VXLAN Bridging with BGP EVPN - Step-By-Step Configuration

Поделиться
HTML-код
  • Опубликовано: 28 апр 2024
  • In this video, I have demonstrated how VXLAN bridging works with BGP EVPN. A detailed step by step demo on Arista switches.
    If you want the pdf of the slides shown in this video, email me at ccie.ots@gmail.com
    For VXLAN Bridging packet walk, watch this video:
    • VLAN Switching vs VXLA...
    12:16 Configuration Steps
    16:23 Configuration on the CLI
    ===Configurations used in this video===
    ===spine1===
    !Underlay
    ip routing
    router ospf 1
    interface Loopback0
    ip address 172.16.0.3/32
    ip ospf area 0.0.0.0
    interface Ethernet1
    no switchport
    ip address 172.16.255.0/31
    ip ospf area 0.0.0.0
    no shutdown
    interface Ethernet3
    no switchport
    ip address 172.16.255.2/31
    ip ospf area 0.0.0.0
    no shutdown
    !Overlay
    router bgp 65000
    router-id 172.16.0.3
    no bgp default ipv4-unicast
    neighbor 172.16.0.1 remote-as 65000
    neighbor 172.16.0.1 update-source Loopback0
    neighbor 172.16.0.1 description cleaf1
    neighbor 172.16.0.1 route-reflector-client
    neighbor 172.16.0.1 send-community
    neighbor 172.16.0.2 remote-as 65000
    neighbor 172.16.0.2 update-source Loopback0
    neighbor 172.16.0.2 description bleaf1
    neighbor 172.16.0.2 route-reflector-client
    neighbor 172.16.0.2 send-community
    address-family evpn
    neighbor 172.16.0.1 activate
    neighbor 172.16.0.2 activate
    ===cleaf1===
    !Underlay
    ip routing
    router ospf 1
    interface Loopback0
    ip address 172.16.0.1/32
    ip ospf area 0.0.0.0
    interface Ethernet1
    no switchport
    ip address 172.16.255.1/31
    ip ospf area 0.0.0.0
    no shutdown
    !Overlay
    router bgp 65000
    router-id 172.16.0.1
    no bgp default ipv4-unicast
    neighbor 172.16.0.3 remote-as 65000
    neighbor 172.16.0.3 update-source Loopback0
    neighbor 172.16.0.3 description spine1
    neighbor 172.16.0.3 send-community
    address-family evpn
    neighbor 172.16.0.3 activate
    interface Vxlan1
    vxlan source-interface Loopback0
    !Layer2 VPN - vlan10
    router bgp 65000
    vlan 10
    rd 172.16.0.1:10000
    route-target both 10000:10000
    redistribute learned
    interface Vxlan1
    vxlan vlan 10 vni 10000
    vlan 10
    interface Ethernet5
    switchport trunk allowed vlan 10
    switchport mode trunk
    no shutdown
    ===bleaf1===
    !Underlay
    ip routing
    router ospf 1
    interface Loopback0
    ip address 172.16.0.2/32
    ip ospf area 0.0.0.0
    interface Ethernet1
    no switchport
    ip address 172.16.255.3/31
    ip ospf area 0.0.0.0
    no shutdown
    !Overlay
    router bgp 65000
    router-id 172.16.0.2
    no bgp default ipv4-unicast
    neighbor 172.16.0.3 remote-as 65000
    neighbor 172.16.0.3 update-source Loopback0
    neighbor 172.16.0.3 description spine1
    neighbor 172.16.0.3 send-community
    address-family evpn
    neighbor 172.16.0.3 activate
    interface Vxlan1
    vxlan source-interface Loopback0
    !Layer2 VPN - vlan10
    router bgp 65000
    vlan 10
    rd 172.16.0.2:10000
    route-target both 10000:10000
    redistribute learned
    interface Vxlan1
    vxlan vlan 10 vni 10000
    vlan 10
    interface Ethernet5
    switchport trunk allowed vlan 10
    switchport mode trunk
    no shutdown
    ===server1===
    !Layer2 VPN - vlan10
    vlan 10
    interface vlan10
    ip address 172.16.10.1/24
    interface Ethernet1
    switchport trunk allowed vlan 10
    switchport mode trunk
    no shutdown
    ===server2===
    !Layer2 VPN - vlan10
    vlan 10
    interface vlan10
    ip address 172.16.10.2/24
    interface Ethernet1
    switchport trunk allowed vlan 10
    switchport mode trunk
    no shutdown
    ===Verification Commands===
    Step 1 (Underlay):
    show ip ospf neighbor
    show ip route
    Step 2 (Overlay):
    Step 2a(Control plane):
    show bgp summary
    Step 2b(Data plane):
    show interface vxlan1
    show vxlan flood vtep
    Step 3 (Layer2 VPN):
    Step 3a(Control Plane):
    show bgp evpn instance vlan 10
    show bgp evpn
    show bgp neighbors 172.16.0.3 evpn advertised-routes
    Step 3b:
    show interface vxlan1
    show vxlan flood vtep
    show mac address-table
    show vxlan address-table
  • НаукаНаука

Комментарии • 9

  • @AdouYaoMAuriceAmalaman
    @AdouYaoMAuriceAmalaman Месяц назад +1

    great explanation . Thanks alot

  • @sagartorase5154
    @sagartorase5154 Месяц назад +1

    please make a video for different vlans

  • @ferozsyed2014
    @ferozsyed2014 11 дней назад

    very informative, and kinda confusing so am going to make it lab to see how its going to work.

    • @CCIEOnTheSpectrum
      @CCIEOnTheSpectrum  11 дней назад

      Thanks. Sure practice it. Whats confusing, let me know?

    • @ferozsyed2014
      @ferozsyed2014 11 дней назад

      @CCIEOnTheSpectrum confusing part about Route dustinguser and route targets. How does it map Mac to ip and where the encapsulation and decap are happening.

    • @CCIEOnTheSpectrum
      @CCIEOnTheSpectrum  11 дней назад

      Didn't understand your question. RD/RT are just like L3VPN, RT is used to install the routes in right MAC-VRF. VNI information helps for data plane forwarding. Split the concept in 2 parts control plan and data plane, would be easier to understand then.
      MAC to IP?? leaf switches don't need to learn about IP in this case, they are just acting like a layer 2 switch as its VXLAN bridging demo.

  • @AdouYaoMAuriceAmalaman
    @AdouYaoMAuriceAmalaman Месяц назад +1

    Sir plesae share the PDF i've sent an email to you