) to avoid duplication on the remote site receiver.
Ext.Src
|
---External network--------
| | |
| | |
L21-----BG21=====DCI======BGW-BL41-------BGW-BL42----------BL9
|
Rx
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
198
Configuring Multi-Site
Configuring TRM with Multi-Site
Procedure
Step 4 host-reachability protocol bgp Defines BGP as the mechanism for host
reachability advertisement.
Example:
switch(config-if-nve)# host-reachability
protocol bgp
Step 5 source-interface loopback src-if Defines the source interface, which must be a
loopback interface with a valid /32 IP address.
Example:
This /32 IP address must be known by the
switch(config-if-nve)# source-interface transient devices in the transport network and
loopback 0
the remote VTEPs. This requirement is
accomplished by advertising the address
through a dynamic routing protocol in the
transport network.
Step 6 multisite border-gateway interface loopback Defines the loopback interface used for the
vi-num border gateway virtual IP address (VIP). The
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
199
Configuring Multi-Site
Verifying TRM with Multi-Site Configuration
Step 7 member vni vni-range associate-vrf Configures the virtual network identifier (VNI).
Example: The range for vni-range is from 1 to 16,777,214
switch(config-if-nve)# member vni 10010 The value of vni-range can be a single value
associate-vrf like 5000 or a range like 5001-5008.
Step 9 multisite ingress-replication optimized Defines the Multi-Site BUM replication method
for extending the Layer 2 VNI.
Example:
switch(config-if-nve-vni)# multisite
ingress-replication optimized
Command Purpose
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
200
Configuring Multi-Site
Verifying TRM with Multi-Site Configuration
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
201
Configuring Multi-Site
Verifying TRM with Multi-Site Configuration
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
202
CHAPTER 10
Configuring Tenant Routed Multicast
This chapter contains the following sections:
• About Tenant Routed Multicast, on page 203
• About Tenant Routed Multicast Mixed Mode, on page 205
• Guidelines and Limitations for Tenant Routed Multicast, on page 205
• Guidelines and Limitations for Layer 3 Tenant Routed Multicast, on page 206
• Guidelines and Limitations for Layer 2/Layer 3 Tenant Routed Multicast (Mixed Mode), on page 207
• Rendezvous Point for Tenant Routed Multicast, on page 208
• Configuring a Rendezvous Point for Tenant Routed Multicast, on page 208
• Configuring a Rendezvous Point Inside the VXLAN Fabric, on page 209
• Configuring an External Rendezvous Point, on page 210
• Configuring RP Everywhere with PIM Anycast, on page 212
• Configuring RP Everywhere with MSDP Peering, on page 217
• Configuring Layer 3 Tenant Routed Multicast, on page 223
• Configuring TRM on the VXLAN EVPN Spine, on page 227
• Configuring Tenant Routed Multicast in Layer 2/Layer 3 Mixed Mode, on page 229
• Configuring Layer 2 Tenant Routed Multicast, on page 234
• Configuring TRM with vPC Support, on page 235
• Configuring TRM with vPC Support (Cisco Nexus 9504-R and 9508-R), on page 238
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
203
Configuring Tenant Routed Multicast
About Tenant Routed Multicast
With TRM enabled, multicast forwarding in the underlay is leveraged to replicate VXLAN encapsulated
routed multicast traffic. A Default Multicast Distribution Tree (Default-MDT) is built per-VRF. This is an
addition to the existing multicast groups for Layer-2 VNI Broadcast, Unknown Unicast, and Layer-2 multicast
replication group. The individual multicast group addresses in the overlay are mapped to the respective underlay
multicast address for replication and transport. The advantage of using a BGP-based approach allows the
VXLAN BGP EVPN fabric with TRM to operate as fully distributed Overlay Rendezvous-Point (RP), with
the RP presence on every edge-device (VTEP).
A multicast-enabled data center fabric is typically part of an overall multicast network. Multicast sources,
receivers, and multicast rendezvous points, might reside inside the data center but might also be inside the
campus or externally reachable via the WAN. TRM allows a seamless integration with existing multicast
networks. It can leverage multicast rendezvous points external to the fabric. Furthermore, TRM allows for
tenant-aware external connectivity using Layer-3 physical interfaces or subinterfaces.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
204
Configuring Tenant Routed Multicast
About Tenant Routed Multicast Mixed Mode
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
205
Configuring Tenant Routed Multicast
Guidelines and Limitations for Layer 3 Tenant Routed Multicast
• Layer 3 TRM and VXLAN EVPN Multi-Site are supported on the same physical switch. For more
information, see Configuring Multi-Site.
• TRM Multi-Site functionality is not supported on Cisco Nexus 9504 platform switches with -R/RX line
cards.
• If one or both VTEPs is a Cisco Nexus 9504 or 9508 platform switch with -R/RX line cards, the packet
TTL is decremented twice, once for routing to the L3 VNI on the source leaf and once for forwarding
from the destination L3 VNI to the destination VLAN on the destination leaf.
• TRM with vPC border leafs is supported only for Cisco Nexus 9200, 9300-EX, and 9300-FX/FX2/FX3
platform switches and Cisco Nexus 9500 platform switches with -EX/FX or -R/RX line cards. The
advertise-pip and advertise virtual-rmac commands must be enabled on the border leafs to support
this functionality. For configuration information, see the "Configuring VIP/PIP" section.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
206
Configuring Tenant Routed Multicast
Guidelines and Limitations for Layer 2/Layer 3 Tenant Routed Multicast (Mixed Mode)
• Well-known local scope multicast (224.0.0.0/24) is excluded from TRM and is bridged.
• When an interface NVE is brought down on the border leaf, the internal overlay RP per VRF must be
brought down.
• Layer 2/Layer 3 Tenant Routed Multicast (TRM) is not supported on Cisco Nexus 9300-FX3 platform
switches.
• Layer 2/Layer 3 Tenant Routed Multicast (TRM) is not supported on Cisco Nexus 9300-GX platform
switches.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
207
Configuring Tenant Routed Multicast
Rendezvous Point for Tenant Routed Multicast
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
208
Configuring Tenant Routed Multicast
Configuring a Rendezvous Point Inside the VXLAN Fabric
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
209
Configuring Tenant Routed Multicast
Configuring an External Rendezvous Point
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
210
Configuring Tenant Routed Multicast
Configuring an External Rendezvous Point
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
211
Configuring Tenant Routed Multicast
Configuring RP Everywhere with PIM Anycast
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
212
Configuring Tenant Routed Multicast
Configuring a TRM Leaf Node for RP Everywhere with PIM Anycast
Procedure
Step 2 interface loopback loopback_number Configure the loopback interface on all VXLAN
VTEP devices.
Example:
switch(config)# interface loopback 11
Configuring a TRM Border Leaf Node for RP Everywhere with PIM Anycast
Configuring the TRM Border Leaf Node for RP Anywhere with PIM Anycast.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
213
Configuring Tenant Routed Multicast
Configuring a TRM Border Leaf Node for RP Everywhere with PIM Anycast
Procedure
Step 7 interface loopback loopback_number Configure the PIM Anycast set RP loopback
interface.
Example:
switch(config)# interface loopback 12
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
214
Configuring Tenant Routed Multicast
Configuring an External Router for RP Everywhere with PIM Anycast
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
215
Configuring Tenant Routed Multicast
Configuring an External Router for RP Everywhere with PIM Anycast
Step 6 interface loopback loopback_number Configure the PIM Anycast set RP loopback
interface.
Example:
switch(config)# interface loopback 12
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
216
Configuring Tenant Routed Multicast
Configuring RP Everywhere with MSDP Peering
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
217
Configuring Tenant Routed Multicast
Configuring a TRM Leaf Node for RP Everywhere with MSDP Peering
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
218
Configuring Tenant Routed Multicast
Configuring a TRM Border Leaf Node for RP Everywhere with MSDP Peering
Configuring a TRM Border Leaf Node for RP Everywhere with MSDP Peering
Use this procedure to configure a TRM border leaf for RP Everywhere with PIM Anycast.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
219
Configuring Tenant Routed Multicast
Configuring a TRM Border Leaf Node for RP Everywhere with MSDP Peering
Step 8 interface loopback loopback_number Configure the PIM Anycast set RP loopback
interface.
Example:
switch(config)# interface loopback 12
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
220
Configuring Tenant Routed Multicast
Configuring an External Router for RP Everywhere with MSDP Peering
Step 17 ip msdp peer ip-address connect-source Configure MSDP peering between border node
loopback and external RP router.
Example:
switch(config-vrf)# ip msdp peer
209.165.201.11 connect-source loopback12
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
221
Configuring Tenant Routed Multicast
Configuring an External Router for RP Everywhere with MSDP Peering
Step 7 interface loopback loopback_number Configure the PIM Anycast set RP loopback
interface.
Example:
switch(config)# interface loopback 12
Step 14 ip msdp peer ip-address connect-source Configure MSDP peering between external
loopback12 RP router and all TRM border nodes.
Example:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
222
Configuring Tenant Routed Multicast
Configuring Layer 3 Tenant Routed Multicast
Note TRM follows an always-route approach and hence decrements the Time to Live (TTL) of the transported IP
multicast traffic.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
223
Configuring Tenant Routed Multicast
Configuring Layer 3 Tenant Routed Multicast
Step 5 member vni vni-range associate-vrf Configure the Layer 3 virtual network
identifier. The range of vni-range is from 1 to
Example:
16,777,214.
switch(config-if-nve)# member vni 200100
associate-vrf
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
224
Configuring Tenant Routed Multicast
Configuring Layer 3 Tenant Routed Multicast
Step 20 route-target both auto mvpn Defines the BGP route target that is added as
an extended community attribute to the
Example:
customer multicast (C_Multicast) routes
switch(config-vrf-af-ipv4)# route-target (ngMVPN route type 6 and 7).
both auto mvpn
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
225
Configuring Tenant Routed Multicast
Configuring Layer 3 Tenant Routed Multicast
Step 26 ip pim sparse-mode Enables IGMP and PIM on the SVI. This is
required is multicast sources and/or receivers
Example:
exist in this VLAN.
switch(config-if)# ip pim sparse-mode
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
226
Configuring Tenant Routed Multicast
Configuring TRM on the VXLAN EVPN Spine
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
227
Configuring Tenant Routed Multicast
Configuring TRM on the VXLAN EVPN Spine
Step 6 address-family ipv4 mvpn Configure the address family IPv4 MVPN
under the BGP.
Example:
switch(config-router)# address-family
ipv4 mvpn
Step 9 address-family ipv4 mvpn Configure address family IPv4 MVPN under
the BGP neighbor.
Example:
switch(config-router-neighbor)#
address-family ipv4 mvpn
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
228
Configuring Tenant Routed Multicast
Configuring Tenant Routed Multicast in Layer 2/Layer 3 Mixed Mode
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
229
Configuring Tenant Routed Multicast
Configuring Tenant Routed Multicast in Layer 2/Layer 3 Mixed Mode
Procedure
Step 3 advertise evpn multicast Advertises IMET and SMET routes into BGP
EVPN towards non-TRM capable switches.
Example:
switch(config)# advertise evpn multicast
Step 8 member vni vni-range associate-vrf Configure the Layer 3 virtual network
identifier. The range of vni-range is from 1 to
Example:
16,777,214.
switch(config-if-nve)# member vni 200100
associate-vrf
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
230
Configuring Tenant Routed Multicast
Configuring Tenant Routed Multicast in Layer 2/Layer 3 Mixed Mode
Step 13 ip router ospf process-tag area ospf-id OSPF area ID in IP address format.
Example:
switch(config-if)# ip router ospf 100
area 0.0.0.0
Step 17 mcast-routing override source-interface Enables that TRM is using a different loopback
loopback int-num interface than the VTEPs default
source-interface.
Example:
switch(config-if-nve)# mcast-routing The loopback10 variable must be configured
override source-interface loopback 10 on every TRM-enabled VTEP (Anchor DR)
in the underlay with the same IP address. This
loopback and the respective override
command are needed to serve TRM VTEPs in
co-existence with non-TRM VTEPs.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
231
Configuring Tenant Routed Multicast
Configuring Tenant Routed Multicast in Layer 2/Layer 3 Mixed Mode
Step 28 route-target both auto mvpn Specify target for mvpn routes.
Example:
switch(config-vrf-af-ipv4)# route-target
both auto mvpn
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
232
Configuring Tenant Routed Multicast
Configuring Tenant Routed Multicast in Layer 2/Layer 3 Mixed Mode
Step 37 ip pim neighbor-policy NONE* The none keyword is a configured route map
to deny any IPv4 addresses to avoid
Example:
establishing a PIM neighborship policy using
switch(config-if)# ip pim anycase IP.
neighbor-policy NONE*
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
233
Configuring Tenant Routed Multicast
Configuring Layer 2 Tenant Routed Multicast
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
234
Configuring Tenant Routed Multicast
Configuring TRM with vPC Support
Step 5 vlan configuration vlan-id Enter configuration mode for VLAN 101.
Example:
switch(config)# vlan configuration 101
Step 6 ip igmp snooping querier querier-ip-address Configure IGMP snooping querier for each
multicast-enabled VXLAN VLAN.
Example:
switch(config-vlan-config)# ip igmp
snooping querier 2.2.2.2
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
235
Configuring Tenant Routed Multicast
Configuring TRM with vPC Support
Step 7 ip pim rp-address address group-list range Defines a PIM RP address for the underlay
multicast group range.
Example:
switch(config)# ip pim rp-address
100.100.100.1 group-list 224.0.0/4
Step 8 vpc domain domain-id Creates a vPC domain on the device and enters
vpn-domain configuration mode for
Example:
configuration purposes. There is no default.
switch(config)# vpc domain 1 The range is from 1 to 1000.
Step 11 peer-keepalive destination ipaddress Configures the IPv4 address for the remote
end of the vPC peer-keepalive link.
Example:
switch(config-vpc-domain)# Note The system does not form the vPC
peer-keepalive destination 172.28.230.85 peer link until you configure a vPC
peer-keepalive link.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
236
Configuring Tenant Routed Multicast
Configuring TRM with vPC Support
Step 17 Create the SVI. Creates the SVI used for the backup routed
path over the vPC peer-link.
Example:
switch(config)# interface vlan 10
switch(config)# ip address 10.10.10.1/30
switch(config)# ip router ospf process
UNDERLAY area 0
switch(config)# ip pim sparse-mode
switch(config)# no ip redirects
switch(config)# mtu 9216
switch(config)# no shutdown
Step 18 (Optional) delay restore interface-vlan Enables the delay restore timer for SVIs. We
seconds recommend tuning this value when the
SVI/VNI scale is high. For example, when the
Example:
SCI count is 1000, we recommend that you set
switch(config-vpc-domain)# delay restore the delay restore for interface-vlan to 45
interface-vlan 45
seconds.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
237
Configuring Tenant Routed Multicast
Configuring TRM with vPC Support (Cisco Nexus 9504-R and 9508-R)
Step 7 ip pim rp-address address group-list range Defines a PIM RP address for the underlay
multicast group range.
Example:
switch(config)# ip pim rp-address
100.100.100.1 group-list 224.0.0/4
Step 8 vpc domain domain-id Creates a vPC domain on the device and enters
vpn-domain configuration mode for
Example:
configuration purposes. There is no default.
switch(config)# vpc domain 1 The range is 1–1000.
Step 9 hardware access-list tcam region mac-ifacl Carves the TCAM region for the ACL
database.
Example:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
238
Configuring Tenant Routed Multicast
Configuring TRM with vPC Support (Cisco Nexus 9504-R and 9508-R)
Step 10 hardware access-list tcam region vxlan 10 Assigns the the TCAM region for use by a
VXLAN.
Example:
switch(config)# hardware access-list Note This TCAM carving command is
tcam region vxlan 10 required to enable TRM forwarding
for N9K-X9636C-RX line cards
only.
Step 14 peer-keepalive destination ipaddress Configures the IPv4 address for the remote
end of the vPC peer-keepalive link.
Example:
switch(config-vpc-domain)# Note The system does not form the vPC
peer-keepalive destination 172.28.230.85 peer link until you configure a vPC
peer-keepalive link.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
239
Configuring Tenant Routed Multicast
Configuring TRM with vPC Support (Cisco Nexus 9504-R and 9508-R)
Step 20 Create the SVI. Creates the SVI used for the backup routed
path over the vPC peer-link.
Example:
switch(config)# interface vlan 10
switch(config)# ip address 10.10.10.1/30
switch(config)# ip router ospf process
UNDERLAY area 0
switch(config)# ip pim sparse-mode
switch(config)# no ip redirects
switch(config)# mtu 9216
switch(config)# no shutdown
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
240
Configuring Tenant Routed Multicast
Configuring TRM with vPC Support (Cisco Nexus 9504-R and 9508-R)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
241
Configuring Tenant Routed Multicast
Configuring TRM with vPC Support (Cisco Nexus 9504-R and 9508-R)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
242
CHAPTER 11
Configuring Cross Connect
This chapter contains the following sections:
• About VXLAN Cross Connect, on page 243
• Guidelines and Limitations for VXLAN Cross Connect, on page 244
• Configuring VXLAN Cross Connect, on page 245
• Verifying VXLAN Cross Connect Configuration, on page 247
• Configuring NGOAM for VXLAN Cross Connect, on page 248
• Verifying NGOAM for VXLAN Cross Connect , on page 248
• NGOAM Authentication, on page 249
• Guidelines and Limitations for Q-in-VNI, on page 250
• Configuring Q-in-VNI, on page 252
• Configuring Selective Q-in-VNI, on page 253
• Configuring Q-in-VNI with LACP Tunneling, on page 256
• Selective Q-in-VNI with Multiple Provider VLANs, on page 258
• Configuring QinQ-QinVNI, on page 262
• Removing a VNI, on page 264
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
243
Configuring Cross Connect
Guidelines and Limitations for VXLAN Cross Connect
VXLAN Cross Connect enables tunneling of all control frames (CDP, LLDP, LACP, STP, BFD, and PAGP)
and data across the VXLAN cloud.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
244
Configuring Cross Connect
Configuring VXLAN Cross Connect
• Scale of xconnect VLANs depends on the number of ports available on the switch. Every xconnect VLAN
can tunnel all 4k customer VLANs.
• Xconnect or Crossconnect feature on vpc-vtep needs backup-svi as native VLAN on the vPC peer-link.
• Make sure that the NGOAM xconnect hb-interval is set to 5000 milliseconds on all VTEPs before
attempting ISSU/patch activation to avoid link flaps.
• Before activating the patch for the cfs process, you must move the NGOAM xconnect hb-interval to the
maximum value of 5000 milliseconds. This prevents interface flaps during the patch activation.
• The vPC orphan tunneled port per VNI should be either on the vPC primary switch or secondary switch,
but not both.
• Configuring a static MAC on xconnect tunnel interfaces is not supported.
• xconnect is not supported on FEX ports.
• On vpc-vtep, spanning tree must be disabled on both vPC peers for xconnect VLANs.
• Xconnect access ports need to be flapped after disabling NGOAM on all the VTEPs.
• After deleting and adding a VLAN, or removing xconnect from a VLAN, physical ports need to be
flapped with NGOAM.
• Beginning with Cisco NX-OS Release 9.3(3), support is added for the following switches:
• Cisco Nexus C93600CD-GX
Cisco Nexus C9364C-GX
Cisco Nexus C9316D-GX
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
245
Configuring Cross Connect
Configuring VXLAN Cross Connect
Step 7 switchport mode dot1q-tunnel Creates a 802.1q tunnel on the port. The port
will do down and reinitialize (port flap) when
Example:
the interface mode is changed. BPDU filtering
switch(config-if)# switchport mode is enabled and CDP is disabled on tunnel
dot1q-tunnel
interfaces.
Step 8 switchport access vlan vlan-id Sets the interface access VLAN.
Example:
switch(config-if)# switchport access vlan
10
Example
This example shows how to configure VXLAN Cross Connect.
switch# configure terminal
switch(config)# vlan 10
switch(config)# vn-segment 10010
switch(config)# xconnect
switch(config)# vlan 20
switch(config)# vn-segment 10020
switch(config)# xconnect
switch(config)# vlan 30
switch(config)# vn-segment 10030
switch(config)# xconnect
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
246
Configuring Cross Connect
Verifying VXLAN Cross Connect Configuration
Command Purpose
show nve vni session-num Displays VXLAN VNI status per VNI.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
247
Configuring Cross Connect
Configuring NGOAM for VXLAN Cross Connect
Procedure
Step 3 ngoam install acl Installs NGOAM Access Control List (ACL).
Example:
switch(config)# ngoam install acl
Step 4 (Optional) ngoam xconnect hb-interval Configures the heart beat interval. Range of
interval interval is 150 to 5000. The default value is
190.
Example:
switch(config)# ngoam xconnect
hb-interval 5000
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
248
Configuring Cross Connect
NGOAM Authentication
Command Purpose
show ngoam xconnect session all Displays the summary of xconnect sessions.
show ngoam xconnect session session-num Displays detailed xconnect information for the session.
NGOAM Authentication
NGOAM provides the interface statistics in the pathtrace response. NGOAM authenticates the pathtrace
requests to provide the statistics by using the HMAC MD5 authentication mechanism.
NGOAM authentication validates the pathtrace requests before providing the interface statistics. NGOAM
authentication takes effect only for the pathtrace requests with req-stats option. All the other commands are
not affected with the authentication configuration. If NGOAM authentication key is configured on the requesting
node, NGOAM runs the MD5 algorithm using this key to generate the 16-bit MD5 digest. This digest is
encoded as type-length-value (TLV) in the pathtrace request messages.
When the pathtrace request is received, NGOAM checks for the req-stats option and the local NGOAM
authentication key. If the local NGOAM authentication key is present, it runs MD5 using the local key on the
request to generate the MD5 digest. If both digests match, it includes the interface statistics. If both digests
do not match, it sends only the interface names. If an NGOAM request comes with the MD5 digest but no
local authentication key is configured, it ignores the digest and sends all the interface statistics. To secure an
entire network, configure the authentication key on all nodes.
To configure the NGOAM authentication key, use the ngoam authentication-key <key> CLI command. Use
the show running-config ngoam CLI command to display the authentication key.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
249
Configuring Cross Connect
Guidelines and Limitations for Q-in-VNI
In the following example, the same authentication key is configured on the requesting switch and the responding
switch.
In the following example, an authentication key is not configured on the requesting switch. Therefore, the
responding switch does not send any interface statistics. The intermediate node does not have any authentication
key configured and it always replies with the interface statistics.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
250
Configuring Cross Connect
Guidelines and Limitations for Q-in-VNI
• The system dot1q-tunnel transit [vlan vlan-range] command is required when running this feature on
vPC VTEPs.
• Port VLAN mapping and Q-in-VNI cannot coexist on the same port.
• Port VLAN mapping and Q-in-VNI cannot coexist on a switch if the system dot1q-tunnel transit
command is enabled. Beginning with Cisco NX-OS Release 9.3(5), port VLAN mapping and Q-in-VNI
can coexist on the same switch but on different ports and different provider VLANs, which are configured
using the system dot1q-tunnel transit vlan vlan-range command.
• For proper operation during L3 uplink failure scenarios on vPC VTEPs, configure a backup SVI and
enter the system nve infra-vlans backup-svi-vlan command. On Cisco Nexus 9000-EX platform switches,
the backup SVI VLAN needs to be the native VLAN on the peer-link.
• Q-in-VNI only supports VXLAN bridging. It does not support VXLAN routing.
• The dot1q tunnel mode does not support ALE ports on Cisco Nexus 9300 Series and Cisco Nexus 9500
platform switches.
• Q-in-VNI does not support FEX.
• When configuring access ports and trunk ports for Cisco Nexus 9000 Series switches with a Network
Forwarding Engine (NFE) or a Leaf Spine Engine (LSE), you can have access ports, trunk ports, and
dot1q ports on different interfaces on the same switch.
• You cannot have the same VLAN configured for both dot1q and trunk ports/access ports.
• Disable ARP suppression on the provider VNI for ARP traffic originated from a customer VLAN in
order to flow.
switch(config)# interface nve 1
switch(config-if-nve)# member VNI 10000011
switch(config-if-nve-vni)# no suppress-arp
• Cisco Nexus 9300 platform switches support single tag. You can enable it by entering the no
overlay-encapsulation vxlan-with-tag command for the NVE interface:
switch(config)# interface nve 1
switch(config-if-nve)# no overlay-encapsulation vxlan-with-tag
switch# show run int nve 1
version 7.0(3u)I4(2u)
interface nve1
no shutdown
source-interface loopback0
host-reachability protocol bgp
member vni 900001 associate-vrf
member vni 2000980
mcast-group 225.4.0.1
• Cisco Nexus 9500 platform switches do not support single tag. They support only double tag.
• Cisco Nexus 9300-EX platform switches do not support double tag. They support only single tag.
• Cisco Nexus 9300-EX platform switches do not support traffic between ports configured for Q-in-VNI
and ports configured for trunk.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
251
Configuring Cross Connect
Configuring Q-in-VNI
• Q-in-VNI cannot coexist with a VTEP that has Layer 3 subinterfaces configured. Beginning with Cisco
NX-OS Release 9.3(5), this limitation no longer applies to Cisco Nexus 9332C, 9364C, 9300-FX/FX2,
and 9300-GX platform switches.
• When VLAN1 is configured as the native VLAN with selective Q-in-VNI with the multiple provider
tag, traffic on the native VLAN gets dropped. Do not configure VLAN1 as the native VLAN when the
port is configured with selective Q-in-VNI. When VLAN1 is configured as a customer VLAN, the traffic
on VLAN1 gets dropped.
• The base port mode must be a dot1q tunnel port with an access VLAN configured.
• VNI mapping is required for the access VLAN on the port.
• If you have Q-in-VNI on one Cisco Nexus 9300-EX Series switch VTEP and trunk on another Cisco
Nexus 9300-EX Series switch VTEP, the bidirectional traffic will not be sent between the two ports.
• Cisco Nexus 9300-EX Series of switches performing VXLAN and Q-in-Q, a mix of provider interface
and VXLAN uplinks is not considered. The VXLAN uplinks have to be separated from the Q-in-Q
provider or customer interface.
For vPC use cases, the following considerations must be made when VXLAN and Q-in-Q are used on
the same switch.
• The vPC peer-link has to be specifically configured as a provider interface to ensure orphan-to-orphan
port communication. In these cases, the traffic is sent with two IEEE 802.1q tags (double dot1q
tagging). The inner dot1q is the customer VLAN ID while the outer dot1q is the provider VLAN
ID (access VLAN).
• The vPC peer-link is used as backup path for the VXLAN encapsulated traffic in the case of an
uplink failure. In Q-in-Q, the vPC peer-link also acts as the provider interface (orphan-to-orphan
port communication). In this combination, use the native VLAN as the backup VLAN for traffic to
handle uplink failure scenarios. Also make sure the backup VLAN is configured as a system infra
VLAN (system nve infra-vlans).
• Beginning with Cisco NX-OS Release 9.3(5), Q-in-VNI is supported on Cisco Nexus 9300-GX platform
switches.
• Beginning with Cisco NX-OS Release 9.3(5), Q-in-VNI supports vPC Fabric Peering.
Configuring Q-in-VNI
Using Q-in-VNI provides a way for you to segregate traffic by mapping to a specific port. In a multi-tenant
environment, you can specify a port to a tenant and send/receive packets over the VXLAN overlay.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
252
Configuring Cross Connect
Configuring Selective Q-in-VNI
Step 5 spanning-tree bpdufilter enable Enables BPDU Filtering for the specified
spanning tree edge interface. By default, BPDU
Filtering is disabled.
Example
The following is an example of configuring Q-in-VNI:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
253
Configuring Cross Connect
Configuring Selective Q-in-VNI
the packet egresses out of the selective Q-in-VNI port. If a packet is sent with VLAN tag 300 from
VTEP1, it is dropped because 300 is not in VTEP1’s selective Q-in-VNI configured range.
• Beginning with Cisco NX-OS Release 9.3(5), the advertise-pip command is supported with selective
Q-in-VNI on a VTEP.
• Port VLAN mapping and selective Q-in-VNI cannot coexist on the same port.
• Port VLAN mapping and selective Q-in-VNI cannot coexist on a switch if the system dot1q-tunnel
transit command is enabled. Beginning with Cisco NX-OS Release 9.3(5), port VLAN mapping and
Q-in-VNI can coexist on the same switch but on different ports and different provider VLANs, which
are configured using the system dot1q-tunnel transit vlan vlan-range command.
• Configure the system dot1q-tunnel transit [vlan vlan-id] command on vPC switches with selective
Q-in-VNI configurations. This command is required to retain the inner Q-tag as the packet goes over the
vPC peer link when one of the vPC peers has an orphan port. With this CLI configuration, the vlan
dot1Q tag native functionality does not work. Prior to Cisco NX-OS Release 9.3(5), every VLAN created
on the switch is a provider VLAN and cannot be used for any other purpose.
Beginning with Cisco NX-OS Release 9.3(5), selective Q-in-VNI and VXLAN VLANs can be supported
on the same port. With the [vlan vlan-range] option, you can specify the provider VLANs and allow
other VLANs to be used for regular VXLAN traffic. In the following example, the VXLAN VLAN is
50, the provider VLAN is 501, the customer VLANs are 31-40, and the native VLAN is 2400.
system dot1q-tunnel transit vlan 501
interface Ethernet1/1/2
switchport
switchport mode trunk
switchport trunk native vlan 2400
switchport vlan mapping 31-40 dot1q-tunnel 501
switchport trunk allowed vlan 50,501,2400
spanning-tree port type edge trunk
mtu 9216
no shutdown
• The native VLAN configured on the selective Q-in-VNI port cannot be a part of the customer VLAN
range. If the native VLAN is part of the customer VLAN range, the configuration is rejected.
The provider VLAN can overlap with the customer VLAN range. For example, switchport vlan mapping
100-1000 dot1q-tunnel 200.
• By default, the native VLAN on any port is VLAN 1. If VLAN 1 is configured as part of the customer
VLAN range using the switchport vlan mapping <range>dot1q-tunnel <sp-vlan> CLI command, the
traffic with customer VLAN 1 is not carried over as VLAN 1 is the native VLAN on the port. If customer
wants VLAN 1 traffic to be carried over the VXLAN cloud, they should configure a dummy native
VLAN on the port whose value is outside the customer VLAN range.
• To remove some VLANs or a range of VLANs from the configured switchport VLAN mapping range
on the selective Q-in-VNI port, use the no form of the switchport vlan mapping <range>dot1q-tunnel
<sp-vlan> command.
For example, VLAN 100-1000 is configured on the port. To remove VLAN 200-300 from the configured
range, use the no switchport vlan mapping <200-300> dot1q-tunnel <sp-vlan> command.
interface Ethernet1/32
switchport
switchport mode trunk
switchport trunk native vlan 4049
switchport vlan mapping 100-1000 dot1q-tunnel 21
switchport trunk allowed vlan 21,4049
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
254
Configuring Cross Connect
Configuring Selective Q-in-VNI
version 7.0(3)I5(2)
interface Ethernet1/32
switchport
switchport mode trunk
switchport trunk native vlan 4049
switchport vlan mapping 100-199,301-1000 dot1q-tunnel 21
switchport trunk allowed vlan 21,4049
no shutdown
vlan 50
vn-segment 10050
• See the following example for configuring VXLAN Flood and Learn with Ingress Replication:
interface nve1
no shutdown
source-interface loopback0 member vni 10050
mcast-group 230.1.1.1
• See the following example for configuring an SVI in the native VLAN to routed traffic.
vlan 150
interface vlan150
no shutdown
ip address 150.1.150.6/24
ip pim sparse-mode
• See the following example for configuring selective Q-in-VNI on a port. In this example, native VLAN
150 is used for routing the untagged packets. Customer VLANs 200-700 are carried across the dot1q
tunnel. The native VLAN 150 and the provider VLAN 50 are the only VLANs allowed.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
255
Configuring Cross Connect
Configuring Q-in-VNI with LACP Tunneling
• Disable ARP suppression on the provider VNI for ARP traffic originated from a customer VLAN in
order to flow.
switch(config)# interface nve 1
switch(config-if-nve)# member VNI 10000011
switch(config-if-nve-vni)# no suppress-arp
Procedure
Step 4 switchport access vlan vlan-id Specifies the port assigned to a VLAN.
Example
• The following is an example of configuring a Q-in-VNI for LACP tunneling (NX-OS 7.0(3)I2(2)
and earlier releases):
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
256
Configuring Cross Connect
Configuring Q-in-VNI with LACP Tunneling
• The following is an example of configuring a Q-in-VNI for LACP tunneling (NX-OS 7.0(3)I3(1)
and later releases):
• The following is an example topology that pins each port of a port-channel pair to a unique VM.
The port-channel is stretched from the CE perspective. There is no port-channel on VTEP. The
traffic on P1 of CE1 transits to P1 of CE2 using Q-in-VNI.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
257
Configuring Cross Connect
Selective Q-in-VNI with Multiple Provider VLANs
Note • Q-in-VNI can be configured to tunnel LACP packets. (Able to provide port-channel connectivity
across data-centers.)
• Gives impression of L1 connectivity and co-location across data-centers.
• Exactly two sites. Traffic coming from P1 of CE1 goes out of P1 of CE2. If P1 of CE1
goes down, LACP provides coverage (over time) to redirect traffic to P2.
• Uses static ingress replication with VXLAN with flood and learn. Each port of the port channel
is configured with Q-in-VNI. There are multiple VNIs for each member of a port-channel and
each port is pinned to specific VNI.
• To avoid saturating the MAC, you should turn off/disable learning of VLANS.
• Configuring Q-in-VNI to tunnel LACP packets is not supported for VXLAN EVPN.
• The number of port-channel members supported is the number of ports supported by the VTEP.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
258
Configuring Cross Connect
Guidelines and Limitations for Selective Q-in-VNI with Multiple Provider VLANs
fabric using the properties of the service provider VNI. The VXLAN encapsulated packet carries the customer
VLAN tag as part of the Layer 2 header of the inner packet.
• All incoming traffic should be tagged when the interface is configured with the switchport vlan mapping
all dot1q-tunnel command.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
259
Configuring Cross Connect
Configuring Selective Q-in-VNI with Multiple Provider VLANs
Procedure
Step 3 Enter interface configuration mode where the traffic comes in with a dot1Q VLAN tag.
switch(config)# interf port-channel 10
switch(config-if)# switchport
switch(config-if)# switchport mode trunk
switch(config-if)# switchport trunk native vlan 3962
switch(config-if)# switchport vlan mapping 2-400 dot1q-tunnel 10
switch(config-if)# switchport vlan mapping 401-800 dot1q-tunnel 20
switch(config-if)# switchport vlan mapping 801-1200 dot1q-tunnel 30
switch(config-if)# switchport vlan mapping 1201-1600 dot1q-tunnel 40
switch(config-if)# switchport vlan mapping 1601-2000 dot1q-tunnel 50
switch(config-if)# switchport vlan mapping 2001-2400 dot1q-tunnel 60
switch(config-if)# switchport vlan mapping 2401-2800 dot1q-tunnel 70
switch(config-if)# switchport vlan mapping 2801-3200 dot1q-tunnel 80
switch(config-if)# switchport vlan mapping 3201-3600 dot1q-tunnel 90
switch(config-if)# switchport vlan mapping 3601-3960 dot1q-tunnel 100
switch(config-if)# switchport trunk allowed vlan 10,20,30,40,50,60,70,80,90,100,3961-3967
Example
This example shows how to configure Selective Qinvni with multiple provider VLANs:
switch# show run vlan 121
vlan 121
vlan 121
vn-segment 10000021
switch#
switch# sh run interf port-channel 5
interface port-channel5
description VPC PO
switchport
switchport mode trunk
switchport trunk native vlan 504
switchport vlan mapping 11 dot1q-tunnel 111
switchport vlan mapping 12 dot1q-tunnel 112
switchport vlan mapping 13 dot1q-tunnel 113
switchport vlan mapping 14 dot1q-tunnel 114
switchport vlan mapping 15 dot1q-tunnel 115
switchport vlan mapping 16 dot1q-tunnel 116
switchport vlan mapping 17 dot1q-tunnel 117
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
260
Configuring Cross Connect
Configuring Selective Q-in-VNI with Multiple Provider VLANs
switch#
VLAN0111
Spanning tree enabled protocol rstp
Root ID Priority 32879
Address 7079.b3cf.956d
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
switch#
switch#
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
261
Configuring Cross Connect
Configuring QinQ-QinVNI
Configuring QinQ-QinVNI
Overview for QinQ-QinVNI
• QinQ-QinVNI is a VXLAN tunneling feature that allows you to configure a trunk port as a multi-tag
port to preserve the customer VLANs that are carried across the network.
• On a port that is configured as multi-tag, packets are expected with multiple-tags or at least one tag.
When multi-tag packets ingress on this port, the outer-most or first tag is treated as provider-tag or
provider-vlan. The remaining tags are treated as customer-tag or customer-vlan.
• This feature is supported on both vPC and non-vPC ports.
• Ensure that the switchport trunk allow-multi-tag command is configured on both of the vPC-peers.
It is a type 1 consistency check.
• This feature is supported with VXLAN Flood and Learn and VXLAN EVPN.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
262
Configuring Cross Connect
Configuring QinQ-QinVNI
Configuring QinQ-QinVNI
Note You can also carry native VLAN (untagged traffic) on the same multi-tag trunk port.
The native VLAN on a multi-tag port cannot be configured as a provider VLAN on another multi-tag port or
a dot1q enabled port on the same switch.
The allow-multi-tag command is allowed only on a trunk port. It is not available on access or dot1q ports.
The allow-multi-tag command is not allowed on Peer Link ports. Port channel with multi-tag enabled must
not be configured as a vPC peer-link.
Procedure
Step 2 interface ethernet slot/port Specifies the interface that you are configuring.
Example:
switch(config)# interface ethernet1/7
Step 4 switchport mode trunk Sets the interface as a Layer 2 trunk port.
Example:
switch(config-inf)# switchport mode trunk
Step 5 switchport trunk native vlan vlan-id Sets the native VLAN for the 802.1Q trunk.
Valid values are from 1 to 4094. The default
Example:
value is VLAN1.
switch(config-inf)# switchport trunk
native vlan 30
Step 6 switchport trunk allowed vlan vlan-list Sets the allowed VLANs for the trunk interface.
The default is to allow all VLANs on the trunk
Example:
interface: 1 to 3967 and 4048 to 4094. VLANs
switch(config-inf)# switchport trunk 3968 to 4047 are the default VLANs reserved
allowed vlan 10,20,30
for internal use by default.
Step 7 switchport trunk allow-multi-tag Sets the allowed VLANs as the provider
VLANs excluding the native VLAN. In the
Example:
following example, VLANs 10 and 20 are
switch(config-inf)# switchport trunk provider VLANs and can carry multiple Inner
allow-multi-tag
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
263
Configuring Cross Connect
Removing a VNI
Example
interface Ethernet1/7
switchport
switchport mode trunk
switchport trunk native vlan 30
switchport trunk allow-multi-tag
switchport trunk allowed vlan 10,20,30
no shutdown
Removing a VNI
Use this procedure to remove a VNI.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
264
CHAPTER 12
Configuring Port VLAN Mapping
This chapter contains the following sections:
• About Translating Incoming VLANs, on page 265
• Guidelines and Limitations for Port VLAN Mapping, on page 266
• Configuring Port VLAN Mapping on a Trunk Port, on page 268
• Configuring Inner VLAN and Outer VLAN Mapping on a Trunk Port, on page 270
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
265
Configuring Port VLAN Mapping
Guidelines and Limitations for Port VLAN Mapping
You can configure VLAN translation between the ingress (incoming) VLAN and a local (translated) VLAN
on a port. For the traffic arriving on the interface where VLAN translation is enabled, the incoming VLAN
is mapped to a translated VLAN that is VXLAN enabled.
On the underlay, this is mapped to a VNI, the inner dot1q is deleted, and switched over to the VXLAN network.
On the egress switch, the VNI is mapped to a translated VLAN. On the outgoing interface, where VLAN
translation is configured, the traffic is converted to the original VLAN and egressed out. Refer to the VLAN
counters on the translated VLAN for the traffic counters and not on the ingress VLAN. Port VLAN (PV)
mapping is an access side feature and is supported with both multicast and ingress replication for flood and
learn and MP-BGP EVPN mode for VXLAN.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
266
Configuring Port VLAN Mapping
Guidelines and Limitations for Port VLAN Mapping
• Starting from Cisco NX-OS Release 9.2(x), this feature is supported on Cisco Nexus 9300-GX
platform switches.
• Starting from Cisco NX-OS Release 9.3(x), this feature is supported on Cisco Nexus 9300-FX3
platform switches.
• Beginning with Cisco NX-OS Release 9.3(3), PV Translation is supported for Cisco Nexus 9300-GX
platform switches.
• On Cisco Nexus 9300 Series switches with NFE ASIC, PV routing is not supported on 40 G ALE ports.
• PV routing supports configuring an SVI on the translated VLAN for flood and learn and BGP EVPN
mode for VXLAN.
• VLAN translation (mapping) is supported on Cisco Nexus 9000 Series switches with a Network
Forwarding Engine (NFE).
• When changing a property on a translated VLAN, the port that has a mapping configuration with that
VLAN as the translated VLAN, must be flapped to ensure correct behavior.
Int eth 1/1
switchport vlan mapping 101 10
.
.
.
• The following example shows incoming VLAN 10 being mapped to local VLAN 100. Local VLAN 100
will be the one mapped to a VXLAN VNI.
interface ethernet1/1
switchport vlan mapping 10 100
• The following is an example of overlapping VLAN for PV translation. In the first statement, VLAN-102
is a translated VLAN with VNI mapping. In the second statement, VLAN-102 the VLAN where it is
translated to VLAN-103 with VNI mapping.
interface ethernet1/1
switchport vlan mapping 101 102
switchport vlan mapping 102 103/
• When adding a member to an existing port channel using the force command, the "mapping enable"
configuration must be consistent. For example:
Int po 101
switchport vlan mapping enable
switchport vlan mapping 101 10
switchport trunk allowed vlan 10
• Port VLAN mapping is not supported on Cisco Nexus 9200 platform switches.
• VLAN mapping helps with VLAN localization to a port, scoping the VLANs per port. A typical use case
is in the service provider environment where the service provider leaf switch has different customers
with overlapping VLANs that come in on different ports. For example, customer A has VLAN 10 coming
in on Eth 1/1 and customer B has VLAN 10 coming in on Eth 2/2.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
267
Configuring Port VLAN Mapping
Configuring Port VLAN Mapping on a Trunk Port
In this scenario, you can map the customer VLAN to a provider VLAN and map that to a Layer 2 VNI.
There is an operational benefit in terminating different customer VLANs and mapping them to the
fabric-managed VLANs, L2 VNIs.
• An NVE interface with VNI mapping must be configured for Port VLAN translation to work.
Note As a best practice, do not add the ingress VLAN ID to the switchport allowed
vlan-list under the interface.
Procedure
Step 2 interface type/port Specifies the interface that you are configuring.
Example:
switch(config)# interface Ethernet1/1
Step 3 [no] switchport vlan mapping enable Enables VLAN translation on the switch port.
VLAN translation is disabled by default.
Example:
switch(config-if)# [no] switchport vlan Note Use the no form of this command to
mapping enable disable VLAN translation.
Step 4 [no] switchport vlan mapping vlan-id Translates a VLAN to another VLAN.
translated-vlan-id
• The range for both the vlan-id and
Example: translated-vlan-id arguments are from 1
switch(config-if)# switchport vlan to 4094.
mapping 10 100
• You can configure VLAN translation
between the ingress (incoming) VLAN and
a local (translated) VLAN on a port. For
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
268
Configuring Port VLAN Mapping
Configuring Port VLAN Mapping on a Trunk Port
Step 5 [no] switchport vlan mapping all Removes all VLAN mappings configured on
the interface.
Example:
switch(config-if)# switchport vlan
mapping all
Step 6 copy running-config startup-config Copies the running configuration to the startup
configuration.
Example:
switch(config-if)# copy running-config Note The VLAN translation configuration
startup-config does not become effective until the
switch port becomes an operational
trunk port.
Step 7 show interface [if-identifier] vlan mapping Displays VLAN mapping information for a
range of interfaces or for a specific interface.
Example:
switch# show interface ethernet1/1 vlan
mapping
Example
This example shows how to configure VLAN translation between (the ingress) VLAN 10 and (the
local) VLAN 100. The show vlan counters command output shows the statistic counters as translated
VLAN instead of customer VLAN.
switch# configure terminal
switch(config)# interface ethernet1/1
switch(config-if)# switchport vlan mapping enable
switch(config-if)# switchport vlan mapping 10 100
switch(config-if)# switchport trunk allowed vlan 100
switch(config-if)# show interface ethernet1/1 vlan mapping
Interface eth1/1:
Original VLAN Translated VLAN
------------------ ---------------
10 100
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
269
Configuring Port VLAN Mapping
Configuring Inner VLAN and Outer VLAN Mapping on a Trunk Port
• On the same port, no two mapping (translation) configurations can have the same outer (or original) or
translated VLAN. Multiple inner VLAN and outer VLAN mapping configurations can have the same
inner VLAN.
For example:
• When a packet comes double-tagged on a port which is enabled with the inner option, only bridging is
supported.
• VXLAN PV routing is not supported for double-tagged frames.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
270
Configuring Port VLAN Mapping
Configuring Inner VLAN and Outer VLAN Mapping on a Trunk Port
Procedure
Step 4 switchport vlan mapping enable Enables VLAN translation on the switch port.
VLAN translation is disabled by default.
Note Use theno form of this command to
disable VLAN translation.
Step 5 switchport vlan mapping outer-vlan-id inner Translates inner VLAN and outer VLAN to
inner-vlan-id translated-vlan-id another VLAN.
Step 6 (Optional) copy running-config Copies the running configuration to the startup
startup-config configuration.
Note The VLAN translation configuration
does not become effective until the
switch port becomes an operational
trunk port
Step 7 (Optional) show interface [if-identifier] vlan Displays VLAN mapping information for a
mapping range of interfaces or for a specific interface.
Example
This example shows how to configure translation of double tag VLAN traffic (inner VLAN 12; outer
VLAN 11) to VLAN 111.
Legend:
* - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
age - seconds since last seen,+ - primary entry using vPC Peer-Link,
(T) - True, (F) - False
VLAN MAC Address Type age Secure NTFY Ports
---------+-----------------+--------+---------+------+----+------------------
* 111 0000.0092.0001 dynamic 0 F F nve1(100.100.100.254)
* 111 0000.0940.0001 dynamic 0 F F Eth1/1
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
271
Configuring Port VLAN Mapping
Configuring Inner VLAN and Outer VLAN Mapping on a Trunk Port
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
272
CHAPTER 13
Configuring IGMP Snooping
This chapter contains the following sections:
• Configuring IGMP Snooping Over VXLAN, on page 273
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
273
Configuring IGMP Snooping
Configuring IGMP Snooping Over VXLAN
Step 2 switch(config)#ip igmp snooping vxlan Enables IGMP snooping for VXLAN VLANs.
You have to explicitly configure this command
to enable snooping for VXLAN VLANs.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
274
CHAPTER 14
Configuring Private VLANs
This chapter contains the following sections:
• About Private VLANs over VXLAN, on page 275
• Guidelines and Limitations for Private VLANs over VXLAN, on page 276
• Configuration Example for Private VLANs, on page 276
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
275
Configuring Private VLANs
Guidelines and Limitations for Private VLANs over VXLAN
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
276
Configuring Private VLANs
Configuration Example for Private VLANs
vlan 500
private-vlan primary
private-vlan association 501-503
vn-segment 5000
vlan 501
private-vlan isolated
vn-segment 5001
vlan 502
private-vlan community
vn-segment 5002
vlan 503
private-vlan community
vn-segment 5003
vlan 1001
!L3 VNI for tenant VRF
vn-segment 900001
interface Vlan500
no shutdown
private-vlan mapping 501-503
vrf member vxlan-900001
no ip redirects
ip address 50.1.1.1/8
ipv6 address 50::1:1:1/64
no ipv6 redirects
fabric forwarding mode anycast-gateway
interface Vlan1001
no shutdown
vrf member vxlan-900001
no ip redirects
ip forward
ipv6 forward
ipv6 address use-link-local-only
no ipv6 redirects
interface nve 1
no shutdown
host-reachability protocol bgp
source-interface loopback0
member vni 5000
mcast-group 225.5.0.1
member vni 5001
mcast-group 225.5.0.2
member vni 5002
ingress-replication protocol bgp
member vni 5003
mcast-group 225.5.0.4
member vni 900001 associate-vrf
Note If you use an external gateway, the interface towards the external router must be configured as a PVLAN
promiscuous port
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
277
Configuring Private VLANs
Configuration Example for Private VLANs
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
278
CHAPTER 15
Configuring Policy-Based Redirect
This chapter contains the following sections:
• About Policy-Based Redirect, on page 279
• Guidelines and Limitations for Policy-Based Redirect, on page 280
• Enabling the Policy-Based Redirect Feature, on page 280
• Configuring a Route Policy, on page 281
• Verifying the Policy-Based Redirect Configuration, on page 282
• Configuration Example for Policy-Based Redirect, on page 282
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
279
Configuring Policy-Based Redirect
Guidelines and Limitations for Policy-Based Redirect
In the previous figure, communication between App group 1 and App group 2 takes place via inter-VLAN/VNI
routing in the tenant VRF by default. If there is a requirement where traffic from App group 1 to App group
2 has to go through a firewall, a PBR policy can be used to redirect traffic. The following configuration snippet
provides the necessary configuration that redirects the traffic flow
For more information on PBR, see PBR on NX-OS.
• PBR over VXLAN doesn't support the following features: IP SLAs, VTEP ECMP, and the load-share
keyword in the set {ip | ipv6} next-hop ip-address command.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
280
Configuring Policy-Based Redirect
Configuring a Route Policy
Note The switch has a RACL TCAM region by default for IPv4 traffic.
Procedure
Step 3 {ip | ipv6} policy route-map map-name Assigns a route map for IPv4 or IPv6
policy-based routing to the interface.
Example:
switch(config-inf)# ip policy route-map
Testmap
Step 4 route-map map-name [permit | deny] [seq] Creates a route map or enters route-map
configuration mode for an existing route map.
Example:
Use seq to order the entries in a route map.
switch(config-inf)# route-map Testmap
Step 5 match {ip | ipv6} address access-list-name Matches an IPv4 or IPv6 address against one
name [name...] or more IPv4 or IPv6 access control lists
(ACLs). This command is used for policy-based
Example:
routing and is ignored by route filtering or
redistribution.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
281
Configuring Policy-Based Redirect
Verifying the Policy-Based Redirect Configuration
Step 6 set ip next-hop address1 Sets the IPv4 next-hop address for policy-based
routing.
Example:
switch(config-route-map)# set ip next-hop
192.0.2.1
Step 7 set ipv6 next-hop address1 Sets the IPv6 next-hop address for policy-based
routing.
Example:
switch(config-route-map)# set ipv6
next-hop 2001:0DB8::1
Step 8 (Optional) set interface null0 Sets the interface that is used for routing. Use
the null0 interface to drop packets.
Example:
switch(config-route-map)# set interface
null0
Command Purpose
show [ip | ipv6] policy [name] Displays information about an IPv4 or IPv6 policy.
Use the route-map map-name pbr-statistics command to enable policy statistics. Use the clear route-map
map-name pbr-statistics command to clear these policy statistics.
ip access-list IPV4_App_group_1
10 permit ip any 10.1.1.0/24
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
282
Configuring Policy-Based Redirect
Configuration Example for Policy-Based Redirect
ip access-list IPV4_App_group_2
10 permit ip any 20.1.1.0/24
interface Vlan10
! tenant SVI appgroup 1
vrf member appgroup
ip address 10.1.1.1/24
no ip redirect
ipv6 address 2001:10:1:1::1/64
no ipv6 redirects
fabric forwarding mode anycast-gateway
ip policy route-map IPV4_ PBR_Appgroup1
ipv6 policy route-map IPV6_PBR_Appgroup1
interface Vlan20
! tenant SVI appgroup 2
vrf member appgroup
ip address 20.1.1.1/24
no ip redirect
ipv6 address 2001:20:1:1::1/64
no ipv6 redirects
fabric forwarding mode anycast-gateway
ip policy route-map IPV4_ PBR_Appgroup2
ipv6 policy route-map IPV6_PBR_Appgroup2
On the service VTEP, the PBR policy is applied on the tenant VRF SVI. This ensures the
traffic post decapsulation will be redirected to firewall.
feature pbr
ip access-list IPV4_App_group_1
10 permit ip any 10.1.1.0/24
ip access-list IPV4_App_group_2
10 permit ip any 20.1.1.0/24
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
283
Configuring Policy-Based Redirect
Configuration Example for Policy-Based Redirect
interface vlan1000
!L3VNI SVI for Tenant VRF
vrf member appgroup
ip forward
ipv6 forward
ipv6 ipv6 address use-link-local-only
ip policy route-map IPV4_ PBR_Appgroup
ipv6 policy route-map IPV6_PBR_Appgroup
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
284
CHAPTER 16
Configuring ACL
This chapter contains the following sections:
• About Access Control Lists, on page 285
• Guidelines and Limitations for VXLAN ACLs, on page 286
• VXLAN Tunnel Encapsulation Switch, on page 287
• VXLAN Tunnel Decapsulation Switch, on page 293
Scenario ACL ACL Type VTEP Type Port Type Flow Traffic Type Supported
Direction Direction
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
285
Configuring ACL
Guidelines and Limitations for VXLAN ACLs
Scenario ACL ACL Type VTEP Type Port Type Flow Traffic Type Supported
Direction Direction
ACL implementation for VXLAN is the same as regular IP traffic. The host traffic is not encapsulated in the
ingress direction at the encapsulation switch. The implementation is a bit different for the VXLAN encapsulated
traffic at the decapsulation switch as the ACL classification is based on the inner payload. The supported ACL
scenarios for VXLAN are explained in the following topics and the unsupported cases are also covered for
both encapsulation and decapsulation switches.
All scenarios that are mentioned in the previous table are explained with the following host details:
• Host-1: 10.1.1.1/24 VLAN-10
• Host-2: 10.1.1.2/24 VLAN-10
• Host-3: 20.1.1.1/24 VLAN-20
• Case 1: Layer 2 traffic/L2 VNI that flows between Host-1 and Host-2 on VLAN-10.
• Case 2: Layer 3 traffic/L3 VNI that flows between Host-1 and Host-3 on VLAN-10 and VLAN-20.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
286
Configuring ACL
VXLAN Tunnel Encapsulation Switch
• A router ACL (RACL) on an SVI and the Layer 3 uplink ports is not supported to filter the encapsulated
VXLAN traffic with outer or inner headers in an ingress direction. This limitation also applies to the
Layer 3 port-channel uplink interfaces.
• A port ACL (PACL) cannot be applied on the Layer 2 port to which a host is connected. Cisco NX-OS
does not support a PACL in the egress direction.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
287
Configuring ACL
Port ACL on the Access Port on Ingress
Step 4 sequence-number permit ip source-address Creates an ACL rule that permits or denies
destination-address IPv4 traffic matching its condition.
Example: The source-address destination-address
switch(config-acl)# 10 permit ip arguments can be the IP address with a
10.1.1.1/32 10.1.1.2/32 network wildcard, the IP address and
variable-length subnet mask, the host address,
and any to designate any address.
Step 7 ip port access-group pacl-namein Applies a Layer 2 PACL to the interface. Only
inbound filtering is supported with port ACLs.
Example:
You can apply one port ACL to an interface.
switch(config-if)# ip port access-group
PACL_On_Host_Port in
Step 10 switchport trunk allowed vlan vlan-list Sets the allowed VLANs for the trunk
interface. The default is to allow all VLANs
Example:
on the trunk interface, 1 through 3967 and
switch(config-if)# switchport trunk 4048 through 4094. VLANs 3968 through
allowed clan 10,20
4047 are the default VLANs reserved for
internal use.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
288
Configuring ACL
VLAN ACL on the Server VLAN
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
289
Configuring ACL
Routed ACL on an SVI on Ingress
Step 4 vlan access-map map-name [sequence-number] Enters VLAN access-map configuration mode
for the VLAN access map specified. If the
Example:
VLAN access map does not exist, the device
switch(config-acl)# vlan access-map creates it.
Vacl_on_Source_Vlan 10
If you do no specify a sequence number, the
device creates a new entry whose sequence
number is 10 greater than the last sequence
number in the access map.
Step 5 match ip address ip-access-list Specifies an ACL for the access-map entry.
Example:
switch(config-acl)# match ip address
Vacl_on_Source_Vlan
Step 6 action forward Specifies the action that the device applies to
traffic that matches the ACL.
Example:
switch(config-acl)# action forward
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
290
Configuring ACL
Routed ACL on an SVI on Ingress
Procedure
Step 2 hardware access-list tcam region ing-ifacl Attaches the UDFs to the ing-racl TCAM
256 region, which applies to IPv4 or IPv6 port
ACLs.
Example:
switch(config)# hardware access-list
tcam region ing-ifacl 256
Step 4 sequence-number permit ip source-address Creates an ACL rule that permits or denies
destination-address IPv4 traffic matching its condition.
Example: The source-address destination-address
switch(config-acl)# 10 permit ip arguments can be the IP address with a
10.1.1.1/32 10.1.1.2/32 network wildcard, the IP address and
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
291
Configuring ACL
Routed ACL on an SVI on Ingress
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
292
Configuring ACL
Routed ACL on the Uplink on Egress
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
293
Configuring ACL
VLAN ACL for the Layer 2 VNI Traffic
Procedure
Step 2 hardware access-list tcam region vacl 256 Changes the ACL TCAM region size.
Example:
switch(config)# hardware access-list tcam
region vacl 256
Step 5 sequence-number permit ip source-address Creates an ACL rule that permits or denies IPv4
destination-address traffic matching its condition.
Example: The source-address destination-address
switch(config-acl)# 10 permit ip arguments can be the IP address with a network
10.1.1.1/32 10.1.1.2/32 wildcard, the IP address and variable-length
subnet mask, the host address, and any to
designate any address.
Step 6 sequence-number permit protocol Creates an ACL rule that permits or denies IPv4
source-address destination-address traffic matching its condition.
Example: The source-address destination-address
switch(config-acl)# 20 permit tcp arguments can be the IP address with a network
10.1.1.2/32 10.1.1.1/32 wildcard, the IP address and variable-length
subnet mask, the host address, and any to
designate any address.
Step 8 vlan access-map map-name [sequence-number] Enters VLAN access-map configuration mode
for the VLAN access map specified. If the
Example:
VLAN access map does not exist, the device
switch(config)# vlan access-map creates it.
VXLAN-L2-VNI 10
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
294
Configuring ACL
VLAN ACL for the Layer 3 VNI Traffic
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
295
Configuring ACL
VLAN ACL for the Layer 3 VNI Traffic
Procedure
Step 2 hardware access-list tcam region vacl 256 Changes the ACL TCAM region size.
Example:
switch(config)# hardware access-list tcam
region vacl 256
Step 5 sequence-number permit ip source-address Creates an ACL rule that permits or denies IPv4
destination-address traffic matching its condition.
Example: The source-address destination-address
switch(config-acl)# 10 permit ip arguments can be the IP address with a network
10.1.1.1/32 20.1.1.1/32 wildcard, the IP address and variable-length
subnet mask, the host address, and any to
designate any address.
Step 7 vlan access-map map-name [sequence-number] Enters VLAN access-map configuration mode
for the VLAN access map specified. If the
Example:
VLAN access map does not exist, the device
switch(config-acl)# vlan access-map creates it.
VXLAN-L3-VNI 10
If you do no specify a sequence number, the
device creates a new entry whose sequence
number is 10 greater than the last sequence
number in the access map.
Step 8 action forward Specifies the action that the device applies to
traffic that matches the ACL.
Example:
switch(config-acl)# action forward
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
296
Configuring ACL
Routed ACL on an SVI on Egress
Procedure
Step 2 hardware access-list tcam region egr-racl Changes the ACL TCAM region size.
256
Example:
switch(config)# hardware access-list
tcam region egr-racl 256
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
297
Configuring ACL
Routed ACL on an SVI on Egress
Step 4 sequence-number permit ip source-address Creates an ACL rule that permits or denies
destination-address IPv4 traffic matching its condition.
Example: The source-address destination-address
switch(config-acl)# 10 permit ip arguments can be the IP address with a
10.1.1.1/32 20.1.1.1/32 network wildcard, the IP address and
variable-length subnet mask, the host address,
and any to designate any address.
Step 7 ip access-group access-list out Applies an IPv4 or IPv6 ACL to the Layer 3
interfaces for traffic flowing in the direction
Example:
specified. You can apply one router ACL per
switch(config-if)# ip access-group direction.
Racl_On_Detination_Vlan_SVI out
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
298
Configuring ACL
Routed ACL on an SVI on Egress
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
299
Configuring ACL
Routed ACL on an SVI on Egress
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
300
CHAPTER 17
Configuring Secure VXLAN EVPN Multi-Site
Using CloudSec
This chapter contains the following sections:
• About Secure VXLAN EVPN Multi-Site Using CloudSec, on page 301
• Guidelines and Limitations for Secure VXLAN EVPN Multi-Site Using CloudSec, on page 302
• Configuring Secure VXLAN EVPN Multi-Site Using CloudSec, on page 303
• Verifying the Secure VXLAN EVPN Multi-Site Using CloudSec, on page 309
• Displaying Statistics for Secure VXLAN EVPN Multi-Site Using CloudSec, on page 314
• Configuration Examples for Secure VXLAN EVPN Multi-Site Using CloudSec, on page 315
• Migrating from Multi-Site with VIP to Multi-Site with PIP, on page 316
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
301
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Guidelines and Limitations for Secure VXLAN EVPN Multi-Site Using CloudSec
A key lifetime specifies when the key expires. CloudSec rolls over to the next configured pre-shared key in
the keychain after the lifetime expires. The time zone of the key can be local or UTC. The default time zone
is UTC. In the absence of a lifetime configuration, the default lifetime is unlimited.
To configure the CloudSec keychain, see Configuring a CloudSec Keychain and Keys, on page 305.
When the lifetime of the first key expires, it automatically rolls over to the next key in the list. If the same
key is configured on both sides of the link at the same time, the key rollover is hitless. That is, the key rolls
over without traffic interruption. The lifetime of the keys must be overlapped in order to achieve hitless key
rollover.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
302
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Caution Configuring VXLAN EVPN Multi-Site without dci-advertise-pip reverts border gateways to VIP-only mode,
which is not supported for CloudSec VXLAN EVPN Tunnel Encryption.
You have two options for sites that are connected through a route server:
• Keep dual RDs enabled – This default behavior ensures that the memory scale remains the same from
previous releases in order to handle leaf devices with limited memory. All same-site BGWs use the same
RD value for reoriginated routes while advertising EVPN routes to the remote BGW.
• Disable dual RDs – If you don’t have memory limitations on leaf devices, you can configure the no dual
rd command on the BGW. Different RD values are used for reoriginated routes on the same BGWs while
advertising EVPN routes to the remote BGW.
Perform one of the following actions, depending on whether dual RDs are enabled on the BGW:
• If dual RDs are configured on the BGWs, follow these steps:
1. Apply BGP additional paths on the BGW.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
303
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Enabling CloudSec VXLAN EVPN Tunnel Encryption
• If no dual rd is configured on the BGWs or full mesh is configured, follow these steps:
1. Configure the address family and maximum paths on the BGW.
router bgp as-num
address-family l2vpn evpn
maximum-paths number
Note BGP additional paths are not required on the route server.
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
304
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Configuring a CloudSec Keychain and Keys
Step 4 (Optional) copy running-config Copies the running configuration to the startup
startup-config configuration.
Example:
switch(config)# copy running-config
startup-config
What to do next
Configuring a CloudSec Keychain and Keys.
Procedure
Step 2 [no] key chain name tunnel-encryption Creates a CloudSec keychain to hold a set of
CloudSec keys and enters tunnel-encryption
Example:
keychain configuration mode.
switch(config)# key chain kc1
tunnel-encryption
switch(config-tunnelencryptkeychain)#
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
305
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Configuring a CloudSec Policy
Step 4 [no] key-octet-string octet-string Configures the octet string for the key. The
cryptographic-algorithm {AES_128_CMAC octet-string argument can contain up to 64
| AES_256_CMAC} hexadecimal characters. The octet key is
encoded internally, so the key in clear text does
Example:
not appear in the output of the show
switch(config-tunnelencryptkeychain-tunnelencryptkey)# running-config tunnel-encryption command.
key-octet-string
abcdef0123456789abcdef0123456789
abcdef0123456789abcdef0123456789
cryptographic-algorithm AES_256_CMAC
Step 5 [no] send-lifetime start-time duration duration Configures a send lifetime for the key. By
default, the device treats the start time as UTC.
Example:
switch(config-tunnelencryptkeychain-tunnelencryptkey)# The start-time argument is the time of day and
send-lifetime 00:00:00 May 06 2020 date that the key becomes active. The duration
duration 100000 argument is the length of the lifetime in
seconds. The range is from 1800 seconds to
2147483646 seconds (approximately 68 years).
Step 6 (Optional) show key chain name Displays the keychain configuration.
Example:
switch(config-tunnelencryptkeychain-tunnelencryptkey)#
show key chain kc1
Step 7 (Optional) copy running-config startup-config Copies the running configuration to the startup
configuration.
Example:
switch(config-tunnelencryptkeychain-tunnelencryptkey)#
copy running-config startup-config
What to do next
Configuring a CloudSec Policy.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
306
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Configuring a CloudSec Policy
Procedure
Step 2 (Optional) [no] tunnel-encryption Ensures that no unencrypted packets are sent
must-secure-policy over the wire for the session. Packets that are
not carrying CloudSec headers are dropped.
Example:
switch(config)# tunnel-encryption The no form of this command allows
must-secure-policy unencrypted traffic. We recommend allowing
unencrypted traffic only during migration from
non-CloudSec-enabled sites to
CloudSec-enabled sites. By default, Secure
VXLAN EVPN Multi-Site using CloudSec
operates in "should secure" mode.
Step 4 (Optional) [no] cipher-suite name Configures one of the following ciphers:
GCM-AES-XPN-128 or GCM-AES-XPN-256.
Example:
The default value is GCM-AES-XPN-256.
switch(config-tunenc-policy)#
cipher-suite GCM-AES-XPN-256
Step 5 (Optional) [no] window-size number Configures the replay protection window such
that the interface will not accept any packet that
Example:
is less than the configured window size. The
switch(config-tunenc-policy)# window-size range is from 134217728 to 1073741823 IP
134217728
packets. The default value is 268435456.
Step 6 (Optional) [no] sak-rekey-time time Configures the time in seconds to force an SAK
rekey. This command can be used to change the
Example:
session key to a predictable time interval. The
switch(config-tunenc-policy)# range is from 1800 to 2592000 seconds. There
sak-rekey-time 1800
is not a default value. We recommend using the
same rekey value for all the peers.
Step 7 (Optional) show tunnel-encryption policy Displays the CloudSec policy configuration.
Example:
switch(config-tunenc-policy)# show
tunnel-encryption policy
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
307
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Configuring CloudSec Peers
What to do next
Configuring CloudSec Peers.
Procedure
Step 2 [no] tunnel-encryption peer-ip Specifies the IP address of the NVE source
peer-ip-address interface on the peer.
Example:
switch(config)# tunnel-encryption peer-ip
33.1.33.33
Step 3 [no] keychain name policy name Attaches a policy to a CloudSec peer.
Example:
switch(config)# keychain kc1 policy p1
What to do next
Enabling Secure VXLAN EVPN Multi-Site Using CloudSec on DCI Uplinks.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
308
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Verifying the Secure VXLAN EVPN Multi-Site Using CloudSec
Procedure
Command Purpose
show tunnel-encryption policy [policy-name] Displays the configuration for a specific CloudSec
policy or for all CloudSec policies.
show bgp ipv4 unicast ip-address Displays the tunnel encryption information for BGP
routes.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
309
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Verifying the Secure VXLAN EVPN Multi-Site Using CloudSec
Command Purpose
show bgp l2vpn evpn Displays the Layer 2 VPN EVPN address family and
routing table information.
show l2route evpn mac evi evi Displays Layer 2 route information.
show nve interface interface detail Displays the NVE interface detail.
show running-config rpm Displays the key text in the running configuration.
Note If you enter the key-chain
tunnelencrypt-psk no-show command
prior to running this command, the key text
is hidden (with asterisks) in the running
configuration. If you enter the reload ascii
command, the key text is omitted from the
running configuration.
The following example displays configuration information for Secure VXLAN EVPN Multi-Site using
CloudSec:
switch# show tunnel-encryption info global
Global Policy Mode: Must-Secure
SCI list: 0000.0000.0001.0002 0000.0000.0001.0004
No. of Active Peers : 1
The following example displays all configured CloudSec policies. The output shows the cipher, window size,
and SAK retry time for each policy.
switch# show tunnel-encryption policy
Tunnel-Encryption Policy Cipher Window SAK Rekey time
---------------------------- ---------------- --------- --------------
cloudsec GCM-AES-XPN-256 134217728 1800
p1 GCM-AES-XPN-256 1073741823
system-default-tunenc-policy GCM-AES-XPN-256 268435456
The following example displays information about CloudSec sessions. The output shows the peer IP address
and policy, the keychain available, and whether the sessions are secure.
switch# show tunnel-encryption session
Tunnel-Encryption Peer Policy Keychain RxStatus TxStatus
----------------- ----------- -------- ----------- --------------
33.1.33.33 p1 kc1 Secure (AN: 0) Secure (AN: 2)
33.2.33.33 p1 kc1 Secure (AN: 0) Secure (AN: 2)
33.3.33.33 p1 kc1 Secure (AN: 0) Secure (AN: 2)
44.1.44.44 p1 kc1 Secure (AN: 0) Secure (AN: 0)
44.2.44.44 p1 kc1 Secure (AN: 0) Secure (AN: 0)
The following example shows the tunnel encryption information for BGP routes:
switch# show bgp ipv4 unicast 199.199.199.199 Source-loopback configured on peer BGW for
CloudSec
BGP routing table information for VRF default, address family IPv4 Unicast
BGP routing table entry for 199.199.199.199/32, version 109
Paths: (1 available, best #1)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
310
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Verifying the Secure VXLAN EVPN Multi-Site Using CloudSec
Advertised path-id 1
Path type: external, path is valid, is best path, no labeled nexthop, in rib
AS-Path: 1000 200 , path sourced external to AS
89.89.89.89 (metric 0) from 89.89.89.89 (89.89.89.89)
Origin IGP, MED not set, localpref 100, weight 0
Tunnel Encapsulation attribute: Length 120
The following example shows if the MAC is attached with the virtual ESI:
switch(config)# show bgp l2vpn evpn 0012.0100.000a
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 110.110.110.110:32876
BGP routing table entry for [2]:[0]:[0]:[48]:[0012.0100.000a]:[0]:[0.0.0.0]/216, version
13198
Paths: (1 available, best #1)
Flags: (0x000202) (high32 00000000) on xmit-list, is not in l2rib/evpn, is not in HW
Multipath: eBGP
Advertised path-id 1
Path type: external, path is valid, is best path, no labeled nexthop
Imported to 1 destination(s)
Imported paths list: l2-10109
AS-Path: 1000 200 , path sourced external to AS
10.10.10.10 (metric 0) from 89.89.89.89 (89.89.89.89)
Origin IGP, MED not set, localpref 100, weight 0
Received label 10109
Extcommunity: RT:100:10109 ENCAP:8
ESI: 0300.0000.0000.0200.0309
Advertised path-id 1
Path type: external, path is valid, is best path, no labeled nexthop
Imported to 1 destination(s)
Imported paths list: l2-10109
AS-Path: 1000 200 , path sourced external to AS
9.9.9.9 (metric 0) from 89.89.89.89 (89.89.89.89)
Origin IGP, MED not set, localpref 100, weight 0
Received label 10109
Extcommunity: RT:100:10109 ENCAP:8
ESI: 0300.0000.0000.0200.0309
The following example shows the ECMP created for EVPN type-5 routes received from the remote site:
switch(config)# show ip route 205.205.205.9 vrf vrf903
IP Route Table for VRF "vrf903"
'*' denotes best ucast next-hop
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
311
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Verifying the Secure VXLAN EVPN Multi-Site Using CloudSec
*via 10.10.10.10%default, [20/0], 3d05h, bgp-100, external, tag 1000, segid: 900003
tunnelid: 0xa0a0a0a encap: VXLAN
The following example shows if ESI-based MAC multipath is configured for MACs received from the remote
site:
switch(config)# show l2route evpn mac evi 109 mac 0012.0100.000a detail
The following example shows that VXLAN EVPN Multi-Site with PIP is configured:
switch(config)# show nve interface nve1 detail
Interface: nve1, State: Up, encapsulation: VXLAN
VPC Capability: VPC-VIP-Only [not-notified]
Local Router MAC: 700f.6a15.c791
Host Learning Mode: Control-Plane
Source-Interface: loopback0 (primary: 14.14.14.14, secondary: 0.0.0.0)
Source Interface State: Up
Virtual RMAC Advertisement: No
NVE Flags:
Interface Handle: 0x49000001
Source Interface hold-down-time: 180
Source Interface hold-up-time: 30
Remaining hold-down time: 0 seconds
Virtual Router MAC: N/A
Virtual Router MAC Re-origination: 0200.2e2e.2e2e
Interface state: nve-intf-add-complete
Multisite delay-restore time: 180 seconds
Multisite delay-restore time left: 0 seconds
Multisite dci-advertise-pip configured: True
Multisite bgw-if: loopback1 (ip: 46.46.46.46, admin: Up, oper: Up)
Multisite bgw-if oper down reason:
The following example shows the key text in the running configuration. If you enter the key-chain
tunnelencrypt-psk no-show command, the key text is hidden.
switch# show running-config rpm
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
312
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Verifying the Secure VXLAN EVPN Multi-Site Using CloudSec
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
313
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Displaying Statistics for Secure VXLAN EVPN Multi-Site Using CloudSec
Command Purpose
show tunnel-encryption statistics [peer-ip Displays statistics for Secure VXLAN EVPN
peer-ip-address] Multi-Site using CloudSec.
clear tunnel-encryption statistics [peer-ip Clears statistics for Secure VXLAN EVPN Multi-Site
peer-ip-address] using CloudSec.
The following example shows sample statistics for Secure VXLAN EVPN Multi-Site using CloudSec:
switch# show tunnel-encryption statistics
Peer 16.16.16.16 SecY Statistics:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
314
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Configuration Examples for Secure VXLAN EVPN Multi-Site Using CloudSec
feature tunnel-encryption
tunnel-encryption source-interface loopback4
tunnel-encryption must-secure-policy
tunnel-encryption policy p1
window-size 1073741823
interface Ethernet1/1
tunnel-encryption
interface Ethernet1/7
tunnel-encryption
interface Ethernet1/55
tunnel-encryption
interface Ethernet1/59
tunnel-encryption
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
315
Configuring Secure VXLAN EVPN Multi-Site Using CloudSec
Migrating from Multi-Site with VIP to Multi-Site with PIP
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
316
CHAPTER 18
Configuring VXLAN QoS
This chapter contains the following sections:
• Information About VXLAN QoS, on page 317
• Guidelines and Limitations for VXLAN QoS, on page 325
• Default Settings for VXLAN QoS, on page 326
• Configuring VXLAN QoS, on page 327
• Verifying the VXLAN QoS Configuration, on page 329
• VXLAN QoS Configuration Examples, on page 329
Note QoS allows you to classify the network traffic, police and prioritize the traffic flow, and provide congestion
avoidance. For more information about QoS, see the Cisco Nexus 9000 Series NX-OS Quality of Service
Configuration Guide, Release 9.2(x).
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
317
Configuring VXLAN QoS
VXLAN QoS Terminology
Term Definition
Class of Service (CoS) Refers to the three bits in an 802.1Q header that are
used to indicate the priority of the Ethernet frame as
it passes through a switched network. The CoS bits
in the 802.1Q header are commonly referred to as the
802.1p bits. 802.1Q is discarded prior to frame
encapsulation in a VXLAN header, where CoS value
is not present in VXLAN tunnel. To maintain QoS
when a packet enters the VXLAN tunnel, the type of
service (ToS) and CoS values map to each other.
Differentiated Services Code Point (DSCP) The first six bits of the ToS byte in the IP header.
DSCP is only present in an IP packet.
Explicit Congestion Notification (ECN) The last two bits of the ToS byte in the IP header.
ECN is only present in an IP packet.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
318
Configuring VXLAN QoS
VXLAN QoS Features
Term Definition
Trust Boundaries
The trust boundary forms a perimeter on your network. Your network trusts (and does not override) the
markings on your switch. The existing ToS values are trusted when received on in the VXLAN fabric.
Classification
You use classification to partition traffic into classes. You classify the traffic based on the port characteristics
or the packet header fields that include IP precedence, differentiated services code point (DSCP), Layer 3 to
Layer 4 parameters, and the packet length.
The values used to classify traffic are called match criteria. When you define a traffic class, you can specify
multiple match criteria, you can choose to not match on a particular criterion, or you can determine the traffic
class by matching any or all criteria.
Traffic that fails to match any class is assigned to a default class of traffic called class-default.
Marking
Marking is the setting of QoS information that is related to a packet. Packet marking allows you to partition
your network into multiple priority levels or classes of service. You can set the value of a standard QoS field
for COS, IP precedence, and DSCP. You can also set the QoS field for internal labels (such as QoS groups)
that can be used in subsequent actions. Marking QoS groups is used to identify the traffic type for queuing
and scheduling traffic.
Policing
Policing causes traffic that exceeds the configured rate to be discarded or marked down to a higher drop
precedence.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
319
Configuring VXLAN QoS
Queuing and Scheduling
Single-rate policers monitor the specified committed information rate (CIR) of traffic. Dual-rate policers
monitor both CIR and peak information rate (PIR) of traffic.
Traffic Shaping
You can shape traffic by imposing a maximum data rate on a class of traffic so that excess packets are retained
in a queue to smooth (constrain) the output rate. In addition, minimum bandwidth shaping can be configured
to provide a minimum guaranteed bandwidth for a class of traffic.
Traffic shaping regulates and smooths out the packet flow by imposing a maximum traffic rate for each port’s
egress queue. Packets that exceed the threshold are placed in the queue and are transmitted later. Traffic
shaping is similar to Traffic Policing, but the packets are not dropped. Because packets are buffered, traffic
shaping minimizes packet loss (based on the queue length), which provides better traffic behavior for TCP
traffic.
By using traffic shaping, you can control the following:
• Access to available bandwidth.
• Ensure that traffic conforms to the policies established for it.
• Regulate the flow of traffic to avoid congestion that can occur when the egress traffic exceeds the access
speed of its remote, target interface.
For example, you can control access to the bandwidth when the policy dictates that the rate of a given interface
must not, on average, exceed a certain rate. Despite the access rate exceeding the speed.
Network QoS
The network QoS policy defines the characteristics of each CoS value, which are applicable network wide
across switches. With a network QoS policy, you can configure the following:
• Pause behavior—You can decide whether a CoS requires the lossless behavior which is provided by
using a priority flow control (PFC) mechanism that prevents packet loss during congestion) or not. You
can configure drop (frames with this CoS value can be dropped) and no drop (frames with this CoS value
cannot be dropped). For the drop and no drop configuration, you must also enable PFC per port. For
more information about PFC, see “Configuring Priority Flow Control".
Pause behavior can be achieved in the VXLAN tunnel for a specific queue-group.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
320
Configuring VXLAN QoS
VXLAN Priority Tunneling
MQC CLI
All available QoS features for VXLAN QoS are managed from the modular QoS command-line interface
(CLI). The Modular QoS CLI (MQC) allows you to define traffic classes (class maps), create and configure
traffic policies (policy maps), and perform actions that are defined in the policy maps to interface (service
policy).
The network is bidirectional, but in the previous image, traffic is moving left to right.
In the VXLAN network, points of interest are ingress VTEPs where the original traffic is encapsulated in a
VXLAN header. Spines are transporting hops that connect ingress and egress VTEPs. An egress VTEP is the
point where VXLAN encapsulated traffic is decapsulated and egresses the VTEP as classical Ethernet traffic.
Note Ingress and egress VTEPs are the boundary between the VXLAN tunnel and the IP network.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
321
Configuring VXLAN QoS
Transport Through the VXLAN Tunnel
Procedure
Step 1 Layer 2 or Layer 3 traffic enters the edge of the VXLAN network.
Step 2 The switch receives the traffic from the input interface and uses the 802.1p bits or the DSCP value to perform
any classification, marking, and policing. It also derives the outer DSCP value in the VXLAN header. For
classification of incoming IP packets, the input service policy can also use access control lists (ACLs).
Step 3 For each incoming packet, the switch performs a lookup of the IP address to determine the next hop.
Step 4 The packet is encapsulated in the VXLAN header. The encapsulated packet's VXLAN header is assigned a
DSCP value that is based on QoS rules.
Step 5 The switch forwards the encapsulated packets to the appropriate output interface for processing.
Step 6 The encapsulated packets, marked by the DSCP value, are sent to the VXLAN tunnel output interface.
Procedure
Step 1 The VXLAN encapsulated packets are received on an input interface of a transport switch. The switch uses
the outer header to perform classification, marking, and policing.
Step 2 The switch performs a lookup on the IP address in the outer header to determine the next hop.
Step 3 The switch forwards the encapsulated packets to the appropriate output interface for processing.
Step 4 VXLAN sends encapsulated packets through the output interface.
Procedure
Step 1 Packets encapsulated in VXLAN are received at the NVE interface of an egress VTEP, where the switch uses
the inner header DSCP value to perform classification, marking, and policing.
Step 2 The switch removes the VXLAN header from the packet, and does a lookup that is based on the decapsulated
packet's headers.
Step 3 The switch forwards the decapsulated packets to the appropriate output interface for processing.
Step 4 Before the packet is sent out, a DSCP value is assigned to a Layer 3 packet based on the decapsulation priority
or based on marking Layer 2 frames.
Step 5 The decapsulated packets are sent through the outgoing interface to the IP network.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
322
Configuring VXLAN QoS
Classification at the Ingress VTEP, Spine, and Egress VTEP
IP to VXLAN
At the ingress VTEP, the ingress point of the VXLAN tunnel, traffic is encapsulated it the VLXAN header.
Traffic on an ingress VTEP is classified based on the priority in the original header. Classification can be
performed by matching the CoS, DSCP, and IP precedence values or by matching traffic with the ACL based
on the original frame data.
When traffic is encapsulated in the VXLAN, the Layer 3 packet's DSCP value is copied from the original
header to the outer header of the VXLAN encapsulated packet. This behavior is illustrated in the following
figure:
Figure 31: Copy of Priority from Layer-3 Packet to VXLAN Outer Header
For Layer 2 frames without the IP header, the DSCP value of the outer header is derived from the CoS-to-DSCP
mapping present in the hardware illustrated in Default Settings for VXLAN QoS, on page 326. In this way,
the original QoS attributes are preserved in the VXLAN tunnel. This behavior is illustrated in the following
figure:
Figure 32: Copy of Priority from Layer-2 Frame to VXLAN Outer Header
A Layer 2 frame, does not have a DSCP value present because the IP header is not present in the frame. After
a Layer 2 frame is encapsulated, the original CoS value is not preserved in the VXLAN tunnel.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
323
Configuring VXLAN QoS
VXLAN to IP
VXLAN to IP
Classification at the egress VTEP is performed for traffic leaving the VXLAN tunnel. For classification at
the egress VTEP, the inner header values are used. The inner DSCP value is used for priority-based
classification. Classification can be performed using ACLs.
Classification is performed on the NVE interface for all VXLAN tunneled traffic.
Marking and policing can be performed on the NVE interface for tunneled traffic. If marking is configured,
newly marked values are present in the decapsulated packet. Because the original CoS value is not preserved
in the encapsulated packet, marking can be performed for decapsulated packets for any devices that expect
an 802.1p field for QoS in the rest of the network.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
324
Configuring VXLAN QoS
Guidelines and Limitations for VXLAN QoS
Figure 34: Uniform Mode Outer DSCP Value is Copied to Decapsulated Packet DSCP Value for a Layer-3 Packet
Figure 35: Pipe Mode Inner DSCP Value is Copied to Decapsulated Packet DSCP Value for Layer-3 Packet
Note The QoS policy must be configured end-to-end for this feature to work as designed.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
325
Configuring VXLAN QoS
Default Settings for VXLAN QoS
• The following features are not supported on Cisco Nexus 9504 and 9508 platform switches with -R and
-RX line cards:
• Policies on the NVE interface
• IPv6 type of service (ToS) from inner to VXLAN outer copying
• IPv4 routed cases for QoS. ToS from inner is not copied to outer VXLAN header
• For Cisco Nexus 9504 and 9508 platform switches with -RX line cards, the default mode is pipe for
VXLAN decapsulation (inner packet DSCP not modified based on outer IP header DSCP value). This
is a difference in behavior from other line cards types. If -RX line cards and other line cards are used in
the same network, the qos-mode pipe command can be used in switches where non-RX line cards are
present in order to have the same behavior. For details on the configuration command, see Configuring
Type QoS on the Egress VTEP, on page 327.
• VXLAN QoS is supported in the EVPN fabric.
• The original IEEE 802.1Q header is not preserved in the VXLAN tunnel. The CoS value is not present
in the inner header of the VXLAN-encapsulated packet.
• Statistics (counters) are present for the NVE interface.
• Entering the policy-map type qos command in the output direction for egress policing is not supported
in the ingress VTEP.
• In a vPC, configure the change of the decapsulated packet priority selection on both peers.
• The service policy on an NVE interface can attach only in the input direction.
• If DSCP marking is present on the NVE interface, traffic to the BUD node preserves marking in the inner
and outer headers. If a marking action is configured on the NVE interface, BUM traffic is marked with
a new DSCP value on Cisco Nexus 9364C and 9300-EX platform switches.
• A classification policy applied to an NVE interface applies only on VXLAN-encapsulated traffic. For
all other traffic, the classification policy must be applied on the incoming interface.
• To mark the decapsulated packet with a CoS value, a marking policy must be attached to the NVE
interface to mark the CoS value to packets where the VLAN header is present.
• The following guidelines and limitations apply to VXLAN QoS configuration on the DCI handoff node:
• Beginning with Cisco NX-OS Release 9.3(5), Cisco Nexus 9300-GX platform switches support
VXLAN QoS configuration on the DCI handoff node.
• VXLAN QoS configuration on the DCI handoff node does not support end-to-end priority flow
control (PFC) for Cisco Nexus 9336C-FX2, 93240YC-FX2, and 9300-GX platform switches.
• Microburst, dynamic packet prioritization (DPP), and approximate fair-drop (AFD) are supported
on VXLAN-encapsulated packets.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
326
Configuring VXLAN QoS
Configuring VXLAN QoS
0 0
1 8
2 16
3 26
4 32
5 46
6 48
7 56
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
327
Configuring VXLAN QoS
Configuring Type QoS on the Egress VTEP
Step 2 [no] class-map [type qos] [match-all]| Creates or accesses the class map
[match-any] class-map-name class--map-name and enters class-map mode.
The class--map-name argument can contain
Example:
alphabetic, hyphen, or underscore characters,
switch(config)# class-map type qos and can be up to 40 characters. (match-any is
class1
the default when the no option is selected and
multiple match statements are entered.)
Step 3 [no] match [access-group | cos | dscp | Configures the traffic class by matching
precedence] {name | 0-7 | 0-63 | 0-7} packets based on access-list, cos value, dscp
values, or IP precedence value
Example:
switch(config-cmap-qos)# match dscp 26
Step 4 [no] policy-map type qos policy-map-name Creates or accesses the policy map that is
named policy-map-name and then enters
Example:
policy-map mode. The policy-map name can
switch(config-cmap-qos)# policy-map type contain alphabetic, hyphen, or underscore
qos policy
characters, is case sensitive, and can be up to
40 characters.
Step 6 [no] set qos-group qos-group-value Sets the QoS group value to qos-group-value.
The value can range from 1 through 126. The
Example:
qos-group is referenced in type queuing and
switch(config-pmap-c-qos)# set qos-group type network-qos as matching criteria.
1
Step 8 [no] interface nve nve-interface-number Enters interface mode to configure the NVE
interface.
Example:
switch(config)# interface nve 1
Step 9 [no] service-policy type qos input Adds a service-policy policy-map-name to the
policy-map-name interface in the input direction. You can attach
only one input policy to an NVE interface.
Example:
switch(config-if-nve)# service-policy
type qos input policy1
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
328
Configuring VXLAN QoS
Verifying the VXLAN QoS Configuration
Command Purpose
show class map Displays information about all configured class maps.
interface ethernet1/1
service-policy type qos input PM_QOS_MARKING
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
329
Configuring VXLAN QoS
VXLAN QoS Configuration Examples
interface nve 1
service-policy type qos input PM_QOS_MARKING
Queuing
This example shows how to configure the policy-map type queueing command for traffic in qos-group 1.
Assigning 50% of the available bandwidth to q1 mapped to qos-group 1 and attaching policy in the output
direction to all ports using the system qos command.
policy-map type queuing PM_QUEUING
class type queuing c-out-8q-q7
priority level 1
class type queuing c-out-8q-q6
bandwidth remaining percent 0
class type queuing c-out-8q-q5
bandwidth remaining percent 0
class type queuing c-out-8q-q4
bandwidth remaining percent 0
class type queuing c-out-8q-q3
bandwidth remaining percent 0
class type queuing c-out-8q-q2
bandwidth remaining percent 0
class type queuing c-out-8q-q1
bandwidth remaining percent 50
class type queuing c-out-8q-q-default
bandwidth remaining percent 50
system qos
service-policy type queueing output PM_QUEUING
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
330
CHAPTER 19
Configuring vPC Fabric Peering
This chapter contains the following sections:
• Information About vPC Fabric Peering, on page 331
• Guidelines and Limitations for vPC Fabric Peering , on page 332
• Configuring vPC Fabric Peering, on page 333
• Migrating from vPC to vPC Fabric Peering, on page 336
• Verifying vPC Fabric Peering Configuration, on page 338
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
331
Configuring vPC Fabric Peering
Guidelines and Limitations for vPC Fabric Peering
Note The vPC Fabric Peering counts as three VTEPs unlike a normal vPC which counts as one VTEP.
Note For Cisco Nexus 9300-EX switches, mixed-mode multicast and ingress replication
are not supported. VNIs must be configured with either multicast or IR underlay,
but not both.
• vPC Fabric Peering requires TCAM carving of region ing-flow-redirect. TCAM carving requires saving
the configuration and reloading the switch prior to using the feature. (This requirement does not apply
to Cisco Nexus 9300-GX platform switches.)
• Prior to reconfiguring the vPC Fabric Peering source and destination IP, the vPC domain must be shut
down. Once the vPC Fabric Peering source and destination IP have been adjusted, the vPC domain can
be enabled (no shutdown).
• The vPC Fabric Peering peer-link is established over the transport network (the spine layer of the fabric).
As communication between vPC peers occurs in this manner, control plane information CFS messages
used to synchronize port state information, VLAN information, VLAN-to-VNI mapping, host MAC
addresses, and IGMP snooping groups are transmitted over the fabric. CFS messages are marked with
the appropriate DSCP value, which should be protected in the transport network. The following example
shows a sample QoS configuration on the spine layer of Cisco Nexus 9000 Series switches.
Classify traffic by matching the DSCP value (DSCP 56 is the default value):
class-map type qos match-all CFS
match dscp 56
Set traffic to the qos-group that corresponds with the strict priority queue for the appropriate spine switch.
In this example, the switch sends traffic to qos-group 7, which corresponds to the strict priority queue
(Queue 7). Note that different Cisco Nexus platforms might have a different queueing structure.
policy-map type qos CFS
class CFS
Set qos-group 7
Assign a classification service policy to all interfaces toward the VTEP (the leaf layer of the network):
interface Ethernet 1/1
service-policy type qos input CFS
• The vPC Fabric Peering domain does not support attaching FEX to it.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
332
Configuring vPC Fabric Peering
Configuring vPC Fabric Peering
• The vPC Fabric Peering domain is not supported in the role of a Multi-Site vPC BGW.
• Enhance forwarding to orphan hosts by extending the VIP/PIP feature to Type-2 routes.
• Layer 3 Tenant Routed Multicast (TRM) is supported. Layer 2/Layer 3 TRM (Mixed Mode) is not
supported.
• If Type-5 routes are used with this feature, the advertise-pip command is a mandatory configuration.
• VTEPs behind vPC ports are not supported. This means that virtual peer-link peers cannot act as a transit
node for the VTEPs behind the vPC ports.
• SVI and sub-interface uplinks are not supported.
• An orphan Type-2 host is advertised using PIP. A vPC Type-2 host is advertised using VIP. This is the
default behavior for a Type-2 host.
To advertise an orphan Type-5 route using PIP, you need to advertise PIP under BGP.
• Traffic from remote VTEP to orphan hosts would land on the actual node which has the orphans. Bouncing
of the traffic is avoided.
Note When the vPC leg is down, vPC hosts are still advertised with the VIP IP.
• Non-disruptive ISSU is not supported for Cisco Nexus 93108TC-EX and 93180YC-EX switches.
Note For MSTP, VLAN 1 must be extended across vPC Fabric Peering if the peer-link and vPC legs have the
default native VLAN configuration. This behavior can be achieved by extending VLAN 1 over VXLAN
(vn-segment). If the peer-link and vPC legs have non-default native VLANs, those VLANs must be extended
across vPC Fabric Peering by associating the VLANs with VXLAN (vn-segment).
Use the show vpc virtual-peerlink vlan consistency command for verification of the existing
VLAN-to-VXLAN mapping used for vPC Fabric Peering.
peer-keepalive for vPC Fabric Peering is supported with one of the following configurations:
• mgmt interface
• dedicated Layer 3 link in default or non-default VRF
• lopback interface reachable via the spine.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
333
Configuring vPC Fabric Peering
Configuring vPC Fabric Peering
Configuring Features
Example uses OSPF as the underlay routing protocol.
configure terminal
nv overlay evpn
feature ospf
feature bgp
feature pim
feature interface-vlan
feature vn-segment-vlan-based
feature vpc
feature ptp
feature nv overlay
vPC Configuration
Note To change the vPC Fabric Peering source or destination IP, the vPC domain must be shutdown prior to
modification. The vPC domain can be returned to operation after the modifying by using the no shutdown
command.
Note The dscp keyword in optional. Range is 1 to 63. The default value is 56.
Note This loopback is not the NVE source-interface loopback (interface used for the VTEP IP address).
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
334
Configuring vPC Fabric Peering
Configuring vPC Fabric Peering
ip address 192.0.2.20/32
ip router ospf 1 area 0.0.0.0
Note You can use the loopback for BGP peering or a dedicated loopback. This lookback must be different that the
loopback for peer keep alive.
VXLAN Configuration
Note Configuring advertise virtual-rmac (NVE) and advertise-pip (BGP) are required steps. For more information,
see the Configuring vPC Multihoming, on page 173 chapter.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
335
Configuring vPC Fabric Peering
Migrating from vPC to vPC Fabric Peering
interface vlan10
no shutdown
mtu 9216
vrf member vxlan-10101
no ip redirects
ip address 192.0.2.102/24
ipv6 address 2001:DB8:0:1::1/64
no ipv6 redirects
fabric forwarding mode anycast-gateway
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
336
Configuring vPC Fabric Peering
Migrating from vPC to vPC Fabric Peering
Procedure
Step 4 interface ethernet slot/port Specifies the interface you are configuring.
Example: Note This is the peer link port channel.
switch(config)# interface ethernet 1/4
Step 9 virtual peer-link destination dest-ip source Specify the destination and source IP addresses
source-ip for vPC fabric peering.
Example:
switch(config-vpc-domain)# virtual
peer-link destination 192.0.2.1 source
192.0.2.100
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
337
Configuring vPC Fabric Peering
Verifying vPC Fabric Peering Configuration
Step 11 copy running-config startup-config Copies the running configuration to the startup
configuration.
Example:
switch(config-vpc-domain)# copy
running-config startup-config
Command Purpose
show vpc virtual-peerlink vlan consistency Displays the VLANs which are not associated with
vn-segment.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
338
Configuring vPC Fabric Peering
Verifying vPC Fabric Peering Configuration
vPC domain id : 3
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
Configuration consistency status : success
Per-vlan consistency status : success
Type-2 consistency status : success
vPC role : primary
Number of vPCs configured : 1
Peer Gateway : Enabled
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled, timer is off.(timeout = 240s)
Delay-restore status : Timer is off.(timeout = 30s)
Delay-restore SVI status : Timer is off.(timeout = 10s)
Operational Layer3 Peer-router : Disabled
Virtual-peerlink mode : Enabled
vPC status
----------------------------------------------------------------------------
Id Port Status Consistency Reason Active vlans
-- ------------ ------ ----------- ------ ---------------
101 Po101 up success success 98-99,1001-280
0
ToR_B1#
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
339
Configuring vPC Fabric Peering
Verifying vPC Fabric Peering Configuration
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
340
CHAPTER 20
Configuring Seamless Integration of EVPN with
L3VPN (MPLS LDP)
This chapter contains the following sections:
• Information About Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP), on page 341
• Guidelines and Limitations for Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP),
on page 341
• Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP), on page 342
GuidelinesandLimitationsforConfiguringSeamlessIntegration
of EVPN with L3VPN (MPLS LDP)
The following are the guidelines and limitations for Configuring Seamless Integration of EVPN with L3VPN
(MPLS LDP):
The following features are supported:
• Cisco Nexus 9504 and 9508 switches with -R and -RX line cards.
• Layer 3 orphans
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
341
Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP)
Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP)
Note If you enter the no hardware profile mpls extended-ecmp command, the mode
is switched to 4 K ECMP routes. This is applicable only when the line card is
-RX and the ECMP group has exactly 2 paths.
Procedure
Step 2 feature mpls l3vpn Enables the MPLS Layer 3 VPN feature.
Example:
switch# feature mpls l3vpn
Step 3 feature mpls ldp Enables the MPLS Label Distribution Protocol
(LDP).
Example:
switch# feature mpls ldp
Step 4 nv overlay evpn Enables the EVPN control plane for VXLAN.
Example:
switch(config)# nv overlay evpn
Step 5 router bgp number Configures BGP. The value of the number
argument is from 1 to 4294967295.
Example:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
342
Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP)
Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP)
Step 6 address-family ipv4 unicast Configures the address family for IPv4.
Example:
switch(config-router)# address-family
ipv4 unicast
Step 7 redistribute direct route-map Configures the directly connected route map.
route-map-name
Example:
switch(config-router-af)# redistribute
direct route-map passall
Step 11 neighbor address remote-as number Configures a BGP neighbor. The range of the
number argument is from 1 to 65535.
Example:
switch(config-router)# neighbor
108.108.108.108 remote-as 22
Step 12 update-source type/id Specifies the source of the BGP session and
updates.
Example:
switch(config-router-neighbor)#
update-source loopback100
Step 13 ebgp-multihop ttl-value Specifies the multihop TTL for the remote
peer. The range of ttl-value is from 2 to 255.
Example:
switch(config-router-neighbor)#
ebgp-multihop 10
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
343
Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP)
Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP)
Step 17 address-family vpnv4 unicast Configures the address family for IPv4.
Example:
switch(config-router-neighbor)#
address-family vpnv4 unicast
Step 19 import l2vpn evpn reoriginate Reoriginates the route with a new RT.
Example:
switch(config-router)# import l2vpn evpn
reoriginate
Step 21 address-family ipv4 unicast Configures the address family for IPv4.
Example:
switch(config-router)# address-family
ipv4 unicast
Step 23 address-family ipv6 unicast Configures the IPv6 unicast address family.
This is required for IPv6 over VXLAN with
Example:
an IPv4 underlay.
switch(config-router)# address-family
ipv6 unicast
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
344
Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP)
Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP)
Step 27 import vpn unicast reoriginate Reoriginates the route with a new RT.
Example:
switch(config-router)# import vpn
unicast reoriginate
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
345
Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP)
Configuring Seamless Integration of EVPN with L3VPN (MPLS LDP)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
346
CHAPTER 21
Configuring Seamless Integration of EVPN with
L3VPN (MPLS SR)
This chapter contains the following sections:
• Information About Configuring Seamless Integration of EVPN with L3VPN (MPLS SR), on page 347
• Guidelines and Limitations for Configuring Seamless Integration of EVPN with L3VPN (MPLS SR) ,
on page 349
• Configuring Seamless Integration of EVPN with L3VPN (MPLS SR), on page 350
• Example Configuration for Configuring Seamless Integration of EVPN with L3VPN (MPLS SR), on
page 354
With two different technologies, one within the data center (DC) and one in the CORE, there is a natural
necessity to handoff from VXLAN to an MPLS-based core at the DCI nodes, which sit on the edge of the DC
domain, interfacing with the Core edge router.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
347
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Information About Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
In the previous diagram, two DC pods, each running VXLAN, are being Layer 3 extended over a WAN/Core
running MPLS/SR. Another method is classical MPLS L3VPN using LDP. The edge devices in the DC domain
(border PE1, PE2, PE3, and PE4) are the DCI nodes doing the handoff between VXLAN and the MPLS-based
Core network.
For additional information on MPLS SR, see the Cisco Nexus 9000 Series NX-OS Label Switching Configuration
Guide.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
348
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Guidelines and Limitations for Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
GuidelinesandLimitationsforConfiguringSeamlessIntegration
of EVPN with L3VPN (MPLS SR)
Feature Cisco Nexus 9300-FX2/FX3 Cisco Nexus 9504 and Comments
and 9300-GX Platform 9508 switches with -R
Switches Line Cards
The following Cisco Nexus platform switches support seamless integration of EVPN with L3VPN (MPLS
SR):
• 9336C-FX2 switches
• 93240YC-FX2 switches
• 9300-FX3 platform switches
• 9300-GX platform switches
• 9504 and 9508 platform switches with 96136YC-R and 9636C-RX line cards (The 9636C-R and 9636Q-R
line cards are not supported.)
The following features are supported with seamless integration of EVPN with L3VPN (MPLS SR):
• Layer 3 orphans
• Layer 3 hand-off
• Layer 3 physical interfaces for core-facing ports
• Per-VRF labels
• VPN label statistics
• End-to-End Time to Live (TTL) and Explicit Congestion Notification (ECN) (We support only pipe
mode for TTL on a handoff scenario.)
• Segment routing and LDP, for Cisco Nexus 9504 and 9508 platform switches with 96136YC-R and
9636C-RX line cards (However, these features cannot coexist.)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
349
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
The VXLAN-to-SR handoff QoS value is preserved during handoff and propagated from VXLAN tunnel
packets to SR-tunneled packets for Cisco Nexus 9336C-FX2, 93240YC-FX2, 9300-FX3, and 9300-GX
platform switches.
The following features are not supported with seamless integration of EVPN with L3VPN (MPLS SR):
• vPC for redundancy
• Subnet stretches across the DC domain
• SVI/Subinterfaces configured MAC addresses
• BGW (VXLAN Multi-Site) and DCI functionalities on the same switch
• SVI toward the MPLS core
• No-drop for VXLAN/SR and SR/VXLAN handoff, for Cisco Nexus 9336C-FX2, 93240YC-FX2, and
9300-FX3 platform switches
• Statistics, for Cisco Nexus 9504 and 9508 platform switches with 96136YC-R and 9636C-RX line cards
• Priority flow control (PFC), for Cisco Nexus 9336C-FX2, 93240YC-FX2, 9300-FX3, and 9300-GX
platform switches
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
350
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Step 11 address-family ipv4 unicast Configures the address family for IPv4.
Example:
switch(config-router)# address-family
ipv4 unicast
Step 13 network address Injects prefixes into handoff BGP along with
redistribution.
Example:
switch(config-router-af)# network
0.0.0.0/0
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
351
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Step 16 neighbor address remote-as number Defines the eBGP neighbor IPv4 address and
remote Autonomous-System (AS) number.
Example:
switch(config-router)# neighbor
108.108.108.108 remote-as 65535
Step 18 ebgp-multihop number Specifies multihop TTL for the remote peer.
The range of number is from 2 to 255.
Example:
switch(config-router)# ebgp-multihop 10
Step 19 address-family ipv4 unicast Configures the address family for IPv4.
Example:
switch(config-router)# address-family
ipv4 unicast
Step 22 address-family vpnv4 unicast Configures the address family for IPv4.
Example:
switch(config-router)# address-family
vpnv4 unicast
Step 24 import l2vpn evpn reoriginate Reoriginates the route with a new RT. It can
be extended to use an optional route-map.
Example:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
352
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Step 25 neighbor address remote-as number Defines the eBGP neighbor IPv4 address and
remote Autonomous-System (AS) number.
Example:
switch(config-router)# neighbor
175.175.175.2 remote-as 65535
Step 26 address-family ipv4 unicast Configures the address family for IPv4.
Example:
switch(config-router)# address-family
ipv4 unicast
Step 29 address-family ipv6 unicast Configures the IPv6 unicast address family.
This is required for IPv6 over VXLAN with
Example:
an IPv4 underlay.
switch(config-router)# address-family
ipv6 unicast
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
353
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Example Configuration for Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Step 35 import vpn unicast reoriginate Reoriginates the route with a new RT. It can
be extended to use an optional route-map.
Example:
switch(config-router)# import vpn
unicast reoriginate
hostname switch
install feature-set mpls
vdc Scrimshaw id 1
allow feature-set mpls
limit-resource vlan minimum 16 maximum 4094
limit-resource vrf minimum 2 maximum 4096
limit-resource port-channel minimum 0 maximum 511
limit-resource u4route-mem minimum 248 maximum 248
limit-resource u6route-mem minimum 96 maximum 96
limit-resource m4route-mem minimum 90 maximum 90
limit-resource m6route-mem minimum 8 maximum 8
feature-set mpls
feature telnet
feature bash-shell
feature sftp-server
nv overlay evpn
feature ospf
feature bgp
feature mpls l3vpn
feature mpls segment-routing
feature interface-vlan
feature vn-segment-vlan-based
feature bfd
feature nv overlay
no password strength-check
username admin password 5
$5$eEI.wtRs$txfevWxMj/upb/1dJeXy5rNvFYKymzz3Zmc.fpuxTp
1 role network-admin
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
354
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Example Configuration for Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
ip domain-lookup
copp profile strict
snmp-server user admin network-admin auth md5 0x116815e4934ab1f854dce5dd673f33d7
priv 0x116815e4934ab1f854dce5dd673f33d7 localizedkey
rmon event 1 description FATAL(1) owner PMON@FATAL
rmon event 2 description CRITICAL(2) owner PMON@CRITICAL
rmon event 3 description ERROR(3) owner PMON@ERROR
rmon event 4 description WARNING(4) owner PMON@WARNING
rmon event 5 description INFORMATION(5) owner PMON@INFO
interface Vlan1
interface Vlan555
no shutdown
vrf member evpn
interface nve1
no shutdown
host-reachability protocol bgp
source-interface loopback1
member vni 55500 associate-vrf
interface Ethernet1/12
mpls ip forwarding
no shutdown
interface Ethernet1/13
interface Ethernet1/14
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
355
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Example Configuration for Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
no shutdown
interface Ethernet1/15
no shutdown
interface Ethernet1/16
no shutdown
interface Ethernet1/17
no shutdown
interface Ethernet1/18
interface Ethernet1/19
interface Ethernet1/20
no shutdown
interface Ethernet1/21
ip address 6.2.0.1/24
mpls ip forwarding
no shutdown
interface Ethernet1/21.1
encapsulation dot1q 1211
vrf member evpn
ip address 6.22.0.1/24
no shutdown
interface Ethernet1/21.2
encapsulation dot1q 1212
ip address 6.222.0.1/24
no shutdown
interface Ethernet1/21.3
encapsulation dot1q 1213
vrf member ch5_swap
ip address 16.1.1.1/24
no shutdown
interface Ethernet1/22
no shutdown
interface Ethernet1/23
description underlay
ip address 6.1.0.1/24
mpls ip forwarding
no shutdown
interface Ethernet1/23.1
encapsulation dot1q 1231
vrf member evpn
ip address 6.11.0.1/23
no shutdown
interface Ethernet1/24
no shutdown
interface Ethernet1/25
no shutdown
interface Ethernet1/26
description underlay
ip address 6.0.0.1/24
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
356
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Example Configuration for Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
mpls ip forwarding
no shutdown
interface Ethernet1/26.1
encapsulation dot1q 1261
ip address 7.0.0.1/24
no shutdown
interface Ethernet1/27
no shutdown
interface Ethernet1/28
no shutdown
interface Ethernet1/29
no shutdown
interface Ethernet1/30
no shutdown
interface Ethernet1/31
ip address 1.31.1.1/24
no shutdown
interface Ethernet1/32
no shutdown
interface Ethernet1/33
ip address 87.87.87.1/24
ip router ospf 100 area 0.0.0.0
no shutdown
interface Ethernet1/34
no shutdown
interface Ethernet1/35
no shutdown
interface Ethernet1/36
no shutdown
interface mgmt0
vrf member management
ip address 172.31.145.107/21
interface loopback1
ip address 58.58.58.58/32
interface loopback6
description used for SR underlay testing
ip address 6.6.6.1/32
line console
line vty
monitor session 1
source interface Ethernet1/21 rx
source interface Ethernet1/23 both
destination interface sup-eth0
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
357
Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Example Configuration for Configuring Seamless Integration of EVPN with L3VPN (MPLS SR)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
358
CHAPTER 22
Configuring Seamless Integration of EVPN with
L3VPN SRv6
This chapter contains the following sections:
• About Seamless Integration of EVPN with L3VPN SRv6 Handoff, on page 359
• Guidelines and Limitations for EVPN to L3VPN SRv6 Handoff, on page 360
• Importing L3VPN SRv6 Routes into EVPN VXLAN, on page 361
• Importing EVPN VXLAN Routes into L3VPN SRv6, on page 362
• Example Configuration for VXLAN EVPN to L3VPN SRv6 Handoff, on page 363
With two different technologies, one within the data center (DC) and one in the Core, there is traffic handoff
from VXLAN to an SRv6 core that becomes a necessity at the DCI nodes, which sit at the edge of the DC
domain and interface with the Core edge router.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
359
Configuring Seamless Integration of EVPN with L3VPN SRv6
Guidelines and Limitations for EVPN to L3VPN SRv6 Handoff
For traffic ingressing the EVPN-VxLAN fabric, the BGP EVPN routes get imported into a local VRF which
contains the RD of the VRF. The bestpath is calculated and installed in the VRF's RIB, then inserted into the
L3VPN SRv6 table. Along with the bestpath, the VRF's RD and per-VRF SRv6 SID are included. The L3VPN
SRv6 route target is sent with the route, which is advertised to the L3VPN SRv6 peer.
For traffic egressing the EVPN VxLAN fabric, the BGP L3VPN SRv6 routes get imported into a local VRF
which contains the RD of the VRF. The bestpath is calculated and installed in the VRF's RIB, then inserted
into the EVPN table. Along with the bestpath, the VRF's RD and VNI are included. The EVPN-VXLAN route
target is sent with the route, which is advertised to the EVPN-VxLAN peer.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
360
Configuring Seamless Integration of EVPN with L3VPN SRv6
Importing L3VPN SRv6 Routes into EVPN VXLAN
Procedure
Step 3 neighbor bgp ipv6-address remote-as Enter BGP router configuration mode.
as-number
Example:
switch-1(config-router)# neighbor 1234::1
remote-as 200
switch-1(config-router-neighbor)#
Step 4 address family vpnv4 unicast or address Configure the IPv4 or IPv6 address family for
family vpnv6 unicast unicast traffic that the EVPN VXLAN will
handoff to L3VPN SRv6.
Example:
switch-1(config-router-neighbor)#
address-family vpnv4 unicast
switch-1(config-router-neighbor-af)#
Example:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
361
Configuring Seamless Integration of EVPN with L3VPN SRv6
Importing EVPN VXLAN Routes into L3VPN SRv6
Step 5 import l2vpn evpn route-map name Configure the IPv4 or IPv6 address family for
[reoriginate] unicast traffic that EVPN VXLAN will handoff
to L3VPN SRv6. This command enables routes
Example:
learned from L3VPN SRv6 domain to be
switch-1(config-router-neighbor-af)# advertised to the EVPN VXLAN domain. Using
import l2vpn evpn route-map test
reoriginate the optional reoriginate keyword advertises
switch-1(config-router-neighbor-af)# only domain-specific RTs.
What to do next
For bidirectional route advertisement, configure importing EVPN VXLAN routes into the L3VPN SRv6
domain.
Procedure
Step 3 neighbor ipv6-address remote-as as-number Enter BGP router configuration mode.
Example:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
362
Configuring Seamless Integration of EVPN with L3VPN SRv6
Example Configuration for VXLAN EVPN to L3VPN SRv6 Handoff
Step 4 address-family l2vpn evpn Configure the address family for unicast traffic
that EVPN VXLAN will handoff to L3VPN
Example:
SRv6.
switch(config-router-neighbor)#
address-family l2vpn evpn
switch(config-router-neighbor-af)#
Step 5 import vpn unicast route-map name Configure the IPv4 or IPv6 address family for
[reoriginate] unicast traffic that EVPN VXLAN will handoff
to L3VPN SRv6. This command enables routes
Example:
learned from the EVPN VXLAN domain to be
switch-1(config-router-neighbor-af)# advertised to the L3VPN SRv6 domain. Using
import vpn unicast route-map test
reoriginate the optional reoriginate keyword advertises
switch-1(config-router-neighbor-af)# only domain-specific RTs.
What to do next
For bidirectional route advertisement, configure importing L3VPN SRv6 routes into the EVPN VXLAN
fabric.
segment-routing
srv6
encapsulation
source-address loopback1
locators
locator DCI_1
prefix café:1234::/64
interface loopback0
ip address 1.1.1.0/32
interface loopback1
ip address 1.1.1.1/32
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
363
Configuring Seamless Integration of EVPN with L3VPN SRv6
Example Configuration for VXLAN EVPN to L3VPN SRv6 Handoff
interface nve1
source-interface loopback0
member vni 10000 associate-vrf
host-reachability protocol bgp
vlan 100
vn-segment 10000
vrf customer
segment-routing srv6
alloc-mode per-vrf
address-family ipv4 unicast
address-family ipv6 unicast
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
364
CHAPTER 23
Configuring Seamless Integration of EVPN (TRM)
with MVPN
This chapter contains the following sections:
• About Seamless Integration of EVPN (TRM) with MVPN (Draft Rosen), on page 365
• Guidelines and Limitations for Seamless Integration of EVPN (TRM) with MVPN , on page 366
• Configuring the Handoff Node for Seamless Integration of EVPN (TRM) with MVPN, on page 367
• Configuration Example for Seamless Integration of EVPN (TRM) with MVPN , on page 372
Sources and receivers can be in any of the three networks (VXLAN, MVPN, or IP multicast).
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
365
Configuring Seamless Integration of EVPN (TRM) with MVPN
Supported RP Positions
All multicast traffic (that is, the tenant traffic from the VXLAN, MVPN, or multicast network) is routed from
one domain to another domain. The handoff node acts as the central node. It performs the necessary packet
forwarding, encapsulation, and decapsulation to send the traffic to the respective receivers.
Supported RP Positions
The rendezvous point (RP) for the customer (overlay) network can be in any of the three networks (VXLAN,
MVPN, or IP multicast).
RP Locations Description
RP internal to VXLAN fabric All VTEPs are RPs inside the VXLAN fabric. All
MVPN PEs use the RP configured on the VXLAN
fabric.
RP on VXLAN MVPN handoff node The RP is the VXLAN MVPN handoff node.
RP Everywhere (PIM Anycast RP or MSDP-based The Anycast RP can be configured on the VXLAN
Anycast RP) leaf. The RP set can be configured on the handoff
node or any MVPN PE.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
366
Configuring Seamless Integration of EVPN (TRM) with MVPN
Configuring the Handoff Node for Seamless Integration of EVPN (TRM) with MVPN
• Inter-AS option A is supported on the handoff node toward the IP multicast network.
• If the number of MDT source loopback IP addresses and NVE loopback IP addresses exceeds the
maximum limit, traffic drops might occur.
• The following functionality isn't supported for seamless integration of EVPN (TRM) with MVPN:
• vPC on the handoff node
• VXLAN ingress replication
• SVIs and subinterfaces as core-facing interfaces for MVPN
• Inter-AS options B and C on MVPN nodes
• PIM SSM as a VXLAN underlay
• Bidirectional PIM as an underlay or overlay
• ECMP with a mix of MPLS and IP paths
• Any existing limitations for VXLAN, TRM, and MVPN also apply to seamless integration of EVPN
(TRM) with MVPN.
• Enable IGMP snooping for VXLAN traffic using the ip igmp snooping vxlan command.
• Enable PIM sparse mode on all source interfaces and interfaces required to carry PIM traffic.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
367
Configuring Seamless Integration of EVPN (TRM) with MVPN
BGP Configuration for the Handoff Node
neighbor 2.1.1.1
address-family ipv4 mvpn
send-community extended
address-family l2vpn evpn
send-community extended
import vpn unicast reoriginate
neighbor 30.30.30.30
address-family vpnv4 unicast
send-community
send-community extended
next-hop-self
import l2vpn evpn reoriginate
address-family ipv4 mdt
send-community extended
no next-hop-third-party
• Never use Inter-AS option B between MVPN peers. Instead, configure the no allocate-label option-b
command under the VPNv4 unicast address family.
address-family vpnv4 unicast
no allocate-label option-b
• If handoff nodes are deployed in dual mode, use the route-map command to avoid advertising prefixes
associated with orphan hosts under the VPN address family.
ip prefix-list ROUTES_CONNECTED_NON_LOCAL seq 2 premit 15.14.0.15/32
neighbor 8.8.8.8
remote-as 100
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
368
Configuring Seamless Integration of EVPN (TRM) with MVPN
VXLAN Configuration for the Handoff Node
update-source loopback1
address-family vpnv4 unicast
send-community
send-community extended
route-map ROUTES_CONNECTED_NON_LOCAL out
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
369
Configuring Seamless Integration of EVPN (TRM) with MVPN
MVPN Configuration for the Handoff Node
no ip redirects
ip address 100.1.1.1/16
no ipv6 redirects
ip pim sparse-mode <-- PIM enabled on L2VNI
fabric forwarding mode anycast-gateway
• For the data MDT mode, configure a unique multicast group-set for a subset of or all tenant multicast
traffic.
mdt data 229.1.100.2/32 immediate-switch
mdt data 232.1.10.4/24 immediate-switch
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
370
Configuring Seamless Integration of EVPN (TRM) with MVPN
CoPP Configuration for the Handoff Node
The following configuration example shows CoPP policies that can be configured to avoid control packet
drops with multicast route scale.
Note The policer values in this example are approximations and might not be optimal for all topologies or traffic
patterns. Configure the CoPP policies according to the MVPN/TRM traffic pattern.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
371
Configuring Seamless Integration of EVPN (TRM) with MVPN
Configuration Example for Seamless Integration of EVPN (TRM) with MVPN
The following example show sample configurations for the VTEP, handoff node, and PE in this topology.
Configuration on VTEP1:
feature ngmvpn
feature interface-vlan
feature vn-segment-vlan-based
feature nv overlay
feature pim
nv overlay evpn
ip pim rp-address 90.1.1.100 group-list 225.0.0.0/8
ip pim ssm range 232.0.0.0/8
vlan 555
vn-segment 55500
interface loopack1
ip address 196.196.196.196/32
interface loopback2
ip address 197.197.197.197/32
ip pim sparse-mode
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
372
Configuring Seamless Integration of EVPN (TRM) with MVPN
Configuration Example for Seamless Integration of EVPN (TRM) with MVPN
feature bgp
router bgp 1
address-family l2vpn evpn
maximum-paths 8
maximum-paths ibgp 8
neighbor 2.1.1.2
remote-as 1
update-source loopback 1
address-family ipv4 unicast
send-community extended
address-family ipv6 unicast
send-community extended
address-family ipv4 mvpn
send-community extended
address-family l2vpn evpn
send-community extended
vrf vrfVxLAN5023
address-family ipv4 unicast
advertise l2vpn evpn
redistribute direct route-map ALL_ROUTES
maximum-paths 8
maximum-paths ibgp 8
interface Vlan555
no shutdown
vrf member vpn1
ip forward
ip pim sparse-mode
interface Ethernet1/5.1
encapsulation dot1q 90
vrf member vpn1
ip address 10.11.12.13/24
ip pim sparse-mode
no shutdown
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
373
Configuring Seamless Integration of EVPN (TRM) with MVPN
Configuration Example for Seamless Integration of EVPN (TRM) with MVPN
nv overlay evpn
interface loopback1
ip address 90.1.1.100 /32
ip pim sparse-mode
interface loopback2
ip address 91.1.1.100 /32
ip pim sparse-mode
interface Ethernet1/4.1
encapsulation dot1q 50
vrf member vpn1
ip pim sparse-mode
no shutdown
interface loopback0
ip address 20.20.20.20/32
ip pim sparse-mode
vlan 555
vn-segment 55500
interface nve1
no shutdown
host-reachability protocol bgp
source-interface loopback3
member vni 55500 associate-vrf
mcast-group 225.3.3.3
interface loopback3
ip address 198.198.198.198/32
ip pim sparse-mode
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
374
Configuring Seamless Integration of EVPN (TRM) with MVPN
Configuration Example for Seamless Integration of EVPN (TRM) with MVPN
interface Vlan555
no shutdown
vrf member vpn1
ip forward
ip pim sparse-mode
router bgp 1
address-family l2vpn evpn
maximum-paths 8
maximum-paths ibgp 8
address-family vpnv4 unicast
no allocate-label option-b
address-family ipv4 mdt
address-family ipv4 mvpn
maximum-paths 8
maximum-paths ibgp 8
neighbor 196.196.196.196
remote-as 1
address-family ipv4 unicast
send-community extended
address-family ipv6 unicast
send-community extended
address-family ipv4 mvpn
send-community extended
address-family l2vpn evpn
send-community extended
import vpn unicast reoriginate
router bgp 1
neighbor 30.30.30.30
remote-as 100
update-source loopback0
ebgp-multihop 255
address-family ipv4 unicast
send-community extended
address-family vpnv4 unicast
send-community
send-community extended
next-hop-self
import l2vpn evpn reoriginate
address-family ipv4 mdt
send-community extended
no next-hop-third-party
Configuration on PE2:
install feature-set mpls
allow feature-set mpls
feature-set mpls
feature bgp
feature pim
feature mpls l3vpn
feature mpls ldp
feature interface-vlan
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
375
Configuring Seamless Integration of EVPN (TRM) with MVPN
Configuration Example for Seamless Integration of EVPN (TRM) with MVPN
ip pim sparse-mode
mpls ip
interface Ethernet1/6.1
encapsulation dot1q 50
vrf member vpn1
ip pim sparse-mode
no shutdown
interface loopback0
ip address 30.30.30.30/32
ip pim sparse-mode
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
376
APPENDIX A
Configuring the Underlay
This chapter contains the following sections:
• IP Fabric Underlay, on page 377
IP Fabric Underlay
Underlay Considerations
Unicast underlay:
The primary purpose of the underlay in the VXLAN EVPN fabric is to advertise the reachability of Virtual
Tunnel End Points (VTEPs) and BGP peering addresses. The primary criterion for choosing an underlay
protocol is fast convergence in the event of node failures. Other criteria are:
• Simplicity of configuration.
• Ability to delay the introduction of a node into the network on boot up.
This document will detail the two primary protocols supported and tested by Cisco, IS-IS and OSPF. It will
also illustrate the use of eBGP protocol as an underlay for the VXLAN EVPN fabric.
From an underlay/overlay perspective, the packet flow from a server to another over the Virtual Extensible
LAN (VXLAN) fabric comprises of these steps:
1. Server sends traffic to source VXLAN tunnel endpoint (VTEP). The VTEP performs Layer-2 or Layer-3
communication based on the destination MAC and derives the nexthop (destination VTEP).
Note When a packet is bridged, the target end host’s MAC address is stamped in the DMAC field of the inner
frame. When a packet is routed, the default gateway’s MAC address is stamped in the DMAC field of the
inner frame.
2. The VTEP encapsulates the traffic (frames) into VXLAN packets (overlay function – see Figure 1) and
signals the underlay IP network.
3. Based on the underlay routing protocol, the packet is sent from the source VTEP to destination VTEP
through the IP network (underlay function – see Underlay Overview figure).
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
377
Configuring the Underlay
Configuring the Underlay
4. The destination VTEP removes the VXLAN encapsulation (overlay function) and sends traffic to the
intended server.
The VTEPs are a part of the underlay network as well since VTEPs need to be reachable to each other to send
VXLAN encapsulated traffic across the IP underlay network.
The Overlay Overview and Underlay Overview images (below) depict the broad difference between an overlay
and underlay. Since the focus is on the VTEPs, the spine switches are only depicted in the background. Note
that, in real time, the packet flow from VTEP to VTEP traverses through the spine switches.
Figure 40: Overlay Overview
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
378
Configuring the Underlay
Configuring the Underlay
Note If the fabric only contains Cisco Nexus 9000 and 7000 series switches, then the
MTU should be set to 9216.
• Unicast routing - Any unicast routing protocol can be used for the VXLAN IP underlay. You can
implement OSPF, IS-IS, or eBGP to route between the VTEPs.
Note As a best practice, use a simple IGP (OSPF or IS-IS) for underlay reachability
between VTEPs with iBGP for overlay information exchange.
• IP addressing – Point-to-point (P2P) or IP unnumbered links. For each point-to-point link, as example
between the leaf switch nodes and spine switch nodes, typically a /30 IP mask should be assigned.
Optionally a /31 mask or IP unnumbered links can be assigned. The IP unnumbered approach is leaner
from an addressing perspective and consumes fewer IP addresses. The IP unnumbered option for the
OSPF or IS-IS protocol underlay will minimize the use of IP addresses.
/31 network - An OSPF or IS-IS point-to-point numbered network is only between two switch (interfaces),
and there is no need for a broadcast or network address. So, a /31 network will suffice for this network.
Neighbors on this network establish adjacency and there is no designated router (DR) for the network.
Note IP Unnumbered for VXLAN underlay is supported starting with Cisco NX-OS
Release 7.0(3)I7(2).
• Multicast protocol for multi destination (BUM) traffic – Though VXLAN has the BGP EVPN control
plane, the VXLAN fabric still requires a technology for Broadcast/Unknown unicast/Multicast (BUM)
traffic to be forwarded. For Cisco Nexus 5600 Series switches and Cisco Nexus 7000/7700 Series switches,
it is mandatory to implement a multicast protocol for BUM packet communication.
While Cisco Nexus 5600 Series switches support Protocol Independent Multicast (PIM) Bidirectional
shared trees (BiDiR), Cisco Nexus 7000/7700 Series switches (with F3 cards) support PIM Any Source
Multicast (ASM) and PIM BiDir options.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
379
Configuring the Underlay
Unicast routing and IP addressing options
• PIM BiDir is supported for Cisco Nexus 9300-EX and 9300-FX/FX2/FX3 platform switches.
• PIM BiDir is not supported on Cisco Nexus 9300-GX switches.
• vPC configuration — This is documented in Chapter 3. For comprehensive information on vPCs, refer
to the respective Cisco Nexus 5600, 7000, or 9000 Series vPC design/configuration guide.
Important All routing configuration samples are from an IP underlay perspective and are not comprehensive. For complete
configuration information including routing process, authentication, Bidirectional Forwarding Detection
(BFD) information, and so on, refer to the respective routing configuration guide (for example, Cisco Nexus
5600 Series NX-OS Unicast Routing Configuration Guide, Cisco Nexus 7000 Series NX-OS Unicast Routing
Configuration Guide, and Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide).
Note You can divide OSPF networks into areas when the size of the routing domain contains a high number of
routers and/or IP prefixes.. The same general well known OSPF best practice rules in regards of scale and
configuration are applicable for the VXLAN underlay too. For example, LSA type 1 and type 2 are never
flooded outside of an area. With multiple areas, the size of the OSPF LSA databases can be reduced to optimize
CPU and memory consumption.
Note • For ease of use, the configuration mode from which you need to start configuring a task is mentioned at
the beginning of each configuration.
• Configuration tasks and corresponding show command output are displayed for a part of the topology
in the image. For example, if the sample configuration is shown for a leaf switch and connected spine
switch, the show command output for the configuration displays corresponding configuration.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
380
Configuring the Underlay
Configuring the Underlay
feature ospf
router ospf UNDERLAY
router-id 10.1.1.54
The ip ospf network point-to-point command configures the OSPF network as a point-to-point network
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
381
Configuring the Underlay
Configuring the Underlay
Configure a loopback interface so that it can be used as the OSPF router ID of leaf switch V1.
(config) #
interface loopback 0
ip address 10.1.1.54/32
ip router ospf UNDERLAY area 0.0.0.0
The interface will be associated with the OSPF instance UNDERLAY and OSPF area 0.0.0.0
OSPF global configuration on spine switch S1
(config) #
feature ospf
router ospf UNDERLAY
router-id 10.1.1.53
Note MTU size of both ends of the link should be configured identically.
Configure a loopback interface so that it can be used as the OSPF router ID of spine switch S1.
(config) #
interface loopback 0
ip address 10.1.1.53/32
ip router ospf UNDERLAY area 0.0.0.0
The interface will be associated with the OSPF instance UNDERLAY and OSPF area 0.0.0.0
.
To complete OSPF topology configuration for the ‘OSPF as the underlay routing protocol’ image, configure
the following
• 3 more V1 interfaces (or 3 more P2P links) to the remaining 3 spine switches.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
382
Configuring the Underlay
Configuring the Underlay
• Repeat the procedure to connect P2P links between V2,V3 and V4 and the spine switches.
(config) #
feature ospf
router ospf UNDERLAY
router-id 10.1.1.54
(config) #
interface Ethernet1/41
description Link to Spine S1
mtu 9192
ip ospf network point-to-point
ip unnumbered loopback0
ip router ospf UNDERLAY area 0.0.0.0
The ip ospf network point-to-point command configures the OSPF network as a point-to-point network.
Configure a loopback interface so that it can be used as the OSPF router ID of leaf switch V1.
(config) #
interface loopback0
ip address 10.1.1.54/32
ip router ospf UNDERLAY area 0.0.0.0
The interface will be associated with the OSPF instance UNDERLAY and OSPF area 0.0.0.0
OSPF spine switch S1 configuration:
OSPF global configuration on spine switch S1
(config) #
feature ospf
router ospf UNDERLAY
router-id 10.1.1.53
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
383
Configuring the Underlay
Configuring the Underlay
(config) #
interface Ethernet1/41
description Link to VTEP V1
mtu 9192
ip ospf network point-to-point
ip unnumbered loopback0
ip router ospf UNDERLAY area 0.0.0.0
(config) #
interface loopback0
ip address 10.1.1.53/32
ip router ospf UNDERLAY area 0.0.0.0
The interface will be associated with the OSPF instance UNDERLAY and OSPF area 0.0.0.0
To complete OSPF topology configuration for the ‘OSPF as the underlay routing protocol’ image, configure
the following:
• 3 more VTEP V1 interfaces (or 3 more IP unnumbered links) to the remaining 3 spine switches.
• Repeat the procedure to connect IP unnumbered links between VTEPs V2,V3 and V4 and the spine
switches.
OSPF Verification
Use the following commands for verifying OSPF configuration:
Leaf-Switch-V1# show ip ospf
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
384
Configuring the Underlay
IS-IS Underlay IP Network
For a detailed list of commands, refer to the Configuration and Command Reference guides.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
385
Configuring the Underlay
Configuring the Underlay
Important Level 1 IS-IS in the Fabric—Cisco has validated the use of IS-IS Level 1 only and IS-IS Level 2 only
configuration on all nodes in the programmable fabric. The fabric is considered a stub network where every
node needs an optimal path to every other node in the fabric. Cisco NX-OS IS-IS implementation scales well
to support a number of nodes in a fabric. Hence, there is no anticipation of having to break up the fabric into
multiple IS-IS domains.
Note • For ease of use, the configuration mode from which you need to start configuring a task is mentioned at
the beginning of each configuration.
• Configuration tasks and corresponding show command output are displayed for a part of the topology
in the image. For example, if the sample configuration is shown for a leaf switch and connected spine
switch, the show command output for the configuration displays corresponding configuration.
In the above image, the leaf switches (V1, V2, and V3, having the VTEP function) are at the bottom of the
image. They are connected to the 4 spine switches (S1, S2, S3, and S4) that are depicted at the top of the
image.
IS-IS – P2P link scenario with /31 mask
A sample P2P configuration between V1 and spine switch S1 is given below:
For P2P connections between a leaf switch and each spine switch, V1, V2, and V3 should each be connected
to each spine switch.
For V1, we must configure a loopback interface and a P2P interface configuration to connect to S1. A sample
P2P configuration between a leaf switch (V1) interface and a spine switch (S1) interface is given below:
IS-IS configuration on leaf switch V1
IS-IS global configuration
(config) #
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
386
Configuring the Underlay
Configuring the Underlay
feature isis
router isis UNDERLAY
net 49.0001.0010.0100.1074.00
is-type level-1
set-overload-bit on-startup 60
Setting the overload bit - You can configure a Cisco Nexus switch to signal other devices not to use the switch
as an intermediate hop in their shortest path first (SPF) calculations. You can optionally configure the overload
bit temporarily on startup. In the above example, the set-overload-bit command is used to set the overload
bit on startup to 60 seconds.
IS-IS P2P interface configuration (leaf switch V1)
(config) #
Configure a loopback interface so that it can be used as the IS-IS router ID of leaf switch V1.
(config) #
interface loopback 0
ip address 10.1.1.74/32
ip router isis UNDERLAY
(config) #
feature isis
router isis UNDERLAY
net 49.0001.0010.0100.1053.00
is-type level-1
set-overload-bit on-startup 60
(config) #
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
387
Configuring the Underlay
Configuring the Underlay
(config) #
interface loopback 0
ip address 10.1.1.53/32
ip router isis UNDERLAY
.
.
To complete IS-IS topology configuration for the above image, configure the following:
• 3 more leaf switch V1’s interfaces (or 3 more P2P links) to the remaining 3 spine switches.
• Repeat the procedure to connect P2P links between leaf switches V2, V3 and V4 and the spine switches.
(config)#
feature isis
router isis UNDERLAY
net 49.0001.0010.0100.1074.00
is-type level-1
set-overload-bit on-startup 60
(config) #
interface Ethernet1/41
description Link to Spine S1
mtu 9192
medium p2p
ip unnumbered loopback0
ip router isis UNDERLAY
(config)
interface loopback0
ip address 10.1.1.74/32
ip router isis UNDERLAY
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
388
Configuring the Underlay
Configuring the Underlay
(config)#
feature isis
router isis UNDERLAY
net 49.0001.0010.0100.1053.00
is-type level-1
set-overload-bit on-startup 60
(config)#
interface Ethernet1/41
description Link to V1
mtu 9192
medium p2p
ip unnumbered loopback0
ip router isis UNDERLAY
(config)#
interface loopback0
ip address 10.1.1.53/32
ip router isis UNDERLAY
IS-IS Verification
Use the following commands for verifying IS-IS configuration on leaf switch V1:
Leaf-Switch-V1# show isis
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
389
Configuring the Underlay
Configuring the Underlay
loopback0
loopback1
Ethernet1/41
Topology : 0
Address family IPv4 unicast :
Number of interface : 2
Distance : 115
Address family IPv6 unicast :
Number of interface : 0
Distance : 115
Topology : 2
Address family IPv4 unicast :
Number of interface : 0
Distance : 115
Address family IPv6 unicast :
Number of interface : 0
Distance : 115
Level1
No auth type and keychain
Auth check set
Level2
No auth type and keychain
Auth check set
L1 Next SPF: Inactive
L2 Next SPF: Inactive
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
390
Configuring the Underlay
eBGP Underlay IP Network
2 0 1 no DN DN no DN no
For a detailed list of commands, refer to the Configuration and Command Reference guides.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
391
Configuring the Underlay
Configuring the Underlay
The redistribute direct command is used to advertise the loopback addresses for BGP and VTEP peering.
It can be used to advertise any other direct routes in the global address space. The route map can filter the
advertisement to include only eBGP peering and VTEP loopback addresses.
maximum-paths 2
address-family l2vpn evpn
retain route-target all
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
392
Configuring the Underlay
Configuring the Underlay
Spine switch BGP speakers don’t have any VRF configuration. Hence, the retain route-target all command
is needed to retain the routes and send them to leaf switch VTEPs. The maximum-paths command is used
for ECMP path in the underlay.
Underlay session towards leaf switch V1 (vPC set up) —As mentioned above, the underlay sessions are
configured on the numbered interfaces between spine and leaf switch nodes.
(config) #
The vPC pair of switches has the same AS number. The disable-peer-as-check command is added to allow
route propagation between the vPC switches as they are configured with the same AS, for example, for route
type 5 routes. If the vPC switches have different AS numbers, this command is not required.
Underlay session towards the border leaf switch—The underlay configurations towards leaf and border
leaf switches are the same, barring the changes in IP address and AS values.
Overlay session on the spine switch S1 towards the leaf switch V1
(config) #
Note The route-map UNCHANGED is user defined whereas the keyword unchanged is an option within the set
ip next-hop command. In eBGP, the next hop is changed to self when sending a route from one eBGP neighbor
to another. The route map UNCHANGED is added to make sure that, for overlay routes, the originating leaf
switch is set as next hop and not the spine switch. This ensures that VTEPs are next hops, and not spine switch
nodes. The unchanged keyword ensures that the next-hop attribute in the BGP update to the eBGP peer is
unmodified.
The spine switch configuration concludes here. The Route Target auto feature configuration is given below
for reference purposes:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
393
Configuring the Underlay
Configuring the Underlay
(config) #
The rewrite-evpn-rt-asn command is required if the Route Target auto feature is being used to configure
EVPN RTs.
Route target auto is derived from the Local AS number configured on the switch and the Layer-3 VNID of
the VRF i.e. Local AS:VNID. In Multi-AS topology, as illustrated in this guide, each leaf node is represented
as a different local AS, and the route target generated for the same VRF will be different on every switch.
The command rewrite-evpn-rt-asn replaces the ASN portion of the route target in the BGP update message
with the local AS number. For example, if VTEP V1 has a Local AS 65551, VTEP V2 has a Local AS 65549,
and spine switch S1 has a Local AS 65536, then the route targets for V1, V2 and S1 are as follows:
• V1—65551:50000
• V2—65549:50000
• S1—65536:50000
In this scenario, V2 advertises the route with RT 65549:50000, the spine switch S1 replaces it with RT
65536:50000, and finally when V1 gets the update, it replaces the route target in the update with 65551:50000.
This matches the locally configured RT on V1. This command requires that it be configured on all BGP
speakers in the fabric.
If the Route Target auto feature is not being used, i.e., matching RTs are required to be manually configured
on all switches, then this command is not necessary.
Leaf switch VTEP V1 configuration—In the sample configuration below, VTEP V1’s interfaces are
designated as BGP neighbors. All leaf switch VTEPs including border leaf switch nodes have the following
configurations towards spine switch neighbor nodes:
(config) #
(config) #
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
394
Configuring the Underlay
Configuring the Underlay
send-community both
The allowas-in command is needed if leaf switch nodes have the same AS. In particular, the Cisco validated
topology had a vPC pair of switches share an AS number.
Overlay session towards spine switch S1
(config) #
The ebgp-multihop 2 command is needed as the peering for the overlay is on the loopback address. NX-OS
considers that as multi hop even if the neighbor is one hop away.
vPC backup session
(config) #
Note This session is configured on the backup SVI between the vPC leaf switch nodes.
BGP Verification
Use the following commands for verifying BGP configuration:
For a detailed list of commands, refer to the Configuration and Command Reference guides.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
395
Configuring the Underlay
Multicast Routing in the VXLAN Underlay
Cisco Nexus 7000/7700 Series switches with Cisco PIM ASM (Sparse Mode)
Nexus 9000 Series switches
Cisco Nexus 9000 Series PIM ASM (Sparse Mode) or PIM BiDir
Note PIM BiDir is supported on Cisco Nexus
9300-EX and 9300-FX/FX2/FX3 platform
switches.
PIM BiDir is not supported on Cisco
Nexus 9300-GX platform switches.
Cisco Nexus 7000/7700 Series switches PIM ASM (Sparse Mode) or PIM BiDir
Note For Cisco Nexus 7000/7700 Series switches, an F3 or M3 card is required to support Cisco Programmable
Fabric.
You can transport BUM traffic without multicast, through ingress replication . Ingress replication is currently
available on Cisco Nexus 9000 Series switches.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
396
Configuring the Underlay
Configuring the Underlay
Important The following configuration samples are from an IP underlay perspective and are not comprehensive. Functions
such as PIM authentication, BFD for PIM, etc, are not shown here. Refer to the respective Cisco Nexus Series
switch multicast configuration guide for complete information.
PIM ASM is supported on the Nexus 7000 and Nexus 9000 series as the underlay multicast protocol. (Nexus
7000 also supports bidirectional PIM as the underlay multicast protocol).
In the above image, the leaf switches (V1, V2, and V3 having VTEP configuration) are at the bottom of the
image. They are connected to the 4 spine switches (S1, S2, S3, and S4) that are depicted at the top of the
image.
Two multicast Rendezvous-Points (S2 and S3) are configured. The second Rendezvous-Point is added for
load sharing and redundancy purposes. Anycast RP is represented in the PIM ASM topology image. Anycast
RP ensures redundancy and load sharing between the two Rendezvous-Points. To use Anycast RP, multiple
spines serving as RPs will share the same IP address (the Anycast RP address). Meanwhile, each RP has its
unique IP address added in the RP set for RPs to sync information with respect to sources between all spines
which act as RPs.
The shared multicast tree is unidirectional, and uses the Rendezvous-Point for forwarding packets.
PIM ASM at a glance - 1 source tree per multicast group per leaf switch.
Programmable Fabric specific pointers are:
• All VTEPs that serve a VNI join a shared multicast tree. VTEPs V1, V2, and V3 have hosts attached
from a single tenant (say x) and these VTEPs form a separate multicast (source, group) tree.
• A VTEP (say V1) might have hosts belonging to other tenants too. Each tenant may have different
multicast groups associated with. A source tree is created for each tenant residing on the VTEP, if the
tenants do not share a multicast group.
The PIM ASM examples are for the Cisco Nexus 7000 and 9000 Series switches.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
397
Configuring the Underlay
Configuring the Underlay
Note For ease of use, the configuration mode from which you need to start configuring a task is mentioned at the
beginning of each configuration.
Configuration tasks and corresponding show command output are displayed for a part of the topology in the
image. For example, if the sample configuration is shown for a leaf switch and connected spine switch, the
show command output for the configuration only displays corresponding configuration.
(config) #
feature pim
ip pim rp-address 198.51.100.220 group-list 224.1.1.1
(config) #
interface loopback 0
ip address 209.165.201.20/32
ip pim sparse-mode
Point-2-Point (P2P) interface PIM configuration for leaf switch V1 to spine switch S2 connectivity
(config) #
Repeat the above configuration for a P2P link between V1 and the spine switch (S3) acting as the redundant
Anycast Rendezvous-Point.
The VTEP also needs to be connected with spine switches (S1 and S4) that are not rendezvous points. A
sample configuration is given below:
Point-2-Point (P2P) interface configuration for leaf switch V1 to non-rendezvous point spine switch
(S1) connectivity
(config) #
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
398
Configuring the Underlay
Configuring the Underlay
ip pim sparse-mode
Repeat the above configuration for all P2P links between V1 and non- rendezvous point spine switches.
Repeat the complete procedure given above to configure all other leaf switches.
(config) #
feature pim
(config) #
interface loopback 0
ip address 10.10.100.100/32
ip pim sparse-mode
(config) #
interface loopback 1
ip address 198.51.100.220/32
ip pim sparse-mode
Configure a spine switch as a Rendezvous Point and associate it with the loopback IP addresses of switches
S2 and S3 for redundancy.
(config) #
feature pim
ip pim rp-address 198.51.100.220 group-list 224.1.1.1
ip pim anycast-rp 198.51.100.220 10.10.100.100
ip pim anycast-rp 198.51.100.220 10.10.20.100
.
.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
399
Configuring the Underlay
Configuring the Underlay
Note The above configurations should also be implemented on the other spine switch (S3) performing the role of
RP.
You also need to configure PIM ASM on spine switches that are not designated as rendezvous points, namely
S1 and S4.
Earlier, leaf switch (VTEP) V1 has been configured for a P2P link to a non RP spine switch. A sample
configuration on the non RP spine switch is given below.
(config) #
feature pim
ip pim rp-address 198.51.100.220 group-list 224.1.1.1
(config) #
interface loopback 0
ip address 10.10.100.103/32
ip pim sparse-mode
Point-2-Point (P2P) interface configuration for spine switch S1 to leaf switch V1 connectivity
(config) #
Repeat the above configuration for all P2P links between the non- rendezvous point spine switches and other
leaf switches (VTEPs).
PIM ASM Verification
Use the following commands for verifying PIM ASM configuration:
Leaf-Switch-V1# show ip mroute 224.1.1.1
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
400
Configuring the Underlay
Configuring the Underlay
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
401
Configuring the Underlay
Configuring the Underlay
For a detailed list of commands, refer to the Configuration and Command Reference guides.
PIM Bidirectional (BiDir)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
402
Configuring the Underlay
Configuring the Underlay
Bidirectional PIM is supported on the Nexus 5600 and Nexus 7000 series as the underlay multicast protocol.
Some multicast topology design pointers are given below:
VXLAN BiDir underlay is supported on Cisco Nexus 9300-EX and 9300-FX/FX2/FX3 platform switches.
In the above image, the leaf switches (V1, V2, and V3) are at the bottom of the image. They are connected
to the 4 spine switches (S1, S2, S3, and S4) that are depicted at the top of the image. The two PIM
Rendezvous-Points using phantom RP mechanism are used for load sharing and redundancy purposes.
Note Load sharing happens only via different multicast groups, for the respective, different VNI.
With bidirectional PIM, one bidirectional, shared tree rooted at the RP is built for each multicast group. Source
specific state are not maintained within the fabric which provides a more scalable solution.
Programmable Fabric specific pointers are:
• The 3 VTEPs share the same VNI and multicast group mapping to form a single multicast group tree.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
403
Configuring the Underlay
Configuring the Underlay
Note Phantom RP is used in a PIM BiDir environment where RP redundancy is designed using loopback networks
with different mask lengths in the primary and secondary routers. These loopback interfaces are in the same
subnet as the RP address, but with different IP addresses from the RP address. (Since the IP address advertised
as RP address is not defined on any routers, the term phantom is used). The subnet of the loopback is advertised
in the Interior Gateway Protocol (IGP). To maintain RP reachability, it is only necessary to ensure that a route
to the RP exists.
Unicast routing longest match algorithms are used to pick the primary over the secondary router.
The primary router announces a longest match route (say, a /30 route for the RP address) and is preferred over
the less specific route announced by the secondary router (a /29 route for the same RP address). The primary
router advertises the /30 route of the RP, while the secondary router advertises the /29 route. The latter is only
chosen when the primary router goes offline. We will be able to switch from the primary to the secondary RP
at the speed of convergence of the routing protocol.
Note For ease of use, the configuration mode from which you need to start configuring a task is mentioned at the
beginning of each configuration.
Configuration tasks and corresponding show command output are displayed for a part of the topology in the
image. For example, if the sample configuration is shown for a leaf switch and connected spine switch, the
show command output for the configuration only displays corresponding configuration.
(config) #
feature pim
ip pim rp-address 10.254.254.1 group-list 227.2.2.0/26 bidir
ip pim rp-address 10.254.254.65 group-list 227.2.2.64/26 bidir
(config) #
interface loopback 0
ip address 10.1.1.54/32
ip pim sparse-mode
(config) #
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
404
Configuring the Underlay
Configuring the Underlay
mtu 9192
medium p2p
ip unnumbered loopback 0
ip pim sparse-mode
(config) #
feature pim
ip pim rp-address 10.254.254.1 group-list 227.2.2.0/26 bidir
ip pim rp-address 10.254.254.65 group-list 227.2.2.64/26 bidir
(config) #
interface loopback 0
ip address 10.1.1.53/32
ip pim sparse-mode
(config) #
Loopback interface PIM configuration (for phantom RP) on spine switch S2/RP1
(config) #
interface loopback 1
ip address 10.254.254.2/30
ip pim sparse-mode
(config) #
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
405
Configuring the Underlay
Configuring the Underlay
interface loopback 2
ip address 10.254.254.66/29
ip pim sparse-mode
feature pim
ip pim rp-address 10.254.254.1 group-list 227.2.2.0/26 bidir
ip pim rp-address 10.254.254.65 group-list 227.2.2.64/26 bidir
interface loopback 0
ip address 10.10.50.100/32
ip pim sparse-mode
(config) #
Loopback interface PIM configuration (for phantom RP) on spine switch S3/RP2
(config) #
interface loopback 1
ip address 10.254.254.66/30
ip pim sparse-mode
interface loopback 2
ip address 10.254.254.2/29
ip pim sparse-mode
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
406
Configuring the Underlay
Configuring the Underlay
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
407
Configuring the Underlay
Configuring the Underlay
For a detailed list of commands, refer to the Configuration and Command Reference guides.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
408
Configuring the Underlay
Configuring the Underlay
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
409
Configuring the Underlay
Configuring the Underlay
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
410
APPENDIX B
Configuring Bud Node
This chapter contains the following sections:
• VXLAN Bud Node Over vPC Overview, on page 411
• VXLAN Bud Node Over vPC Topology Example, on page 412
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
411
Configuring Bud Node
VXLAN Bud Node Over vPC Topology Example
Note For bud-node topologies, the source IP of the VTEP behind vPC must be in the same subnet as the infra
VLAN. This SVI should have proxy ARP enabled. For example:
Interface Vlan2
ip proxy-arp
Note The system nve infra-vlans command specifies VLANs used for all SVI interfaces, for uplink interfaces
with respect to bud-node topologies, and vPC peer-links in VXLAN as infra-VLANs. You must not configure
certain combinations of infra-VLANs. For example, 2 and 514, 10 and 522, which are 512 apart.
For Cisco Nexus 9200, 9300-EX, and 9300-FX/FX2/FX3 and 9300-GX platform switches, use the system
nve infra-vlans command to configure any VLANs that are used as infra-VLANs.
feature ospf
feature pim
feature interface-vlan
feature vn-segment-vlan-based
feature hsrp
feature lacp
feature vpc
feature nv overlay
• VLAN configuration
In this example, tenant VLANs 101-103 are mapped to vn-segments.
vlan 1-4,101-103,2000
vlan 101
vn-segment 10001
vlan 102
vn-segment 10002
vlan 103
vn-segment 10003
• vPC configuration
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
412
Configuring Bud Node
Configuring Bud Node
vpc domain 1
peer-switch
peer-keepalive destination 172.31.144.213
delay restore 180
peer-gateway
ipv6 nd synchronize
ip arp synchronize
interface Vlan2
no shutdown
no ip redirects
ip proxy-arp
ip address 10.200.1.252/24
no ipv6 redirects
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
hsrp version 2
hsrp 1
ip 10.200.1.254
interface Vlan2000
no shutdown
ip address 20.20.20.1/24
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
ip igmp static-oif route-map match-mcast-groups
• Configuration Option 2:
interface Vlan2000
no shutdown
ip address 20.20.20.1/24
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
ip igmp static-oif 225.1.1.1
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
413
Configuring Bud Node
Configuring Bud Node
interface port-channel1
switchport mode trunk
switchport trunk allowed vlan 2
vpc 1
• MCT configuration
interface port-channel100
switchport mode trunk
spanning-tree port type network
vpc peer-link
•
Note You can choose either of the following two command procedures for creating
the NVE interfaces. Use the first one for a small number of VNIs. Use the second
procedure to configure a large number of VNIs.
NVE configuration
Option 1
interface nve1
no shutdown
source-interface loopback0
member vni 10001 mcast-group 225.1.1.1
member vni 10002 mcast-group 225.1.1.1
member vni 10003 mcast-group 225.1.1.1
Option 2
interface nve1
no shutdown
source-interface loopback0
global mcast-group 225.1.1.1
member vni 10001
member vni 10002
member vni 10003
interface loopback0
ip address 101.101.101.101/32
ip address 99.99.99.99/32 secondary
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
• Show commands
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
414
Configuring Bud Node
Configuring Bud Node
tor1# sh vpc
Legend:
- local vPC is down, forwarding via vPC peer-link
vPC domain id : 1
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
Configuration consistency status : success
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
415
Configuring Bud Node
Configuring Bud Node
vPC status
----------------------------------------------------------------------
id Port Status Consistency Reason Active vlans
-- ---- ------ ----------- ------ ------------
1 Po1 up success success 2
Legend:
Type 1 : vPC will be suspended in case of mismatch
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
416
APPENDIX C
DHCP Relay in VXLAN BGP EVPN
This chapter contains the following sections:
• DHCP Relay in VXLAN BGP EVPN Overview, on page 417
• DHCP Relay in VXLAN BGP EVPN Example, on page 418
• DHCP Relay on VTEPs, on page 419
• Client on Tenant VRF and Server on Layer 3 Default VRF, on page 419
• Client on Tenant VRF (SVI X) and Server on the Same Tenant VRF (SVI Y), on page 422
• Client on Tenant VRF (VRF X) and Server on Different Tenant VRF (VRF Y), on page 426
• Client on Tenant VRF and Server on Non-Default Non-VXLAN VRF, on page 429
• Configuring vPC Peers Example, on page 431
• vPC VTEP DHCP Relay Configuration Example, on page 433
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
417
DHCP Relay in VXLAN BGP EVPN
DHCP Relay in VXLAN BGP EVPN Example
interface IP address, which is the IP address on the relay agent that is accessible from the client. Using
this information, the DHCP client sends all renew and release request packets to the relay agent. The
relay agent adds all of the appropriate sub-options and then forwards the renew and release request
packets to the original DHCP server. For this function, Cisco’s proprietary implementation is sub-option
152(0x98). You can use the ip dhcp relay sub-option type cisco command to manage the function.
• Sub-option 5(0x5) - Link Selection (Defined in RFC#3527)
The link selection sub-option provides a mechanism to separate the subnet/link on which the DHCP
client resides from the gateway address (giaddr), which can be used to communicate with the relay agent
by the DHCP server. The relay agent will set the sub-option to the correct subscriber subnet and the
DHCP server will use that value to assign an IP address rather than the giaddr value. The relay agent
will set the giaddr to its own IP address so that DHCP messages are able to be forwarded over the network.
For this function, Cisco’s proprietary implementation is sub-option 150(0x96). You can use the ip dhcp
relay sub-option type cisco command to manage the function.
Topology characteristics:
• Switches 9372-1 and 9372-2 are VTEPs connected to the VXLAN fabric.
• Client1 and client2 are DHCP clients in vlan1001. They belong to tenant VRF vxlan-900001.
• The DHCP server is ASR1K, a router that sits in vlan10.
• DHCP server configuration
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
418
DHCP Relay in VXLAN BGP EVPN
DHCP Relay on VTEPs
ip vrf vxlan900001
ip dhcp excluded-address vrf vxlan900001 172.16.16.1 172.16.16.9
ip dhcp pool one
vrf vxlan900001
network 172.16.16.0 255.240.0.0
defaultrouter 172.16.16.1
The following sections below move vlan10 to different VRFs to depict different scenarios.
version 7.0(3)I1(3)
interface Vlan10
no shutdown
ip address 192.0.2.25/24
ip router ospf 1 area 0.0.0.0
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
419
DHCP Relay in VXLAN BGP EVPN
DHCP Relay in VXLAN BGP EVPN
service dhcp
ip dhcp relay
ip dhcp relay information option
ip dhcp relay information option vpn
ipv6 dhcp relay
interface Vlanl001
ip dhcp relay address 192.0.2.42 use—vrf default
• 9372-2
version 7.0(3)11(3)
feature dhcp
service dhcp
ip dhcp relay
ip dhcp relay information option
ip dhcp relay information option vpn
ipv6 dhcp relay
interfaoe Vlanl001
ip dhcp relay address 192.0.2.42 use—vrf default
Debug Output
• The following is a packet dump for DHCP interact sequences.
Capturing on inband
20180824 08:35:25.066530 0.0.0.0 -> 255.255.255.0 DHCP DHCP Discover - Transaction ID
0x636a38fd
20180824 08:35:25.068141 192.0.2.25 -> 192.0.2.42 DHCP DHCP Discover - Transaction ID
0x636a38fd
20180824 08:35:27.069494 192.0.2.42 -> 192.0.2.25 DHCP DHCP Offer Transaction - ID
0x636a38fd
20180824 08:35:27.071029 172.16.16.1 -> 172.16.16.11 DHCP DHCP Offer Transaction - ID
0x636a38fd
20180824 08:35:27.071488 0.0.0.0 -> 255.255.255.0 DHCP DHCP Request Transaction - ID
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
420
DHCP Relay in VXLAN BGP EVPN
DHCP Relay in VXLAN BGP EVPN
0x636a38fd
20180824 08:35:27.072447 192.0.2.25 -> 192.0.2.42 DHCP DHCP Request Transaction - ID
0x636a38fd
20180824 08:35:27.073008 192.0.2.42 -> 192.0.2.25 DHCP DHCP ACK Transaction - ID
0x636a38fd
20180824 08:35:27.073692 172.16.16.1 -> 172.16.16.11 DHCP DHCP ACK Transaction - ID
0x636a38fd
Note Ethanalyzer might not capture all DHCP packets because of inband interpretation
issues when you use the filter. You can avoid this by using SPAN.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
421
DHCP Relay in VXLAN BGP EVPN
Client on Tenant VRF (SVI X) and Server on the Same Tenant VRF (SVI Y)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
422
DHCP Relay in VXLAN BGP EVPN
DHCP Relay in VXLAN BGP EVPN
version 7.0(3)I1(3)
interface Vlan10
no shutdown
vrf member vxlan-900001
ip address 192.0.2.25/24
Because 172.16.16.1 is an anycast address for vlan1001 configured on all the VTEPs, we need to pick up a
unique address as the DHCP relay packet’s source address to make sure the DHCP server can deliver a response
to the original DHCP Relay agent. In this scenario, we use loopback1 and we need to make sure loopback1
is reachable from everywhere of VRF vxlan-900001.
version 7.0(3)I1(3)
interface loopback1
vrf member vxlan-900001
ip address 10.11.11.11/8
version 7.0(3)I1(3)
interface loopback1
vrf member vxlan900001
ip address 10.22.22.22/8
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
423
DHCP Relay in VXLAN BGP EVPN
DHCP Relay in VXLAN BGP EVPN
version 7.0(3)11(3)
feature dhcp
service dhcp
ip dhcp relay
ip dhcp relay information option
I4ip dhcp relay information option vpn
ipv6 dhcp relay
interface Vlanl00l
ip dhcp relay address 192.0.2.42
ip dhcp relay source—interface loopback1
• 9372-2
service dhcp
ip dhcp relay
ip dhcp relay information option
ip dhcp relay information option vpn
ipv6 dhcp relay
interface Vlanl00l
ip dhcp relay address 192.0.2.42
ip dhcp relay source—interface loopback1
Debug Output
• The following is a packet dump for DHCP interact sequences.
Capturing on inband
20180824 09:31:38.129393 0.0.0.0 -> 255.255.255.0 DHCP DHCP Discover - Transaction ID
0x860cd13
20180824 09:31:38.129952 10.11.11.11 -> 192.0.2.42 DHCP DHCP Discover - Transaction ID
0x860cd13
20180824 09:31:40.130134 192.0.2.42 -> 10.11.11.11 DHCP DHCP Offer - Transaction ID
0x860cd13
20180824 09:31:40.130552 172.16.16.1 -> 172.16.16.11 DHCP DHCP Offer - Transaction ID
0x860cd13
20180824 09:31:40.130990 0.0.0.0 -> 255.255.255.0 DHCP DHCP Request - Transaction ID
0x860cd13
20180824 09:31:40.131457 10.11.11.11 -> 192.0.2.42 DHCP DHCP Request - Transaction ID
0x860cd13
20180824 09:31:40.132009 192.0.2.42 -> 10.11.11.11 DHCP DHCP ACK - Transaction ID
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
424
DHCP Relay in VXLAN BGP EVPN
DHCP Relay in VXLAN BGP EVPN
0x860cd13
20180824 09:31:40.132268 172.16.16.1 -> 172.16.16.11 DHCP DHCP ACK - TransactionID
0x860cd13
Note Ethanalyzer might not capture all DHCP packets because of inband interpretation
issues when you use the filter. You can avoid this by using SPAN.
Bootstrap Protocol
Message type: Boot Request (1)
Hardware type: Ethernet (0x01)
Hardware address length: 6
Hops: 1
Transaction ID: 0x0860cd13
Seconds elapsed: O
Bootp flags: 0x0000 (unicast)
Client IP address: 0.0.0.0 (0.0.0.0)
Your (client) IP address: 0.0.0.0 (0.0.0.0)
Next server IP address: 0.0.0.0 (0.0.0.0)
Relay agent iP address: 10.11.11.11 (10.11.11.11)
Client MAC address: Hughes_01:51:51 (00:00:10:01:51:51)
Client hardware address padding: 00000000000000000000
Server host name not given
Boot file name not given
Magic cookie: DHCP
Option: (53) DHCP Message Type
Length: 1
DHCP: Discover (1)
Option: (55) Parameter Request List
Option: (61) Client Identifier
Option: (82) Agent Information Option
Length: 47
Option 82 suboption: (1) Aqent Circuit ID
Option 82 suboption: (151) Agent Remote ID
Option 82 suboption: (11) Server ID Override
Length: 4
Server ID override: 172.16.16.1 (172.16.16.1)
Option 82 suboption: (5) Link selection
Length: 4
Link selection: 172.16.16.0 (172.16.16.0)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
425
DHCP Relay in VXLAN BGP EVPN
Client on Tenant VRF (VRF X) and Server on Different Tenant VRF (VRF Y)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
426
DHCP Relay in VXLAN BGP EVPN
DHCP Relay in VXLAN BGP EVPN
version 7.0(3)I1(3)
interface Vlan10
no shutdown
vrf member vxlan900002
ip address 192.0.2.40/24
service dhcp
ip dhcp relay
ip dhcp relay information option
ip dhcp relay information option vpn
ipv6 dhcp relay
interface VlanlOOl
ip dhcp relay address 192.0.2.42 use—vrf vxlan—900002
ip dhcp relay source—interface loopback2
• 9372-2
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
427
DHCP Relay in VXLAN BGP EVPN
DHCP Relay in VXLAN BGP EVPN
version 7.0(3)11(3)
feature dhcp
service dhcp
ip dhcp relay
ip dhcp relay information option
ip dhcp relay information option vpn
ipv6 dhcp relay
interface VlaniOOl
ip dhcp relay address 192.0.2.42 use-vrf vxlan—900002
ip dhcp relay source—interface loopback2
Debug Output
• The following is a packet dump for DHCP interact sequences.
Bootstrap Protocol
Message type: Boot Request (1)
Hardware type: Ethernet (0x01)
Hardware address length: 6
Hops: 1
Transaction ID: Ox3eebccae
Seconds elapsed: O
Bootp flags: 0x0000 (unicast)
Client IP address: 0.0.0.0 (0.0.0.0)
Your (client) IP address: 0.0.0.0 (0.0.0.0)
Next server IP address: 0.0.0.0 (0.0.0.0)
Relay agent IP address: 10.33.33.33 (10.33.33.33)
Client MAC address: i-iughes_01:51:51 (00:00:10:01:51:51)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
428
DHCP Relay in VXLAN BGP EVPN
Client on Tenant VRF and Server on Non-Default Non-VXLAN VRF
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
429
DHCP Relay in VXLAN BGP EVPN
DHCP Relay in VXLAN BGP EVPN
version 7.0(3)11(3)
feature dhcp
service dhcp
ip dhcp relay
ip dhcp relay information option
ip dhcp relay information option vpn
ipv6 dhcp relay
interface VlanlOOl
ip dhcp relay address 10.122.164.147 use—vrf management
• 9372-2
version 7.0(3)11(3)
feature dhcp
service dhcp
ip dhcp relay
ip dhcp relay information option
ip dhcp relay information option vpn
ipv6 dhcp relay
interface VlanlOOl
ip dhcp relay address 10.122.164.147 use—vrf management
Debug Output
• The following is a packet dump for DHCP interact sequences.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
430
DHCP Relay in VXLAN BGP EVPN
Configuring vPC Peers Example
Bootstrap Protocol
Message type: Boot Request (1)
Hardware type: Ethernet (0x01)
Hardware address length: 6
Hops: 1
Transaction ID: 0x28a8606d
Seconds elapsed: O
Bootp flags: 0x0000 (Unicast)
Client IP address: 0.0.0.0 (0.0.0.0)
Your (client) IP address: 0.0.0.0 (0.0.0.0)
Next server IP address: 0.0.0.0 (0.0.0.0)
Relay agent IP address: 10.122.165.134 (10.122.165.134)
Client MAC address: Hughes_01:51:51 (00:00:10:01:51:51)
Client hardware address padding: 00000000000000000000
Server host name not given
Boot file name not given
Magic cookie: DHCP
Option: (53) DHCP Message Type
Length: 1
DHCP: Discover (1)
Option: (55) Parameter Request List
Option: (61) Client identifier
Option: (82) Agent Information Option
Length: 47
Option 82 Suboption: (1) Agent Circuit ID
Option 82 Suboption: (2) Agent Remote ID
Option 82 Suboption: (151) VRF name/VPN ID
Option 82 Suboption: (11) Server ID Override
Length: 4
Server ID Override: 172.16.16.1 (172.16.16.1)
Option 82 Suboption: (5) Link selection
Length: 4
Link selection: 172.16.16.0 (172.16.16.0)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
431
DHCP Relay in VXLAN BGP EVPN
DHCP Relay in VXLAN BGP EVPN
service dhcp
ip dhcp relay
ip dhcp relay information option
ip dhcp relay sub-option type cisco
ip dhcp relay information option vpn
• Create loopback under VRF where you need DHCP relay service.
interface loopback601
vrf member evpn-tenant-kk1
ip address 192.0.2.36/24
ip router ospf 1 area 0 /* Only required for vPC VTEP. */
Router bgp 2
vrf X
network 10.1.1.42/8
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
432
DHCP Relay in VXLAN BGP EVPN
vPC VTEP DHCP Relay Configuration Example
interface Vlan1601
vrf member evpn-tenant-kk1
ip address 10.160.1.254/8
fabric forwarding mode anycast-gateway
ip dhcp relay address 10.160.2.201
ip dhcp relay source-interface loopback601
interface Vlan1600
vrf member evpn-tenant-kk1
ip forward
Vlan 1605
interface Vlan1605
vrf member evpn-tenant-kk1
ip address 10.160.5.43/8
ip router ospf 1 area 10.10.10.41
router ospf 1
vrf evpn-tenant-kk1
router-id 10.160.5.43
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
433
DHCP Relay in VXLAN BGP EVPN
DHCP Relay in VXLAN BGP EVPN
/* vPC Peer-1 */
interface Vlan2000
no shutdown
mtu 9216
vrf member tenant-vrf
ip address 192.168.1.1/16
ip router ospf UNDERLAY area 0.0.0.0
/* vPC Peer-2 */
interface Vlan2000
no shutdown
mtu 9216
vrf member tenant-vrf
ip address 192.168.1.2/16
ip router ospf UNDERLAY area 0.0.0.0
• Configuration of SVI using static routes between vPC peers across the MCT:
/* vPC Peer-1 */
interface Vlan2000
no shutdown
mtu 9216
vrf member tenant-vrf
ip address 192.168.1.1/16
/* vPC Peer-2 */
interface Vlan2000
no shutdown
mtu 9216
vrf member tenant-vrf
ip address 192.168.1.2/16
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
434
APPENDIX D
Configuring Layer 4 - Layer 7 Network Services
Integration
This chapter contains the following sections:
• About VXLAN Layer 4 - Layer 7 Services, on page 435
• Integrating Layer 3 Firewalls in VXLAN Fabrics, on page 435
• Firewall as Default Gateway, on page 449
• Transparent Firewall Insertion, on page 450
• Show Command Examples, on page 455
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
435
Configuring Layer 4 - Layer 7 Network Services Integration
Single-Attached Firewall with Static Routing
Vlan 20
Name outside
Vn-segment 10020
Interface VLAN 10
Description inside_vlan
VRF member INSIDE
IP address 10.1.1.254/24
fabric forwarding mode anycast-gateway
Interface VLAN 20
Description outside_vlan
VRF member OUTSIDE
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
436
Configuring Layer 4 - Layer 7 Network Services Integration
Configuring Layer 4 - Layer 7 Network Services Integration
IP address 20.1.1.254/24
fabric forwarding mode anycast-gateway
interface nve1
no shutdown
host-reachability protocol bgp
source-interface loopback1
member vni 10010
mcastgroup 239.1.1.1
member vni 10020
mcastgroup 239.1.1.1
member vni 1001000 associate-vrf
member vni 1002000 associate-vrf
!
VRF context OUTSIDE
Vni 1001000
IP route 10.1.1.0/24 20.1.1.1 track 20
Firewall Failure on VTEP A caused the track to go down causing VTEP A to withdraw the static
route.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
437
Configuring Layer 4 - Layer 7 Network Services Integration
Recursive Static Routes Distributed to the Rest of the Fabric
Redistribute Static Routes into BGP and Advertise to the Rest of the Fabric
Through redistribution, we make the route toward the active firewall shown to the VTEP where it resides.
The route is seen as a prefix route (EVPN Route-Type5), and as such, only the route toward the VTEP with
the active firewall is seen. In the case of a firewall active/standby change, the tracking needs to detect the
change and inform all of the remote VTEPs of this change. This behavior is equal to a route "delete" followed
by an "add." This approach needs to notify all VTEPs with the VRF, and hence a wider churn can be seen.
VTEP A and VTEP B:
router bgp 65000
vrf OUTSIDE
address-family ipv4 unicast
redistribute static route-map Static-to-BGP
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
438
Configuring Layer 4 - Layer 7 Network Services Integration
Single-Attached Firewall with eBGP Routing
Vlan 20
Name outside
Vn-segment 10020
interface nve1
no shutdown
host-reachability protocol bgp
source-interface loopback1
member vni 10010
mcastgroup 239.1.1.1
member vni 10020
mcastgroup 239.1.1.1
member vni 1001000 associate-vrf
member vni 1002000 associate-vrf
Interface VLAN 10
Description inside_vlan
VRF member INSIDE
IP address 10.1.1.254/24
fabric forwarding mode anycast-gateway
Interface VLAN 20
Description outside_vlan
VRF member OUTSIDE
IP address 20.1.1.254/24
fabric forwarding mode anycast-gateway
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
439
Configuring Layer 4 - Layer 7 Network Services Integration
Configuring Layer 4 - Layer 7 Network Services Integration
EVPN, the same IP address could be used on all of the belonging VTEPs. We recommend using individual
IP addresses on a per-VTEP basis.
Reachability to the loopback from the firewall can be configured using a static route on the firewall, pointing
to the Anycast Gateway IP on the VTEPs.
In the following example, an eBGP peering is established from the VTEPs, which are in AS 65000, and the
firewall in AS 65002. The BGP peering with iBGP is not supported.
VTEP A:
Vlan 10
Name inside
Vn-segment 10010
Vlan 20
Name outside
Vn-segment 10020
Interface VLAN 10
Description inside_vlan
VRF member INSIDE
IP address 10.1.1.254/24
fabric forwarding mode anycast-gateway
Interface loopback100
Vrf member INSIDE
Ip address 172.16.1.253/32
Interface VLAN 20
Description outside_vlan
VRF member OUTSIDE
IP address 20.1.1.254/24
fabric forwarding mode anycast-gateway
Interface loopback101
Vrf member OUTSIDE
Ip address 172.18.1.253/32
vrf OUTSIDE
! peer with Firewall Outside
neighbor 20.1.1.0/24 remote-as 65123
update-source loopback101
ebgp-multihop 5
address-family ipv4 unicast
local-as 65052 no-prepend replace-as
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
440
Configuring Layer 4 - Layer 7 Network Services Integration
Configuring Layer 4 - Layer 7 Network Services Integration
VTEP B:
Vlan 10
Name inside
Vn-segment 10010
Vlan 20
Name outside
Vn-segment 10020
Interface VLAN 10
Description inside_vlan
VRF member INSIDE
IP address 10.1.1.254/24
fabric forwarding mode anycast-gateway
Interface loopback100
Vrf member INSIDE
Ip address 172.16.1.254/32
Interface VLAN 20
Description outside_vlan
VRF member OUTSIDE
IP address 20.1.1.254/24
fabric forwarding mode anycast-gateway
Interface loopback101
Vrf member OUTSIDE
Ip address 172.18.1.254/32
vrf OUTSIDE
! peer with Firewall Outside
neighbor 20.1.1.0/24 remote-as 65123
update-source loopback101
ebgp-multihop 5
address-family ipv4 unicast
local-as 65052 no-prepend replace-as
With the VXLAN fabric generally being in a single BGP Autonomous System (AS), the AS of the inside
VRF and the outside VRF is the same. BGP does not install routes that are received from its own AS. Therefore,
we need to adjust the AS-path to override this rule. Various approaches exist, including disabling the rule that
BGP drops routes from its own AS, which has further implications to the network. To keep all of the BGP
protection mechanics in place, the “local-as” approach allows you to mimic routes being originated from a
different AS. We recommend inserting the “local-as #ASN# no-prepend replace-as” on each firewall peering
with different “local-as” per VRF.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
441
Configuring Layer 4 - Layer 7 Network Services Integration
Dual-Attached Firewall with eBGP Routing
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
442
Configuring Layer 4 - Layer 7 Network Services Integration
Configuring Layer 4 - Layer 7 Network Services Integration
VTEP A:
Vlan 10
Name inside
Vn-segment 10010
Vlan 20
Name outside
Vn-segment 10020
Interface VLAN 10
Description inside_vlan
VRF member INSIDE
IP address 10.1.1.254/24
fabric forwarding mode anycast-gateway
Interface loopback100
Vrf member INSIDE
Ip address 172.16.1.253/32
Interface VLAN 20
Description outside_vlan
VRF member OUTSIDE
IP address 20.1.1.254/24
fabric forwarding mode anycast-gateway
Interface loopback101
Vrf member OUTSIDE
Ip address 172.18.1.253/32
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
443
Configuring Layer 4 - Layer 7 Network Services Integration
Configuring Layer 4 - Layer 7 Network Services Integration
vrf OUTSIDE
! peer with Firewall Outside
neighbor 20.1.1.0/24 remote-as 65123
update-source loopback101
ebgp-multihop 5
address-family ipv4 unicast
local-as 65052 no-prepend replace-as
VTEP B:
Vlan 10
Name inside
Vn-segment 10010
Vlan 20
Name outside
Vn-segment 10020
Interface VLAN 10
Description inside_vlan
VRF member INSIDE
IP address 10.1.1.254/24
fabric forwarding mode anycast-gateway
Interface loopback100
Vrf member INSIDE
Ip address 172.16.1.254/32
Interface VLAN 20
Description outside_vlan
VRF member OUTSIDE
IP address 20.1.1.254/24
fabric forwarding mode anycast-gateway
Interface loopback101
Vrf member OUTSIDE
Ip address 172.18.1.254/32
vrf OUTSIDE
! peer with Firewall Outside
neighbor 20.1.1.0/24 remote-as 65123
update-source loopback101
ebgp-multihop 5
address-family ipv4 unicast
local-as 65052 no-prepend replace-as
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
444
Configuring Layer 4 - Layer 7 Network Services Integration
Per-VRF Peering via vPC Peer-Link
vlan 3967
! vlan use for peering between the vPC VTEPS
vrf OUTSIDE
neighbor 100.1.2.0 remote-as 65000
update-source vlan 3967
next-hop self
address-family ipv4 unicast
The routes learned in each VRF are advertised to the rest of the fabric via BGP EVPN updates.
vlan 20
name outside
vn-segment 10020
interface VLAN 10
Description inside_vlan
VRF member INSIDE
IP address 10.1.1.254/24
IP router ospf 1 area 0
fabric forwarding mode anycast-gateway
Interface VLAN 20
Description outside_vlan
VRF member OUTSIDE
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
445
Configuring Layer 4 - Layer 7 Network Services Integration
Redistribute OSPF Routes into BGP and Advertise to the Rest of the Fabric
IP address 20.1.1.254/24
IP router ospf 1 area 0
fabric forwarding mode anycast-gateway
interface nve1
no shutdown
host-reachability protocol bgp
source-interface loopback1
member vni 10010
mcastgroup 239.1.1.1
member vni 10020
mcastgroup 239.1.1.1
member vni 1001000 associate-vrf
member vni 1002000 associate-vrf
router ospf 1
router-id 192.168.1.1
vrf INSIDE
VRF OUTSIDE
This route is then redistributed into BGP and advertised through the EVPN fabric so that all other VTEPs
have all routes in each VRF pointing to VTEP A as the next hop.
Redistribute OSPF Routes into BGP and Advertise to the Rest of the Fabric
VTEP A and VTEP B:
router bgp 65000
vrf OUTSIDE
address-family ipv4 unicast
redistribute ospf 1 route-map OUTSIDEOSPF-to-BGP
vrf INSIDE
address-family ipv4 unicast
redistribute ospf 1 route-map INSIDEOSPF-to-BGP
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
446
Configuring Layer 4 - Layer 7 Network Services Integration
Dual-Attached Firewall with OSPF
Traffic is VXLAN encapsulated from VTEP to services VTEP and decapsulated and sent to the firewall. The
firewall enforces the rules and sends the traffic to the services VTEP on the inside VRF. This traffic is then
VXLAN encapsulated and sent to the destination VTEP where traffic is decapsulated and sent to the end
client.
Firewall Failover
When the active firewall fails and the standby firewall takes over, routes are withdrawn from service VTEP
A and advertised to the fabric by service VTEP B.
VTEP A:
Vlan 10
Name inside
Vlan 20
Name outside
Interface VLAN 10
Description inside_vlan
VRF member INSIDE
IP address 10.1.1.253/24
Ip router ospf 1 area 0
Interface VLAN 20
Description outside_vlan
VRF member OUTSIDE
IP address 20.1.1.253/24
Ip router ospf 1 area 0
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
447
Configuring Layer 4 - Layer 7 Network Services Integration
Configuring Layer 4 - Layer 7 Network Services Integration
router ospf 1
vrf INSIDE VRF OUTSIDE
VTEP B:
Vlan 10
Name inside
Vlan 20
Name outside
Interface VLAN 10
Description inside_vlan
VRF member INSIDE
IP address 10.1.1.254/24
Ip router ospf 1 area 0
Interface VLAN 20
Description outside_vlan
VRF member OUTSIDE
IP address 20.1.1.254/24
Ip router ospf 1 area 0
router ospf 1
vrf INSIDE VRF OUTSIDE
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
448
Configuring Layer 4 - Layer 7 Network Services Integration
Redistribute OSPF Routes into BGP and Advertise to the Rest of the Fabric
Redistribute OSPF Routes into BGP and Advertise to the Rest of the Fabric
VTEP A and VTEP B:
router bgp 65000
vrf OUTSIDE
address-family ipv4 unicast
redistribute ospf 1 route-map OUTSIDEOSPF-to-BGP
vrf INSIDE
address-family ipv4 unicast
redistribute ospf 1 route-map INSIDEOSPF-to-BGP
interface nve1
no shutdown
host-reachability protocol bgp
source-interface loopback1
member vni 10010
mcastgroup 239.1.1.1
member vni 10020
mcastgroup 239.1.1.1
member vni 10030
mcastgroup 239.1.1.1
The firewall has a logical interface in each VNI and is the default gateway for all endpoints. Every inter-VNI
communication flows through the firewall. Take special care with the sizing of the firewall so that it does not
become a bottleneck. Therefore, use this design in environments with low-bandwidth requirements.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
449
Configuring Layer 4 - Layer 7 Network Services Integration
Transparent Firewall Insertion
In this topology, the traffic that goes from VLAN X to other VLANs must go through a transparent Layer 2
firewall that is attached to the service leafs. This topology utilizes an approach of an untrusted VLAN X and
a trusted VLAN Y. All ToR leafs have a Layer 2 VNI VLAN X. There is no SVI for VLAN X. The service
leafs that are connected to the firewall have Layer 2 VNI VLAN X, non-VXLAN VLAN Y, and SVI Y with
an HSRP gateway.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
450
Configuring Layer 4 - Layer 7 Network Services Integration
Configuring Layer 4 - Layer 7 Network Services Integration
Note For VXLAN EVPN, we recommend using the distributed Anycast Gateway with transparent firewall insertion.
Doing so allows all VLANs to be VXLAN enabled. When using an HSRP/VRRP-based First-Hop Gateway,
the VLAN for the SVI can't be VXLAN enabled and should reside on a vPC pair for redundancy.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
451
Configuring Layer 4 - Layer 7 Network Services Integration
EVPN with Transparent Firewall Insertion Example
interface nve1
member vni 100094
mcastgroup 239.1.1.1
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
452
Configuring Layer 4 - Layer 7 Network Services Integration
Configuring Layer 4 - Layer 7 Network Services Integration
evpn
vni 100094 l2
rd auto
route-target import auto
route-target export auto
vlan 95
description trusted_vlan
vpc domain 10
peer-switch
peer-keepalive destination 10.1.59.160
peer-gateway
auto-recovery
ip arp synchronize
interface Vlan2
description vpc_backup_svi_for_overlay
no shutdown
no ip redirects
ip address 10.10.60.17/30
no ipv6 redirects
ip router ospf 100 area 0.0.0.0
ip ospf bfd
ip pim sparsemode
interface Vlan95
description SVI_for_trusted_vlan
no shutdown
mtu 9216
vrf member Ten-1
no ip redirects
ip address 10.0.94.2/24
hsrp 0
preempt priority 255
ip 10.0.94.1
interface nve1
member vni 100094
mcast-group 239.1.1.1
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
453
Configuring Layer 4 - Layer 7 Network Services Integration
Configuring Layer 4 - Layer 7 Network Services Integration
network 10.0.94.0/24 /*advertise /24 for SVI 95 subnet; it is not VXLAN anymore*/
advertise l2vpn evpn
evpn
vni 100094 l2
rd auto
route-target import auto
route-target export auto
vlan 95
description trusted_vlan
vpc domain 10
peer-switch
peer-keepalive destination 10.1.59.159
peer-gateway
auto-recovery
ip arp synchronize
interface Vlan2
description vpc_backup_svi_for_overlay
no shutdown
no ip redirects
ip address 10.10.60.18/30
no ipv6 redirects
ip router ospf 100 area 0.0.0.0
ip pim sparsemode
interface Vlan95
description SVI_for_trusted_vlan
no shutdown
mtu 9216
vrf member Ten-1
no ip redirects
ip address 10.0.94.3/24
hsrp 0
preempt priority 255
ip 10.0.94.1
interface nve1
member vni 100094
mcastgroup 239.1.1.1
evpn
vni 100094 l2
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
454
Configuring Layer 4 - Layer 7 Network Services Integration
Show Command Examples
rd auto
route-target import auto
route-target export auto
Note In VLAN 94, the service leaf learned the host MAC from the remote peer by BGP.
Display information about service leaf learned ARP for host on VLAN 95:
switch# sh ip arp vrf ten-1
Address Age MAC Address Interface
10.0.94.101 00:00:26 d8b1.9071.5beb Vlan95
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
455
Configuring Layer 4 - Layer 7 Network Services Integration
Configuring Layer 4 - Layer 7 Network Services Integration
Display information about the border leaf learned host routes by BGP:
switch# sh ip route 10.0.94.101
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
456
APPENDIX E
Configuring Multihoming
This chapter contains the following sections:
• VXLAN EVPN Multihoming Overview, on page 457
• Configuring VXLAN EVPN Multihoming, on page 461
• Configuring Layer 2 Gateway STP, on page 463
• Configuring VXLAN EVPN Multihoming Traffic Flows, on page 467
• Configuring ESI ARP Suppression, on page 479
• Configuring VLAN Consistency Checking, on page 482
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
457
Configuring Multihoming
EVPN Multihoming Implementation
BGP EVPN running on Cisco NX-OS uses route type-2 to advertise MAC and IP (host) information, route
type-3 to carry VTEP information (specifically for ingress replication), and the EVPN route type-5 allows
advertisements of IPv4 or IPv6 prefixes in an Network Layer Reachability Information (NLRI) with no MAC
addresses in the route key.
With the introduction of EVPN multihoming, Cisco NX-OS software utilizes Ethernet Auto-discovery (EAD)
route, where Ethernet Segment Identifier and the Ethernet Tag ID are considered to be part of the prefix in
the NLRI. Since the end points reachability is learned via the BGP control plane, the network convergence
time is a function of the number of MAC/IP routes that must be withdrawn by the VTEP in case of a failure
scenario. To deal with such condition, each VTEP advertises a set of one or more Ethernet Auto-Discovery
per ES routes for each locally attached Ethernet Segment and upon a failure condition to the attached segment,
the VTEP withdraws the corresponding set of Ethernet Auto-Discovery per ES routes.
Ethernet Segment Route is the other route type that is being used by Cisco NX-OS software with EVPN
multihoming, mainly for Designated Forwarder (DF) election for the BUM traffic. If the Ethernet Segment
is multihomed, the presence of multiple DFs could result in forwarding the loops in addition to the potential
packet duplication. Therefore, the Ethernet Segment Route (Type 4) is used to elect the Designated Forwarder
and to apply Split Horizon Filtering. All VTEPs/PEs that are configured with an Ethernet Segment originate
this route.
To summarize the new implementation concepts for the EVPN multihoming:
• EAD/ES: Ethernet Auto Discovery Route per ES that is also referred to as type-1 route. This route is
used to converge the traffic faster during access failure scenarios. This route has Ethernet Tag of
0xFFFFFFFF.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
458
Configuring Multihoming
EVPN Multihoming Redundancy Group
• EAD/EVI: Ethernet Auto Discovery Route per EVI that is also referred to as type-1 route. This route is
used for aliasing and load balancing when the traffic only hashes to one of the switches. This route cannot
have Ethernet Tag value of 0xFFFFFF to differentiate it from the EAD/ES route.
• ES: Ethernet Segment route that is also referred to as type-4 route. This route is used for DF election for
BUM traffic.
• Aliasing: It is used for load balancing the traffic to all the connected switches for a given Ethernet Segment
using the type-1 EAD/EVI route. This is done irrespective of the switch where the hosts are actually
learned.
• Mass Withdrawal: It is used for fast convergence during the access failure scenarios using the type-1
EAD/ES route.
• DF Election: It is used to prevent forwarding of the loops and the duplicates as only a single switch is
allowed to decap and forward the traffic for a given Ethernet Segment.
• Split Horizon: It is used to prevent forwarding of the loops and the duplicates for the BUM traffic. Only
the BUM traffic that originates from a remote site is allowed to be forwarded to a local site.
LACP Bundling
LACP can be turned ON for detecting ESI misconfigurations on the multihomed port channel bundle as LACP
sends the ESI configured MAC address value to the access switch. LACP is not mandated along with ESI. A
given ESI interface (PO) shares the same ESI ID across the VTEPs in the group.
The access switch receives the same configured MAC value from both switches (L1 and L2). Therefore, it
puts the bundled link in the UP state. Since the ES MAC can be shared across all the Ethernet-segments on
the switch, LACP PDUs use ES MAC as system MAC address and the admin_key carries the ES ID.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
459
Configuring Multihoming
Guidelines and Limitations for VXLAN EVPN Multihoming
Cisco recommends running LACP between the switches and the access devices since LACP PDUs have a
mechanism to detect and act on the misconfigured ES IDs. In case there is mismatch on the configured ES
ID under the same PO, LACP brings down one of the links (first link that comes online stays up). By default,
on most Cisco Nexus platforms, LACP sets a port to the suspended state if it does not receive an LACP PDU
from the peer. This is based on the lacp suspend-individual command that is enabled by default. This command
helps in preventing loops that are created due to the ESI configuration mismatch. Therefore, it is recommended
to enable this command on the port-channels on the access switches and the servers.
In some scenarios (for example, POAP or NetBoot), it can cause the servers to fail to boot up because they
require LACP to logically bring up the port. In case you are using static port channel and you have mismatched
ES IDs, the MAC address gets learned from both L1 and L2 switches. Therefore, both the switches advertise
the same MAC address belonging to different ES IDs that triggers the MAC address move scenario. Eventually,
no traffic is forwarded to that node for the MAC addresses that are learned on both L1 and L2 switches.
Note The default value for local learned endpoints is 190, the default value for eBGP
is 20, and the default value for iBGP is 200.
• If eBGP is used with VXLAN EVPN Multihoming, the administrative distance for local learned endpoints
must be lower than the value of eBGP. The administrative distance can be changed by entering the fabric
forwarding admin-distance distance command.
Note The default value for local learned endpoints is 190, the default value for eBGP
is 20, and the default value for iBGP is 200.
• EVPN Multihoming is supported on the Cisco Nexus 9300 platform switches only. It is not supported
on the Cisco Nexus 9200, 9300-EX, FX/FXP/FX2, /FX3, 9300-GX, and 9500 platform switches. The
Cisco Nexus 9500 platform switches can be used as spine switches, but they cannot be used as VTEPs.
• EVPN Multihoming requires that all switches in a given network must be EVPN Multihoming capable.
Mixing platforms with and without EVPN Multihoming is not supported.
• EVPN multihoming is not supported on FEX.
• ARP suppression is supported with EVPN multihoming.
• EVPN Multihoming is supported with multihoming to two switches only.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
460
Configuring Multihoming
Configuring VXLAN EVPN Multihoming
• To enable EVPN Multihoming, the spine switches must be running the minimum software version as
Cisco NX-OS Release 7.0(3)I5(2) or later.
• Switchport trunk native VLAN is not supported on the trunk interfaces.
• Cisco recommends enabling LACP on ES PO.
• IPv6 is not currently supported.
• ISSU is not supported if ESI is configured on the Cisco Nexus 9300 Series switches.
Procedure
Step 2 address-family l2vpn evpn maximum-paths Enables BGP maximum-path to enable ECMP
<>maximum-paths ibgp <> for the MAC routes. Otherwise, the MAC routes
have only 1 VTEP as the next-hop. This
Example:
configuration is needed under BGP in Global
level.
address-family l2vpn evpn
maximum-paths 64
maximum-paths ibgp 64
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
461
Configuring Multihoming
VXLAN EVPN Multihoming Configuration Examples
Step 5 hardware access-list tcam region Configures the TCAM. This command is used
vpc-convergence 256 to configure the split horizon ACLs in the
hardware. This command avoids BUM traffic
Example:
duplication on the shared ES POs.
hardware access-list tcam region
vpc-convergence 256
Switch 1 (L1)
interface Ethernet2/1
no switchport
evpn multihoming core-tracking
mtu 9216
ip address 10.1.1.1/30
ip pim sparse-mode
no shutdown
interface Ethernet2/2
no switchport
evpn multihoming core-tracking
mtu 9216
ip address 10.1.1.5/30
ip pim sparse-mode
no shutdown
interface port-channel11
switchport mode trunk
switchport trunk allowed vlan 901-902,1001-1050
ethernet-segment 2011
system-mac 0000.0000.2011
mtu 9216
Switch 2 (L2)
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
462
Configuring Multihoming
Configuring Layer 2 Gateway STP
interface Ethernet2/1
no switchport
evpn multihoming core-tracking
mtu 9216
ip address 10.1.1.2/30
ip pim sparse-mode
no shutdown
interface Ethernet2/2
no switchport
evpn multihoming core-tracking
mtu 9216
ip address 10.1.1.6/30
ip pim sparse-mode
no shutdown
interface port-channel11
switchport mode trunk
switchport access vlan 1001
switchport trunk allowed vlan 901-902,1001-1050
ethernet-segment 2011
system-mac 0000.0000.2011
mtu 9216
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
463
Configuring Multihoming
Guidelines for Moving to Layer 2 Gateway STP
customer access switches and it puts the ports in the blk l2g_inc state to secure the root on the overlay-fabric
and to prevent a loop.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
464
Configuring Multihoming
Enabling Layer 2 Gateway STP on a Switch
• Remove the BPDU filter configurations and the edge on the customer access switch.
Now the topology converges with Layer 2 Gateway STP and any blocking of the redundant connections
is pushed to the access switch layer.
Procedure
Step 4 spanning-tree mst <id> priority 8192 Configures Spanning Tree Protocol priority.
Step 5 spanning-tree vlan <id> priority 8192 Configures Spanning Tree Protocol priority.
Example
All Layer 2 Gateway STP VLANs should be set to a lower spanning-tree priority than the
customer-edge (CE) topology to help ensure that the VTEP is the spanning-tree root for this VLAN.
If the access switches have a higher priority, you can set the Layer 2 Gateway STP priority to 0 to
retain the Layer 2 Gateway STP root in the VXLAN fabric. See the following configuration example:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
465
Configuring Multihoming
Configuring Multihoming
MST0000
Spanning tree enabled protocol mstp
The output displays that the spanning-tree priority is set to 8192 (the default is 32768). Spanning-tree
priority is set in multiples of 4096. The priority for individual instances is calculated as the priority
and the Instance_ID. In this case, the priority is calculated as 8192 + 0 = 8192. With Layer 2 Gateway
STP, access ports (VTEP ports connected to the access switches) have root guard enabled. If a superior
BPDU is received on an edge port of a VTEP, the port is placed in the Layer 2 Gateway inconsistent
state until the condition is cleared as displayed in the following example:
MST0000
Spanning tree enabled protocol mstp
Root ID Priority 8192
Address c84c.75fa.6001
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
To disable Layer 2 Gateway STP on a VTEP, enter the spanning-tree domain disable CLI command.
This command disables Layer 2 Gateway STP on all EVPN ESI multihomed VLANs. The bridge
MAC address is restored to the system MAC address, and the VTEP may not necessarily be the root.
In the following case, the access switch has assumed the root role because Layer 2 Gateway STP is
disabled:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
466
Configuring Multihoming
Configuring VXLAN EVPN Multihoming Traffic Flows
MST0000
Spanning tree enabled protocol mstp
Root ID Priority 4096
Address 00c8.8ba6.5073
Cost 0
Port 4108 (port-channel13)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
With Layer 2 Gateway STP, the access ports on VTEPs cannot be in an edge port, because they
behave like normal spanning-tree ports, receiving BPDUs from the access switches. In that case, the
access ports on VTEPs lose the advantage of rapid transmission, instead forwarding on Ethernet
segment link flap. (They have to go through a proposal and agreement handshake before assuming
the FWD-Desg role).
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
467
Configuring Multihoming
Configuring Multihoming
Note When such condition occurs, the MAC table entry for H2 changes from a local route pointing to a port channel
interface to a remote overlay route pointing to peer-ID of L2. The change gets percolated in the system from
BGP.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
468
Configuring Multihoming
Configuring Multihoming
Figure 56: ES1 failure on L1. H1->H2 is now bridged over VXLAN tunnel.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
469
Configuring Multihoming
Configuring Multihoming
Any packet that is routed from H1 to H2 is directly sent from L1 via native routing.
However, host H3 is not a locally attached adjacency, unlike in vPC case where the ARP entry syncs to L1
as a locally attached adjacency. Instead, H3 shows up as a remote host in the IP table at L1, installed in the
context of L3 VNI. This packet must be encapsulated in the router-MAC of L2 and routed to L2 via VXLAN
overlay.
Therefore, routed traffic from H1 to H3 takes place exactly in the same fashion as routed traffic between truly
remote hosts in different subnets.
Figure 58: L1 is Distributed Anycast Gateway. H1, H2, and H3 are in different VLANs. H1->H3 routing happens via VXLAN tunnel
encapsulation. In vPC, H3 ARP would have been synced via MCT and direct routing.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
470
Configuring Multihoming
Configuring Multihoming
Figure 59: H1, H2, and H3 are in different VLANs. ESI fails on L1. H1->H2 routing happens via VXLAN tunnel encapsulation.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
471
Configuring Multihoming
EVPN Multihoming Remote Traffic Flows
Below are the main constructs needed to create this MAC ECMP PathList:
Ethernet Auto Discovery Route (Type 1) per ES
EVPN defines a mechanism to efficiently and quickly signal the need to update their forwarding tables upon
the occurrence of a failure in connectivity to an Ethernet Segment. Having each PE advertise a set of one or
more Ethernet A-D per ES route for each locally attached Ethernet Segment does this.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
472
Configuring Multihoming
Configuring Multihoming
MPLS Label 0
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
473
Configuring Multihoming
Configuring Multihoming
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
474
Configuring Multihoming
Configuring Multihoming
L1 and L2 advertise the MAC-IP route for Host H2. Due to the receipt of these routes, L3 builds an L3 ECMP
list comprising of L1 and L2.
Figure 64: Layer 3 VXLAN Gateway. L3 does IP ECMP to L1/L2 for inter subnet traffic.
Hence the routing happens 3 times, once each at L3, L1, and L2. This sub-optimal behavior continues until
Type-2 route is withdrawn by L1 by BGP.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
475
Configuring Multihoming
EVPN Multihoming BUM Flows
Figure 65: Layer 3 VXLAN Gateway. ESI failure causes ES mass withdrawal that only impacts L2 ECMP. L3 ECMP continues until Type2
is withdrawn. L3 traffic reaches H2 via suboptimal path L3->L1->L2 until then.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
476
Configuring Multihoming
Configuring Multihoming
Figure 67: BUM traffic originating at L3. L2 is the DF for ES1 and ES2. L2 decapsulates and forwards to ES1, ES2 and orphan. L1 decapsulates
and only forwards to orphan.
Designated Forwarder
It is important that only one of the switches in the redundancy group decaps and forwards BUM traffic over
the ESI links. For this purpose, a unique Designated Forwarder (DF) is elected on a per Ethernet Segment
basis. The role of the DF is to decap and forward BUM traffic originating from the remote segments to the
destination local segment for which the device is the DF. The main aspects of DF election are:
• DF Election is per (ES, VLAN) basis. There can be a different DF for ES1 and ES2 for a given VLAN.
• DF election result only applies to BUM traffic on the RX side for decap.
• Every switch must decap BUM traffic to forward it to singly homed or orphan links.
• Duplication of DF role leads to duplicate packets or loops in a DHN. Therefore, there must be a unique
DF on per (ES, VLAN) basis.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
477
Configuring Multihoming
Configuring Multihoming
Figure 68: BUM traffic originating at L1. L2 is the DF for ES1 and ES2. However, L2 must perform split horizon check here as it shares
ES1 and ES2 with L1. L2 however
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
478
Configuring Multihoming
Configuring ESI ARP Suppression
With ESI ARP suppression, the initial ARP requests are broadcast to all sites. However, subsequent ARP
requests are suppressed at the first-hop leaf switch and answered locally if possible. In this way, ESI ARP
suppression significantly reduces ARP traffic across the overlay. If the cache lookup fails and the response
cannot be generated locally, the ARP request can be flooded, which helps with the detection of silent hosts.
ESI ARP suppression is a per-VNI (L2 VNI) feature and is supported only with VXLAN EVPN (distributed
gateway). This feature is supported only in L3 mode.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
479
Configuring Multihoming
Limitations for ESI ARP Suppression
Interface nve1
no shutdown
source-interface loopback1
host-reachability protocol bgp
member vni 10000
suppress-arp
mcast-group 224.1.1.10
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
480
Configuring Multihoming
Configuring Multihoming
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
481
Configuring Multihoming
Configuring VLAN Consistency Checking
switch#
The broadcast request is retransmitted if a response is not received. VLAN consistency checking fails to run
if a response is not received after 3 retransmissions.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
482
Configuring Multihoming
VLAN Consistency Checking Guidelines and Limitations
Scope : Physical-ip
-------------------------------------------------------------------------
Switch WWN IP Address
-------------------------------------------------------------------------
20:00:f8:c2:88:23:19:47 172.31.202.228 [Local]
Switch
20:00:f8:c2:88:90:c6:21 172.31.201.172 [Not Merged]
20:00:f8:c2:88:23:22:8f 172.31.203.38 [Not Merged]
20:00:f8:c2:88:23:1d:e1 172.31.150.132 [Not Merged]
20:00:f8:c2:88:23:1b:37 172.31.202.233 [Not Merged]
20:00:f8:c2:88:23:05:1d 172.31.150.134 [Not Merged]
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
483
Configuring Multihoming
Configuring Multihoming
The show nve ethernet-segment command now displays the following details:
• The list of VLANs for which consistency check is failed.
• Remaining value (in seconds) of the global VLAN CC timer.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
484
APPENDIX F
Configuring Proportional Multipath for VNF
This chapter contains the following sections:
• About Proportional Multipath for VNF, on page 485
• Proportional Multipath for VNF with Multi-Site, on page 489
• Prerequisites for Proportional Multipath for VNF, on page 489
• Guidelines and Limitations for Proportional Multipath for VNF, on page 490
• Configuring the Route Reflector, on page 491
• Configuring the ToR, on page 492
• Configuring the Border Leaf, on page 497
• Configuring the BGP Legacy Peer, on page 503
• Configuring a User-Defined Profile for Maintenance Mode, on page 504
• Configuring a User-Defined Profile for Normal Mode, on page 504
• Configuring a Default Route Map, on page 505
• Applying a Route Map to a Route Reflector, on page 505
• Verifying Proportional Multipath for VNF, on page 506
• Configuration Example for Proportional Multipath for VNF with Multi-Site, on page 510
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
485
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
In the preceding diagram, North-South traffic that enters the VXLAN fabric at a border leaf is sent across all
egress endpoints with the traffic forwarded proportional to the number of links from the egress top of rack
(ToR) to the destination network.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
486
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
East-West traffic is forwarded between the VXLAN Tunnel Endpoints (VTEPs) proportional to the number
of next hops advertised by each ToR switch to the destination network.
The switch uses BGP to advertise reachability within the fabric using the Layer 2 VPN (L2VPN)/Ethernet
VPN (EVPN) address family. If all ToR switches and border leafs are within the same Autonomous System
(AS), a full internal BGP (iBGP) mesh is configured by using route reflectors or by having each BGP router
peer with every other router.
Each ToR and border leaf constitutes a VTEP in the VXLAN fabric. You can use a BGP route reflector to
reduce the full mesh BGP sessions across the VTEPs to a single BGP session between a VTEP and the route
reflector. Virtual Network Identifiers (VNIs) are globally unique within the overlay. Each Virtual Routing
and Forwarding (VRF) instance is mapped to a unique VNI. The inner destination MAC address in the VXLAN
header belongs to the receiving VTEP that does the routing of the VXLAN payload. This MAC address is
distributed as a BGP attribute along with the EVPN routes.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
487
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
The networks advertised to the ToRs by the virtual machines (VMs) attached to them are advertised to the
VXLAN fabric as EVPN Type-5 routes with the following:
• The route distinguisher (RD) will be the Layer 3 VNI's configured RD.
• The gateway IP field will be populated with the next hop.
• The next hop of the EVPN route will continue to be the VTEP IP.
• The export route targets of the routes will be derived from the configured export route targets of the
associated Layer 3 VNI.
Multiple VRF routes may generate the same Type-5 Network Layer Reachability Information (NLRI)
differentiated only by the gateway IP field. The routes are advertised with the L3VNI’s RD, and the gateway
IP isn't part of the Type-5 NLRI’s key. The NLRI is exchanged between BGP routers using update messages.
These routes are advertised to the EVPN AF by extending the BGP export mechanism to include ECMPs and
using the addpath BGP feature in the EVPN AF.
Each Type-5 route within the EVPN AF that is created by using the Proportional Multipath for VNF feature
may have multiple paths that are imported into the corresponding VRF based on the matching of the received
route targets and by having ECMP enabled within the VRF and in the EVPN AF. Within the VRF, the route
is a single prefix with multiple paths. Each path represents a Type-5 EVPN path or those learned locally within
the VRF. The EVPN Type-5 routes that are enabled for the Proportional Multipath for VNF feature will have
their next hop in the VRF derived from their gateway IP field. Use the export-gateway-ip command to enable
BGP to advertise the gateway IP in the EVPN Type-5 routes.
Use the maximum-paths mixed command to enable BGP and the Unicast Routing Information Base (URIB)
to consider the following paths as ECMP:
• iBGP paths
• eBGP paths
• Paths from other protocols (such as static) that are redistributed or injected into BGP
The paths can be either local to the device (static, iBGP, or eBGP) or remote (eBGP or iBGP learned over
BGP-EVPN). This overrides the default route selection behavior in which local routes are preferred over
remote routes. URIB downloads all next hops of the route, including locally learned and user-configured
routes, to the Unicast FIB Distribution Module (uFDM)/Forwarding Information Base (FIB).
Beginning with Cisco NX-OS Release 9.3(5), you don't need to use mixed paths. You can choose to have
only eBGP or iBGP filter the ECMP paths.
When you enter the maximum-paths mixed command beginning with Cisco NX-OS Release 9.3(5), BGP
checks for the AS-path length by default. If you want to ignore the AS-path length (for example, on nodes
that participate in packet forwarding such as BGWs and VTEPs), you must enter the bestpath as-path ignore
command. When the maximum-paths mixed command is enabled for earlier releases, BGP ignores the
AS-path length, and URIB ignores the administrative distance when choosing ECMPs. To ensure that no
impact is observed, we recommend upgrading to Cisco NX-OS Release 9.3(5) prior to entering this command.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
488
Configuring Proportional Multipath for VNF
Proportional Multipath for VNF with Multi-Site
Multipath for VNF feature for a legacy peer. BGP sets the gateway IP field of the Type-5 NLRI to zero even
if the path being advertised has a valid gateway IP.
The no advertise-gw-ip command flaps the specified peer session as gracefully as possible. The remote peer
triggers a graceful restart if the peer supports this capability. When the session is re-established, the local peer
advertises EVPN Type-5 routes with the gateway IP set or with the gateway IP as zero depending on whether
the advertise-gw-ip command has been used. By default, this knob is enabled and the gateway IP field is
populated with the appropriate next hop value.
To use this feature, simply configure Proportional Multipath for VNF and enable Multi-Site. For a sample
configuration, see Configuration Example for Proportional Multipath for VNF with Multi-Site, on page 510.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
489
Configuring Proportional Multipath for VNF
Guidelines and Limitations for Proportional Multipath for VNF
• Enter the bestpath as-path ignore command on nodes that participate in packet forwarding, such as
BGWs and VTEPs. This command causes BGP to ignore the AS-path length.
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
490
Configuring Proportional Multipath for VNF
Configuring the Route Reflector
Similarly, TOR2 advertises both subnets and 2.2.2.0/24 is sent without a gateway IP as it is directly
connected to TOR2. 1.1.1.0 is learned via OSPF and is sent with a gateway IP of 2.2.2.2 which is the
VNF’s address connected to TOR2. 1.1.1.1/32 and 2.2.2.2/32 won't be advertised as they are Adjacency
Manager (AM) routes on each TOR.
This issue doesn't have a resolution when Type-5 routes are involved. However, this scenario can be
avoided if the TORs advertise the gateway IP’s /32 address using a network command. And if the gateway
IPs are being resolved by Type-2 EVPN MAC/IP routes, this scenario can be avoided as the gateway IP
will be resolved by the /32 IP route.
• The following guidelines and limitations apply to Proportional Multipath for VNF with Multi-Site:
• This feature is supported for Cisco Nexus 9364C, 9300-EX, and 9300-FX/FX2/FX3 platform
switches and Cisco Nexus 9500 platform switches with the N9K-C9508-FM-E2 fabric module and
an -EX or -FX line card.
• VNF moves across sites aren't supported.
Step 3 address-family l2vpn evpn Configure address family Layer 2 VPN EVPN
under router bgp context.
Example:
switch(config-router)# address-family
l2vpn evpn
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
491
Configuring Proportional Multipath for VNF
Configuring the ToR
Step 8 set path-selection all advertise Sets the route-map related to the
additional-paths feature.
Example:
switch(config-route-map)# set
path-selection all advertise
Procedure
Step 3 address-family l2vpn evpn Configure address family Layer 2 VPN EVPN
under router bgp context.
Example:
switch(config-router)# address-family
l2vpn evpn
Step 4 [no] maximum-paths [eBGP max-paths The following options are available:
|mixed | ibgp |local | eibgp ] mpath-count
• eBGP max-path–Enables the eBGP
Example: maximum paths. The range is from 1 to
switch(config-router-af)# maximum-paths 64 parallel paths. The default value is 1.
?
<1-64> Number of parallel paths • mixed–Enables BGP and the Unicast
Routing Information Base (URIB) to
*Default value is 1 consider the following paths as Equal
eibgp Configure multipath for both
Cost Multi Path (ECMP):
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
492
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Step 7 additional-paths selection route-map passall The additional-paths configuration applied the
route map.
Example:
switch(config-router-af)#
additional-paths selection route-map
passall
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
493
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Step 12 [no] maximum-paths [eBGP max-paths The following options are available:
|mixed | ibgp |local | eibgp ] mpath-count
• eBGP max-path–Enables the eBGP
Example: maximum paths. The range is from 1 to
switch(config-router-vrf-af)# 64 parallel paths. The default value is 1.
maximum-paths ?
<1-64> Number of parallel paths • mixed–Enables BGP and the Unicast
Routing Information Base (URIB) to
*Default value is 1 consider the following paths as Equal
eibgp Configure multipath for both
EBGP and IBGP paths
Cost Multi Path (ECMP):
ibgp Configure multipath for IBGP
• eBGP paths
paths
local Configure multipath for local
• eiBGP paths
paths
mixed Configure multipath for local
and remote paths
• iBGP paths
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
494
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Step 13 redistribute static route-map redist-rtmap Preserves the next-hop of the redistributed
paths.
Example:
switch(config-router-vrf-af)#
redistribute static route-map
redist-rtmap
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
495
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Step 18 [no] maximum-paths [eBGP max-paths The following options are available:
|mixed | ibgp |local | eibgp ] mpath-count
• eBGP max-path–Enables the eBGP
Example: maximum paths. The range is from 1 to
switch(config-router-vrf-af)# 64 parallel paths. The default value is 1.
maximum-paths ?
<1-64> Number of parallel paths • mixed–Enables BGP and the Unicast
Routing Information Base (URIB) to
*Default value is 1 consider the following paths as Equal
eibgp Configure multipath for both
EBGP and IBGP paths
Cost Multi Path (ECMP):
ibgp Configure multipath for IBGP
• eBGP paths
paths
local Configure multipath for local
• eiBGP paths
paths
mixed Configure multipath for local
and remote paths
• iBGP paths
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
496
Configuring Proportional Multipath for VNF
Configuring the Border Leaf
Step 23 set path-selection all advertise Sets the route-map related to the
additional-paths feature.
Example:
switch(config-route-map)# set
path-selection all advertise
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
497
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Step 4 [no] maximum-paths [eBGP max-paths The following options are available:
|mixed | ibgp |local | eibgp ] mpath-count
• eBGP max-path–Enables the eBGP
Example: maximum paths. The range is from 1 to
switch(config-router-af)# maximum-paths 64 parallel paths. The default value is 1.
?
<1-64> Number of parallel paths • mixed–Enables BGP and the Unicast
Routing Information Base (URIB) to
*Default value is 1 consider the following paths as Equal
eibgp Configure multipath for both
EBGP and IBGP paths
Cost Multi Path (ECMP):
ibgp Configure multipath for IBGP
• eBGP paths
paths
local Configure multipath for local
• eiBGP paths
paths
mixed Configure multipath for local
and remote paths
• iBGP paths
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
498
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Step 12 [no] maximum-paths [eBGP max-paths The following options are available:
|mixed | ibgp |local | eibgp ] mpath-count
• eBGP max-path–Enables the eBGP
Example: maximum paths. The range is from 1 to
switch(config-router-af)# maximum-paths 64 parallel paths. The default value is 1.
?
<1-64> Number of parallel paths • mixed–Enables BGP and the Unicast
Routing Information Base (URIB) to
*Default value is 1 consider the following paths as Equal
eibgp Configure multipath for both
EBGP and IBGP paths
Cost Multi Path (ECMP):
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
499
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Step 13 redistribute static route-map redist-rtmap Preserves the next-hop of the redistributed
paths.
Example:
switch(config-router-vrf-af)#
redistribute static route-map
redist-rtmap
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
500
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Step 17 [no] maximum-paths [eBGP max-paths The following options are available:
|mixed | ibgp |local | eibgp ] mpath-count
• eBGP max-path–Enables the eBGP
Example: maximum paths. The range is from 1 to
switch(config-router-vrf-af)# 64 parallel paths. The default value is 1.
maximum-paths ?
<1-64> Number of parallel paths • mixed–Enables BGP and the Unicast
Routing Information Base (URIB) to
*Default value is 1 consider the following paths as Equal
eibgp Configure multipath for both
EBGP and IBGP paths
Cost Multi Path (ECMP):
ibgp Configure multipath for IBGP
• eBGP paths
paths
local Configure multipath for local
• eiBGP paths
paths
mixed Configure multipath for local
and remote paths
• iBGP paths
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
501
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Step 22 set path-selection all advertise Sets the route-map related to the
additional-paths feature.
Example:
switch(config-route-map)# set
path-selection all advertise
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
502
Configuring Proportional Multipath for VNF
Configuring the BGP Legacy Peer
Procedure
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
503
Configuring Proportional Multipath for VNF
Configuring a User-Defined Profile for Maintenance Mode
Step 3 route-map name deny sequence Configure route map. The value of sequence is
from 0 to 65535. Default is 10.
Example:
switch(config-mm-profile)# route-map GIR
deny 5
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
504
Configuring Proportional Multipath for VNF
Configuring a Default Route Map
Step 3 route-map name permit sequence Configure route map. The value of sequence is
from 0 to 65535. Default is 10.
Example:
switch(config-mm-profile)# route-map GIR
permit 5
Step 2 route-map name permit sequence Configure route map. The value of sequence is
from 0 to 65535. Default is 10.
Example:
switch(config-mm-profile)# route-map GIR
permit 5
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
505
Configuring Proportional Multipath for VNF
Verifying Proportional Multipath for VNF
Step 5 route-map name out Apply the route map to the neighbor route
reflector.
Example:
switch(config-router-neighbor-af)#
route-map GIR out
show bgp ipv4 unicast Displays Border Gateway Protocol (BGP) information
for the IPv4 unicast address
family.
show bgp l2vpn evpn Displays BGP information for the Layer-2 Virtual
Private Network (L2VPN) Ethernet Virtual Private
Network (EVPN) address family.
show maintenance profile maintenance-mode Displays the GIR user-defined profile for the
maintenance mode.
show maintenance profile normal-mode Displays the GIR user-defined profile for the normal
mode.
The following example shows how to display BGP information for the L2VPN EVPN address family:
Advertised path-id 1
Path type: external, path is valid, is best path
Imported to 2 destination(s)
Gateway IP: 11.1.1.133
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
506
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Path type: external, path is valid, not best reason: Neighbor Address, multipath
Imported to 2 destination(s)
Gateway IP: 11.1.1.233
AS-Path: 2000000 100 , path sourced external to AS
33.33.33.33 (metric 5) from 102.102.102.102 (102.102.102.102)
Origin incomplete, MED not set, localpref 100, weight 0
Received label 22001
Received path-id 2
Extcommunity: RT:23456:22001 Route-Import:33.33.33.33:2001 ENCAP:8
Router MAC:e00e.da4a.589d
Path type: external, path is valid, not best reason: Neighbor Address, multipath
Imported to 2 destination(s)
Gateway IP: 11.1.1.100
AS-Path: 2000000 500000 , path sourced external to AS
22.22.22.22 (metric 5) from 102.102.102.102 (102.102.102.102)
Origin incomplete, MED not set, localpref 100, weight 0
Received label 22001
Received path-id 1
Extcommunity: RT:23456:22001 Route-Import:22.22.22.22:2001 ENCAP:8
Router MAC:e00e.da4a.62a5
Advertised path-id 1
Path type: external, path is valid, is best path
Imported from 13.13.13.13:3:[5]:[0]:[0]:[24]:[11.1.1.0]/224
Gateway IP: 11.1.1.100
AS-Path: 2000000 500000 , path sourced external to AS
22.22.22.22 (metric 5) from 102.102.102.102 (102.102.102.102)
Origin incomplete, MED not set, localpref 100, weight 0
Received label 22001
Received path-id 1
Extcommunity: RT:23456:22001 Route-Import:22.22.22.22:2001 ENCAP:8
Router MAC:e00e.da4a.62a5
Path type: external, path is valid, not best reason: newer EBGP path, multipat
h
Imported from 13.13.13.13:3:[5]:[0]:[0]:[24]:[11.1.1.0]/224
Gateway IP: 11.1.1.233
AS-Path: 2000000 100 , path sourced external to AS
33.33.33.33 (metric 5) from 102.102.102.102 (102.102.102.102)
Origin incomplete, MED not set, localpref 100, weight 0
Received label 22001
Received path-id 2
Extcommunity: RT:23456:22001 Route-Import:33.33.33.33:2001 ENCAP:8
Router MAC:e00e.da4a.589d
Path type: external, path is valid, not best reason: newer EBGP path, multipat
h
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
507
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
The following example shows how to display BGP information for the IPv4 unicast address family:
Path type: external, path is valid, not best reason: Neighbor Address, multipath, in rib
Imported from 13.13.13.13:3:[5]:[0]:[0]:[24]:[11.1.1.0]/224
AS-Path: 2000000 100 , path sourced external to AS
11.1.1.233 (metric 5) from 102.102.102.102 (102.102.102.102)
Origin incomplete, MED not set, localpref 100, weight 0
Received label 22001
Received path-id 2
Extcommunity: RT:23456:22001 Route-Import:33.33.33.33:2001 ENCAP:8
Router MAC:e00e.da4a.589d
Path type: external, path is valid, not best reason: Neighbor Address, multipath, in rib
Imported from 13.13.13.13:3:[5]:[0]:[0]:[24]:[11.1.1.0]/224
AS-Path: 2000000 100000 , path sourced external to AS
11.1.1.133 (metric 5) from 102.102.102.102 (102.102.102.102)
Origin incomplete, MED not set, localpref 100, weight 0
Received label 22001
Received path-id 3
Extcommunity: RT:23456:22001 Route-Import:11.11.11.11:2001 ENCAP:8
Router MAC:003a.7d7d.1dbd
The following example shows how to display routes from the unicast RIB after the Proportional Multipath
for VNF feature has been configured:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
508
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
The following example shows how to display the GIR user-defined profile for the maintenance mode:
The following example shows how to display the GIR user-defined profile for the normal mode:
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
509
Configuring Proportional Multipath for VNF
Configuration Example for Proportional Multipath for VNF with Multi-Site
The following configuration example allows traffic to be sent across sites if a local VNF isn't available.
feature telnet
feature nxapi
feature bash-shell
feature scp-server
nv overlay evpn
feature ospf
feature bgp
feature pim
feature interface-vlan
feature vn-segment-vlan-based
feature bfd
feature nv overlay
no password strength-check
username admin password 5 password role network-admin
ip domain-lookup
copp profile strict
evpn multisite border-gateway 1
delay-restore time 30
snmp-server user admin network-admin auth md5 0x66a8185ad28d9df13d9214f6e19aad37 priv
0x66a8185ad28d9df13d9214f6e19aad37 localizedkey
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
510
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
vlan 101
name l2-vni-vlan-0-for-vrf101
vn-segment 2000101
vlan 1100
name l2-vni-vlan-1-for-vrf100
vn-segment 2001100
vlan 1101
name l2-vni-vlan-1-for-vrf101
vn-segment 2001101
vlan 2100
name l3-vni-vlan-for-vrf100
vn-segment 3000100
vlan 2101
name l3-vni-vlan-for-vrf101
vn-segment 3000101
interface Vlan14
no shutdown
vrf member vrf100
ip address 192.14.0.1/24
ipv6 address 192:14::1/64
interface Vlan24
no shutdown
vrf member vrf101
ip address 192.24.0.1/24
ipv6 address 192:24::1/64
interface Vlan100
description "L3VRF.VLANNUM.0.222"
no shutdown
vrf member vrf100
ip address 100.0.0.222/24
ipv6 address 100::222/64
fabric forwarding mode anycast-gateway
interface Vlan101
description "L3VRF.VLANNUM.0.222"
no shutdown
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
511
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
interface Vlan1100
description "L3VRF.VLANNUM.0.222"
no shutdown
vrf member vrf100
ip address 100.1.0.222/16
ipv6 address 100:1::222/64
fabric forwarding mode anycast-gateway
interface Vlan1101
description "L3VRF.VLANNUM.0.222"
no shutdown
vrf member vrf101
ip address 101.1.0.222/16
ipv6 address 101:1::222/64
fabric forwarding mode anycast-gateway
interface Vlan2100
no shutdown
vrf member vrf100
ip forward
ipv6 address use-link-local-only
interface Vlan2101
no shutdown
vrf member vrf101
ip forward
ipv6 address use-link-local-only
interface nve1
no shutdown
host-reachability protocol bgp
source-interface loopback1
multisite border-gateway interface loopback2
member vni 2000100-2000110
suppress-arp
mcast-group 227.1.1.1
member vni 2000120-2000150
suppress-arp
mcast-group 227.1.1.1
member vni 2001100-2001110
suppress-arp
mcast-group 227.1.1.1
member vni 3000100-3000110 associate-vrf
member vni 3100100-3100110 associate-vrf
interface Ethernet1/22
description "BGW11 to BGW2"
medium p2p
ip unnumbered loopback0
ip ospf cost 40
ip ospf network point-to-point
ip router ospf 12 area 0.0.0.0
no shutdown
evpn multisite dci-tracking
interface Ethernet1/25
description "BGW11 to Spine11"
medium p2p
ip unnumbered loopback0
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
512
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
ip ospf cost 40
ip ospf network point-to-point
ip router ospf 1 area 0.0.0.0
no shutdown
evpn multisite fabric-tracking
interface Ethernet1/27
description "BGW11 to Spine12"
medium p2p
ip unnumbered loopback0
ip ospf cost 40
ip ospf network point-to-point
ip router ospf 1 area 0.0.0.0
no shutdown
evpn multisite fabric-tracking
interface Ethernet1/34
switchport
switchport mode trunk
switchport trunk allowed vlan 14,24
no shutdown
interface loopback0
ip address 1.1.11.0/32
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
interface loopback1
ip address 1.1.11.1/32
ip router ospf 1 area 0.0.0.0
ip pim sparse-mode
interface loopback2
ip address 11.11.11.11/32
ip router ospf 12 area 0.0.0.0
ip pim sparse-mode
router ospf 1
redistribute direct route-map permit-all
router ospf 12
redistribute direct route-map permit-all
ip load-sharing address source-destination rotate 32 universal-id 1
router bgp 1
log-neighbor-changes
address-family l2vpn evpn
maximum-paths 8
maximum-paths ibgp 8
additional-paths send
additional-paths receive
additional-paths selection route-map passall
neighbor 1.2.11.1
remote-as 1
description "SPINE-11"
update-source loopback1
address-family l2vpn evpn
send-community extended
neighbor 1.2.12.1
remote-as 1
description "SPINE-12"
update-source loopback1
address-family l2vpn evpn
send-community extended
neighbor 2.1.2.1
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
513
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
remote-as 2
description "BGW-2"
update-source loopback1
ebgp-multihop 3
peer-type fabric-external
address-family ipv4 unicast
address-family l2vpn evpn
send-community extended
rewrite-evpn-rt-asn
vrf vrf100
address-family ipv4 unicast
redistribute direct route-map permit-all
maximum-paths 8
maximum-paths ibgp 8
export-gateway-ip
address-family ipv6 unicast
redistribute direct route-map permit-all
maximum-paths 8
maximum-paths ibgp 8
export-gateway-ip
vrf vrf101
address-family ipv4 unicast
redistribute direct route-map permit-all
maximum-paths 8
maximum-paths ibgp 8
export-gateway-ip
address-family ipv6 unicast
redistribute direct route-map permit-all
maximum-paths 8
maximum-paths ibgp 8
export-gateway-ip
evpn
vni 2000100 l2
rd auto
route-target import auto
route-target export auto
vni 2000101 l2
rd auto
route-target import auto
route-target export auto
vni 2001100 l2
rd auto
route-target import auto
route-target export auto
vni 2001101 l2
rd auto
route-target import auto
route-target export auto
The following example shows that the VTEP in site 1 prefers the local VNF (FW).
leaf1# show bgp l2vpn evpn 200.100.1.1
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 1.3.12.0:3
BGP routing table entry for [5]:[0]:[0]:[32]:[200.100.1.1]/224, version 77902
Paths: (4 available, best #2)
Flags: (0x000002) (high32 00000000) on xmit-list, is not in l2rib/evpn, is not in HW
Multipath: eBGP iBGP Local
Path type: internal, path is valid, not best reason: Neighbor Address, no labeled nexthop
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
514
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Advertised path-id 2
Path type: local, path is valid, not best reason: Locally originated, multipath, no labeled
nexthop
Gateway IP: 100.0.0.11
AS-Path: 99 100 , path sourced external to AS
1.3.11.1 (metric 0) from 0.0.0.0 (1.3.11.0)
Origin IGP, MED not set, localpref 100, weight 0
Received label 3000100
Received path-id 1
Extcommunity: RT:1:3000100 ENCAP:8 Router MAC:d478.9bb3.c1a1
The following example shows how the local VNF is disabled so that the VNF from site 2 is used. The BGP
adjacency is shut down between site 1’s VTEP11 to FW11 and between VTEP12 to FW12.
leaf1(config-router)# vrf vrf100
leaf1(config-router-vrf)# neighbor 100::11
leaf1(config-router-vrf-neighbor)# shut
leaf1(config-router-vrf-neighbor)# neighbor 100::12
leaf1(config-router-vrf-neighbor)# shut
leaf1(config-router-vrf-neighbor)# neighbor 100:1::11
leaf1(config-router-vrf-neighbor)# shut
leaf1(config-router-vrf-neighbor)# neighbor 100:1::12
leaf1(config-router-vrf-neighbor)# shut
leaf1(config-router-vrf-neighbor)# neighbor 100.0.0.11
leaf1(config-router-vrf-neighbor)# shut
leaf1(config-router-vrf-neighbor)# neighbor 100.0.0.12
leaf1(config-router-vrf-neighbor)# shut
leaf1(config-router-vrf-neighbor)# neighbor 100.1.0.11
leaf1(config-router-vrf-neighbor)# shut
leaf1(config-router-vrf-neighbor)# neighbor 100.1.0.12
leaf1(config-router-vrf-neighbor)# shut
leaf1(config-router-vrf-neighbor)# end
The following example shows that the prefix now uses the VNF (FW) from site 2.
leaf1# show bgp l2vpn evpn 200.100.1.1
BGP routing table information for VRF default, address family L2VPN EVPN
Route Distinguisher: 1:3000100
BGP routing table entry for [5]:[0]:[0]:[32]:[200.100.1.1]/224, version 97269
Paths: (3 available, best #3)
Flags: (0x000002) (high32 00000000) on xmit-list, is not in l2rib/evpn, is not in HW
Multipath: eBGP iBGP Local
Path type: internal, path is valid, not best reason: Neighbor Address, no labeled nexthop
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
515
Configuring Proportional Multipath for VNF
Configuring Proportional Multipath for VNF
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
516
INDEX
A I
action forward 290, 296 import l2vpn evpn reoriginate 344, 352
address-family ipv4 unicast 49, 54, 127, 343, 344, 351, 353 import vpn unicast reoriginate 354
address-family ipv6 unicast 54, 344, 353 ingress-replication protocol bgp 28, 53
address-family l2vpn evpn 54, 55, 56, 144, 343, 345, 352, 353 ingress-replication protocol static 28
address-family vpnv4 unicast 352 interface 51
advertise 54 interface ethernet 288, 292
interface loopback 93, 95
interface ne1 199
C interface nve 23, 28, 328
cipher-suite 307 interface nve 1 57
class 328 interface nve1 93, 94
class-map 328 interface vlan 48, 298
configure maintenance profile maintenance-mode 504 ip access-group 292, 298
configure maintenance profile normal-mode 505 ip access-list 288, 289, 291, 294, 296, 298
ip address 51, 292, 298
ip port access-group 288
E ip route 0.0.0.0/0 126
ebgp-multihop 343, 352 ipv6 address 93, 95
evpn 154
K
F key 305
fabric forwarding mode anycast-gateway 292, 298 key chain 305
feature bgp 350 key-octet-string 306
feature interface-vlan 351
feature mpls l3vpn 351 M
feature mpls segment-routing 351
feature nv overlay 27, 48, 351 mac address-table static 27
feature vn-segment 48 mac-list 141, 153
feature vn-segment-vlan-based 27, 351 match 328
feature-set mpls 350 match evpn route-type 141
match extcommunity 142
match ip address 290, 295
H match mac-list 142, 153
hardware access-list tcam region arp-ether double-wide 14, 57 mcast-group 24, 52, 200
hardware access-list tcam region egr-racl 256 297 member vni 24, 28, 52, 53, 57, 200
hardware access-list tcam region ing-ifacl 256 288, 291 multisite border-gateway interface loopback 199
hardware access-list tcam region vacl 256 294, 296 multisite ingress-replication 200
host-reachability protocol bgp 51, 53, 199
N
neighbor 54, 55, 56, 144, 343, 344, 352
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
IN-1
INDEX
S U
sak-rekey-time 307 update-source 343
send-community extended 54, 55, 56, 344, 345, 352, 353
send-lifetime 306 V
service-policy type qos input 328
set evpn gateway-ip 143 vlan 23, 48, 50, 51
set extcommunity evpn rmac 143 vlan access-map 290, 294, 296
set ip next-hop 143 vn-segment 23, 48
set qos-group 328 vn-segment-vlan-based 48
show bgp evi 60 vni 49, 126, 154
show bgp l2vpn evpn 60 vrf 54
show forwarding adjacency nve platform 60 vrf context 49, 126
show forwarding route vrf 60 vrf member 51, 292, 298
show interface 271
show ip arp suppression-cache 60 W
show ip route detail vrf 61
show key chain 306 window-size 307
Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x)
IN-2