Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Centrally-Routed Bridging Overlay Design and Implementation

date_range 21-Jun-24

A centrally-routed bridging (CRB) overlay performs routing at a central location in the EVPN network as shown in Figure 1, In this example, IRB interfaces are configured in the overlay at each spine device to route traffic between the VLANs that originate at the leaf devices and end systems. For an overview of CRB overlays, see the Centrally-Routed Bridging Overlay section in Data Center Fabric Blueprint Architecture Components.

Figure 1: CRB Overlay CRB Overlay

The following sections provide the detailed steps of how to implement a CRB overlay:

Configuring a VLAN-Aware CRB Overlay in the Default Instance

The VLAN-aware CRB overlay is a basic overlay supported on all platforms included in this reference design. It uses the simplest VLAN-aware method to enable a single, default switching instance that supports up to 4094 VLANs.

As shown in Figure 2, you configure VLANs at the leaf devices, and IRB interfaces for routing at the spine devices. Such configuration is placed in the default switching instance at the [edit vlans], [edit interfaces], [edit protocols evpn], and [edit switch-options] hierarchy levels. Routing instances are not required for this overlay style, but can be implemented as an option depending on the needs of your network.

Figure 2: VLAN-Aware CRB Overlay VLAN-Aware CRB Overlay

When you implement this style of overlay on a spine device, you:

  • Configure IRB interfaces to route traffic between Ethernet virtual network instances.

  • Set virtual gateway addresses.

  • Add VXLAN features to optimize traffic paths.

  • Configure EVPN with VXLAN encapsulation in the default switching instance or in a routing instance.

  • Set the loopback interface as the VTEP source interface.

  • Configure route distinguishers and route targets to direct traffic to peers.

  • Map VLANs to VNIs.

When you implement this style of overlay on a leaf device, you:

  • Configure Ethernet Segment Identifier (ESI) settings.

  • Enable EVPN with VXLAN encapsulation in the default switching instance.

  • Establish route targets and route distinguishers.

  • Map VLANs to VNIs.

For an overview of VLAN-aware CRB overlays, see the Centrally-Routed Bridging Overlay section in Data Center Fabric Blueprint Architecture Components.

If you need to implement more than 4094 VLANs, you can use a CRB overlay with virtual switches (available on switches in the QFX10000 line) or MAC-VRF instances. See Configuring a VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances. With MAC-VRF instances, you expand your options to either isolate traffic between tenant systems or to enable routing and forwarding between tenant systems.

The following sections provide the detailed steps of how to configure and verify the VLAN-aware CRB overlay in the default switching instance:

Configuring a VLAN-Aware CRB Overlay in the Default Instance on the Spine Device

To configure a VLAN-aware CRB overlay in the default switching instance on a spine device, perform the following:

Note:

The following example shows the configuration for Spine 1, as shown in Figure 3.

Figure 3: VLAN-Aware CRB Overlay in the Default Instance – Spine Device VLAN-Aware CRB Overlay in the Default Instance – Spine Device
  1. Ensure the IP fabric underlay is in place. To configure an IP fabric on a spine device, see IP Fabric Underlay Network Design and Implementation.
  2. Confirm that your IBGP overlay is up and running. To configure an IBGP overlay on your spine devices, see Configure IBGP for the Overlay.
  3. Configure the VTEP tunnel endpoint as the loopback address, and add a route distinguisher and a route target (target:64512:1111). Also, keep your configuration simple by using the auto route target option, which uses one target for both import and export.

    Spine 1:

    content_copy zoom_out_map
    set switch-options vtep-source-interface lo0.0
    set switch-options route-distinguisher 192.168.0.1:1
    set switch-options vrf-target target:64512:1111
    set switch-options vrf-target auto
    
  4. Configure IRB interfaces for each VNI and the corresponding virtual gateway address (which uses .254 in the 4th octet for each prefix). Include VXLAN features, such as proxy-macip-advertisement and virtual-gateway-accept-data, to improve performance and manageability.
    Note:
    • We strongly recommend you set the proxy-macip-advertisement option on the spine devices in a CRB fabric. This option enables one central gateway (the spine device) to send both MAC address and IP address information (ARP entries) that it learns locally to the other central gateways. This operation is called ARP synchronization. Setting this option ensures that ARP synchronization happens efficiently if any leaf devices in the fabric advertise only the MAC addresses in their EVPN Type 2 route advertisements for their connected hosts. This setting improves convergence times and traffic handling in the fabric.

    • You must configure both the virtual-gateway-accept-data statement and the preferred IPv4 and IPv6 addresses to use the ping operation and verify connectivity to the virtual gateway IP address from the end system.

    Spine 1:

    content_copy zoom_out_map
    set interfaces irb unit 100 family inet address 10.1.0.1/24 virtual-gateway-address 10.1.0.254
    set interfaces irb unit 100 family inet address 10.1.0.1/24 preferred
    set interfaces irb unit 100 proxy-macip-advertisement
    set interfaces irb unit 100 virtual-gateway-accept-data
    set interfaces irb unit 100 family inet6 address 2001:db8::10:1:0:1/112 virtual-gateway-address 2001:db8::10:1:0:254
    set interfaces irb unit 100 family inet6 address fe80::10:1:0:254/112
    set interfaces irb unit 200 family inet address 10.1.1.1/24 virtual-gateway-address 10.1.1.254
    set interfaces irb unit 200 family inet address 10.1.1.1/24 preferred
    set interfaces irb unit 200 proxy-macip-advertisement
    set interfaces irb unit 200 virtual-gateway-accept-data
    set interfaces irb unit 200 family inet6 address 2001:db8::10:1:1:1/112 virtual-gateway-address 2001:db8::10:1:1:254
    set interfaces irb unit 200 family inet6 address fe80::10:1:1:254/112
    set interfaces irb unit 300 family inet address 10.1.2.1/24 virtual-gateway-address 10.1.2.254
    set interfaces irb unit 300 family inet address 10.1.2.1/24 preferred
    set interfaces irb unit 300 proxy-macip-advertisement
    set interfaces irb unit 300 virtual-gateway-accept-data
    set interfaces irb unit 300 family inet6 address 2001:db8::10:1:2:1/112 virtual-gateway-address 2001:db8::10:1:2:254
    set interfaces irb unit 300 family inet6 address fe80::10:1:2:254/112
    set interfaces irb unit 400 family inet address 10.1.3.1/24 virtual-gateway-address 10.1.3.254
    set interfaces irb unit 400 family inet address 10.1.3.1/24 preferred
    set interfaces irb unit 400 proxy-macip-advertisement
    set interfaces irb unit 400 virtual-gateway-accept-data
    set interfaces irb unit 400 family inet6 address 2001:db8::10:1:3:1/112 virtual-gateway-address 2001:db8::10:1:3:254
    set interfaces irb unit 400 family inet6 address fe80::10:1:3:254/112
    
  5. Configure a secondary logical unit on the loopback interface for the default switching instance.

    Spine 1:

    content_copy zoom_out_map
    set interfaces lo0 unit 1 family inet address 192.168.0.101/32
    
  6. Configure EVPN with VXLAN encapsulation. Include the no-gateway-community option to advertise the virtual gateway and IRB MAC addresses to the EVPN peer devices so that Ethernet-only PE devices can learn these MAC addresses.

    Spine 1:

    content_copy zoom_out_map
    set protocols evpn encapsulation vxlan
    set protocols evpn default-gateway no-gateway-community
    set protocols evpn extended-vni-list all
    
  7. Configure mapping between VLANs and VXLAN VNIs.

    Spine 1:

    content_copy zoom_out_map
    set vlans VNI_10000 vlan-id 100
    set vlans VNI_10000 l3-interface irb.100
    set vlans VNI_10000 vxlan vni 10000
    set vlans VNI_20000 vlan-id 200
    set vlans VNI_20000 l3-interface irb.200
    set vlans VNI_20000 vxlan vni 20000
    set vlans VNI_30000 vlan-id 300
    set vlans VNI_30000 l3-interface irb.300
    set vlans VNI_30000 vxlan vni 30000
    set vlans VNI_40000 vlan-id 400
    set vlans VNI_40000 l3-interface irb.400
    set vlans VNI_40000 vxlan vni 40000
    
  8. Configure a routing instance named VRF 1, and map IRB interfaces irb.100 (VNI 10000) and irb.200 (VNI 20000) to this instance.
    Note:

    Because the irb.300 (VNI 30000) and irb.400 (VNI 40000) interfaces are not configured inside a routing instance, they are part of the default switching instance for the spine devices. The end result of your configuration should match the diagram shown in Figure 3.

    Spine 1:

    content_copy zoom_out_map
    set routing-instances VRF_1 instance-type vrf
    set routing-instances VRF_1 interface irb.100
    set routing-instances VRF_1 interface irb.200
    set routing-instances VRF_1 interface lo0.1
    set routing-instances VRF_1 route-distinguisher 192.168.0.1:100
    set routing-instances VRF_1 vrf-target target:62273:10000
    

Verifying the VLAN-Aware CRB Overlay in the Default Instance for the Spine Device

Issue the following commands to verify that the overlay is working properly on your spine devices:

  1. Verify the IRB interfaces are operational for both IPv4 and IPv6.
    content_copy zoom_out_map
    user@spine-1> show interfaces terse irb
    Interface               Admin Link Proto    Local                 Remote
    irb                     up    up
    irb.100                 up    up   inet     10.1.0.1/24     
                                       inet6    2001:db8::10:1:0:1/112
                                                fe80::10:1:0:254/112
    irb.200                 up    up   inet     10.1.1.1/24     
                                       inet6    2001:db8::10:1:1:1/112
                                                fe80::10:1:1:254/112
    irb.300                 up    up   inet     10.1.2.1/24     
                                       inet6    2001:db8::10:1:2:1/112
                                                fe80::10:1:2:254/112
    irb.400                 up    up   inet     10.1.3.1/24     
                                       inet6    2001:db8::10:1:3:1/112
                                                fe80::10:1:3:254/112
  2. Verify that the VTEP interfaces are up.
    content_copy zoom_out_map
    user@spine-1> show interfaces terse vtep
    Interface               Admin Link Proto    Local                 Remote
    vtep                    up    up
    vtep.32768              up    up  
    vtep.32769              up    up   eth-switch
    vtep.32770              up    up   eth-switch
    vtep.32771              up    up   eth-switch
    vtep.32772              up    up   eth-switch
    ...
    vtep.32804              up    up   eth-switch
    ---(more)--- 
    
    user@spine-1> show interfaces terse vtep | match eth-switch | count
    Count: 109 lines
  3. Verify the endpoint destination IP address for the VTEP interfaces. The spine devices display their VTEPs as loopback addresses in the range of 192.168.0.x (1 - 4) and the leaf devices display their VTEPs as loopback addresses in the range of 192.168.1.x (1 - 96).
    content_copy zoom_out_map
    user@spine-1> show interfaces vtep
    Physical interface: vtep, Enabled, Physical link is Up
      Interface index: 240, SNMP ifIndex: 504
      Type: Software-Pseudo, Link-level type: VxLAN-Tunnel-Endpoint, MTU: Unlimited, Speed: Unlimited
      Device flags   : Present Running
      Link type      : Full-Duplex
      Link flags     : None
      Last flapped   : Never
        Input packets : 0
        Output packets: 0
    
      Logical interface vtep.32768 (Index 670) (SNMP ifIndex 505)
        Flags: Up SNMP-Traps 0x4000 Encapsulation: ENET2
        VXLAN Endpoint Type: Source, VXLAN Endpoint Address: 192.168.0.1, L2 Routing Instance: default-switch, L3 Routing Instance: default
        Input packets : 0
        Output packets: 0
    
    ...
    
      Logical interface vtep.32771 (Index 802) (SNMP ifIndex 536)
        Flags: Up SNMP-Traps Encapsulation: ENET2
        VXLAN Endpoint Type: Remote, VXLAN Endpoint Address: 192.168.1.4, L2 Routing Instance: default-switch, L3 Routing Instance: default
        Input packets : 1979
        Output packets: 9867
        Protocol eth-switch, MTU: Unlimited
    ---(more)---
  4. Verify that the spine device has all the routes to the leaf devices.
    content_copy zoom_out_map
    user@spine-2> show route 192.168.1.1
    
    inet.0: 446 destinations, 19761 routes (446 active, 0 holddown, 0 hidden)
    + = Active Route, - = Last Active, * = Both
    
    192.168.1.1/32     *[BGP/170] 00:06:29, localpref 100
                          AS path: 4200000011 I, validation-state: unverified
                        > to 172.16.1.5 via ae1.0
                        [BGP/170] 00:06:22, localpref 100
                          AS path: 4200000023 4200000004 4200000011 I, validation-state: unverified
                        > to 172.16.13.5 via ae13.0
    
                         ...
    
                         [BGP/170] 00:06:18, localpref 100
                          AS path: 4200000032 4200000004 4200000011 I, validation-state: unverified
                        > to 172.16.22.5 via ae22.0
    ---(more)---
  5. Verify that each end system resolves the virtual gateway MAC address for a subnet using the gateway IRB address on the central gateways (spine devices).
    content_copy zoom_out_map
    user@spine-1> show arp no-resolve vpn VRF_1
    MAC Address       Address         Interface         Flags
    06:4b:8c:cd:13:f8 10.1.0.2        irb.100 [vtep.32796]     none  ## Spine 2 IRB interface
    06:4b:8c:cd:c4:38 10.1.0.3        irb.100 [vtep.32878]     none  ## Spine 3 IRB interface
    06:38:e1:6f:30:29 10.1.0.4        irb.100 [vtep.32821]     none  ## Spine 4 IRB interface02:0c:10:01:02:01 10.1.0.201      irb.100 [.local..11]     none  ## End system behind the QFX5100s
    02:0c:10:01:02:02 10.1.0.202      irb.100 [.local..11]     none  ## End system behind the QFX5110s
    02:0c:10:01:02:03 10.1.0.203      irb.100 [.local..11]     none  ## End system behind the QFX5200s
    02:0c:10:01:02:04 10.1.0.204      irb.100 [.local..11]     none  ## End system behind the QFX10002s 
    00:00:5e:00:01:01 10.1.0.254      irb.100                  permanent published gateway
                                                               ## Virtual gateway IP and MAC address
    06:4b:8c:cd:13:f8 10.1.1.2        irb.200 [vtep.32796]     none
    06:4b:8c:cd:c4:38 10.1.1.3        irb.200 [vtep.32878]     none
    06:38:e1:6f:30:29 10.1.1.4        irb.200 [vtep.32821]     none
    0e:ad:10:02:00:01 10.1.1.101      irb.200 [vtep.32776]     none
    user@spine-1> show ipv6 neighbors
    IPv6 Address                 Linklayer Address  State       Exp Rtr Secure Interface
    2001:db8::10:1:0:2           06:4b:8c:cd:13:f8  stale       325 no  no      irb.100 [vtep.32796]
    2001:db8::10:1:0:3           06:4b:8c:cd:c4:38  stale       514 yes no      irb.100 [vtep.32878]
    2001:db8::10:1:0:4           06:38:e1:6f:30:29  stale       326 no  no      irb.100 [vtep.32821]
    2001:db8::10:1:0:201         02:0c:10:01:02:01  stale       1114 no no      irb.100 [.local..11]
    2001:db8::10:1:0:202         02:0c:10:01:02:02  stale       443 no  no      irb.100 [.local..11]
    2001:db8::10:1:0:203         02:0c:10:01:02:03  stale       853 no  no      irb.100 [.local..11]
    2001:db8::10:1:0:204         02:0c:10:01:02:04  stale       1181 no no      irb.100 [.local..11]
    2001:db8::10:1:0:254         00:00:5e:00:02:01  reachable   0   no  no      irb.100     
    2001:db8::10:1:1:2           06:4b:8c:cd:13:f8  stale       325 no  no      irb.200 [vtep.32796]
    2001:db8::10:1:1:3           06:4b:8c:cd:c4:38  stale       514 yes no      irb.200 [vtep.32878]
    2001:db8::10:1:1:4           06:38:e1:6f:30:29  stale       326 no  no      irb.200 [vtep.32821]
    2001:db8::10:1:1:201         02:0c:10:02:02:01  stale       1121 no no      irb.200 [.local..11]
    2001:db8::10:1:1:202         02:0c:10:02:02:02  stale       423 no  no      irb.200 [.local..11]
    2001:db8::10:1:1:203         02:0c:10:02:02:03  stale       1081 no no      irb.200 [.local..11]
    2001:db8::10:1:1:204         02:0c:10:02:02:04  stale       1167 no no      irb.200 [.local..11]
  6. Verify the switching table for VNI 10000 to see entries for end systems and the other spine devices.
    content_copy zoom_out_map
    user@spine-1> show ethernet-switching table vlan-id 100
    
    MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static
               SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC)
    
    
    Ethernet switching table : 105 entries, 105 learned
    Routing instance : default-switch
       Vlan                MAC                 MAC      Logical              Active
       name                address             flags    interface            source
       VNI_10000           00:00:5e:00:01:01   DR       esi.2453             05:19:17:f3:41:00:00:27:10:00 
    
    ## Entries for the spine devices
       VNI_10000           06:4b:8c:cd:13:f8   D        vtep.32796           192.168.0.2                   
       VNI_10000           06:4b:8c:cd:c4:38   D        vtep.32878           192.168.0.3                   
       VNI_10000           06:38:e1:6f:30:29   D        vtep.32821           192.168.0.4                   
    ## The next four MAC addresses belong to the end systems
    connected to Leaf 1 - 3 (QFX5100), Leaf 4-6 (QFX5110), Leaf 7-9 (QFX5200),
    and Leaf 10-12 (QFX10002).
       VNI_10000           02:0c:10:01:02:01   DR       esi.2443             00:00:00:00:00:00:51:00:00:01 
       VNI_10000           02:0c:10:01:02:02   DR       esi.2497             00:00:00:00:00:00:51:10:00:01 
       VNI_10000           02:0c:10:01:02:03   DR       esi.2427             00:00:00:00:00:00:52:00:00:01 
       VNI_10000           02:0c:10:01:02:04   DR       esi.2610             00:00:00:00:00:01:00:00:00:01 
       ...   
       VNI_10000           0e:ad:10:01:00:02   D        vtep.32814           192.168.1.96
  7. Verify MAC address and ARP information learned from the leaf devices over the control plane.
    content_copy zoom_out_map
    user@spine-1> show evpn database mac-address 02:0c:10:01:02:01 extensive
    Instance: default-switch
    
    VN Identifier: 10000, MAC address:: 02:0c:10:01:02:01
      Source: 00:00:00:00:00:00:51:00:00:01, Rank: 1, Status: Active
        Remote origin: 192.168.1.2  ## Leaf 2 and Leaf 3 advertised this route   
        Remote origin: 192.168.1.3
        Timestamp: Jul 13 23:35:37 (0x59686639)
        State: <Remote-To-Local-Adv-Done>
        IP address: 10.1.0.201  ## MAC Address + IP   
          Flags: <Proxy>
          Remote origin: 192.168.1.2
          Remote origin: 192.168.1.3
        IP address: 2001:db8::10:1:0:201   ## MAC Address + IPv6
          Remote origin: 192.168.1.2
          Remote origin: 192.168.1.3    History db: 
          Time                  Event
          Jul 13 23:35:38 2017  Applying remote state to peer 192.168.1.2
          Jul 13 23:35:38 2017  Remote peer 192.168.1.2 updated
          Jul 13 23:35:38 2017  MAC+IP not updated, source l2ald is not owner (type2)
          Jul 13 23:35:38 2017  Updated
          Jul 13 23:35:38 2017  No change to MAC state
          Jul 13 23:35:38 2017  Applying remote state to peer 192.168.1.3
          Jul 13 23:35:38 2017  Remote peer 192.168.1.3 updated
          Jul 13 23:35:38 2017  MAC+IP not updated, source l2ald is not owner (type2)
          Jul 13 23:35:38 2017  Updated
          Jul 13 23:35:38 2017  No change to MAC state
  8. Verify the remote VXLAN tunnel end points.
    content_copy zoom_out_map
    user@spine-1> show ethernet-switching vxlan-tunnel-end-point remote
    Logical System Name       Id  SVTEP-IP         IFL   L3-Idx
    <default>                 0   192.168.0.1      lo0.0    0  
     RVTEP-IP         IFL-Idx   NH-Id
     192.168.1.1      827       2444     
        VNID          MC-Group-IP      
        10000         0.0.0.0         
        20000         0.0.0.0         
        30000         0.0.0.0         
        40000         0.0.0.0         
     RVTEP-IP         IFL-Idx   NH-Id
    ... 
    RVTEP-IP         IFL-Idx   NH-Id
     192.168.1.96      812       2428     
        VNID          MC-Group-IP      
        10000         0.0.0.0         
        20000         0.0.0.0         
        30000         0.0.0.0         
        40000         0.0.0.0         
    
  9. Verify that MAC addresses are learned through the VXLAN tunnel.
    content_copy zoom_out_map
    user@spine-1> show ethernet-switching vxlan-tunnel-end-point remote mac-table
    
    MAC flags (S -static MAC, D -dynamic MAC, L -locally learned, C -Control MAC
               SE -Statistics enabled, NM -Non configured MAC, R -Remote PE MAC, P -Pinned MAC)
    
    Logical system   : <default>
    Routing instance : default-switch
     Bridging domain : VNI_10000+100, VLAN : 100, VNID : 10000
       MAC                 MAC      Logical          Remote VTEP
       address             flags    interface        IP address
       02:0c:10:01:02:03   DR       esi.2427         192.168.1.8 192.168.1.7 192.168.1.9 
       02:0c:10:01:02:01   DR       esi.2443         192.168.1.2 192.168.1.3
    ## This next entry shows that the virtual gateway MAC address
    of 00:00:5e:00:01:01 has been learned by
    the other spine devices. 
       00:00:5e:00:01:01   DR       esi.2453         192.168.0.3 192.168.0.4 192.168.0.2 
       02:0c:10:01:02:02   DR       esi.2497         192.168.1.6 192.168.1.4 
       02:0c:10:01:02:04   DR       esi.2610         192.168.1.12 192.168.1.10 192.168.1.11 
       06:4b:8c:cd:13:f8   D        vtep.32796       192.168.0.2  
    ---(more)---

Configuring a VLAN-Aware CRB Overlay in the Default Instance on the Leaf Device

To configure a VLAN-aware CRB overlay in the default switching instance on a leaf device, perform the following:

Note:
  • The following example shows the configuration for Leaf 1, as shown in Figure 4.

Figure 4: VLAN-Aware CRB Overlay in the Default Instance – Leaf Device VLAN-Aware CRB Overlay in the Default Instance – Leaf Device
  1. Ensure the IP fabric underlay is in place. To configure an IP fabric on a leaf device, see IP Fabric Underlay Network Design and Implementation.
  2. Confirm that your IBGP overlay is up and running. To configure an IBGP overlay on your leaf device, see Configure IBGP for the Overlay.
  3. Configure the EVPN protocol with VXLAN encapsulation, and specify the VTEP source interface (in this case, the loopback interface of the leaf device).

    Leaf 1:

    content_copy zoom_out_map
    set protocols evpn encapsulation vxlan
    set protocols evpn extended-vni-list all
    set switch-options vtep-source-interface lo0.0
    
  4. Define an EVPN route target and route distinguisher, and use the auto option to derive route targets automatically. Setting these parameters specifies how the routes are imported and exported. The import and export of routes from a routing or bridging table is the basis for dynamic overlays. In this case, members of the global BGP community with a route target of target:64512:1111 participate in the exchange of EVPN-VXLAN information.

    Leaf 1:

    content_copy zoom_out_map
    set switch-options route-distinguisher 192.168.1.1:1
    set switch-options vrf-target target:64512:1111
    set switch-options vrf-target auto
    
  5. Configure ESI settings on all similar leaf devices. Because the end systems in this reference design are multihomed to three leaf devices per device type cluster (such as QFX5100), you must configure the same ESI identifier and LACP system identifier on all three leaf devices for each unique end system. Unlike other topologies where you would configure a different LACP system identifier per leaf device and have VXLAN select a single designated forwarder, use the same LACP system identifier to allow the 3 leaf devices to appear as a single LAG to a multihomed end system. In addition, use the same aggregated Ethernet interface number for all ports included in the ESI.

    The configuration for Leaf 1 is shown below, but you must replicate this configuration on both Leaf 2 and Leaf 3 per the topology shown in Figure 5.

    Tip:

    When you create an ESI number, always set the high order octet to 00 to indicate the ESI is manually created. The other 9 octets can be any hexadecimal value from 00 to FF.

    Figure 5: ESI Topology for Leaf 1, Leaf 2, and Leaf 3 ESI Topology for Leaf 1, Leaf 2, and Leaf 3

    Leaf 1:

    content_copy zoom_out_map
    set interfaces ae11 esi 00:00:00:00:00:00:51:00:00:01
    set interfaces ae11 esi all-active
    set interfaces ae11 aggregated-ether-options lacp system-id 00:00:51:00:00:01
    set interfaces xe-0/0/10 ether-options 802.3ad ae11
    set interfaces xe-1/0/10 ether-options 802.3ad ae11
    
  6. Configure VLANs and map them to VNIs. This step enables the VLANs to participate in VNIs across the EVPN-VXLAN domain.

    Leaf 1:

    content_copy zoom_out_map
    set vlans VNI_10000 vlan-id 100
    set vlans VNI_10000 vxlan vni 10000
    set vlans VNI_20000 vlan-id 200
    set vlans VNI_20000 vxlan vni 20000
    set vlans VNI_30000 vlan-id 300
    set vlans VNI_30000 vxlan vni 30000
    set vlans VNI_40000 vlan-id 400
    set vlans VNI_40000 vxlan vni 40000
    

Verifying the VLAN-Aware CRB Overlay in the Default Instance for the Leaf Device

Issue the following commands to verify that the overlay is working properly on your leaf devices:

  1. Verify the interfaces are operational.
    content_copy zoom_out_map
    user@leaf-1> show interfaces terse | match ae.*
    xe-0/0/10.0             up    up   aenet    --> ae11.0
    et-0/0/48.0             up    up   aenet    --> ae1.0
    et-0/0/49.0             up    up   aenet    --> ae2.0
    et-0/0/50.0             up    up   aenet    --> ae3.0
    et-0/0/51.0             up    up   aenet    --> ae4.0
    xe-1/0/10.0             up    up   aenet    --> ae11.0
    et-1/0/48.0             up    up   aenet    --> ae1.0
    et-1/0/49.0             up    up   aenet    --> ae2.0
    et-1/0/50.0             up    up   aenet    --> ae3.0
    et-1/0/51.0             up    up   aenet    --> ae4.0
    ae1                     up    up  ## To Spine 1
    ae1.0                   up    up   inet     172.16.1.1/30
    ae2                     up    up  ## To Spine 2
    ae2.0                   up    up   inet     172.16.1.5/30
    ae3                     up    up  ## To Spine 3
    ae3.0                   up    up   inet     172.16.1.9/30   
    ae4                     up    up  ## To Spine 4
    ae4.0                   up    up   inet     172.16.1.13/30  
    ae11                    up    up  ## To End System
    ae11.0                  up    up   eth-switch
    user@leaf-1> show lacp interfaces
    Aggregated interface: ae1
        LACP state:       Role   Exp   Def  Dist  Col  Syn  Aggr  Timeout  Activity
          et-0/0/48      Actor    No    No   Yes  Yes  Yes   Yes     Fast    Active
          et-0/0/48    Partner    No    No   Yes  Yes  Yes   Yes     Fast    Active
          et-1/0/48      Actor    No    No   Yes  Yes  Yes   Yes     Fast    Active
          et-1/0/48    Partner    No    No   Yes  Yes  Yes   Yes     Fast    Active
        LACP protocol:        Receive State  Transmit State          Mux State 
          et-0/0/48                 Current   Fast periodic Collecting distributing
          et-1/0/48                 Current   Fast periodic Collecting distributing
    
    
    ...
    
    Aggregated interface: ae11
        LACP state:       Role   Exp   Def  Dist  Col  Syn  Aggr  Timeout  Activity
          xe-0/0/10      Actor    No    No   Yes  Yes  Yes   Yes     Fast    Active
          xe-0/0/10    Partner    No    No   Yes  Yes  Yes   Yes     Fast    Active
          xe-1/0/10      Actor    No    No   Yes  Yes  Yes   Yes     Fast    Active
          xe-1/0/10    Partner    No    No   Yes  Yes  Yes   Yes     Fast    Active
        LACP protocol:        Receive State  Transmit State          Mux State 
          xe-0/0/10                 Current   Fast periodic Collecting distributing
          xe-1/0/10                 Current   Fast periodic Collecting distributing
  2. Verify that the EVPN routes are being learned through the overlay.
    Note:
    • Only selected excerpts of this output are displayed.

    • The format of the EVPN routes is EVPN-route-type:route-distinguisher:vni:mac-address.

    content_copy zoom_out_map
    user@leaf-1> show route table bgp.evpn.0 evpn-ethernet-tag-id 10000
    
    bgp.evpn.0: 828 destinations, 3169 routes (827 active, 0 holddown, 4 hidden)
    + = Active Route, - = Last Active, * = Both
    
    ## Spine 1: Virtual Gateway MAC Address for IPv4
    2:192.168.0.1:1::10000::00:00:5e:00:01:01/304 MAC/IP
                       *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:33:39, localpref 100, from 192.168.0.2
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:31:15, localpref 100, from 192.168.0.3
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:29:41, localpref 100, from 192.168.0.4
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
    ## Spine 1: Virtual Gateway MAC Address for IPv6
    2:192.168.0.1:1::10000::00:00:5e:00:02:01/304 MAC/IP
                       *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:33:39, localpref 100, from 192.168.0.2
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:31:15, localpref 100, from 192.168.0.3
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:29:41, localpref 100, from 192.168.0.4
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
    ## Spine 1: IRB MAC Address
    2:192.168.0.1:1::10000::06:4b:8c:67:0f:f0/304 MAC/IP
                       *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:33:39, localpref 100, from 192.168.0.2
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:31:15, localpref 100, from 192.168.0.3
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:29:41, localpref 100, from 192.168.0.4
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
    ## Spine 1: ARP for the virtual gateway
    2:192.168.0.1:1::10000::00:00:5e:00:01:01::10.1.0.254/304 MAC/IP
                       *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:33:39, localpref 100, from 192.168.0.2
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:31:15, localpref 100, from 192.168.0.3
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:29:41, localpref 100, from 192.168.0.4
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
    ## Spine 1: IRB IPv4 ARP
    2:192.168.0.1:1::10000::06:4b:8c:67:0f:f0::10.1.0.1/304 MAC/IP
                       *[BGP/170] 00:04:50, localpref 100, from 192.168.0.1
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 00:04:50, localpref 100, from 192.168.0.2
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 00:04:50, localpref 100, from 192.168.0.3
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 00:04:50, localpref 100, from 192.168.0.4
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
    ## Spine 2: ARP for the virtual gateway
    2:192.168.0.2:1::10000::00:00:5e:00:01:01::10.1.0.254/304 MAC/IP      
                       *[BGP/170] 07:55:22, localpref 100, from 192.168.0.2
                          AS path: I, validation-state: unverified
                        > to 172.16.1.6 via ae2.0
                        [BGP/170] 07:33:39, localpref 100, from 192.168.0.1
                          AS path: I, validation-state: unverified
                        > to 172.16.1.6 via ae2.0
                        [BGP/170] 07:31:11, localpref 100, from 192.168.0.3
                          AS path: I, validation-state: unverified
                        > to 172.16.1.6 via ae2.0
                        [BGP/170] 07:29:37, localpref 100, from 192.168.0.4
                          AS path: I, validation-state: unverified
                        > to 172.16.1.6 via ae2.0
    ## Spine 2: IRB IPv4 ARP
    2:192.168.0.2:1::10000::06:4b:8c:cd:13:f8::10.1.0.2/304 MAC/IP
                       *[BGP/170] 07:55:22, localpref 100, from 192.168.0.2
                          AS path: I, validation-state: unverified
                        > to 172.16.1.6 via ae2.0
                        [BGP/170] 07:33:39, localpref 100, from 192.168.0.1
                          AS path: I, validation-state: unverified
                        > to 172.16.1.6 via ae2.0
                        [BGP/170] 07:31:11, localpref 100, from 192.168.0.3
                          AS path: I, validation-state: unverified
                        > to 172.16.1.6 via ae2.0
                        [BGP/170] 07:29:37, localpref 100, from 192.168.0.4
                          AS path: I, validation-state: unverified
                        > to 172.16.1.6 via ae2.0
    ## Spine 1: IPv6 ARP for the virtual gateway
    2:192.168.0.1:1::10000::00:00:5e:00:02:01::2001:db8::10:1:0:254/304 MAC/IP
                       *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:33:39, localpref 100, from 192.168.0.2
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:31:15, localpref 100, from 192.168.0.3
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:29:41, localpref 100, from 192.168.0.4
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
    ## Spine 1: IRB IPv6 ARP
    2:192.168.0.1:1::10000::06:4b:8c:67:0f:f0::2001:db8::10:1:0:1/304 MAC/IP
                       *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:33:39, localpref 100, from 192.168.0.2
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:31:15, localpref 100, from 192.168.0.3
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
                        [BGP/170] 07:29:41, localpref 100, from 192.168.0.4
                          AS path: I, validation-state: unverified
                        > to 172.16.1.2 via ae1.0
    
    ...
  3. Verify on Leaf 1 and Leaf 3 that the Ethernet switching table has installed both the local MAC addresses and the remote MAC addresses learned through the overlay.
    Note:

    To identify end systems learned remotely from the EVPN overlay, look for the MAC address, ESI logical interface, and ESI number. For example, Leaf 1 learns about an end system with the MAC address of 02:0c:10:03:02:02 through esi.1885. This end system has an ESI number of 00:00:00:00:00:00:51:10:00:01. Consequently, this matches the ESI number configured for Leaf 4, 5, and 6 (QFX5110 switches), so we know that this end system is multihomed to these three leaf devices.

    content_copy zoom_out_map
    user@leaf-1> show ethernet-switching table vlan-id 300
    
    MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static
               SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC)
    
    
    Ethernet switching table : 10 entries, 10 learned
    Routing instance : default-switch
       Vlan                MAC                 MAC      Logical              Active
       name                address             flags    interface            source
       VNI_30000           00:00:5e:00:01:01   DR       esi.1679             05:19:17:f3:41:00:00:75:30:00 
       VNI_30000           00:00:5e:00:02:01   DR       esi.1679             05:19:17:f3:41:00:00:75:30:00 
       VNI_30000           06:4b:8c:67:0f:f0   D        vtep.32770           192.168.0.1                   
       VNI_30000           06:4b:8c:cd:13:f8   D        vtep.32783           192.168.0.2                   
       VNI_30000           06:4b:8c:cd:c4:38   D        vtep.32769           192.168.0.3                   
       VNI_30000           06:38:e1:6f:30:29   D        vtep.32879           192.168.0.4         
    ## Learned locally
       VNI_30000           02:0c:10:03:02:01   DL       ae11.0               
    ## Learned from the QFX5110 switches - Leaf 4 to 6
       VNI_30000           02:0c:10:03:02:02   DR       esi.1885             00:00:00:00:00:00:51:10:00:01 
    ## Learned from the QFX5200 switches - Leaf 7 to 9
       VNI_30000           02:0c:10:03:02:03   DR       esi.1887             00:00:00:00:00:00:52:00:00:01 
    ## Learned from the QFX10002 switches - Leaf 10 to 12
       VNI_30000           02:0c:10:03:02:04   DR       esi.1892             00:00:00:00:00:01:00:00:00:01 
    ## IPv4 virtual gateway MAC address learned over the overlay
    and distributed to the leaf devices by Spine 1, 2, 3 and 4
    00:00:5e:00:01:01
    # IPv6 virtual gateway MAC address learned over Overlay
    00:00:5e:00:02:01
    ## IRB MAC address prefix for Spine 1, 2, and 3 (Physical
    MAC address)
    06:4b:*             
    ## End System MAC address, connected locally to the leaf
    device
    02:0c:10:03:02:01   
    ## MAC address learned over the overlay, these end systems
    are also multihomed
    02:0c:10:03:02:02,03,04   
    user@leaf-3> show ethernet-switching table vlan-id 100 
    
    MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static
               SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC)
    
    
    Ethernet switching table : 106 entries, 106 learned
    Routing instance : default-switch
       Vlan                MAC                 MAC      Logical              Active
       name                address             flags    interface            source
    ## 00:00:5e:00:01:01 is the virtual gateway MAC address
    for the spine devices and is reachable over the dynamically created
    logical link esi.1679. As a result, you can use this ESI number to
    filter future command output by using esi.1679 to find the virtual
    gateway.
       VNI_10000           00:00:5e:00:01:01   DR       esi.1769             05:19:17:f3:41:00:00:27:10:00 
       VNI_10000           00:00:5e:00:02:01   DR       esi.1769             05:19:17:f3:41:00:00:27:10:00
       VNI_10000           06:4b:8c:67:0f:f0   D        vtep.32781           192.168.0.1                   
       VNI_10000           06:4b:8c:cd:13:f8   D        vtep.32782           192.168.0.2                   
       VNI_10000           06:4b:8c:cd:c4:38   D        vtep.32775           192.168.0.3                   
    ## Learned locally
       VNI_10000           02:0c:10:01:02:01   DL       ae11.0                 
    ## Learned through the overlay
       VNI_10000           02:0c:10:01:02:02   DR       esi.1760             00:00:00:00:00:00:51:10:00:01 
       VNI_10000           02:0c:10:01:02:03   DR       esi.1782             00:00:00:00:00:00:52:00:00:01 
       VNI_10000           02:0c:10:01:02:04   DR       esi.1758             00:00:00:00:00:01:00:00:00:01 
       VNI_10000           06:38:e1:6f:30:29   D        vtep.32783           192.168.0.4                   
       VNI_10000           0e:ad:10:01:00:01   D        vtep.32821           192.168.1.85
  4. Verify on Leaf 1 that the virtual gateway ESI (esi.1679) is reachable by all the spine devices.
    content_copy zoom_out_map
    user@leaf-1> show ethernet-switching vxlan-tunnel-end-point esi | find esi.1679
    ESI                           RTT                      VLNBH INH     ESI-IFL   LOC-IFL   #RVTEPs 
    05:19:17:f3:41:00:00:75:30:00 default-switch           1679  131072  esi.1679            4    
        RVTEP-IP             RVTEP-IFL      VENH     MASK-ID   FLAGS
        192.168.0.4          vtep.32879     1890     3         2         
        192.168.0.2          vtep.32783     1795     2         2         
        192.168.0.1          vtep.32770     1682     1         2         
        192.168.0.3          vtep.32769     1764     0         2
  5. Verify the remote EVPN routes coming from VNI 10000 and MAC address 02:0c:10:01:02:02. In this case, they are coming from Leaf 4 (192.168.1.4) by way of Spine 1 (192.168.0.1).
    Note:

    The format of the EVPN routes is EVPN-route-type:route-distinguisher:vni:mac-address.

    content_copy zoom_out_map
    user@leaf-1> show route table bgp.evpn.0 evpn-ethernet-tag-id 10000 evpn-mac-address 02:0c:10:01:02:02
    
    bgp.evpn.0: 910 destinations, 3497 routes (904 active, 0 holddown, 24 hidden)
    + = Active Route, - = Last Active, * = Both
    
    2:192.168.1.4:1::10000::02:0c:10:01:02:02/304 MAC/IP        
                       *[BGP/170] 00:11:37, localpref 100, from 192.168.0.1
                          AS path: I, validation-state: unverified
                        > to 172.16.1.10 via ae3.0
                        [BGP/170] 00:11:37, localpref 100, from 192.168.0.2
                          AS path: I, validation-state: unverified
                        > to 172.16.1.10 via ae3.0
                        [BGP/170] 00:11:37, localpref 100, from 192.168.0.3
                          AS path: I, validation-state: unverified
                        > to 172.16.1.10 via ae3.0
                        [BGP/170] 00:11:37, localpref 100, from 192.168.0.4
                          AS path: I, validation-state: unverified
                        > to 172.16.1.10 via ae3.0
    user@leaf-1> show route table bgp.evpn.0 evpn-ethernet-tag-id 10000 evpn-mac-address 02:0c:10:01:02:02 detail
    
    bgp.evpn.0: 925 destinations, 3557 routes (919 active, 0 holddown, 24 hidden)
    2:192.168.1.4:1::10000::02:0c:10:01:02:02/304 MAC/IP (4 entries, 0 announced)
            *BGP    Preference: 170/-101
                    Route Distinguisher: 192.168.1.4:1
                    Next hop type: Indirect, Next hop index: 0
                    Address: 0xb3a2170
                    Next-hop reference count: 160
                    Source: 192.168.0.1
                    Protocol next hop: 192.168.1.4
                    Indirect next hop: 0x2 no-forward INH Session ID: 0x0
                    State: <Active Int Ext>
                    Local AS: 4210000001 Peer AS: 4210000001
                    Age: 13:42      Metric2: 0 
                    Validation State: unverified 
                    Task: BGP_4210000001.192.168.0.1
                    AS path: I (Originator)
                    Cluster list:  192.168.0.10
                    Originator ID: 192.168.1.4
                    Communities: target:62273:268445456 encapsulation:vxlan(0x8)
                    Import Accepted
                    Route Label: 10000
                    ESI: 00:00:00:00:00:00:51:10:00:01
                    Localpref: 100
                    Router ID: 192.168.0.1
                    Secondary Tables: default-switch.evpn.0
    ...
    ## This output has been abbreviated. In a full set of output,
    there should also be routes sourced by Spine 2 (192.168.0.2), Spine
    3 (192.168.0.3), and Spine 4 (192.168.0.4).
  6. Verify the source and destination address of each VTEP interface and view their status.
    Note:

    There are 96 leaf devices and four spine devices, so there are 100 VTEP interfaces in this reference design - one VTEP interface per device.

    content_copy zoom_out_map
    user@leaf-1> show ethernet-switching vxlan-tunnel-end-point source
    Logical System Name       Id  SVTEP-IP         IFL   L3-Idx
    <default>                 0   192.168.1.1      lo0.0    0  
        L2-RTT                   Bridge Domain              VNID     MC-Group-IP
        default-switch           VNI_10000+100              10000    0.0.0.0        
        default-switch           VNI_20000+200              20000    0.0.0.0        
        default-switch           VNI_30000+300              30000    0.0.0.0        
        default-switch           VNI_40000+400              40000    0.0.0.0
    user@leaf-1> show interfaces terse vtep
    Interface               Admin Link Proto    Local                 Remote
    vtep                    up    up
    vtep.32768              up    up  
    vtep.32769              up    up   eth-switch
    vtep.32770              up    up   eth-switch
    vtep.32771              up    up   eth-switch
    vtep.32772              up    up   eth-switch
    ...
    vtep.32869              up    up   eth-switch
    user@leaf-1> show interfaces vtep
    Physical interface: vtep, Enabled, Physical link is Up
      Interface index: 646, SNMP ifIndex: 503
      Type: Software-Pseudo, Link-level type: VxLAN-Tunnel-Endpoint, MTU: Unlimited, Speed: Unlimited
      Device flags   : Present Running
      Link type      : Full-Duplex
      Link flags     : None
      Last flapped   : Never
        Input packets : 0
        Output packets: 0
    
      Logical interface vtep.32768 (Index 554) (SNMP ifIndex 648)
        Flags: Up SNMP-Traps 0x4000 Encapsulation: ENET2
        VXLAN Endpoint Type: Source, VXLAN Endpoint Address: 192.168.1.1, L2 Routing Instance: default-switch, L3 Routing Instance: default
        Input packets : 0
        Output packets: 0
    
    
    ...  Logical interface vtep.32814 (Index 613) (SNMP ifIndex 903)
        Flags: Up SNMP-Traps Encapsulation: ENET2
        VXLAN Endpoint Type: Remote, VXLAN Endpoint Address: 192.168.1.96, L2 Routing Instance: default-switch, L3 Routing Instance: default
        Input packets : 0
        Output packets: 6364
        Protocol eth-switch, MTU: Unlimited
          Flags: Trunk-Mode
  7. Verify that each VNI maps to the associated VXLAN tunnel.
    content_copy zoom_out_map
    user@leaf-1> show ethernet-switching vxlan-tunnel-end-point remote
                     0   192.168.1.1      lo0.0    0  
     RVTEP-IP         IFL-Idx   NH-Id
     192.168.0.1      587       1792     
        VNID          MC-Group-IP      
        10000         0.0.0.0         
        20000         0.0.0.0         
        30000         0.0.0.0         
        40000         0.0.0.0         
    
    ...
    
    RVTEP-IP         IFL-Idx   NH-Id
    192.168.1.96     613       1820     
        VNID          MC-Group-IP      
        10000         0.0.0.0         
        20000         0.0.0.0         
        30000         0.0.0.0         
        40000         0.0.0.0         
    
  8. Verify that MAC addresses are learned through the VXLAN tunnels.
    content_copy zoom_out_map
    user@leaf-1> show ethernet-switching vxlan-tunnel-end-point remote mac-table
    
    MAC flags (S -static MAC, D -dynamic MAC, L -locally learned, C -Control MAC
               SE -Statistics enabled, NM -Non configured MAC, R -Remote PE MAC, P -Pinned MAC)
    
    Logical system   : <default>
    Routing instance : default-switch
     Bridging domain : VNI_10000+100, VLAN : 100, VNID : 10000
       MAC                 MAC      Logical          Remote VTEP
       address             flags    interface        IP address
       02:0c:10:01:02:04   DR       esi.1764         192.168.1.11 192.168.1.12 192.168.1.10 
       02:0c:10:01:02:02   DR       esi.1771         192.168.1.6 192.168.1.4 
       02:0c:10:01:02:03   DR       esi.1774         192.168.1.7  
       00:00:5e:00:01:01   DR       esi.1781         192.168.0.4 192.168.0.2 192.168.0.1 192.168.0.3 
       06:4b:8c:cd:c4:38   D        vtep.32779       192.168.0.3  
       06:4b:8c:67:0f:f0   D        vtep.32781       192.168.0.1  
       06:4b:8c:cd:13:f8   D        vtep.32782       192.168.0.2  
       06:38:e1:6f:30:29   D        vtep.32783       192.168.0.4  
    ---(more)---
  9. Verify multihoming information of the gateway and the aggregated Ethernet interfaces.
    content_copy zoom_out_map
    user@leaf-1> show ethernet-switching vxlan-tunnel-end-point esi
    ## Local AE link – QFX5100 leaf devices
    ESI                           RTT                      VLNBH INH     ESI-IFL   LOC-IFL   #RVTEPs
    00:00:00:00:00:00:51:00:00:01 default-switch           1768  131078  esi.1768  ae11.0,   2    
        RVTEP-IP             RVTEP-IFL      VENH     MASK-ID   FLAGS
        192.168.1.2          vtep.32780     1782     1         2         
        192.168.1.3          vtep.32772     1767     0         2    
    ## Remote AE Link for QFX5110 leaf devices
    ESI                           RTT                      VLNBH INH     ESI-IFL   LOC-IFL   #RVTEPs
    00:00:00:00:00:00:51:10:00:01 default-switch           1771  131081  esi.1771            3    
        RVTEP-IP             RVTEP-IFL      VENH     MASK-ID   FLAGS
        192.168.1.6          vtep.32771     1766     2         2         
        192.168.1.4          vtep.32770     1765     1         2         
        192.168.1.5          vtep.32774     1770     0         2   
    ## Remote AE Link for QFX5200 leaf devices
    ESI                           RTT                      VLNBH INH     ESI-IFL   LOC-IFL   #RVTEPs
    00:00:00:00:00:00:52:00:00:01 default-switch           1774  131084  esi.1774            3    
        RVTEP-IP             RVTEP-IFL      VENH     MASK-ID   FLAGS
        192.168.1.9          vtep.32778     1776     2         2         
        192.168.1.8          vtep.32777     1775     1         2         
        192.168.1.7          vtep.32776     1773     0         2      
    ## Remote AE Link for QFX10002 leaf devices
    ESI                           RTT                      VLNBH INH     ESI-IFL   LOC-IFL   #RVTEPs
    00:00:00:00:00:01:00:00:00:01 default-switch           1764  131074  esi.1764            3    
        RVTEP-IP             RVTEP-IFL      VENH     MASK-ID   FLAGS
        192.168.1.11         vtep.32775     1772     2         2         
        192.168.1.12         vtep.32773     1769     1         2         
        192.168.1.10         vtep.32769     1759     0         2     
    ## ESI multihoming to the VTEP for each segment
    ESI                           RTT                      VLNBH INH     ESI-IFL   LOC-IFL   #RVTEPs
    05:19:17:f3:41:00:00:27:10:00 default-switch           1781  131091  esi.1781            4    
        RVTEP-IP             RVTEP-IFL      VENH     MASK-ID   FLAGS
        192.168.0.4          vtep.32783     1796     3         2         
        192.168.0.2          vtep.32782     1793     2         2         
        192.168.0.1          vtep.32781     1792     1         2         
        192.168.0.3          vtep.32779     1777     0         2         
    
    ...
    
  10. Verify that the VXLAN tunnel from one leaf to another leaf is load balanced with equal cost multipathing (ECMP) over the underlay.
    content_copy zoom_out_map
    user@leaf-1> show route forwarding-table table default-switch extensive | find vtep.32770
        
    Destination:  vtep.32770
      Route type: interface             
      Route reference: 0                   Route interface-index: 576 
      Multicast RPF nh index: 0             
      P2mpidx: 0              
      Flags: sent to PFE 
      Nexthop:  
      Next-hop type: composite             Index: 1765     Reference: 12   
      Next-hop type: indirect              Index: 131076   Reference: 3    
      Next-hop type: unilist               Index: 131193   Reference: 238  
      Nexthop: 172.16.1.2
      Next-hop type: unicast               Index: 1791     Reference: 10   
      Next-hop interface: ae1.0         Weight: 0x0  
      Nexthop: 172.16.1.6
      Next-hop type: unicast               Index: 1794     Reference: 10   
      Next-hop interface: ae2.0         Weight: 0x0  
      Nexthop: 172.16.1.10
      Next-hop type: unicast               Index: 1758     Reference: 10   
      Next-hop interface: ae3.0         Weight: 0x0  
      Nexthop: 172.16.1.14
      Next-hop type: unicast               Index: 1795     Reference: 10   
      Next-hop interface: ae4.0         Weight: 0x0
  11. Verify that remote MAC addresses are reachable through ECMP.
    content_copy zoom_out_map
    user@leaf-1> show route forwarding-table table default-switch extensive destination 02:0c:10:01:02:03/48 
    Routing table: default-switch.evpn-vxlan [Index 4] 
    Bridging domain: VNI_10000.evpn-vxlan [Index 3] 
    VPLS:
    Enabled protocols: Bridging, ACKed by all peers, EVPN VXLAN, 
        
    Destination:  02:0c:10:01:02:03/48
      Learn VLAN: 0                        Route type: user                  
      Route reference: 0                   Route interface-index: 582 
      Multicast RPF nh index: 0         
      P2mpidx: 0              
      IFL generation: 169                  Epoch: 0   
      Sequence Number: 0                   Learn Mask: 0x400000000000000003000000000000000000000
      L2 Flags: control_dyn
      Flags: sent to PFE
      Nexthop:  
      Next-hop type: composite             Index: 1773     Reference: 12   
      Next-hop type: indirect              Index: 131085   Reference: 3    
      Next-hop type: unilist               Index: 131193   Reference: 238  
      Nexthop: 172.16.1.2
      Next-hop type: unicast               Index: 1791     Reference: 10   
      Next-hop interface: ae1.0            Weight: 0x0  
      Nexthop: 172.16.1.6
      Next-hop type: unicast               Index: 1794     Reference: 10   
      Next-hop interface: ae2.0            Weight: 0x0  
      Nexthop: 172.16.1.10
      Next-hop type: unicast               Index: 1758     Reference: 10   
      Next-hop interface: ae3.0            Weight: 0x0  
      Nexthop: 172.16.1.14
      Next-hop type: unicast               Index: 1795     Reference: 10   
      Next-hop interface: ae4.0            Weight: 0x0
    Note:

    Though the MAC address is reachable over multiple VTEP interfaces, QFX5100, QFX5110, QFX5120-32C, and QFX5200 switches do not support ECMP across the overlay because of a merchant ASIC limitation. Only the QFX10000 line of switches contain a custom Juniper Networks ASIC that supports ECMP across both the overlay and the underlay.

    content_copy zoom_out_map
    user@leaf-1> show ethernet-switching table vlan-id 100 | match 02:0c:10:01:02:03
       VNI_10000           02:0c:10:01:02:03   DR       esi.1774             00:00:00:00:00:00:52:00:00:01
    user@leaf-1> show route forwarding-table table default-switch extensive destination 02:0c:10:01:02:03/48
    Routing table: default-switch.evpn-vxlan [Index 9] 
    Bridging domain: VNI_10000.evpn-vxlan [Index 3] 
    VPLS:
    Enabled protocols: Bridging, ACKed by all peers, EVPN VXLAN, 
        
    Destination:  02:0c:10:01:02:03/48
      Learn VLAN: 0                        Route type: user                  
      Route reference: 0                   Route interface-index: 550 
      Multicast RPF nh index: 0         
      P2mpidx: 0              
      IFL generation: 0                    Epoch: 0   
      Sequence Number: 0                   Learn Mask: 0x400000000000000001000000000000000000000
      L2 Flags: control_dyn, esi
      Flags: sent to PFE
      Next-hop type: indirect              Index: 2097173  Reference: 5    
      Nexthop:  
      Next-hop type: composite             Index: 1947     Reference: 2    
      Nexthop:  
      Next-hop type: composite             Index: 1948     Reference: 8    
      Next-hop type: indirect              Index: 2097174  Reference: 3    
      Next-hop type: unilist               Index: 2097280  Reference: 241  
      Nexthop: 172.16.10.2
      Next-hop type: unicast               Index: 1950     Reference: 11   
      Next-hop interface: ae1.0            Weight: 0x0  
      Nexthop: 172.16.10.6
      Next-hop type: unicast               Index: 1956     Reference: 10   
      Next-hop interface: ae2.0            Weight: 0x0  
      Nexthop: 172.16.10.10
      Next-hop type: unicast               Index: 1861     Reference: 10   
      Next-hop interface: ae3.0            Weight: 0x0  
      Nexthop: 172.16.10.14
      Next-hop type: unicast               Index: 1960     Reference: 10   
      Next-hop interface: ae4.0            Weight: 0x0  
    
  12. Verify which device is the Designated Forwarder (DF) for broadcast, unknown, and multicast (BUM) traffic coming from the VTEP tunnel.
    Note:

    Because the DF IP address is listed as 192.168.1.2, Leaf 2 is the DF.

    content_copy zoom_out_map
    user@leaf-1> show evpn instance esi 00:00:00:00:00:00:51:00:00:01 designated-forwarder
    Instance: default-switch
      Number of ethernet segments: 12
        ESI: 00:00:00:00:00:00:51:00:00:01
          Designated forwarder: 192.168.1.2

Configuring a VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances

You can configure a VLAN-aware CRB overlay model using virtual switches or MAC-VRF instances. With either of these models, you can configure multiple switching instances where each switching instance can support up to 4094 VLANs per instance.

The configuration method for VLANs (at the leaf devices) and IRB interfaces (at the spine devices) is similar to the default instance method for VLAN-aware CRB overlays. The main difference is that you configure certain elements inside the virtual switching instances or MAC-VRF instances. See Figure 6.

Figure 6: VLAN-Aware CRB Overlay — Virtual Switch Instance or MAC-VRF Instance VLAN-Aware CRB Overlay — Virtual Switch Instance or MAC-VRF Instance

When you implement this style of overlay on a spine device, you:

  • Configure a virtual switch or MAC-VRF instance with:

    • The loopback interface as the VTEP source interface.

    • Route distinguishers and route targets.

    • EVPN with VXLAN encapsulation.

    • VLAN to VNI mappings and Layer 3 IRB interface associations.

  • Configure virtual gateways, virtual MAC addresses, and corresponding IRB interfaces (to provide routing between VLANs).

To implement this overlay style on a leaf device:

  • Configure a virtual switch or a MAC-VRF instance with:

    • The loopback interface as the VTEP source interface.

    • Route distinguishers and route targets.

    • EVPN with VXLAN encapsulation.

    • VLAN to VNI mappings.

  • Set the following end system-facing elements:

    • An Ethernet segment ID (ESI).

    • Flexible VLAN tagging and extended VLAN bridge encapsulation.

    • LACP settings.

    • VLAN IDs.

For an overview of VLAN-aware CRB overlays, see the Centrally-Routed Bridging Overlay section in Data Center Fabric Blueprint Architecture Components.

For information on MAC-VRF instances, see MAC-VRF Instances for Multitenancy in Network Virtualization Overlays and MAC-VRF Routing Instance Type Overview.

Note:

The following sections provide the detailed steps of how to configure and verify the VLAN-aware CRB overlay with virtual switches or MAC-VRF instances.

Configuring the VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances on a Spine Device

To configure a VLAN-aware style of CRB overlay on a spine device, perform the following:

Note:

The following example shows the configuration for Spine 1, as shown in Figure 7.

Figure 7: VLAN-Aware CRB Overlay with Virtual Switches or a MAC-VRF Instance – Spine Device VLAN-Aware CRB Overlay with Virtual Switches or a MAC-VRF Instance – Spine Device
  1. Ensure the IP fabric underlay is in place. To configure an IP fabric on spine devices, see IP Fabric Underlay Network Design and Implementation.
  2. Confirm that your IBGP overlay is up and running. To configure an IBGP overlay on your spine devices, see Configure IBGP for the Overlay.
  3. (QFX5130 and QFX5700 switches only) On any QFX5130 or QFX5700 switches in the fabric that you configure with EVPN-VXLAN, set the host-profile unified forwarding profile option to support EVPN with VXLAN encapsulation (see Layer 2 Forwarding Tables for details):
    content_copy zoom_out_map
    set system packet-forwarding-options forwarding-profile host-profile
  4. Configure a virtual switch instance (VS1) or a MAC-VRF instance (MAC-VRF-1) for a VLAN-aware service. With the VLAN-aware service type, you can configure the instance with one or more VLANs. Include VTEP information, VXLAN encapsulation, VLAN to VNI mapping, associated IRB interfaces, and other instance details (such as a route distinguisher and a route target) as part of the configuration.

    For a virtual switch instance, use instance-type virtual-switch. Using the VLAN-aware model, configure VLANs VNI_90000 and VNI_100000 in the virtual switch instance with the associated IRB interfaces.

    Spine 1 (Virtual Switch Instance):

    content_copy zoom_out_map
    set routing-instances VS1 vtep-source-interface lo0.0
    set routing-instances VS1 instance-type virtual-switch
    set routing-instances VS1 route-distinguisher 192.168.0.1:900
    set routing-instances VS1 vrf-target target:62273:90000
    set routing-instances VS1 vrf-target auto
    set routing-instances VS1 protocols evpn encapsulation vxlan
    set routing-instances VS1 protocols evpn extended-vni-list all
    set routing-instances VS1 protocols evpn default-gateway no-gateway-community
    set routing-instances VS1 vlans VNI_90000 vlan-id none
    set routing-instances VS1 vlans VNI_90000 l3-interface irb.900
    set routing-instances VS1 vlans VNI_90000 vxlan vni 90000
    set routing-instances VS1 vlans VNI_100000 vlan-id none
    set routing-instances VS1 vlans VNI_100000 l3-interface irb.1000
    set routing-instances VS1 vlans VNI_100000 vxlan vni 100000
    

    With MAC-VRF instances, use instance-type mac-vrf. You also configure the service type when you create the MAC-VRF instance. Here we configure service-type vlan-aware with the two VLANs VNI_90000 and VNI_100000 and their associated IRB interfaces in the MAC-VRF instance.

    Spine 1 (MAC-VRF Instance):

    content_copy zoom_out_map
    set routing-instances MAC-VRF-1 vtep-source-interface lo0.0
    set routing-instances MAC-VRF-1 instance-type mac-vrf
    set routing-instances MAC-VRF-1 service-type vlan-aware
    set routing-instances MAC-VRF-1 route-distinguisher 192.168.0.1:900
    set routing-instances MAC-VRF-1 vrf-target target:62273:90000
    set routing-instances MAC-VRF-1 vrf-target auto
    set routing-instances MAC-VRF-1 protocols evpn encapsulation vxlan
    set routing-instances MAC-VRF-1 protocols evpn extended-vni-list all
    set routing-instances MAC-VRF-1 protocols evpn default-gateway no-gateway-community
    set routing-instances MAC-VRF-1 vlans VNI_90000 vlan-id none
    set routing-instances MAC-VRF-1 vlans VNI_90000 l3-interface irb.900
    set routing-instances MAC-VRF-1 vlans VNI_90000 vxlan vni 90000
    set routing-instances MAC-VRF-1 vlans VNI_100000 vlan-id none
    set routing-instances MAC-VRF-1 vlans VNI_100000 l3-interface irb.1000
    set routing-instances MAC-VRF-1 vlans VNI_100000 vxlan vni 100000
    
  5. (MAC-VRF instances only) Enable shared tunnels on the device.

    A device can have problems with VTEP scaling when the configuration uses multiple MAC-VRF instances. As a result, to avoid this problem, we require that you enable the shared tunnels feature on the QFX5000 line of switches with a MAC-VRF instance configuration. When you configure the shared-tunnels option, the device minimizes the number of next-hop entries to reach remote VTEPs. The following statement globally enables shared VXLAN tunnels on the device:

    content_copy zoom_out_map
    set forwarding-options evpn-vxlan shared-tunnels
    

    This statement is optional on the QFX10000 line of switches, which can handle higher VTEP scaling than QFX5000 switches.

    Note:

    This setting requires you to reboot the device.

  6. Configure spine devices with one or more VLANs for the VLAN-aware method. Include settings for the IPv4 and IPv6 virtual gateways and virtual MAC addresses. This example shows the configuration for Spine 1 with IRB interfaces and virtual gateways for VLANs VNI_90000 and VNI_100000.

    Spine 1:

    content_copy zoom_out_map
    set interfaces irb unit 900 proxy-macip-advertisement
    set interfaces irb unit 900 virtual-gateway-accept-data
    set interfaces irb unit 900 family inet address 10.1.8.1/24 virtual-gateway-address 10.1.8.254
    set interfaces irb unit 900 family inet6 address 2001:db8::10:1:8:1/112 virtual-gateway-address 2001:db8::10:1:8:254
    set interfaces irb unit 900 family inet6 address fe80::10:1:8:1/112
    set interfaces irb unit 900 family inet6 nd6-stale-time 600
    set interfaces irb unit 900 virtual-gateway-v4-mac 00:00:5e:90:00:00
    set interfaces irb unit 900 virtual-gateway-v6-mac 00:00:5e:90:00:00
    set interfaces irb unit 1000 proxy-macip-advertisement
    set interfaces irb unit 1000 virtual-gateway-accept-data
    set interfaces irb unit 1000 family inet address 10.1.9.1/24 virtual-gateway-address 10.1.9.254
    set interfaces irb unit 1000 family inet6 address 2001:db8::10:1:9:1/112 virtual-gateway-address 2001:db8::10:1:9:254
    set interfaces irb unit 1000 family inet6 address fe80::10:1:9:1/112
    set interfaces irb unit 1000 family inet6 nd6-stale-time 600
    set interfaces irb unit 1000 virtual-gateway-v4-mac 00:00:5e:a0:00:00
    set interfaces irb unit 1000 virtual-gateway-v6-mac 00:00:5e:a0:00:00
    

Verifying the VLAN-Aware Model for a CRB Overlay with Virtual Switches or MAC-VRF Instances on a Spine Device

To verify this style of overlay on a spine device, run the commands in this section.

Most commands here show output for a virtual switch instance configuration. With a MAC-VRF instance configuration, you can alternatively use:

  • show mac-vrf forwarding commands that are aliases for the show ethernet-switching commands in this section.

  • The show mac-vrf routing database command, which is an alias for the show evpn database command in this section.

  • The show mac-vrf routing instance command, which is an alias for the show evpn instance command in this section.

See MAC-VRF Routing Instance Type Overview for tables of show mac-vrf forwarding and show ethernet-switching command mappings, and show mac-vrf routing command aliases for show evpn commands.

Otherwise, you can use the commands in this section for either virtual switch instances or MAC-VRF instances.

The output with a MAC-VRF instance configuration displays similar information for MAC-VRF routing instances as this section shows for virtual switch instances. One main difference you might see is in the output with MAC-VRF instances on devices where you enable the shared tunnels feature. With shared tunnels enabled, you see VTEP interfaces in the following format:

content_copy zoom_out_map
vtep-index.shared-tunnel-unit

where:

  • index is the index associated with the MAC-VRF routing instance.

  • shared-tunnel-unit is the unit number associated with the shared tunnel remote VTEP logical interface.

For example, if a device has a MAC-VRF instance with index 26 and the instance connects to two remote VTEPs, the shared tunnel VTEP logical interfaces might look like this:

content_copy zoom_out_map
vtep-26.32823
vtep-26.32824
  1. Verify the IRB interfaces for VNIs 90000 and 100000 are operational for both IPv4 and IPv6.
    content_copy zoom_out_map
    user@spine-1> show interfaces terse irb | find irb\.900
    irb.900                 up    up   inet     10.1.8.1/24     
                                                10.1.8.254/24   
                                       inet6    2001:db8::10:1:8:1/112
                                                2001:db8::10:1:8:254/112
                                                fe80::10:1:8:1/112
    irb.1000                up    up   inet     10.1.9.1/24     
                                                10.1.9.254/24   
                                       inet6    2001:db8::10:1:9:1/112
                                                2001:db8::10:1:9:254/112
                                                fe80::10:1:9:1/112
    
  2. (MAC-VRF instances only) Verify the VLANs you configured as part of the MAC-VRF instance.
    content_copy zoom_out_map
    user@spine-1> show mac-vrf forwarding instance MAC-VRF-1
    Information for routing instance and VLAN:
    
    Flags (DL - disable learning, SE - stats enabled,
           AD - packet action drop, LH - MAC limit hit,
           MI - mac+ip limit hit)
    
    Inst Logical   Routing             VLAN name          Index IRB   Flags Tag   
    type system    instance                                     index        
    RTT  Default   MAC-VRF-1                              26  
    vlan Default   MAC-VRF-1           VNI-90000          3403  4204        900 
    vlan Default   MAC-VRF-1           VNI-100000         3425  4203        1000 
    .
    .
    .
    
    user@spine-1> show vlans VNI-90000
    Routing instance        VLAN name             Tag          Interfaces
    MAC-VRF-1               VNI-90000             NA       
                                                               esi.105902*
                                                               esi.89032*
                                                               vtep-26.32823*
                                                               vtep-26.32824*
                                                               vtep-26.32827*
    
  3. Verify switching details about the EVPN routing instance. This output includes information about the route distinguisher (192.168.1.10:900), VXLAN encapsulation, ESI (00:00:00:00:00:01:00:00:00:02), verification of the VXLAN tunnels for VLANs 900 and 1000, EVPN neighbors (Spine 2 - 4, and Leaf 10 - 12), and the source VTEP IP address (192.168.0.1).
    content_copy zoom_out_map
    user@spine-1> show evpn instance VS1 extensive
    Instance: VS1
      Route Distinguisher: 192.168.0.1:900
      Encapsulation type: VXLAN
      MAC database status                     Local  Remote
        MAC advertisements:                       2      14
        MAC+IP advertisements:                   14      26
        Default gateway MAC advertisements:       4       0
      Number of local interfaces: 0 (0 up)
      Number of IRB interfaces: 2 (2 up)
        Interface name  VLAN   VNI    Status  L3 context
        irb.1000               100000  Up     master                           
        irb.900                90000   Up     master                           
      Number of bridge domains: 2
        VLAN  Domain ID   Intfs / up    IRB intf   Mode             MAC sync  IM route label  SG sync  IM core nexthop
        8191  90000          0    0     irb.900    Extended         Enabled   90000           Disabled
        8191  100000         0    0     irb.1000   Extended         Enabled   100000          Disabled
      Number of neighbors: 6
        Address               MAC    MAC+IP        AD        IM        ES Leaf-label
        192.168.0.2             4        10         2         2         0
        192.168.0.3             4        10         2         2         0
        192.168.0.4             4        10         2         2         0
        192.168.1.10            1         2         2         2         0
        192.168.1.11            0         0         2         2         0
        192.168.1.12            1         2         2         2         0
      Number of ethernet segments: 3
        ESI: 00:00:00:00:00:01:00:00:00:02
          Status: Resolved
          Number of remote PEs connected: 3
            Remote PE        MAC label  Aliasing label  Mode
            192.168.1.12     90000      0               all-active   
            192.168.1.11     90000      0               all-active   
            192.168.1.10     100000     0               all-active   
        ESI: 05:19:17:f3:41:00:01:5f:90:00
          Local interface: irb.900, Status: Up/Forwarding
          Number of remote PEs connected: 3
            Remote PE        MAC label  Aliasing label  Mode
            192.168.0.3      90000      0               all-active   
            192.168.0.2      90000      0               all-active   
            192.168.0.4      90000      0               all-active   
        ESI: 05:19:17:f3:41:00:01:86:a0:00
          Local interface: irb.1000, Status: Up/Forwarding
          Number of remote PEs connected: 3
            Remote PE        MAC label  Aliasing label  Mode
            192.168.0.3      100000     0               all-active   
            192.168.0.2      100000     0               all-active   
            192.168.0.4      100000     0               all-active   
      Router-ID: 192.168.0.1
      Source VTEP interface IP: 192.168.0.1
  4. Verify the MAC address table on the leaf device.
    Note:
    • 00:00:5e:90:00:00 and 00:00:5e:a0:00:00 are the IP subnet gateways on the spine device.

    • 02:0c:10:09:02:01 and 02:0c:10:08:02:01 are end systems connected through the leaf device.

    content_copy zoom_out_map
    user@spine-1> show ethernet-switching table instance VS1
    
    MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static
               SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC)
    
    
    Ethernet switching table : 5 entries, 5 learned
    Routing instance : VS1
       Vlan                MAC                 MAC      Logical              Active
       name                address             flags    interface            source
       VNI_100000          00:00:5e:a0:00:00   DR       esi.2454             05:19:17:f3:41:00:01:86:a0:00 
       VNI_100000          06:4b:8c:cd:13:f8   D        vtep.32773           192.168.0.2                   
       VNI_100000          06:4b:8c:cd:c4:38   D        vtep.32787           192.168.0.3                   
       VNI_100000          02:0c:10:09:02:01   DR       esi.2467             00:00:00:00:00:01:00:00:00:02 
       VNI_100000          06:38:e1:6f:30:29   D        vtep.32796           192.168.0.4                   
    
    MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static
               SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC)
    
    
    Ethernet switching table : 5 entries, 5 learned
    Routing instance : VS1
       Vlan                MAC                 MAC      Logical              Active
       name                address             flags    interface            source
       VNI_90000           00:00:5e:90:00:00   DR       esi.2455             05:19:17:f3:41:00:01:5f:90:00 
       VNI_90000           06:4b:8c:cd:13:f8   D        vtep.32773           192.168.0.2                   
       VNI_90000           06:4b:8c:cd:c4:38   D        vtep.32787           192.168.0.3                   
       VNI_90000           02:0c:10:08:02:01   DR       esi.2467             00:00:00:00:00:01:00:00:00:02 
       VNI_90000           06:38:e1:6f:30:29   D        vtep.32796           192.168.0.4
  5. Verify the end system MAC address is reachable from all three leaf devices.
    content_copy zoom_out_map
    user@spine-1> show ethernet-switching vxlan-tunnel-end-point esi | find esi.2467
    00:00:00:00:00:01:00:00:00:02 VS1                      2467  2097182 esi.2467            3    
        RVTEP-IP             RVTEP-IFL      VENH     MASK-ID   FLAGS
        192.168.1.10         vtep.32789     2522     2         2         
        192.168.1.11         vtep.32782     2475     1         2         
        192.168.1.12         vtep.32779     2466     0         2         
    ESI                           RTT                      VLNBH INH     ESI-IFL   LOC-IFL   #RVTEPs
  6. Verify the end system is reachable through the forwarding table.
    content_copy zoom_out_map
    user@spine-1> show route forwarding-table table VS1 destination 02:0c:10:09:02:01/48 extensive
    Routing table: VS1.evpn-vxlan [Index 11] 
    Bridging domain: VNI_100000.evpn-vxlan [Index 9] 
    VPLS:
    Enabled protocols: Bridging, ACKed by all peers, EVPN VXLAN, 
        
    Destination:  02:0c:10:09:02:01/48
      Learn VLAN: 0                        Route type: user                  
      Route reference: 0                   Route interface-index: 676 
      Multicast RPF nh index: 0         
      P2mpidx: 0              
      IFL generation: 0                    Epoch: 0   
      Sequence Number: 0                   Learn Mask: 0x400000000000000006000000000000000000000
      L2 Flags: control_dyn, esi
      Flags: sent to PFE
      Next-hop type: indirect              Index: 2097182  Reference: 3    
      Nexthop:  
      Next-hop type: composite             Index: 2467     Reference: 2    
      Nexthop:  
      Next-hop type: composite             Index: 2522     Reference: 6    
      Next-hop type: indirect              Index: 2097154  Reference: 5    
      Nexthop: 172.16.10.1
      Next-hop type: unicast               Index: 2172     Reference: 11   
      Next-hop interface: ae10.0       
      Nexthop:  
      Next-hop type: composite             Index: 2475     Reference: 6    
      Next-hop type: indirect              Index: 2097193  Reference: 5    
      Nexthop: 172.16.11.1
      Next-hop type: unicast               Index: 2194     Reference: 11   
      Next-hop interface: ae11.0       
      Nexthop:  
      Next-hop type: composite             Index: 2466     Reference: 6    
      Next-hop type: indirect              Index: 2097195  Reference: 5    
      Nexthop: 172.16.12.1
      Next-hop type: unicast               Index: 2916     Reference: 11   
      Next-hop interface: ae12.0
  7. Verify end system information (MAC address, IP address, etc.) has been added to the IPv4 ARP table and IPv6 neighbor table.
    content_copy zoom_out_map
    user@spine-1> show arp no-resolve expiration-time | match "irb.900|irb.1000"
    06:4b:8c:cd:13:f8 10.1.8.2        irb.900 [vtep.32773]     none 1035
    06:4b:8c:cd:c4:38 10.1.8.3        irb.900 [vtep.32787]     none 1064
    06:38:e1:6f:30:29 10.1.8.4        irb.900 [vtep.32796]     none 964
    02:0c:10:08:02:01 10.1.8.201      irb.900 [.local..11]     none 781
    06:4b:8c:cd:13:f8 10.1.9.2        irb.1000 [vtep.32773]    none 910
    06:4b:8c:cd:c4:38 10.1.9.3        irb.1000 [vtep.32787]    none 1344
    06:38:e1:6f:30:29 10.1.9.4        irb.1000 [vtep.32796]    none 1160
    02:0c:10:09:02:01 10.1.9.201      irb.1000 [.local..11]    none 1099
    user@spine-1> show ipv6 neighbors | match "irb.900|irb.1000"
    2001:db8::10:1:8:2           06:4b:8c:cd:13:f8  stale       969 yes no      irb.900 [vtep.32773]
    2001:db8::10:1:8:3           06:4b:8c:cd:c4:38  stale       1001 yes no     irb.900 [vtep.32787]
    2001:db8::10:1:8:4           06:38:e1:6f:30:29  stale       971 yes no      irb.900 [vtep.32796]
    2001:db8::10:1:8:201         02:0c:10:08:02:01  stale       1178 no no      irb.900 [.local..11]
    2001:db8::10:1:9:2           06:4b:8c:cd:13:f8  stale       955 yes no      irb.1000 [vtep.32773]
    2001:db8::10:1:9:3           06:4b:8c:cd:c4:38  stale       1006 yes no     irb.1000 [vtep.32787]
    2001:db8::10:1:9:4           06:38:e1:6f:30:29  stale       990 yes no      irb.1000 [vtep.32796]
    2001:db8::10:1:9:201         02:0c:10:09:02:01  stale       1199 no no      irb.1000 [.local..11]
    fe80::10:1:8:2               06:4b:8c:cd:13:f8  stale       991 yes no      irb.900 [vtep.32773]
    fe80::10:1:8:3               06:4b:8c:cd:c4:38  stale       989 yes no      irb.900 [vtep.32787]
    fe80::10:1:8:4               06:38:e1:6f:30:29  stale       966 yes no      irb.900 [vtep.32796]
    fe80::10:1:9:2               06:4b:8c:cd:13:f8  stale       978 yes no      irb.1000 [vtep.32773]
    fe80::10:1:9:3               06:4b:8c:cd:c4:38  stale       994 yes no      irb.1000 [vtep.32787]
    fe80::10:1:9:4               06:38:e1:6f:30:29  stale       1006 yes no     irb.1000 [vtep.32796]
  8. Verify that the EVPN database contains the MAC address (02:0c:10:08:02:01) and ARP information learned from an end system connected to the leaf device.
    content_copy zoom_out_map
    user@spine-1> show evpn database mac-address 02:0c:10:08:02:01 extensive
    Instance: VS1
    
    VN Identifier: 90000, MAC address:: 02:0c:10:08:02:01
      Source: 00:00:00:00:00:01:00:00:00:02, Rank: 1, Status: Active
        Remote origin: 192.168.1.10
        Remote origin: 192.168.1.11
        Remote origin: 192.168.1.12
        Timestamp: Sep 10 23:47:37 (0x59b63189)
        State: <Remote-To-Local-Adv-Done>
        IP address: 10.1.8.201
          Flags: <Proxy>
          Remote origin: 192.168.1.10
          Remote origin: 192.168.1.11
          Remote origin: 192.168.1.12
        IP address: 2001:db8::10:1:8:201
          Remote origin: 192.168.1.10
          Remote origin: 192.168.1.11
          Remote origin: 192.168.1.12    History db: 
          Time                  Event
          Sep 10 23:47:39 2017  Applying remote state to peer 192.168.1.11
          Sep 10 23:47:39 2017  Remote peer 192.168.1.11 updated
          Sep 10 23:47:39 2017  MAC+IP not updated, source l2ald is not owner (type2)
          Sep 10 23:47:39 2017  Updated
          Sep 10 23:47:39 2017  No change to MAC state
          Sep 10 23:47:39 2017  Applying remote state to peer 192.168.1.12
          Sep 10 23:47:39 2017  Remote peer 192.168.1.12 updated
          Sep 10 23:47:39 2017  MAC+IP not updated, source l2ald is not owner (type2)
          Sep 10 23:47:39 2017  Updated
          Sep 10 23:47:39 2017  No change to MAC state

Configuring the VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances on a Leaf Device

To configure a VLAN-aware CRB overlay in a virtual switch or a MAC-VRF instance on a leaf device, perform the following:

Note:

The following example shows the configuration for Leaf 10, as shown in Figure 8.

Figure 8: VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances – Leaf Device VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances – Leaf Device
  1. Ensure the IP fabric underlay is in place. To configure an IP fabric on leaf devices, see IP Fabric Underlay Network Design and Implementation.
  2. Confirm that your IBGP overlay is up and running. To configure an IBGP overlay on your leaf devices, see Configure IBGP for the Overlay.
  3. Configure a virtual switch instance (VS1) or a MAC-VRF instance (MAC-VRF-1) to enable EVPN-VXLAN. Also, map VLANs 900 and 1000 to VNIs 90000 and 100000 in the instance.

    For a virtual switch instance, use instance-type virtual-switch.

    Leaf 10 (Virtual Switch Instance):

    content_copy zoom_out_map
    set routing-instances VS1 vtep-source-interface lo0.0
    set routing-instances VS1 instance-type virtual-switch
    set routing-instances VS1 route-distinguisher 192.168.1.10:900
    set routing-instances VS1 vrf-target target:62273:90000
    set routing-instances VS1 vrf-target auto
    set routing-instances VS1 protocols evpn encapsulation vxlan
    set routing-instances VS1 protocols evpn extended-vni-list all
    set routing-instances VS1 protocols evpn default-gateway no-gateway-community
    set routing-instances VS1 vlans VNI_90000 interface ae12.900
    set routing-instances VS1 vlans VNI_90000 vxlan vni 90000
    set routing-instances VS1 vlans VNI_100000 interface ae12.1000
    set routing-instances VS1 vlans VNI_100000 vxlan vni 100000
    

    With MAC-VRF instances, use instance-type mac-vrf. You also configure the service type when you create the MAC-VRF instance. Here we configure service-type vlan-aware with the two VLANs VNI_90000 and VNI_100000, and their VNI mappings.

    Leaf 10 (MAC-VRF Instance):

    content_copy zoom_out_map
    set routing-instances MAC-VRF-1 vtep-source-interface lo0.0
    set routing-instances MAC-VRF-1 instance-type mac-vrf
    set routing-instances MAC-VRF-1 service-type vlan-aware
    set routing-instances MAC-VRF-1 route-distinguisher 192.168.1.10:900
    set routing-instances MAC-VRF-1 vrf-target target:62273:90000
    set routing-instances MAC-VRF-1 vrf-target auto
    set routing-instances MAC-VRF-1 protocols evpn encapsulation vxlan
    set routing-instances MAC-VRF-1 protocols evpn extended-vni-list all
    set routing-instances MAC-VRF-1 protocols evpn default-gateway no-gateway-community
    set routing-instances MAC-VRF-1 vlans VNI_90000 interface ae12.900
    set routing-instances MAC-VRF-1 vlans VNI_90000 vxlan vni 90000
    set routing-instances MAC-VRF-1 vlans VNI_100000 interface ae12.1000
    set routing-instances MAC-VRF-1 vlans VNI_100000 vxlan vni 100000
    
  4. (MAC-VRF instances only) Enable shared tunnels on the device.

    A device can have problems with VTEP scaling when the configuration uses multiple MAC-VRF instances. As a result, to avoid this problem, we require that you enable the shared tunnels feature on the QFX5000 line of switches with a MAC-VRF instance configuration. When you configure the shared-tunnels option, the device minimizes the number of next-hop entries to reach remote VTEPs. The following statement globally enables shared VXLAN tunnels on the device:

    content_copy zoom_out_map
    set forwarding-options evpn-vxlan shared-tunnels
    

    This statement is optional on the QFX10000 line of switches, which can handle higher VTEP scaling than QFX5000 switches.

    Note:

    This setting requires you to reboot the device.

  5. Configure the leaf device to communicate with the end system. In this example, configure an aggregated Ethernet interface on Leaf 10—in this case, ae12 with two member interfaces. With the interface definition, include LACP options, an ESI in all-active mode, and VLANs 900 and 1000 (which this example uses for the VLAN-aware service type). Figure 9 illustrates the topology.
    Figure 9: ESI Topology for Leaf 10, Leaf 11, and Leaf 12 ESI Topology for Leaf 10, Leaf 11, and Leaf 12

    Leaf 10:

    content_copy zoom_out_map
    set interfaces ae12 flexible-vlan-tagging
    set interfaces ae12 encapsulation extended-vlan-bridge
    set interfaces ae12 esi 00:00:00:00:00:01:00:00:00:02
    set interfaces ae12 esi all-active
    set interfaces ae12 aggregated-ether-options minimum-links 1
    set interfaces ae12 aggregated-ether-options lacp active
    set interfaces ae12 aggregated-ether-options lacp periodic fast
    set interfaces ae12 aggregated-ether-options lacp system-id 00:01:00:00:00:02
    set interfaces ae12 aggregated-ether-options lacp hold-time up 300
    set interfaces ae12 unit 900 vlan-id 900
    set interfaces ae12 unit 1000 vlan-id 1000
    set interfaces et-0/0/23 ether-options 802.3ad ae12
    set interfaces et-0/0/35 ether-options 802.3ad ae12
    

    Note that in this example, you configure the aggregated Ethernet interface to support the service provider configuration style. See Flexible Ethernet Service Encapsulation for more information on the service provider style configuration for switch interfaces.

Verifying the VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances on a Leaf Device

To verify this style of overlay on a leaf device, run the commands in this section.

Most commands here show output for a virtual switch instance configuration. With a MAC-VRF instance configuration, you can alternatively use:

  • show mac-vrf forwarding commands that are aliases for the show ethernet-switching commands in this section.

  • The show mac-vrf routing instance command, which is an alias for the show evpn instance command in this section.

See MAC-VRF Routing Instance Type Overview for tables of show mac-vrf forwarding and show ethernet-switching command mappings, and show mac-vrf routing command aliases for show evpn commands.

Otherwise, you can use the commands in this section for either virtual switch instances or MAC-VRF instances.

The output with a MAC-VRF instance configuration displays similar information for MAC-VRF routing instances as this section shows for virtual switch instances. One main difference you might see is in the output with MAC-VRF instances on devices where you enable the shared tunnels feature. With shared tunnels enabled, you see VTEP interfaces in the following format:

content_copy zoom_out_map
vtep-index.shared-tunnel-unit

where:

  • index is the index associated with the MAC-VRF routing instance.

  • shared-tunnel-unit is the unit number associated with the shared tunnel remote VTEP logical interface.

For example, if a device has a MAC-VRF instance with index 26 and the instance connects to two remote VTEPs, the shared tunnel VTEP logical interfaces might look like this:

content_copy zoom_out_map
vtep-26.32823
vtep-26.32824
  1. Verify that the aggregated Ethernet interface is operational on the leaf device.
    content_copy zoom_out_map
    user@leaf-10> show interfaces terse ae12
    Interface               Admin Link Proto    Local                 Remote
    ae12                    up    up
    ae12.900                up    up   eth-switch
    ae12.1000               up    up   eth-switch
    ae12.32767              up    up
  2. (MAC-VRF instances only) Verify the VLANs you configured as part of the MAC-VRF instance.
    content_copy zoom_out_map
    user@leaf-10> show mac-vrf forwarding instance MAC-VRF-1
    Information for routing instance and VLAN:
    
    Flags (DL - disable learning, SE - stats enabled,
           AD - packet action drop, LH - MAC limit hit,
           MI - mac+ip limit hit)
    
    Inst Logical   Routing             VLAN name          Index IRB   Flags Tag   
    type system    instance                                     index        
    RTT  Default   MAC-VRF-1                              27  
    vlan Default   MAC-VRF-1           VNI-90000          3424              NA   
    vlan Default   MAC-VRF-1           VNI-100000         3425              NA   
    .
    .
    .
    
    user@leaf-10> show vlans VNI-90000
    Routing instance        VLAN name             Tag          Interfaces
    MAC-VRF-1               VNI-90000             NA       
                                                               ae12.900*
                                                               esi.19955*
                                                               esi.20938*
                                                               vtep-27.32820*
                                                               vtep-27.32821*
                                                               vtep-27.32822*
                                                               xe-0/0/18:2.900*
  3. Verify switching details about the EVPN routing instance. This output includes information about the route distinguisher (192.168.1.10:900), VXLAN encapsulation, ESI (00:00:00:00:00:01:00:00:00:02), verification of the VXLAN tunnels for VLANs 900 and 1000, EVPN neighbors (Spine 1 - 4, and Leaf 11 and 12), and the source VTEP IP address (192.168.1.10).
    content_copy zoom_out_map
    user@leaf-10> show evpn instance VS1 extensive
    Instance: VS1
      Route Distinguisher: 192.168.1.10:900
      Encapsulation type: VXLAN
      MAC database status                     Local  Remote
        MAC advertisements:                       0      20
        MAC+IP advertisements:                    0      32
        Default gateway MAC advertisements:       0       0
      Number of local interfaces: 2 (2 up)
        Interface name  ESI                            Mode             Status     AC-Role
        ae12.1000       00:00:00:00:00:01:00:00:00:02  all-active       Up         Root 
        ae12.900        00:00:00:00:00:01:00:00:00:02  all-active       Up         Root 
      Number of IRB interfaces: 0 (0 up)
      Number of bridge domains: 2
        VLAN  Domain ID   Intfs / up    IRB intf   Mode             MAC sync  IM route label  SG sync  IM core nexthop
        None  90000          1    1                Extended         Enabled   90000           Disabled
        None  100000         1    1                Extended         Enabled   100000          Disabled
      Number of neighbors: 6
        Address               MAC    MAC+IP        AD        IM        ES Leaf-label
        192.168.0.1             4        10         2         2         0
        192.168.0.2             4        10         2         2         0
        192.168.0.3             4        10         2         2         0
        192.168.0.4             4        10         2         2         0
        192.168.1.11            2         4         2         2         0
        192.168.1.12            2         4         2         2         0
      Number of ethernet segments: 3
        ESI: 00:00:00:00:00:01:00:00:00:02
          Status: Resolved by IFL ae12.900
          Local interface: ae12.1000, Status: Up/Forwarding
          Number of remote PEs connected: 2
            Remote PE        MAC label  Aliasing label  Mode
            192.168.1.12     100000     0               all-active   
            192.168.1.11     90000      0               all-active   
          DF Election Algorithm: MOD based
          Designated forwarder: 192.168.1.10
          Backup forwarder: 192.168.1.11
          Backup forwarder: 192.168.1.12
          Last designated forwarder update: Sep 10 23:22:07
        ESI: 05:19:17:f3:41:00:01:5f:90:00
          Status: Resolved
          Number of remote PEs connected: 4
            Remote PE        MAC label  Aliasing label  Mode
            192.168.0.1      90000      0               all-active   
            192.168.0.3      90000      0               all-active   
            192.168.0.2      90000      0               all-active   
            192.168.0.4      90000      0               all-active   
        ESI: 05:19:17:f3:41:00:01:86:a0:00
          Status: Resolved
          Number of remote PEs connected: 4 
            Remote PE        MAC label  Aliasing label  Mode
            192.168.0.1      100000     0               all-active   
            192.168.0.3      100000     0               all-active   
            192.168.0.2      100000     0               all-active   
            192.168.0.4      100000     0               all-active   
      Router-ID: 192.168.1.10
      Source VTEP interface IP: 192.168.1.10
  4. View the MAC address table on the leaf device to confirm that spine device and end system MAC addresses appear in the table.
    Note:
    • 00:00:5e:90:00:00 and 00:00:5e:a0:00:00 are the IP subnet gateways on the spine device.

    • 02:0c:10:09:02:01 and 02:0c:10:08:02:01 are end systems connected through the leaf device.

    content_copy zoom_out_map
    user@leaf-10> show ethernet-switching table instance VS1
    
    MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static
               SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC)
    
    
    Ethernet switching table : 6 entries, 6 learned
    Routing instance : VS1
       Vlan                MAC                 MAC      Logical              Active
       name                address             flags    interface            source
       VNI_100000          00:00:5e:a0:00:00   DR       esi.2139             05:19:17:f3:41:00:01:86:a0:00 
       VNI_100000          06:4b:8c:67:0f:f0   D        vtep.32799           192.168.0.1                   
       VNI_100000          06:4b:8c:cd:13:f8   D        vtep.32798           192.168.0.2                   
       VNI_100000          06:4b:8c:cd:c4:38   D        vtep.32804           192.168.0.3                   
       VNI_100000          02:0c:10:09:02:01   DR       ae12.1000            
       VNI_100000          06:38:e1:6f:30:29   D        vtep.32807           192.168.0.4                   
    
    MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static
               SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC)
    
    
    Ethernet switching table : 6 entries, 6 learned
    Routing instance : VS1
       Vlan                MAC                 MAC      Logical              Active
       name                address             flags    interface            source
       VNI_90000           00:00:5e:90:00:00   DR       esi.2144             05:19:17:f3:41:00:01:5f:90:00 
       VNI_90000           06:4b:8c:67:0f:f0   D        vtep.32799           192.168.0.1                   
       VNI_90000           06:4b:8c:cd:13:f8   D        vtep.32798           192.168.0.2                   
       VNI_90000           06:4b:8c:cd:c4:38   D        vtep.32804           192.168.0.3                   
       VNI_90000           02:0c:10:08:02:01   DR       ae12.900             
       VNI_90000           06:38:e1:6f:30:29   D        vtep.32807           192.168.0.4
  5. Verify that the IP subnet gateway ESIs discovered in Step 3 (esi.2144 for VNI 90000 and esi.2139 for VNI 100000) are reachable from all four spine devices.
    content_copy zoom_out_map
    user@leaf-10> show ethernet-switching vxlan-tunnel-end-point esi | find esi.2144
    05:19:17:f3:41:00:01:5f:90:00 VS1                      2144  2097224 esi.2144            4    
        RVTEP-IP             RVTEP-IFL      VENH     MASK-ID   FLAGS
        192.168.0.4          vtep.32807     2033     3         2         
        192.168.0.2          vtep.32798     2092     2         2         
        192.168.0.3          vtep.32804     2174     1         2         
        192.168.0.1          vtep.32799     2093     0         2         
    ESI                           RTT                      VLNBH INH     ESI-IFL   LOC-IFL   #RVTEPs
    user@leaf-10> show ethernet-switching vxlan-tunnel-end-point esi | find esi.2139
    05:19:17:f3:41:00:01:86:a0:00 VS1                      2139  2097221 esi.2139            4    
        RVTEP-IP             RVTEP-IFL      VENH     MASK-ID   FLAGS
        192.168.0.4          vtep.32807     2033     3         2         
        192.168.0.2          vtep.32798     2092     2         2         
        192.168.0.3          vtep.32804     2174     1         2         
        192.168.0.1          vtep.32799     2093     0         2
  6. Verify the IP subnet gateway on the spine device (00:00:5e:a0:00:00) is reachable through the forwarding table.
    content_copy zoom_out_map
    user@leaf-10> show route forwarding-table table VS1 destination 00:00:5e:a0:00:00/48 extensive
    Routing table: VS1.evpn-vxlan [Index 10] 
    Bridging domain: VNI_100000.evpn-vxlan [Index 15] 
    VPLS:
    Enabled protocols: Bridging, ACKed by all peers, EVPN VXLAN, 
        
    Destination:  00:00:5e:a0:00:00/48
      Learn VLAN: 0                        Route type: user                  
      Route reference: 0                   Route interface-index: 571 
      Multicast RPF nh index: 0         
      P2mpidx: 0              
      IFL generation: 0                    Epoch: 0   
      Sequence Number: 0                   Learn Mask: 0x40000000000000000f000000000000000000000
      L2 Flags: control_dyn, esi
      Flags: sent to PFE
      Next-hop type: indirect              Index: 2097221  Reference: 2    
      Nexthop:  
      Next-hop type: composite             Index: 2139     Reference: 2    
      Nexthop:  
      Next-hop type: composite             Index: 2033     Reference: 9    
      Next-hop type: indirect              Index: 2097223  Reference: 5    
      Nexthop: 172.16.10.14
      Next-hop type: unicast               Index: 2106     Reference: 10   
      Next-hop interface: ae4.0        
      Nexthop:  
      Next-hop type: composite             Index: 2092     Reference: 9    
      Next-hop type: indirect              Index: 2097172  Reference: 5    
      Nexthop: 172.16.10.6
      Next-hop type: unicast               Index: 1951     Reference: 11   
      Next-hop interface: ae2.0        
      Nexthop:  
      Next-hop type: composite             Index: 2174     Reference: 9    
      Next-hop type: indirect              Index: 2097174  Reference: 5    
      Nexthop: 172.16.10.10
      Next-hop type: unicast               Index: 2143     Reference: 11   
      Next-hop interface: ae3.0        
      Nexthop:  
      Next-hop type: composite             Index: 2093     Reference: 9    
      Next-hop type: indirect              Index: 2097165  Reference: 5    
      Nexthop: 172.16.10.2
      Next-hop type: unicast               Index: 2153     Reference: 11   
      Next-hop interface: ae1.0

Centrally-Routed Bridging Overlay — Release History

Table 1 provides a history of all of the features in this section and their support within this reference design.

Table 1: CRB Overlay in the Data Center Fabric Reference Design– Release History

Release

Description

19.1R2

QFX10002-60C and QFX5120-32C switches running Junos OS Release 19.1R2 and later releases in the same release train support all features documented in this section.

17.3R3-S2

Adds support for Contrail Enterprise Multicloud, where you can configure CRB overlays from the Contrail Command GUI.

17.3R3-S1

All devices in the reference design that support Junos OS Release 17.3R3-S1 and later releases in the same release train also support all features documented in this section

footer-navigation