Комментарии •

  • @steves741
    @steves741 10 месяцев назад +2

    Fabulous series, concise and to the point. Exactly the right style of presentation, no fluff to wade through and all concepts explained to just the right level of detail with minimum repetition. I'll be referring back to this series a lot in future!

  • @JoeBee999
    @JoeBee999 5 лет назад +6

    Wow. After Part 6 I now know why people goes ACI to overcome this configuration efford. Thanks for this deep look inside.

  • @patrickwilliams9255
    @patrickwilliams9255 5 лет назад +5

    Really enjoy how you go through all the configuration for both switches with explanations for the commands. Makes it easy to follow along while configuring it yourself.

  • @patrickreilly7636
    @patrickreilly7636 5 лет назад +1

    We implemented ACI about 2 years ago but having a review on the capabilities is very enlightening. Who possibly thinks up this stuff? Genius
    .

  • @lakhvirdhiman
    @lakhvirdhiman 2 месяца назад

    Thank you very much for creating this. It gives a quick and wonderful summary.

  • @templofuerte
    @templofuerte 6 лет назад +4

    Pretty good series and a kick start for anyone who is new into VXLANs. Two things worth mentioning. First if you are running a VPC between your Nexus switches you need to add a secondary IP address to your loopback0 interface, the IP is the same for both devices and will be shared if they need to communicate to other nve peers. Your VPC will fail due to consistency reasons otherwise. Second and not so important, show nve peers will have empty output until there is bidirectional traffic.

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      That's a good point Krasimir. vPC does add a whole new spin on it

  • @inswingone
    @inswingone 6 лет назад +1

    Outstanding series on VXLAN. The depth, width and clarity of topics is outstanding....

  • @laxmanbhandari6720
    @laxmanbhandari6720 4 года назад

    I was looking for tutorial to understand VxLAN and this is the best video series I found so far to understand VxLAN with lab.

  • @sameerkumar1884
    @sameerkumar1884 4 года назад +1

    Your explanation is crisp and superb. I am learning VxLAN first time and it seems closely related to traditional L2, L3 VLAN with several new added feature such as Anycast and improved MAC/ARP learning. Thanks for your video

  • @alaertevidali5648
    @alaertevidali5648 6 лет назад +2

    I agree with Dan Le words: the BEST explanation I see so far about VXLAN. Also generally the best technical video explanation I had the luck to watch. Thanks a Lot!!!!

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      You're most welcome :)
      Thanks for the great feedback, this is really encouraging

  • @moneeksembhi3776
    @moneeksembhi3776 4 года назад +1

    Watched all 6 videos, very good work. Have made notes for each video. Can see the hardwork to put these videos together that explain VXLAN un best possible way.

  • @kdeivasi
    @kdeivasi 5 лет назад +1

    I bookmarked these videos as a reference guide. Indeed it's an excellent video series on evpn

    • @NetworkDirection
      @NetworkDirection 5 лет назад

      Thanks Karthikeyan! It's good to hear you say that!

  • @Borgsquirrel
    @Borgsquirrel 5 лет назад +33

    Fantastic series, I've learned both the leaf/spine concept which several other videos failed in doing, and VxLAN! The first 4 videos were excellently paced and pedagogical, but the last 2 kind of sped up and got too much in too short time with less room left for explanation. Kind of almost threw me off there but I managed to understand most of it. If you ever redo the recordings, please revise/extend the last 2 :)

    • @ericgoodman9876
      @ericgoodman9876 3 года назад +3

      I absolutely agree with this entire post. What I had to do was slow down the recording to 75%. It was a little inconvenient, but it allowed me to keep up.

    • @SilentServiceCode
      @SilentServiceCode 3 года назад

      I agree. the last 2 really condensed a lot into a little space.

    • @atexnik
      @atexnik 2 года назад +2

      not so fantastic as it lacks precise explanation. If you understood it clearly, please explain why there are VNIs 5000 and 5005 in parallel to L3VNI 900001?

    • @suryaprakash2832
      @suryaprakash2832 Год назад

      @@atexnik Initially its very difficult to understand but its like VLAN and SVI concept... Here 5000 and 5005 are L2 VNI and to make them communicate we need a L3 VNI which is 900001.. Similarly for Tenant-2 we don't need a L3VI which is 900002 just L2VNI 6000 should be sufficient.. Correct me if I am wrong.

  • @bertrand656
    @bertrand656 2 года назад

    It is very helpful and simply described for beginners with VXLAN. I work since two weeks on VXLAN, I thought it was complicated, but with your videos, all will be clear for me in the evening when I watched the VXLAN series videos. Thank you very much !!!!!!!!!!!!! ;)

  • @jbazzari6332
    @jbazzari6332 6 лет назад +2

    PERFECT , NEVER SEEN ANYONE DESCRIBED VXLAN BETTER THAN IN THIS SERIES A+++

  • @FayOnis
    @FayOnis 6 лет назад +2

    thank you for these series. I understood finally, the diff. between the terminology and more important, the diff between DP learning and CP learning!

    • @NetworkDirection
      @NetworkDirection 6 лет назад +1

      Really good to hear that this is helping you!

  • @rfc37861
    @rfc37861 5 лет назад

    Excellent video series on VXLAN It just simply hit all the necessary keys to understanding and implementing VXLAN Thank You!!!!.

  • @vijaypillai4131
    @vijaypillai4131 5 лет назад +2

    Great Educational Videos on VXLAN . Clear & Well explained . Thank you.

  • @ashrafzakaria1267
    @ashrafzakaria1267 6 лет назад +1

    BEST explanation I see so far about VXLAN. Very good Technique. you are talented

  • @wechecha
    @wechecha 4 года назад +1

    Thanks very much. You broke down the technology I have been fighting with myself to understand. You walked me over the water to cross the pond of VXLAN :-)

  • @k3nbe
    @k3nbe Год назад

    This series has me wanting to throw together a lab! Great content and even better teaching! You just got a new subscriber.

  • @voittb4954
    @voittb4954 5 лет назад +3

    Very good content, it's clear and well explained even for a non-native English speakers. I also loved the introduction video (I'll probably re-watch arrested development tonight ;-) ). Thanks for your great work.

    • @NetworkDirection
      @NetworkDirection 5 лет назад +1

      I don't think everyone gets the Arrested Development reference 😀

  • @aroonharyani1
    @aroonharyani1 2 года назад

    Many Many thanks for making again complex topic into very simple and it cleared my basic concepts which I was struggling hard.... !!!

  • @JarrydS
    @JarrydS 5 лет назад +1

    Absolutely loved this series, we will likely be deploying vxlan in the data center this year and the way you've demonstrated it and explained it answered a few questions I had about it. Whilst the configuration is slightly complex using evpn, it's significantly less complex than our current data center network design. VXLAN actually seems to simplify things a lot.
    Would love to see more videos around services connected to your VTEPs like firewalls, load balancers, edge routers etc for external connectivity.

    • @NetworkDirection
      @NetworkDirection 5 лет назад

      Thanks Jarryd,
      There's not much that's special with external devices like firewalls, etc. They are just connected like any other host.
      Is there something specific that you were thinking of?

    • @JarrydS
      @JarrydS 5 лет назад +1

      @@NetworkDirection I'm currently about to go through a DC refresh, multi site, multihomed to two different transit providers, two pairs of load balancers and two pairs of firewalls and one pair of VPN concentrators, some vendors Suggest you connect services to the spine, others suggest you connect them to a single 'services vtep' others suggest uplinking them to two services VTEPs for redundancy etc, every vendor seems to do something different. I guess I was after a real world example, my thought process was uplink them to two VTEPs for the resiliency and treat them like any other host, which I assume is what your recommendation would be too.
      Further to that, we're a multi site design and we want to avoid a super spine layer for now, but is the best practice to link sites via a pair of "border leafs"? Because another vendor other than Cisco recommends doing DCI's on the spine.

  • @pupulmayank3823
    @pupulmayank3823 4 года назад

    Brilliant...I have to say, very nicely put together and crisply explained....Thank you so very much

  • @InderjeetSingh-pv9nz
    @InderjeetSingh-pv9nz 11 месяцев назад +2

    Part6 took most of the time to understand. Hope there can be more easier way.

  • @johngilbert7430
    @johngilbert7430 5 лет назад +1

    Thank you for explaining how Cisco does VXLAN. I had just about understood VMware NSX so this was really useful.
    Lots of new terms to use and I'll need to read more to get it straight in my head.

  • @InderjeetSingh-pv9nz
    @InderjeetSingh-pv9nz 11 месяцев назад

    You have done an excellent work in educating this complex bit.

  • @baleshyadav320
    @baleshyadav320 4 года назад

    I am very new to vxlan, this videos helped me a lot in understanding the vxlan basics including the leaf and spine switches and vni id's.

  • @anjankumar8660
    @anjankumar8660 2 года назад +1

    Superb series. Simple but great tutorial. Thank you so much.

  • @pjstevens0208
    @pjstevens0208 6 лет назад +2

    great series, well explained. best video I've seen on VXLAN, I understand much better after watching this series

  • @nktconsultingltd670
    @nktconsultingltd670 4 года назад +1

    Great series of videos covering VXLan. Thanks for taking the time to educate us lessor mortals :-)

    • @NetworkDirection
      @NetworkDirection 4 года назад

      You're very welcome. There wasn't enough intro information on this when I was looking, which is why I created this series.
      It's good to hear that it's helping.

  • @pandeyajay1983
    @pandeyajay1983 3 года назад +1

    Excellent Video and really simplified explanations !!!!

  • @DigiacomoDave
    @DigiacomoDave 2 года назад +1

    Very nice series, Thank you for this. along with the theory comes a practical example and just what I needed!

  • @luckyduckimages
    @luckyduckimages 4 года назад +1

    solid description on the VXLAN technology. Many thanks...

  • @mohammadchavoshi5568
    @mohammadchavoshi5568 Год назад +1

    really clear and categorized route map and explanations

  • @dennisbutcher7533
    @dennisbutcher7533 4 года назад +2

    You make it look easy. Thanks for the well done tutorial.

  • @AshfaqAhmad
    @AshfaqAhmad 5 лет назад +1

    A very well explained and precise video series on VxLan.
    It will be great if another video of multi-site (inter data center) can be added so it will provide more insight for data centers migration.

    • @NetworkDirection
      @NetworkDirection 5 лет назад

      It's a good idea. I haven't used multi-site yet, so I'll need a bit more research

  • @shayamar9739
    @shayamar9739 2 дня назад

    Amazing work my friend !!! Keep them going!!

  • @alvaroidrugo5346
    @alvaroidrugo5346 4 года назад +4

    I am looking at video minute 9:38 and Now I got lost, why do you use vlan 101 If it´s not in your layout? Where this VLAN 101 comes from and what for used? As far as I see, there is only vlan 1000, vlan 900 and Vlan 1001. Please explain me the reason for using vlan 101?

    • @Matheeeew
      @Matheeeew 3 года назад

      I'm confused by this as well, he seems to be skipping this exact question in the comment section as well.

  • @dushyanthpeddi9690
    @dushyanthpeddi9690 3 года назад

    Thank you very much for this series. This has helped me a lot.

  • @MrJsysco
    @MrJsysco 4 года назад

    Thanks for your explanations, examples and quick replies on comments. I would also like to put another request in for EVPN from you. Another request would be for how this underlay/overlay environment compares to Cisco ACI. I saw some of those queries in some of the others videos in this series. Thanks for series! Well done!

  • @bb-yo3ol
    @bb-yo3ol 3 года назад +1

    Excellent series, great explanation

  • @jgraue
    @jgraue 6 лет назад +1

    This Videos Series are great!! Thanks a lot for the effort on uploading such a neat work. Outstanding.

  • @vetri10
    @vetri10 3 года назад

    Excellent video for vxlan evpn

  • @kigilging
    @kigilging 6 лет назад +2

    Well explained in simple and direct way .... Thank you

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      Thanks. I hope it provides some practical use to you

  • @richardyli
    @richardyli 2 года назад

    VERY HELPFUL THANKS NETWORK DIRECTION!

  • @samansh6305
    @samansh6305 3 года назад +1

    Thanks for the video. Did we really need to add VLAN 1000/VNI 5000 to Switch02 (since there are no servers on that VLAN on that switch) or VLAN 1001/VNI 5005 to Switch01? My understanding is that when we're using "Symmetric IRBs" (that is, using a L3 VNI to route between the L2 VNIs), then we don't need to have all the L2 VNIs on all the VTEPs and that resolves scaling issues.

    • @NetworkDirection
      @NetworkDirection 3 года назад +1

      That's a good question. In the real world, yes that's right. You wouldn't need to put the VLAN/VNI on all switches. It's shown here for the example

  • @Dhanishwarrierdhwarrier
    @Dhanishwarrierdhwarrier 5 лет назад +2

    Great to begin Vxlan world. Thank you boss :)

  • @kurtmissotten5965
    @kurtmissotten5965 4 года назад +1

    Well done! Very informative and professional!

  • @ccnp2009
    @ccnp2009 Год назад

    Man that was excellent I’m ready to fire up my EVE-NG LAB

  • @yasirroony5004
    @yasirroony5004 4 года назад +1

    just a perfect series , great job !!

  • @mkisready
    @mkisready 5 лет назад

    Perfect series. Thanks a lot!. I know there is lot of information specially in this video. I need to see this particular part atleast 3 times more to absorb it properly :)

  • @isaiahh5453
    @isaiahh5453 6 лет назад +1

    Very good information this series was. I enjoyed it and learned a lot. Thanks!

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      Thanks Isaiah, it's good to hear that you enjoyed the whole series

  • @lyeong3461
    @lyeong3461 6 лет назад +4

    Thanks for the great tutorial on VXLAN. I have a question about the network diagram. In the beginning, the host on vlan 1001 has an ip of 192.168.10.20/24. At 11:23, the host IP change to 192.168.0.20/24. Is that a typo? I am trying to following along your tutorial from GNS3.

    • @cameronpaulk
      @cameronpaulk 4 года назад +1

      I noticed the same. Maybe the author can follow up to clarify for us.

    • @NetworkDirection
      @NetworkDirection 2 года назад

      yeah, that would be a typo

  • @Rubded
    @Rubded 3 года назад +1

    Loved it! Thank you.

  • @andriaginting60
    @andriaginting60 2 года назад +1

    Your explanation is very fantastic, easy to understand. May i have question to you that why you need anycast "fabric forwarding anycast-gateway-mac" while in the NVE you have set ingress-replication protocol bgp ? I hope i could have advise from you. thanks

    • @NetworkDirection
      @NetworkDirection 2 года назад

      ingress replication is how the VTEPs handle BUM traffic. The anycast gateway is so clients can use the local switch as their default gateway, regardless where in the fabric they are.

    • @andriaginting60
      @andriaginting60 2 года назад

      @@NetworkDirection Thank you for your reply, i use your topology and config in my lab. is it possible the BGP between VTEP use different AS ?

  • @goranskoc4152
    @goranskoc4152 3 года назад +1

    Very very helpfull and really nicely explained... gj man, respect!

    • @NetworkDirection
      @NetworkDirection 3 года назад

      Thanks Garan! Thanks for watching our videos! Have a great day 😀

  • @krishnapriyaakula8678
    @krishnapriyaakula8678 2 года назад +1

    Greatttt you are a Saviour...

  • @brunoguedes9715
    @brunoguedes9715 4 года назад

    This series was perfect. Good explanation! Congrats!

  • @supritchinchodikar888
    @supritchinchodikar888 6 лет назад +2

    Hello,
    I really liked the way you explain the VxLAN technology, simillarly can you make videos on EvPN as well.

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      Thanks Suprit,
      EVPN is something I need to dig into. It's on my list

  • @apkking7744
    @apkking7744 Год назад

    Thank you for the series !!

  • @y.e.2103
    @y.e.2103 7 дней назад

    Great series, i am sure you heard this before. My questions is, why there are no more content? we need ACI content, overlay security architecture examples and many more

  • @Fulblade
    @Fulblade 4 года назад +1

    great series!

  • @jeffbiggs2836
    @jeffbiggs2836 6 лет назад +1

    Really enjoyed this.....gonna watch all 6 again to get this down....

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      Nice to hear that you enjoyed it! Watch it as many times as you need 😀

  • @Slavey
    @Slavey 5 лет назад +1

    Thank you for VxLAN explanation

  • @lethedan
    @lethedan 6 лет назад +3

    Within L3VNI 90001 (separated VRF for this L3VNI): Would you please elaborate the steps involved with Hosts in VNI-L2-Domain-5000 to communicate with Hosts in VNI-L2-Domain-5005? How they use the Distributed AnyCast Gateways and L3VNI?
    Also, steps involve when Host in L3VNI 9001 to communicate with Host in L3VNI 900002?
    Thanks, Dan

    • @NetworkDirection
      @NetworkDirection 6 лет назад +2

      The L3VNI uses a VRF. This makes it a tenant boundary, like VRF's in an MPLS L3VPN. Hosts in one L3VNI will not be able to communicate with a host in another L3VNI, unless you enable route leaking (route-target import/export) or use an external router.
      Hosts within the same L3VNI, but in different L2VNI's are separated in the same way that VLANs separate hosts. Each L2VNI can have a subnet, and they are in the same routing table. This means that the switch can perform the routing natively.
      An L2VNI will have an IP address that's the same on each switch in the fabric. The host uses this IP as the default gateway. As all switches have the same IP, they become anycast gateways, as any of them can respond to first-hop requests.
      Does that help?

    • @lethedan
      @lethedan 6 лет назад +1

      L3VNI: If I have multiple VRFs/VIN-Domains within the VxLAN fabric, I need to perform L3VNI's route leaking (route-target import/export) - correct? (I think I got this part right n from your reply). But to communicate with External networks: the L3VNI of one VRF/VNI-Domain needs to exchange EBGP with external routers - correct? (I also think I got this part right from your reply)
      L2VNI: So the Distributed AnyCast Gateway is the L2VNI-IP-Address for each L2VNI-bridge-domain (similar as a SVI for a VLAN) - correct?
      L2VNI: Hosts within the same L3VNI, but in different L2VNI's are separated in the same way that VLANs separate hosts: The VxLAN perform ROUTING between L2VNI's using the "Distributed AnyCast Gateway IP addresses of each L2VNI-bridge-domain (similar as ROUTING between SVIs for different VLANs) - correct?
      L2VNI: Can I have different subnets in a L2VNI?
      Thanks,
      Dan

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      Yes, different L3VNI's are separate routing tables, so you need route leaking or an external router to communicate between them. To access an external network, you need to peer with an external router too. This might be with BGP, or an IGP with route redistribution.
      Yes, the Anycast Gateway is much like an SVI for a VLAN. The difference is that the same IP is used on all switches.
      Yes, VXLAN (L2VNI) is like enhanced VLANs. BGP can route between L2VNI's. If you are not using BGP/Control plane learning (that is, if you're using flood and learn), then you need an external router to handle routing.
      You could, in the same way that you could have different subnets in a VLAN. It's not recommended though.

  • @alexanderCRms
    @alexanderCRms 5 лет назад +3

    Excellent video, it helped me a lot, thank you a lot, this was extrmely easy to understand this time if I compare this to the training I was provided in my job haha. BTW at the end for tenant 2 I have the feeling you forgot to add the VRF for tenant 2 under BGP process. Maybe I missed I dont know but looks like working at the end :)

  • @TheRahulthukral
    @TheRahulthukral 2 года назад

    Nicely explained. Can I please request for an additional video explaining how an external network can connect to your lab topology.

    • @NetworkDirection
      @NetworkDirection 2 года назад

      Thanks for the suggestion, I'll think about that one

  • @miguelosores3524
    @miguelosores3524 4 года назад

    Fantastic, I have only had one doubt, Supress ARP is configured in order not to flood the local switch, but if the consumption of said traffic is only local, is suppress ARP necessary? Is Supress ARP a necessity when we talk about CP ??

  • @richardyli
    @richardyli 2 года назад

    I LOVED IT

  • @paredes-h
    @paredes-h 6 месяцев назад

    great series

  • @ramiromuino6835
    @ramiromuino6835 2 года назад

    Thanks a lot for sharing, very clear and useful for those who have learned VxLAN with another vendor. Do you have any example of interop Cisco-Juniper?

  • @changev1gearv125
    @changev1gearv125 2 года назад

    the best explanation and demonstration about VXLAN on RUclips.
    I am learning VXLAN from SD-Access perspective. So, the control plane is LISP in case of SD-Access instead of BGP(Of course there are other differences as well from the Data Center, including the physical topology), which I am not concerned right now. I want to know the data plane flow compared with dot1q and MPLS encapsulations. I wish I can share some images.
    So, I want to know if my summary below is accurate:
    VRF maps to L3 VNI
    VLAN maps to L2 VNI
    Also, why do you create VLANs 101 and 102 which are not in your topology or design?
    Thank you,

  • @AZADI804
    @AZADI804 3 года назад

    Nicely explained, Will be great if you can do a video on Multicast + BGP (Control Plane Learning)

  • @avkkuzmin3000
    @avkkuzmin3000 2 года назад +1

    Hi! Thanks for GREAT series! I have a question: why you've created vlans 101 amd 102 - but they are NOT used elsewhere in config?

    • @atexnik
      @atexnik 2 года назад

      I think he just messed up a lot in this config. It doesn't match the diagram. I also don't understand why there are VNI 5000/5005 in addition to L3VNI 900001?

  • @SuperBrigader
    @SuperBrigader 4 года назад

    Very good video, i enjoyed watching and learnt a lot, thank you.

  • @rakeshbelsare5000
    @rakeshbelsare5000 6 лет назад +1

    Really nice video help a lot to understand in short time...

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      That’s good to hear, thanks for the feedback

  • @gablopezuk
    @gablopezuk 3 года назад

    Love this small series you got something focus on multicast by any chance !!

    • @NetworkDirection
      @NetworkDirection 3 года назад

      Multicast is a good idea. It's already on my list of possible series to make. I just need more time in my day!

  • @Frogstomp_actual
    @Frogstomp_actual 6 лет назад +2

    Gday mate great series - no longer have access to Cisco kit just Cumulus - How does anycast play with next hop devices like Firewalls? Guessing via an exit leaf should be all sweet - looking forward to more - JB.Sydney

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      Yeah, a border leaf is exactly right. It goes a bit beyond what we've covered in this series though.
      Basically, anycast gateway is used as a first hop for hosts connected to the fabric. The switches will then need a route to the next hop. You can put this straight into BGP, or redistribute it in through some other means

  • @georgehewitt8041
    @georgehewitt8041 5 лет назад

    Your a hero my dude keep the vids up learnt alot.

  • @HomePilot
    @HomePilot 2 года назад

    Great stuff! well done!

  • @B_S123
    @B_S123 Год назад

    Hi! Thanks for this informative series. I have a question - let's assume on your network example that we do not have a e1/1 and e1/2 pointing toward a server but we have only e1/1 pointing to a standard, L2 ethernet switch capable of doing vlans. How should configuration of e1/1 look then to transport vlan 1000 between two Nexus N9K e1/1 further to switches capable of doing simple L2 vlan? Thanks in advance.

  • @georgemavimbela
    @georgemavimbela 6 лет назад +1

    Thanks So much.. I iwll try this lab on a 9000v (nxosv-final.7.0.3.I7.5) on GNS VM
    You are a Star

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      Let me know how you go! I haven’t tried it in 9000v yet

  • @jamesanojan3767
    @jamesanojan3767 5 лет назад

    Thanks for the training, its really worth it.

  • @soumyasaraswat2963
    @soumyasaraswat2963 2 года назад

    Great videos to watch!!!
    Can you please share the differences for configuring this in juniper boxes like QFX10k or ACX7k.
    Also if possible please make a video on that.
    Just out of box if you could please make a video series on evpn-mpls would love to view it.

  • @robimhof4613
    @robimhof4613 6 лет назад +1

    Thanks for this video series, it was very helpful in understanding VxLAN. Unrelated question...how did you get your putty output to show different colors rather than just one?

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      Thanks Rob,
      I get asked this question a lot, so I created a video showing how it's done:
      ruclips.net/video/fRxXiAVadA0/видео.html

  • @cmaartin39
    @cmaartin39 6 лет назад +1

    you rock!!!!! thanks for your excellent presentation.

    • @NetworkDirection
      @NetworkDirection 6 лет назад

      You're welcome Carlos, I'm glad the video made sense 🙂

  • @RaviKantGumber
    @RaviKantGumber 4 года назад

    You nailed it mate!!!

  • @Srqjan
    @Srqjan Месяц назад

    Awesome!!!

  • @sschulak07
    @sschulak07 5 лет назад +1

    Very good video. best one around!
    What is the best way to allow L3 traffic in and out from the global routing table to the tenate VRF?

    • @NetworkDirection
      @NetworkDirection 5 лет назад

      You have to be careful with mixing tenant traffic in the underlay (global routing table).
      If you're doing it to access a shared service, such as the internet, then consider adding a firewall to a border leaf. The firewall can have an interface (or subinterface) in each tenancy, and a shared 'outside' interface connected to the internet.
      This way, you still secure the boundary where your traffic mixes.

    • @sschulak07
      @sschulak07 5 лет назад +1

      @@NetworkDirection what if its just a single enterprise network thats already behind a FW? is route- leaking from global the only way to do this?

    • @NetworkDirection
      @NetworkDirection 5 лет назад +1

      I would consider using a different VRF for the underlay routing, and connecting your firewall to a leaf.
      The firewall can aggregate the traffic from the overlay to the other parts of the network (internet, WAN, etc) in global.

    • @NetworkDirection
      @NetworkDirection 5 лет назад

      I would consider using a different VRF for the underlay routing, and connecting your firewall to a leaf.
      The firewall can aggregate the traffic from the overlay to the other parts of the network (internet, WAN, etc) in global.

    • @NetworkDirection
      @NetworkDirection 5 лет назад

      I would consider using a different VRF for the underlay routing, and connecting your firewall to a leaf.
      The firewall can aggregate the traffic from the overlay to the other parts of the network (internet, WAN, etc) in global.

  • @mitrhitesh84
    @mitrhitesh84 4 года назад

    Thanks a lot for Such Nice Explaination.

  • @Shaq2k
    @Shaq2k 5 лет назад +2

    Good videos. But does this configuration work between two Catalyst 9500 as well? With differenct commandos of course.

    • @NetworkDirection
      @NetworkDirection 5 лет назад

      I haven’t had an opportunity to try, but yes.
      What you’re looking for is called the ‘campus fabric’

    • @austinlin2488
      @austinlin2488 3 года назад

      Catalyst 9500 that is use LISP plus vxlan encapsulation

  • @lolgast77
    @lolgast77 4 года назад

    Thank you, very educating.

  • @vinuradhananjaya2408
    @vinuradhananjaya2408 3 года назад +1

    Hi, It was a great explanation and good content. I watched the whole series. I'm a newbie here and one question that came to me is, if we are mapping one VLAN per VNI as recommended then doesn't the number of VNIs limited to the number of VLANs? Could you give a small example if it's not the case

    • @NetworkDirection
      @NetworkDirection 3 года назад

      Thanks for watching the series!
      The VLAN mapping is per switch, so for example, you might have VLAN 10 mapped to VNI 90010 on one switch, and VLAN 10 mapped to VNI 53010 on another switch.
      If you have a massive fabric (like AWS, Azure, GCP, etc) you can have unique VNI's across the globe. However, the VLANs only need to remain unique to the local switch or fabric.

  • @bashobchakravartty9305
    @bashobchakravartty9305 4 года назад

    Very well explained.
    Would request if you can share the configs shown here as well, This will help to lab it and do it self. Even suggest the iOS version being used here.
    Having the command shown here will be helpful to match and correct wherever required.

  • @souviksamanta8938
    @souviksamanta8938 3 года назад

    very very nice

  • @NetworkDirection
    @NetworkDirection 6 лет назад +1

    I recommend: networkdirection.net/VxLAN+EVPN+Configuration
    The book (affiliate): click.linksynergy.com/link?id=RL4E*8CmbSY&offerid=145238.2463561&type=2&murl=http%3A%2F%2Fwww.ciscopress.com%2Ftitle%2F9781587144677

  • @marijuanahehi
    @marijuanahehi 4 года назад

    Very nice! I would also like to see a configuration of VXLAN on Nx7k, using BDI.

  • @sachs8379
    @sachs8379 2 года назад +1

    Thanks bro!