- play_arrow Data Center Fabric Blueprint Architecture—Overview
- play_arrow Data Center Fabric Reference Design—Tested Implementation
- Data Center Fabric Reference Design Overview and Validated Topology
- IP Fabric Underlay Network Design and Implementation
- Configure IBGP for the Overlay
- IPv6 Fabric Underlay and Overlay Network Design and Implementation with EBGP
- BGP Unnumbered IPv6 Underlay in an EVPN-VXLAN Data Center
- Bridged Overlay Design and Implementation
- Centrally-Routed Bridging Overlay Design and Implementation
- Multihoming an Ethernet-Connected End System Design and Implementation
- Edge-Routed Bridging Overlay Design and Implementation
- Routed Overlay Design and Implementation
- Multihoming an IP-Connected End System Design and Implementation
- Five-Stage IP Fabric Design and Implementation
- Collapsed Spine Fabric Design and Implementation
- EVPN Type 2 and Type 5 Route Coexistence Implementation
- Data Center Interconnect Design and Implementation Using Type 5 Routes
- Data Center Interconnect Design and Implementation Using IPVPN
- Configure VXLAN Stitching for Layer 2 Data Center Interconnect
- EVPN Type 2 Symmetric Routing with DCI Stitching
- Configure EVPN-VXLAN Data Center Stitching Through Interconnected EVPN-MPLS WAN Gateways
- Static VXLAN Tunnels with Q-in-Q
- Configure L2PT over VXLAN Tunnels
- Service Chaining Design and Implementation
- Multicast IGMP Snooping and PIM Design and Implementation
- Multicast Optimization Design and Implementation
- Optimized Intersubnet Multicast (OISM) with Assisted Replication (AR) for Edge-Routed Bridging Overlays
- Enhanced Optimized Intersubnet Multicast (OISM) Implementation
- Configure VMTO
- DHCP Relay Design and Implementation
- Verifying Proxy ARP and ARP Suppression for the Edge-Routed Bridging Overlay
- Configuring Layer 2 Port Security Features on Ethernet-Connected End Systems
Centrally-Routed Bridging Overlay Design and Implementation
A centrally-routed bridging (CRB) overlay performs routing at a central location in the EVPN network as shown in Figure 1, In this example, IRB interfaces are configured in the overlay at each spine device to route traffic between the VLANs that originate at the leaf devices and end systems. For an overview of CRB overlays, see the Centrally-Routed Bridging Overlay section in Data Center Fabric Blueprint Architecture Components.

The following sections provide the detailed steps of how to implement a CRB overlay:
Configuring a VLAN-Aware CRB Overlay in the Default Instance
The VLAN-aware CRB overlay is a basic overlay supported on all platforms included in this reference design. It uses the simplest VLAN-aware method to enable a single, default switching instance that supports up to 4094 VLANs.
As shown in Figure 2, you configure VLANs
at the leaf devices, and IRB interfaces for routing at the spine devices. Such configuration
is placed in the default switching instance at the [edit vlans]
,
[edit interfaces]
, [edit protocols evpn]
, and
[edit switch-options]
hierarchy levels. Routing instances are not
required for this overlay style, but can be implemented as an option depending on the needs
of your network.

When you implement this style of overlay on a spine device, you:
Configure IRB interfaces to route traffic between Ethernet virtual network instances.
Set virtual gateway addresses.
Add VXLAN features to optimize traffic paths.
Configure EVPN with VXLAN encapsulation in the default switching instance or in a routing instance.
Set the loopback interface as the VTEP source interface.
Configure route distinguishers and route targets to direct traffic to peers.
Map VLANs to VNIs.
When you implement this style of overlay on a leaf device, you:
Configure Ethernet Segment Identifier (ESI) settings.
Enable EVPN with VXLAN encapsulation in the default switching instance.
Establish route targets and route distinguishers.
Map VLANs to VNIs.
For an overview of VLAN-aware CRB overlays, see the Centrally-Routed Bridging Overlay section in Data Center Fabric Blueprint Architecture Components.
If you need to implement more than 4094 VLANs, you can use a CRB overlay with virtual switches (available on switches in the QFX10000 line) or MAC-VRF instances. See Configuring a VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances. With MAC-VRF instances, you expand your options to either isolate traffic between tenant systems or to enable routing and forwarding between tenant systems.
The following sections provide the detailed steps of how to configure and verify the VLAN-aware CRB overlay in the default switching instance:
- Configuring a VLAN-Aware CRB Overlay in the Default Instance on the Spine Device
- Verifying the VLAN-Aware CRB Overlay in the Default Instance for the Spine Device
- Configuring a VLAN-Aware CRB Overlay in the Default Instance on the Leaf Device
- Verifying the VLAN-Aware CRB Overlay in the Default Instance for the Leaf Device
Configuring a VLAN-Aware CRB Overlay in the Default Instance on the Spine Device
To configure a VLAN-aware CRB overlay in the default switching instance on a spine device, perform the following:
The following example shows the configuration for Spine 1, as shown in Figure 3.

- Ensure the IP fabric underlay is in place. To configure an IP fabric on a spine device, see IP Fabric Underlay Network Design and Implementation.
- Confirm that your IBGP overlay is up and running. To configure an IBGP overlay on your spine devices, see Configure IBGP for the Overlay.
- Configure the VTEP tunnel endpoint as the loopback address, and add a route
distinguisher and a route target
(target:64512:1111).
Also, keep your configuration simple by using the auto route target option, which uses
one target for both import and export.
Spine 1:
content_copy zoom_out_mapset switch-options vtep-source-interface lo0.0 set switch-options route-distinguisher 192.168.0.1:1 set switch-options vrf-target target:64512:1111 set switch-options vrf-target auto
- Configure IRB interfaces for each VNI and the corresponding virtual gateway address
(which uses .254 in the 4th octet for each prefix). Include VXLAN features, such as
proxy-macip-advertisement
andvirtual-gateway-accept-data
, to improve performance and manageability.Note:We strongly recommend you set the
proxy-macip-advertisement
option on the spine devices in a CRB fabric. This option enables one central gateway (the spine device) to send both MAC address and IP address information (ARP entries) that it learns locally to the other central gateways. This operation is called ARP synchronization. Setting this option ensures that ARP synchronization happens efficiently if any leaf devices in the fabric advertise only the MAC addresses in their EVPN Type 2 route advertisements for their connected hosts. This setting improves convergence times and traffic handling in the fabric.You must configure both the
virtual-gateway-accept-data
statement and the preferred IPv4 and IPv6 addresses to use the ping operation and verify connectivity to the virtual gateway IP address from the end system.
Spine 1:
content_copy zoom_out_mapset interfaces irb unit 100 family inet address 10.1.0.1/24 virtual-gateway-address 10.1.0.254 set interfaces irb unit 100 family inet address 10.1.0.1/24 preferred set interfaces irb unit 100 proxy-macip-advertisement set interfaces irb unit 100 virtual-gateway-accept-data set interfaces irb unit 100 family inet6 address 2001:db8::10:1:0:1/112 virtual-gateway-address 2001:db8::10:1:0:254 set interfaces irb unit 100 family inet6 address fe80::10:1:0:254/112 set interfaces irb unit 200 family inet address 10.1.1.1/24 virtual-gateway-address 10.1.1.254 set interfaces irb unit 200 family inet address 10.1.1.1/24 preferred set interfaces irb unit 200 proxy-macip-advertisement set interfaces irb unit 200 virtual-gateway-accept-data set interfaces irb unit 200 family inet6 address 2001:db8::10:1:1:1/112 virtual-gateway-address 2001:db8::10:1:1:254 set interfaces irb unit 200 family inet6 address fe80::10:1:1:254/112 set interfaces irb unit 300 family inet address 10.1.2.1/24 virtual-gateway-address 10.1.2.254 set interfaces irb unit 300 family inet address 10.1.2.1/24 preferred set interfaces irb unit 300 proxy-macip-advertisement set interfaces irb unit 300 virtual-gateway-accept-data set interfaces irb unit 300 family inet6 address 2001:db8::10:1:2:1/112 virtual-gateway-address 2001:db8::10:1:2:254 set interfaces irb unit 300 family inet6 address fe80::10:1:2:254/112 set interfaces irb unit 400 family inet address 10.1.3.1/24 virtual-gateway-address 10.1.3.254 set interfaces irb unit 400 family inet address 10.1.3.1/24 preferred set interfaces irb unit 400 proxy-macip-advertisement set interfaces irb unit 400 virtual-gateway-accept-data set interfaces irb unit 400 family inet6 address 2001:db8::10:1:3:1/112 virtual-gateway-address 2001:db8::10:1:3:254 set interfaces irb unit 400 family inet6 address fe80::10:1:3:254/112
- Configure a secondary logical unit on the loopback interface for the default
switching instance.
Spine 1:
content_copy zoom_out_mapset interfaces lo0 unit 1 family inet address 192.168.0.101/32
- Configure EVPN with VXLAN encapsulation. Include the
no-gateway-community
option to advertise the virtual gateway and IRB MAC addresses to the EVPN peer devices so that Ethernet-only PE devices can learn these MAC addresses.Spine 1:
content_copy zoom_out_mapset protocols evpn encapsulation vxlan set protocols evpn default-gateway no-gateway-community set protocols evpn extended-vni-list all
- Configure mapping between VLANs and VXLAN VNIs.
Spine 1:
content_copy zoom_out_mapset vlans VNI_10000 vlan-id 100 set vlans VNI_10000 l3-interface irb.100 set vlans VNI_10000 vxlan vni 10000 set vlans VNI_20000 vlan-id 200 set vlans VNI_20000 l3-interface irb.200 set vlans VNI_20000 vxlan vni 20000 set vlans VNI_30000 vlan-id 300 set vlans VNI_30000 l3-interface irb.300 set vlans VNI_30000 vxlan vni 30000 set vlans VNI_40000 vlan-id 400 set vlans VNI_40000 l3-interface irb.400 set vlans VNI_40000 vxlan vni 40000
- Configure a routing instance named VRF 1, and map IRB interfaces irb.100 (VNI
10000) and irb.200 (VNI 20000) to this instance. Note:
Because the irb.300 (VNI 30000) and irb.400 (VNI 40000) interfaces are not configured inside a routing instance, they are part of the default switching instance for the spine devices. The end result of your configuration should match the diagram shown in Figure 3.
Spine 1:
content_copy zoom_out_mapset routing-instances VRF_1 instance-type vrf set routing-instances VRF_1 interface irb.100 set routing-instances VRF_1 interface irb.200 set routing-instances VRF_1 interface lo0.1 set routing-instances VRF_1 route-distinguisher 192.168.0.1:100 set routing-instances VRF_1 vrf-target target:62273:10000
Verifying the VLAN-Aware CRB Overlay in the Default Instance for the Spine Device
Issue the following commands to verify that the overlay is working properly on your spine devices:
- Verify the IRB interfaces are operational for both IPv4 and IPv6. content_copy zoom_out_map
user@spine-1> show interfaces terse irb Interface Admin Link Proto Local Remote irb up up irb.100 up up inet 10.1.0.1/24 inet6 2001:db8::10:1:0:1/112 fe80::10:1:0:254/112 irb.200 up up inet 10.1.1.1/24 inet6 2001:db8::10:1:1:1/112 fe80::10:1:1:254/112 irb.300 up up inet 10.1.2.1/24 inet6 2001:db8::10:1:2:1/112 fe80::10:1:2:254/112 irb.400 up up inet 10.1.3.1/24 inet6 2001:db8::10:1:3:1/112 fe80::10:1:3:254/112
- Verify that the VTEP interfaces are up. content_copy zoom_out_map
user@spine-1> show interfaces terse vtep Interface Admin Link Proto Local Remote vtep up up vtep.32768 up up vtep.32769 up up eth-switch vtep.32770 up up eth-switch vtep.32771 up up eth-switch vtep.32772 up up eth-switch ... vtep.32804 up up eth-switch ---(more)--- user@spine-1> show interfaces terse vtep | match eth-switch | count Count: 109 lines
- Verify the endpoint destination IP address for the VTEP interfaces. The spine
devices display their VTEPs as loopback addresses in the range of
192.168.0.x (1 - 4) and the leaf devices display their VTEPs as
loopback addresses in the range of 192.168.1.x (1 - 96). content_copy zoom_out_map
user@spine-1> show interfaces vtep Physical interface: vtep, Enabled, Physical link is Up Interface index: 240, SNMP ifIndex: 504 Type: Software-Pseudo, Link-level type: VxLAN-Tunnel-Endpoint, MTU: Unlimited, Speed: Unlimited Device flags : Present Running Link type : Full-Duplex Link flags : None Last flapped : Never Input packets : 0 Output packets: 0 Logical interface vtep.32768 (Index 670) (SNMP ifIndex 505) Flags: Up SNMP-Traps 0x4000 Encapsulation: ENET2 VXLAN Endpoint Type: Source, VXLAN Endpoint Address: 192.168.0.1, L2 Routing Instance: default-switch, L3 Routing Instance: default Input packets : 0 Output packets: 0 ... Logical interface vtep.32771 (Index 802) (SNMP ifIndex 536) Flags: Up SNMP-Traps Encapsulation: ENET2 VXLAN Endpoint Type: Remote, VXLAN Endpoint Address: 192.168.1.4, L2 Routing Instance: default-switch, L3 Routing Instance: default Input packets : 1979 Output packets: 9867 Protocol eth-switch, MTU: Unlimited ---(more)---
- Verify that the spine device has all the routes to the leaf devices. content_copy zoom_out_map
user@spine-2> show route 192.168.1.1 inet.0: 446 destinations, 19761 routes (446 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both 192.168.1.1/32 *[BGP/170] 00:06:29, localpref 100 AS path: 4200000011 I, validation-state: unverified > to 172.16.1.5 via ae1.0 [BGP/170] 00:06:22, localpref 100 AS path: 4200000023 4200000004 4200000011 I, validation-state: unverified > to 172.16.13.5 via ae13.0 ... [BGP/170] 00:06:18, localpref 100 AS path: 4200000032 4200000004 4200000011 I, validation-state: unverified > to 172.16.22.5 via ae22.0 ---(more)---
- Verify that each end system resolves the virtual gateway MAC address for a subnet
using the gateway IRB address on the central gateways (spine devices). content_copy zoom_out_map
user@spine-1> show arp no-resolve vpn VRF_1 MAC Address Address Interface Flags 06:4b:8c:cd:13:f8 10.1.0.2 irb.100 [vtep.32796] none ## Spine 2 IRB interface 06:4b:8c:cd:c4:38 10.1.0.3 irb.100 [vtep.32878] none ## Spine 3 IRB interface 06:38:e1:6f:30:29 10.1.0.4 irb.100 [vtep.32821] none ## Spine 4 IRB interface02:0c:10:01:02:01 10.1.0.201 irb.100 [.local..11] none ## End system behind the QFX5100s 02:0c:10:01:02:02 10.1.0.202 irb.100 [.local..11] none ## End system behind the QFX5110s 02:0c:10:01:02:03 10.1.0.203 irb.100 [.local..11] none ## End system behind the QFX5200s 02:0c:10:01:02:04 10.1.0.204 irb.100 [.local..11] none ## End system behind the QFX10002s 00:00:5e:00:01:01 10.1.0.254 irb.100 permanent published gateway ## Virtual gateway IP and MAC address 06:4b:8c:cd:13:f8 10.1.1.2 irb.200 [vtep.32796] none 06:4b:8c:cd:c4:38 10.1.1.3 irb.200 [vtep.32878] none 06:38:e1:6f:30:29 10.1.1.4 irb.200 [vtep.32821] none 0e:ad:10:02:00:01 10.1.1.101 irb.200 [vtep.32776] none user@spine-1> show ipv6 neighbors IPv6 Address Linklayer Address State Exp Rtr Secure Interface 2001:db8::10:1:0:2 06:4b:8c:cd:13:f8 stale 325 no no irb.100 [vtep.32796] 2001:db8::10:1:0:3 06:4b:8c:cd:c4:38 stale 514 yes no irb.100 [vtep.32878] 2001:db8::10:1:0:4 06:38:e1:6f:30:29 stale 326 no no irb.100 [vtep.32821] 2001:db8::10:1:0:201 02:0c:10:01:02:01 stale 1114 no no irb.100 [.local..11] 2001:db8::10:1:0:202 02:0c:10:01:02:02 stale 443 no no irb.100 [.local..11] 2001:db8::10:1:0:203 02:0c:10:01:02:03 stale 853 no no irb.100 [.local..11] 2001:db8::10:1:0:204 02:0c:10:01:02:04 stale 1181 no no irb.100 [.local..11] 2001:db8::10:1:0:254 00:00:5e:00:02:01 reachable 0 no no irb.100 2001:db8::10:1:1:2 06:4b:8c:cd:13:f8 stale 325 no no irb.200 [vtep.32796] 2001:db8::10:1:1:3 06:4b:8c:cd:c4:38 stale 514 yes no irb.200 [vtep.32878] 2001:db8::10:1:1:4 06:38:e1:6f:30:29 stale 326 no no irb.200 [vtep.32821] 2001:db8::10:1:1:201 02:0c:10:02:02:01 stale 1121 no no irb.200 [.local..11] 2001:db8::10:1:1:202 02:0c:10:02:02:02 stale 423 no no irb.200 [.local..11] 2001:db8::10:1:1:203 02:0c:10:02:02:03 stale 1081 no no irb.200 [.local..11] 2001:db8::10:1:1:204 02:0c:10:02:02:04 stale 1167 no no irb.200 [.local..11]
- Verify the switching table for VNI 10000 to see entries for end systems and the
other spine devices. content_copy zoom_out_map
user@spine-1> show ethernet-switching table vlan-id 100 MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC) Ethernet switching table : 105 entries, 105 learned Routing instance : default-switch Vlan MAC MAC Logical Active name address flags interface source VNI_10000 00:00:5e:00:01:01 DR esi.2453 05:19:17:f3:41:00:00:27:10:00 ## Entries for the spine devices VNI_10000 06:4b:8c:cd:13:f8 D vtep.32796 192.168.0.2 VNI_10000 06:4b:8c:cd:c4:38 D vtep.32878 192.168.0.3 VNI_10000 06:38:e1:6f:30:29 D vtep.32821 192.168.0.4 ## The next four MAC addresses belong to the end systems connected to Leaf 1 - 3 (QFX5100), Leaf 4-6 (QFX5110), Leaf 7-9 (QFX5200), and Leaf 10-12 (QFX10002). VNI_10000 02:0c:10:01:02:01 DR esi.2443 00:00:00:00:00:00:51:00:00:01 VNI_10000 02:0c:10:01:02:02 DR esi.2497 00:00:00:00:00:00:51:10:00:01 VNI_10000 02:0c:10:01:02:03 DR esi.2427 00:00:00:00:00:00:52:00:00:01 VNI_10000 02:0c:10:01:02:04 DR esi.2610 00:00:00:00:00:01:00:00:00:01 ... VNI_10000 0e:ad:10:01:00:02 D vtep.32814 192.168.1.96
- Verify MAC address and ARP information learned from the leaf devices over the
control plane. content_copy zoom_out_map
user@spine-1> show evpn database mac-address 02:0c:10:01:02:01 extensive Instance: default-switch VN Identifier: 10000, MAC address:: 02:0c:10:01:02:01 Source: 00:00:00:00:00:00:51:00:00:01, Rank: 1, Status: Active Remote origin: 192.168.1.2 ## Leaf 2 and Leaf 3 advertised this route Remote origin: 192.168.1.3 Timestamp: Jul 13 23:35:37 (0x59686639) State: <Remote-To-Local-Adv-Done> IP address: 10.1.0.201 ## MAC Address + IP Flags: <Proxy> Remote origin: 192.168.1.2 Remote origin: 192.168.1.3 IP address: 2001:db8::10:1:0:201 ## MAC Address + IPv6 Remote origin: 192.168.1.2 Remote origin: 192.168.1.3 History db: Time Event Jul 13 23:35:38 2017 Applying remote state to peer 192.168.1.2 Jul 13 23:35:38 2017 Remote peer 192.168.1.2 updated Jul 13 23:35:38 2017 MAC+IP not updated, source l2ald is not owner (type2) Jul 13 23:35:38 2017 Updated Jul 13 23:35:38 2017 No change to MAC state Jul 13 23:35:38 2017 Applying remote state to peer 192.168.1.3 Jul 13 23:35:38 2017 Remote peer 192.168.1.3 updated Jul 13 23:35:38 2017 MAC+IP not updated, source l2ald is not owner (type2) Jul 13 23:35:38 2017 Updated Jul 13 23:35:38 2017 No change to MAC state
- Verify the remote VXLAN tunnel end points. content_copy zoom_out_map
user@spine-1> show ethernet-switching vxlan-tunnel-end-point remote Logical System Name Id SVTEP-IP IFL L3-Idx <default> 0 192.168.0.1 lo0.0 0 RVTEP-IP IFL-Idx NH-Id 192.168.1.1 827 2444 VNID MC-Group-IP 10000 0.0.0.0 20000 0.0.0.0 30000 0.0.0.0 40000 0.0.0.0 RVTEP-IP IFL-Idx NH-Id ... RVTEP-IP IFL-Idx NH-Id 192.168.1.96 812 2428 VNID MC-Group-IP 10000 0.0.0.0 20000 0.0.0.0 30000 0.0.0.0 40000 0.0.0.0
- Verify that MAC addresses are learned through the VXLAN tunnel. content_copy zoom_out_map
user@spine-1> show ethernet-switching vxlan-tunnel-end-point remote mac-table MAC flags (S -static MAC, D -dynamic MAC, L -locally learned, C -Control MAC SE -Statistics enabled, NM -Non configured MAC, R -Remote PE MAC, P -Pinned MAC) Logical system : <default> Routing instance : default-switch Bridging domain : VNI_10000+100, VLAN : 100, VNID : 10000 MAC MAC Logical Remote VTEP address flags interface IP address 02:0c:10:01:02:03 DR esi.2427 192.168.1.8 192.168.1.7 192.168.1.9 02:0c:10:01:02:01 DR esi.2443 192.168.1.2 192.168.1.3 ## This next entry shows that the virtual gateway MAC address of 00:00:5e:00:01:01 has been learned by the other spine devices. 00:00:5e:00:01:01 DR esi.2453 192.168.0.3 192.168.0.4 192.168.0.2 02:0c:10:01:02:02 DR esi.2497 192.168.1.6 192.168.1.4 02:0c:10:01:02:04 DR esi.2610 192.168.1.12 192.168.1.10 192.168.1.11 06:4b:8c:cd:13:f8 D vtep.32796 192.168.0.2 ---(more)---
Configuring a VLAN-Aware CRB Overlay in the Default Instance on the Leaf Device
To configure a VLAN-aware CRB overlay in the default switching instance on a leaf device, perform the following:
The following example shows the configuration for Leaf 1, as shown in Figure 4.

- Ensure the IP fabric underlay is in place. To configure an IP fabric on a leaf device, see IP Fabric Underlay Network Design and Implementation.
- Confirm that your IBGP overlay is up and running. To configure an IBGP overlay on your leaf device, see Configure IBGP for the Overlay.
- Configure the EVPN protocol with VXLAN encapsulation, and specify the VTEP source
interface (in this case, the loopback interface of the leaf device).
Leaf 1:
content_copy zoom_out_mapset protocols evpn encapsulation vxlan set protocols evpn extended-vni-list all set switch-options vtep-source-interface lo0.0
- Define an EVPN route target and route distinguisher, and use the
auto
option to derive route targets automatically. Setting these parameters specifies how the routes are imported and exported. The import and export of routes from a routing or bridging table is the basis for dynamic overlays. In this case, members of the global BGP community with a route target of target:64512:1111 participate in the exchange of EVPN-VXLAN information.Leaf 1:
content_copy zoom_out_mapset switch-options route-distinguisher 192.168.1.1:1 set switch-options vrf-target target:64512:1111 set switch-options vrf-target auto
- Configure ESI settings on all similar leaf devices. Because the end systems in this
reference design are multihomed to three leaf devices per device type cluster (such as
QFX5100), you must configure the same ESI identifier and LACP system identifier on all
three leaf devices for each unique end system. Unlike other topologies where you would
configure a different LACP system identifier per leaf device and have VXLAN select a
single designated forwarder, use the same LACP system identifier to allow the 3 leaf
devices to appear as a single LAG to a multihomed end
system. In addition, use
the same aggregated Ethernet interface number for all ports included in the ESI.
The configuration for Leaf 1 is shown below, but you must replicate this configuration on both Leaf 2 and Leaf 3 per the topology shown in Figure 5.
Tip:When you create an ESI number, always set the high order octet to 00 to indicate the ESI is manually created. The other 9 octets can be any hexadecimal value from 00 to FF.
Figure 5: ESI Topology for Leaf 1, Leaf 2, and Leaf 3Leaf 1:
content_copy zoom_out_mapset interfaces ae11 esi 00:00:00:00:00:00:51:00:00:01 set interfaces ae11 esi all-active set interfaces ae11 aggregated-ether-options lacp system-id 00:00:51:00:00:01 set interfaces xe-0/0/10 ether-options 802.3ad ae11 set interfaces xe-1/0/10 ether-options 802.3ad ae11
- Configure VLANs and map them to VNIs. This step enables the VLANs to participate in
VNIs across the EVPN-VXLAN domain.
Leaf 1:
content_copy zoom_out_mapset vlans VNI_10000 vlan-id 100 set vlans VNI_10000 vxlan vni 10000 set vlans VNI_20000 vlan-id 200 set vlans VNI_20000 vxlan vni 20000 set vlans VNI_30000 vlan-id 300 set vlans VNI_30000 vxlan vni 30000 set vlans VNI_40000 vlan-id 400 set vlans VNI_40000 vxlan vni 40000
Verifying the VLAN-Aware CRB Overlay in the Default Instance for the Leaf Device
Issue the following commands to verify that the overlay is working properly on your leaf devices:
- Verify the interfaces are operational. content_copy zoom_out_map
user@leaf-1> show interfaces terse | match ae.* xe-0/0/10.0 up up aenet --> ae11.0 et-0/0/48.0 up up aenet --> ae1.0 et-0/0/49.0 up up aenet --> ae2.0 et-0/0/50.0 up up aenet --> ae3.0 et-0/0/51.0 up up aenet --> ae4.0 xe-1/0/10.0 up up aenet --> ae11.0 et-1/0/48.0 up up aenet --> ae1.0 et-1/0/49.0 up up aenet --> ae2.0 et-1/0/50.0 up up aenet --> ae3.0 et-1/0/51.0 up up aenet --> ae4.0 ae1 up up ## To Spine 1 ae1.0 up up inet 172.16.1.1/30 ae2 up up ## To Spine 2 ae2.0 up up inet 172.16.1.5/30 ae3 up up ## To Spine 3 ae3.0 up up inet 172.16.1.9/30 ae4 up up ## To Spine 4 ae4.0 up up inet 172.16.1.13/30 ae11 up up ## To End System ae11.0 up up eth-switch user@leaf-1> show lacp interfaces Aggregated interface: ae1 LACP state: Role Exp Def Dist Col Syn Aggr Timeout Activity et-0/0/48 Actor No No Yes Yes Yes Yes Fast Active et-0/0/48 Partner No No Yes Yes Yes Yes Fast Active et-1/0/48 Actor No No Yes Yes Yes Yes Fast Active et-1/0/48 Partner No No Yes Yes Yes Yes Fast Active LACP protocol: Receive State Transmit State Mux State et-0/0/48 Current Fast periodic Collecting distributing et-1/0/48 Current Fast periodic Collecting distributing ... Aggregated interface: ae11 LACP state: Role Exp Def Dist Col Syn Aggr Timeout Activity xe-0/0/10 Actor No No Yes Yes Yes Yes Fast Active xe-0/0/10 Partner No No Yes Yes Yes Yes Fast Active xe-1/0/10 Actor No No Yes Yes Yes Yes Fast Active xe-1/0/10 Partner No No Yes Yes Yes Yes Fast Active LACP protocol: Receive State Transmit State Mux State xe-0/0/10 Current Fast periodic Collecting distributing xe-1/0/10 Current Fast periodic Collecting distributing
- Verify that the EVPN routes are being learned through the overlay. Note:
Only selected excerpts of this output are displayed.
The format of the EVPN routes is EVPN-route-type:route-distinguisher:vni:mac-address.
content_copy zoom_out_mapuser@leaf-1> show route table bgp.evpn.0 evpn-ethernet-tag-id 10000 bgp.evpn.0: 828 destinations, 3169 routes (827 active, 0 holddown, 4 hidden) + = Active Route, - = Last Active, * = Both ## Spine 1: Virtual Gateway MAC Address for IPv4 2:192.168.0.1:1::10000::00:00:5e:00:01:01/304 MAC/IP *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:33:39, localpref 100, from 192.168.0.2 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:31:15, localpref 100, from 192.168.0.3 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:29:41, localpref 100, from 192.168.0.4 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 ## Spine 1: Virtual Gateway MAC Address for IPv6 2:192.168.0.1:1::10000::00:00:5e:00:02:01/304 MAC/IP *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:33:39, localpref 100, from 192.168.0.2 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:31:15, localpref 100, from 192.168.0.3 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:29:41, localpref 100, from 192.168.0.4 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 ## Spine 1: IRB MAC Address 2:192.168.0.1:1::10000::06:4b:8c:67:0f:f0/304 MAC/IP *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:33:39, localpref 100, from 192.168.0.2 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:31:15, localpref 100, from 192.168.0.3 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:29:41, localpref 100, from 192.168.0.4 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 ## Spine 1: ARP for the virtual gateway 2:192.168.0.1:1::10000::00:00:5e:00:01:01::10.1.0.254/304 MAC/IP *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:33:39, localpref 100, from 192.168.0.2 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:31:15, localpref 100, from 192.168.0.3 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:29:41, localpref 100, from 192.168.0.4 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 ## Spine 1: IRB IPv4 ARP 2:192.168.0.1:1::10000::06:4b:8c:67:0f:f0::10.1.0.1/304 MAC/IP *[BGP/170] 00:04:50, localpref 100, from 192.168.0.1 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 00:04:50, localpref 100, from 192.168.0.2 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 00:04:50, localpref 100, from 192.168.0.3 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 00:04:50, localpref 100, from 192.168.0.4 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 ## Spine 2: ARP for the virtual gateway 2:192.168.0.2:1::10000::00:00:5e:00:01:01::10.1.0.254/304 MAC/IP *[BGP/170] 07:55:22, localpref 100, from 192.168.0.2 AS path: I, validation-state: unverified > to 172.16.1.6 via ae2.0 [BGP/170] 07:33:39, localpref 100, from 192.168.0.1 AS path: I, validation-state: unverified > to 172.16.1.6 via ae2.0 [BGP/170] 07:31:11, localpref 100, from 192.168.0.3 AS path: I, validation-state: unverified > to 172.16.1.6 via ae2.0 [BGP/170] 07:29:37, localpref 100, from 192.168.0.4 AS path: I, validation-state: unverified > to 172.16.1.6 via ae2.0 ## Spine 2: IRB IPv4 ARP 2:192.168.0.2:1::10000::06:4b:8c:cd:13:f8::10.1.0.2/304 MAC/IP *[BGP/170] 07:55:22, localpref 100, from 192.168.0.2 AS path: I, validation-state: unverified > to 172.16.1.6 via ae2.0 [BGP/170] 07:33:39, localpref 100, from 192.168.0.1 AS path: I, validation-state: unverified > to 172.16.1.6 via ae2.0 [BGP/170] 07:31:11, localpref 100, from 192.168.0.3 AS path: I, validation-state: unverified > to 172.16.1.6 via ae2.0 [BGP/170] 07:29:37, localpref 100, from 192.168.0.4 AS path: I, validation-state: unverified > to 172.16.1.6 via ae2.0 ## Spine 1: IPv6 ARP for the virtual gateway 2:192.168.0.1:1::10000::00:00:5e:00:02:01::2001:db8::10:1:0:254/304 MAC/IP *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:33:39, localpref 100, from 192.168.0.2 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:31:15, localpref 100, from 192.168.0.3 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:29:41, localpref 100, from 192.168.0.4 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 ## Spine 1: IRB IPv6 ARP 2:192.168.0.1:1::10000::06:4b:8c:67:0f:f0::2001:db8::10:1:0:1/304 MAC/IP *[BGP/170] 09:12:00, localpref 100, from 192.168.0.1 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:33:39, localpref 100, from 192.168.0.2 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:31:15, localpref 100, from 192.168.0.3 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 [BGP/170] 07:29:41, localpref 100, from 192.168.0.4 AS path: I, validation-state: unverified > to 172.16.1.2 via ae1.0 ...
- Verify on Leaf 1 and Leaf 3 that the Ethernet switching table has installed both
the local MAC addresses and the remote MAC addresses learned through the
overlay. Note:
To identify end systems learned remotely from the EVPN overlay, look for the MAC address, ESI logical interface, and ESI number. For example, Leaf 1 learns about an end system with the MAC address of
02:0c:10:03:02:02
throughesi.1885
. This end system has an ESI number of00:00:00:00:00:00:51:10:00:01
. Consequently, this matches the ESI number configured for Leaf 4, 5, and 6 (QFX5110 switches), so we know that this end system is multihomed to these three leaf devices.content_copy zoom_out_mapuser@leaf-1> show ethernet-switching table vlan-id 300 MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC) Ethernet switching table : 10 entries, 10 learned Routing instance : default-switch Vlan MAC MAC Logical Active name address flags interface source VNI_30000 00:00:5e:00:01:01 DR esi.1679 05:19:17:f3:41:00:00:75:30:00 VNI_30000 00:00:5e:00:02:01 DR esi.1679 05:19:17:f3:41:00:00:75:30:00 VNI_30000 06:4b:8c:67:0f:f0 D vtep.32770 192.168.0.1 VNI_30000 06:4b:8c:cd:13:f8 D vtep.32783 192.168.0.2 VNI_30000 06:4b:8c:cd:c4:38 D vtep.32769 192.168.0.3 VNI_30000 06:38:e1:6f:30:29 D vtep.32879 192.168.0.4 ## Learned locally VNI_30000 02:0c:10:03:02:01 DL ae11.0 ## Learned from the QFX5110 switches - Leaf 4 to 6 VNI_30000 02:0c:10:03:02:02 DR esi.1885 00:00:00:00:00:00:51:10:00:01 ## Learned from the QFX5200 switches - Leaf 7 to 9 VNI_30000 02:0c:10:03:02:03 DR esi.1887 00:00:00:00:00:00:52:00:00:01 ## Learned from the QFX10002 switches - Leaf 10 to 12 VNI_30000 02:0c:10:03:02:04 DR esi.1892 00:00:00:00:00:01:00:00:00:01 ## IPv4 virtual gateway MAC address learned over the overlay and distributed to the leaf devices by Spine 1, 2, 3 and 4 00:00:5e:00:01:01 # IPv6 virtual gateway MAC address learned over Overlay 00:00:5e:00:02:01 ## IRB MAC address prefix for Spine 1, 2, and 3 (Physical MAC address) 06:4b:* ## End System MAC address, connected locally to the leaf device 02:0c:10:03:02:01 ## MAC address learned over the overlay, these end systems are also multihomed 02:0c:10:03:02:02,03,04 user@leaf-3> show ethernet-switching table vlan-id 100 MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC) Ethernet switching table : 106 entries, 106 learned Routing instance : default-switch Vlan MAC MAC Logical Active name address flags interface source ## 00:00:5e:00:01:01 is the virtual gateway MAC address for the spine devices and is reachable over the dynamically created logical link esi.1679. As a result, you can use this ESI number to filter future command output by using esi.1679 to find the virtual gateway. VNI_10000 00:00:5e:00:01:01 DR esi.1769 05:19:17:f3:41:00:00:27:10:00 VNI_10000 00:00:5e:00:02:01 DR esi.1769 05:19:17:f3:41:00:00:27:10:00 VNI_10000 06:4b:8c:67:0f:f0 D vtep.32781 192.168.0.1 VNI_10000 06:4b:8c:cd:13:f8 D vtep.32782 192.168.0.2 VNI_10000 06:4b:8c:cd:c4:38 D vtep.32775 192.168.0.3 ## Learned locally VNI_10000 02:0c:10:01:02:01 DL ae11.0 ## Learned through the overlay VNI_10000 02:0c:10:01:02:02 DR esi.1760 00:00:00:00:00:00:51:10:00:01 VNI_10000 02:0c:10:01:02:03 DR esi.1782 00:00:00:00:00:00:52:00:00:01 VNI_10000 02:0c:10:01:02:04 DR esi.1758 00:00:00:00:00:01:00:00:00:01 VNI_10000 06:38:e1:6f:30:29 D vtep.32783 192.168.0.4 VNI_10000 0e:ad:10:01:00:01 D vtep.32821 192.168.1.85
- Verify on Leaf 1 that the virtual gateway ESI (esi.1679) is reachable by all the
spine devices. content_copy zoom_out_map
user@leaf-1> show ethernet-switching vxlan-tunnel-end-point esi | find esi.1679 ESI RTT VLNBH INH ESI-IFL LOC-IFL #RVTEPs 05:19:17:f3:41:00:00:75:30:00 default-switch 1679 131072 esi.1679 4 RVTEP-IP RVTEP-IFL VENH MASK-ID FLAGS 192.168.0.4 vtep.32879 1890 3 2 192.168.0.2 vtep.32783 1795 2 2 192.168.0.1 vtep.32770 1682 1 2 192.168.0.3 vtep.32769 1764 0 2
- Verify the remote EVPN routes coming from VNI 10000 and MAC address
02:0c:10:01:02:02. In this case, they are coming from Leaf 4 (192.168.1.4) by way of
Spine 1 (192.168.0.1). Note:
The format of the EVPN routes is EVPN-route-type:route-distinguisher:vni:mac-address.
content_copy zoom_out_mapuser@leaf-1> show route table bgp.evpn.0 evpn-ethernet-tag-id 10000 evpn-mac-address 02:0c:10:01:02:02 bgp.evpn.0: 910 destinations, 3497 routes (904 active, 0 holddown, 24 hidden) + = Active Route, - = Last Active, * = Both 2:192.168.1.4:1::10000::02:0c:10:01:02:02/304 MAC/IP *[BGP/170] 00:11:37, localpref 100, from 192.168.0.1 AS path: I, validation-state: unverified > to 172.16.1.10 via ae3.0 [BGP/170] 00:11:37, localpref 100, from 192.168.0.2 AS path: I, validation-state: unverified > to 172.16.1.10 via ae3.0 [BGP/170] 00:11:37, localpref 100, from 192.168.0.3 AS path: I, validation-state: unverified > to 172.16.1.10 via ae3.0 [BGP/170] 00:11:37, localpref 100, from 192.168.0.4 AS path: I, validation-state: unverified > to 172.16.1.10 via ae3.0 user@leaf-1> show route table bgp.evpn.0 evpn-ethernet-tag-id 10000 evpn-mac-address 02:0c:10:01:02:02 detail bgp.evpn.0: 925 destinations, 3557 routes (919 active, 0 holddown, 24 hidden) 2:192.168.1.4:1::10000::02:0c:10:01:02:02/304 MAC/IP (4 entries, 0 announced) *BGP Preference: 170/-101 Route Distinguisher: 192.168.1.4:1 Next hop type: Indirect, Next hop index: 0 Address: 0xb3a2170 Next-hop reference count: 160 Source: 192.168.0.1 Protocol next hop: 192.168.1.4 Indirect next hop: 0x2 no-forward INH Session ID: 0x0 State: <Active Int Ext> Local AS: 4210000001 Peer AS: 4210000001 Age: 13:42 Metric2: 0 Validation State: unverified Task: BGP_4210000001.192.168.0.1 AS path: I (Originator) Cluster list: 192.168.0.10 Originator ID: 192.168.1.4 Communities: target:62273:268445456 encapsulation:vxlan(0x8) Import Accepted Route Label: 10000 ESI: 00:00:00:00:00:00:51:10:00:01 Localpref: 100 Router ID: 192.168.0.1 Secondary Tables: default-switch.evpn.0 ... ## This output has been abbreviated. In a full set of output, there should also be routes sourced by Spine 2 (192.168.0.2), Spine 3 (192.168.0.3), and Spine 4 (192.168.0.4).
- Verify the source and destination address of each VTEP interface and view their
status. Note:
There are 96 leaf devices and four spine devices, so there are 100 VTEP interfaces in this reference design - one VTEP interface per device.
content_copy zoom_out_mapuser@leaf-1> show ethernet-switching vxlan-tunnel-end-point source Logical System Name Id SVTEP-IP IFL L3-Idx <default> 0 192.168.1.1 lo0.0 0 L2-RTT Bridge Domain VNID MC-Group-IP default-switch VNI_10000+100 10000 0.0.0.0 default-switch VNI_20000+200 20000 0.0.0.0 default-switch VNI_30000+300 30000 0.0.0.0 default-switch VNI_40000+400 40000 0.0.0.0 user@leaf-1> show interfaces terse vtep Interface Admin Link Proto Local Remote vtep up up vtep.32768 up up vtep.32769 up up eth-switch vtep.32770 up up eth-switch vtep.32771 up up eth-switch vtep.32772 up up eth-switch ... vtep.32869 up up eth-switch user@leaf-1> show interfaces vtep Physical interface: vtep, Enabled, Physical link is Up Interface index: 646, SNMP ifIndex: 503 Type: Software-Pseudo, Link-level type: VxLAN-Tunnel-Endpoint, MTU: Unlimited, Speed: Unlimited Device flags : Present Running Link type : Full-Duplex Link flags : None Last flapped : Never Input packets : 0 Output packets: 0 Logical interface vtep.32768 (Index 554) (SNMP ifIndex 648) Flags: Up SNMP-Traps 0x4000 Encapsulation: ENET2 VXLAN Endpoint Type: Source, VXLAN Endpoint Address: 192.168.1.1, L2 Routing Instance: default-switch, L3 Routing Instance: default Input packets : 0 Output packets: 0 ... Logical interface vtep.32814 (Index 613) (SNMP ifIndex 903) Flags: Up SNMP-Traps Encapsulation: ENET2 VXLAN Endpoint Type: Remote, VXLAN Endpoint Address: 192.168.1.96, L2 Routing Instance: default-switch, L3 Routing Instance: default Input packets : 0 Output packets: 6364 Protocol eth-switch, MTU: Unlimited Flags: Trunk-Mode
- Verify that each VNI maps to the associated VXLAN tunnel. content_copy zoom_out_map
user@leaf-1> show ethernet-switching vxlan-tunnel-end-point remote 0 192.168.1.1 lo0.0 0 RVTEP-IP IFL-Idx NH-Id 192.168.0.1 587 1792 VNID MC-Group-IP 10000 0.0.0.0 20000 0.0.0.0 30000 0.0.0.0 40000 0.0.0.0 ... RVTEP-IP IFL-Idx NH-Id 192.168.1.96 613 1820 VNID MC-Group-IP 10000 0.0.0.0 20000 0.0.0.0 30000 0.0.0.0 40000 0.0.0.0
- Verify that MAC addresses are learned through the VXLAN tunnels. content_copy zoom_out_map
user@leaf-1> show ethernet-switching vxlan-tunnel-end-point remote mac-table MAC flags (S -static MAC, D -dynamic MAC, L -locally learned, C -Control MAC SE -Statistics enabled, NM -Non configured MAC, R -Remote PE MAC, P -Pinned MAC) Logical system : <default> Routing instance : default-switch Bridging domain : VNI_10000+100, VLAN : 100, VNID : 10000 MAC MAC Logical Remote VTEP address flags interface IP address 02:0c:10:01:02:04 DR esi.1764 192.168.1.11 192.168.1.12 192.168.1.10 02:0c:10:01:02:02 DR esi.1771 192.168.1.6 192.168.1.4 02:0c:10:01:02:03 DR esi.1774 192.168.1.7 00:00:5e:00:01:01 DR esi.1781 192.168.0.4 192.168.0.2 192.168.0.1 192.168.0.3 06:4b:8c:cd:c4:38 D vtep.32779 192.168.0.3 06:4b:8c:67:0f:f0 D vtep.32781 192.168.0.1 06:4b:8c:cd:13:f8 D vtep.32782 192.168.0.2 06:38:e1:6f:30:29 D vtep.32783 192.168.0.4 ---(more)---
- Verify multihoming information of the gateway and the aggregated Ethernet
interfaces. content_copy zoom_out_map
user@leaf-1> show ethernet-switching vxlan-tunnel-end-point esi ## Local AE link – QFX5100 leaf devices ESI RTT VLNBH INH ESI-IFL LOC-IFL #RVTEPs 00:00:00:00:00:00:51:00:00:01 default-switch 1768 131078 esi.1768 ae11.0, 2 RVTEP-IP RVTEP-IFL VENH MASK-ID FLAGS 192.168.1.2 vtep.32780 1782 1 2 192.168.1.3 vtep.32772 1767 0 2 ## Remote AE Link for QFX5110 leaf devices ESI RTT VLNBH INH ESI-IFL LOC-IFL #RVTEPs 00:00:00:00:00:00:51:10:00:01 default-switch 1771 131081 esi.1771 3 RVTEP-IP RVTEP-IFL VENH MASK-ID FLAGS 192.168.1.6 vtep.32771 1766 2 2 192.168.1.4 vtep.32770 1765 1 2 192.168.1.5 vtep.32774 1770 0 2 ## Remote AE Link for QFX5200 leaf devices ESI RTT VLNBH INH ESI-IFL LOC-IFL #RVTEPs 00:00:00:00:00:00:52:00:00:01 default-switch 1774 131084 esi.1774 3 RVTEP-IP RVTEP-IFL VENH MASK-ID FLAGS 192.168.1.9 vtep.32778 1776 2 2 192.168.1.8 vtep.32777 1775 1 2 192.168.1.7 vtep.32776 1773 0 2 ## Remote AE Link for QFX10002 leaf devices ESI RTT VLNBH INH ESI-IFL LOC-IFL #RVTEPs 00:00:00:00:00:01:00:00:00:01 default-switch 1764 131074 esi.1764 3 RVTEP-IP RVTEP-IFL VENH MASK-ID FLAGS 192.168.1.11 vtep.32775 1772 2 2 192.168.1.12 vtep.32773 1769 1 2 192.168.1.10 vtep.32769 1759 0 2 ## ESI multihoming to the VTEP for each segment ESI RTT VLNBH INH ESI-IFL LOC-IFL #RVTEPs 05:19:17:f3:41:00:00:27:10:00 default-switch 1781 131091 esi.1781 4 RVTEP-IP RVTEP-IFL VENH MASK-ID FLAGS 192.168.0.4 vtep.32783 1796 3 2 192.168.0.2 vtep.32782 1793 2 2 192.168.0.1 vtep.32781 1792 1 2 192.168.0.3 vtep.32779 1777 0 2 ...
- Verify that the VXLAN tunnel from one leaf to another leaf is load balanced with
equal cost multipathing (ECMP) over the underlay. content_copy zoom_out_map
user@leaf-1> show route forwarding-table table default-switch extensive | find vtep.32770 Destination: vtep.32770 Route type: interface Route reference: 0 Route interface-index: 576 Multicast RPF nh index: 0 P2mpidx: 0 Flags: sent to PFE Nexthop: Next-hop type: composite Index: 1765 Reference: 12 Next-hop type: indirect Index: 131076 Reference: 3 Next-hop type: unilist Index: 131193 Reference: 238 Nexthop: 172.16.1.2 Next-hop type: unicast Index: 1791 Reference: 10 Next-hop interface: ae1.0 Weight: 0x0 Nexthop: 172.16.1.6 Next-hop type: unicast Index: 1794 Reference: 10 Next-hop interface: ae2.0 Weight: 0x0 Nexthop: 172.16.1.10 Next-hop type: unicast Index: 1758 Reference: 10 Next-hop interface: ae3.0 Weight: 0x0 Nexthop: 172.16.1.14 Next-hop type: unicast Index: 1795 Reference: 10 Next-hop interface: ae4.0 Weight: 0x0
- Verify that remote MAC addresses are reachable through ECMP. content_copy zoom_out_map
user@leaf-1> show route forwarding-table table default-switch extensive destination 02:0c:10:01:02:03/48 Routing table: default-switch.evpn-vxlan [Index 4] Bridging domain: VNI_10000.evpn-vxlan [Index 3] VPLS: Enabled protocols: Bridging, ACKed by all peers, EVPN VXLAN, Destination: 02:0c:10:01:02:03/48 Learn VLAN: 0 Route type: user Route reference: 0 Route interface-index: 582 Multicast RPF nh index: 0 P2mpidx: 0 IFL generation: 169 Epoch: 0 Sequence Number: 0 Learn Mask: 0x400000000000000003000000000000000000000 L2 Flags: control_dyn Flags: sent to PFE Nexthop: Next-hop type: composite Index: 1773 Reference: 12 Next-hop type: indirect Index: 131085 Reference: 3 Next-hop type: unilist Index: 131193 Reference: 238 Nexthop: 172.16.1.2 Next-hop type: unicast Index: 1791 Reference: 10 Next-hop interface: ae1.0 Weight: 0x0 Nexthop: 172.16.1.6 Next-hop type: unicast Index: 1794 Reference: 10 Next-hop interface: ae2.0 Weight: 0x0 Nexthop: 172.16.1.10 Next-hop type: unicast Index: 1758 Reference: 10 Next-hop interface: ae3.0 Weight: 0x0 Nexthop: 172.16.1.14 Next-hop type: unicast Index: 1795 Reference: 10 Next-hop interface: ae4.0 Weight: 0x0
Note:Though the MAC address is reachable over multiple VTEP interfaces, QFX5100, QFX5110, QFX5120-32C, and QFX5200 switches do not support ECMP across the overlay because of a merchant ASIC limitation. Only the QFX10000 line of switches contain a custom Juniper Networks ASIC that supports ECMP across both the overlay and the underlay.
content_copy zoom_out_mapuser@leaf-1> show ethernet-switching table vlan-id 100 | match 02:0c:10:01:02:03 VNI_10000 02:0c:10:01:02:03 DR esi.1774 00:00:00:00:00:00:52:00:00:01 user@leaf-1> show route forwarding-table table default-switch extensive destination 02:0c:10:01:02:03/48 Routing table: default-switch.evpn-vxlan [Index 9] Bridging domain: VNI_10000.evpn-vxlan [Index 3] VPLS: Enabled protocols: Bridging, ACKed by all peers, EVPN VXLAN, Destination: 02:0c:10:01:02:03/48 Learn VLAN: 0 Route type: user Route reference: 0 Route interface-index: 550 Multicast RPF nh index: 0 P2mpidx: 0 IFL generation: 0 Epoch: 0 Sequence Number: 0 Learn Mask: 0x400000000000000001000000000000000000000 L2 Flags: control_dyn, esi Flags: sent to PFE Next-hop type: indirect Index: 2097173 Reference: 5 Nexthop: Next-hop type: composite Index: 1947 Reference: 2 Nexthop: Next-hop type: composite Index: 1948 Reference: 8 Next-hop type: indirect Index: 2097174 Reference: 3 Next-hop type: unilist Index: 2097280 Reference: 241 Nexthop: 172.16.10.2 Next-hop type: unicast Index: 1950 Reference: 11 Next-hop interface: ae1.0 Weight: 0x0 Nexthop: 172.16.10.6 Next-hop type: unicast Index: 1956 Reference: 10 Next-hop interface: ae2.0 Weight: 0x0 Nexthop: 172.16.10.10 Next-hop type: unicast Index: 1861 Reference: 10 Next-hop interface: ae3.0 Weight: 0x0 Nexthop: 172.16.10.14 Next-hop type: unicast Index: 1960 Reference: 10 Next-hop interface: ae4.0 Weight: 0x0
- Verify which device is the Designated Forwarder (DF) for broadcast, unknown, and
multicast (BUM) traffic coming from the VTEP tunnel. Note:
Because the DF IP address is listed as 192.168.1.2, Leaf 2 is the DF.
content_copy zoom_out_mapuser@leaf-1> show evpn instance esi 00:00:00:00:00:00:51:00:00:01 designated-forwarder Instance: default-switch Number of ethernet segments: 12 ESI: 00:00:00:00:00:00:51:00:00:01 Designated forwarder: 192.168.1.2
Configuring a VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances
You can configure a VLAN-aware CRB overlay model using virtual switches or MAC-VRF instances. With either of these models, you can configure multiple switching instances where each switching instance can support up to 4094 VLANs per instance.
The configuration method for VLANs (at the leaf devices) and IRB interfaces (at the spine devices) is similar to the default instance method for VLAN-aware CRB overlays. The main difference is that you configure certain elements inside the virtual switching instances or MAC-VRF instances. See Figure 6.

When you implement this style of overlay on a spine device, you:
Configure a virtual switch or MAC-VRF instance with:
The loopback interface as the VTEP source interface.
Route distinguishers and route targets.
EVPN with VXLAN encapsulation.
VLAN to VNI mappings and Layer 3 IRB interface associations.
Configure virtual gateways, virtual MAC addresses, and corresponding IRB interfaces (to provide routing between VLANs).
To implement this overlay style on a leaf device:
Configure a virtual switch or a MAC-VRF instance with:
The loopback interface as the VTEP source interface.
Route distinguishers and route targets.
EVPN with VXLAN encapsulation.
VLAN to VNI mappings.
Set the following end system-facing elements:
An Ethernet segment ID (ESI).
Flexible VLAN tagging and extended VLAN bridge encapsulation.
LACP settings.
VLAN IDs.
For an overview of VLAN-aware CRB overlays, see the Centrally-Routed Bridging Overlay section in Data Center Fabric Blueprint Architecture Components.
For information on MAC-VRF instances, see MAC-VRF Instances for Multitenancy in Network Virtualization Overlays and MAC-VRF Routing Instance Type Overview.
For a simpler method that works on all leaf platforms used in this reference design, see Configuring a VLAN-Aware CRB Overlay in the Default Instance
The following sections provide the detailed steps of how to configure and verify the VLAN-aware CRB overlay with virtual switches or MAC-VRF instances.
- Configuring the VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances on a Spine Device
- Verifying the VLAN-Aware Model for a CRB Overlay with Virtual Switches or MAC-VRF Instances on a Spine Device
- Configuring the VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances on a Leaf Device
- Verifying the VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances on a Leaf Device
Configuring the VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances on a Spine Device
To configure a VLAN-aware style of CRB overlay on a spine device, perform the following:
The following example shows the configuration for Spine 1, as shown in Figure 7.

- Ensure the IP fabric underlay is in place. To configure an IP fabric on spine devices, see IP Fabric Underlay Network Design and Implementation.
- Confirm that your IBGP overlay is up and running. To configure an IBGP overlay on your spine devices, see Configure IBGP for the Overlay.
- (QFX5130 and QFX5700 switches only) On any QFX5130 or QFX5700 switches in the
fabric that you configure with EVPN-VXLAN, set the
host-profile
unified forwarding profile option to support EVPN with VXLAN encapsulation (see Layer 2 Forwarding Tables for details):content_copy zoom_out_mapset system packet-forwarding-options forwarding-profile host-profile
- Configure a virtual switch instance (VS1) or a MAC-VRF instance (MAC-VRF-1) for a
VLAN-aware service. With the VLAN-aware service type, you can configure the instance
with one or more VLANs. Include VTEP information, VXLAN encapsulation, VLAN to VNI
mapping, associated IRB interfaces, and other instance details (such as a route
distinguisher and a route target) as part of the configuration.
For a virtual switch instance, use
instance-type virtual-switch
. Using the VLAN-aware model, configure VLANs VNI_90000 and VNI_100000 in the virtual switch instance with the associated IRB interfaces.Spine 1 (Virtual Switch Instance):
content_copy zoom_out_mapset routing-instances VS1 vtep-source-interface lo0.0 set routing-instances VS1 instance-type virtual-switch set routing-instances VS1 route-distinguisher 192.168.0.1:900 set routing-instances VS1 vrf-target target:62273:90000 set routing-instances VS1 vrf-target auto set routing-instances VS1 protocols evpn encapsulation vxlan set routing-instances VS1 protocols evpn extended-vni-list all set routing-instances VS1 protocols evpn default-gateway no-gateway-community set routing-instances VS1 vlans VNI_90000 vlan-id none set routing-instances VS1 vlans VNI_90000 l3-interface irb.900 set routing-instances VS1 vlans VNI_90000 vxlan vni 90000 set routing-instances VS1 vlans VNI_100000 vlan-id none set routing-instances VS1 vlans VNI_100000 l3-interface irb.1000 set routing-instances VS1 vlans VNI_100000 vxlan vni 100000
With MAC-VRF instances, use
instance-type mac-vrf
. You also configure the service type when you create the MAC-VRF instance. Here we configureservice-type vlan-aware
with the two VLANs VNI_90000 and VNI_100000 and their associated IRB interfaces in the MAC-VRF instance.Spine 1 (MAC-VRF Instance):
content_copy zoom_out_mapset routing-instances MAC-VRF-1 vtep-source-interface lo0.0 set routing-instances MAC-VRF-1 instance-type mac-vrf set routing-instances MAC-VRF-1 service-type vlan-aware set routing-instances MAC-VRF-1 route-distinguisher 192.168.0.1:900 set routing-instances MAC-VRF-1 vrf-target target:62273:90000 set routing-instances MAC-VRF-1 vrf-target auto set routing-instances MAC-VRF-1 protocols evpn encapsulation vxlan set routing-instances MAC-VRF-1 protocols evpn extended-vni-list all set routing-instances MAC-VRF-1 protocols evpn default-gateway no-gateway-community set routing-instances MAC-VRF-1 vlans VNI_90000 vlan-id none set routing-instances MAC-VRF-1 vlans VNI_90000 l3-interface irb.900 set routing-instances MAC-VRF-1 vlans VNI_90000 vxlan vni 90000 set routing-instances MAC-VRF-1 vlans VNI_100000 vlan-id none set routing-instances MAC-VRF-1 vlans VNI_100000 l3-interface irb.1000 set routing-instances MAC-VRF-1 vlans VNI_100000 vxlan vni 100000
- (MAC-VRF instances only) Enable shared tunnels on the device.
A device can have problems with VTEP scaling when the configuration uses multiple MAC-VRF instances. As a result, to avoid this problem, we require that you enable the shared tunnels feature on the QFX5000 line of switches with a MAC-VRF instance configuration. When you configure the shared-tunnels option, the device minimizes the number of next-hop entries to reach remote VTEPs. The following statement globally enables shared VXLAN tunnels on the device:
content_copy zoom_out_mapset forwarding-options evpn-vxlan shared-tunnels
This statement is optional on the QFX10000 line of switches, which can handle higher VTEP scaling than QFX5000 switches.
Note:This setting requires you to reboot the device.
- Configure spine devices with one or more VLANs for the VLAN-aware method. Include
settings for the IPv4 and IPv6 virtual gateways and virtual MAC addresses. This
example shows the configuration for Spine 1 with IRB interfaces and virtual gateways
for VLANs VNI_90000 and VNI_100000.
Spine 1:
content_copy zoom_out_mapset interfaces irb unit 900 proxy-macip-advertisement set interfaces irb unit 900 virtual-gateway-accept-data set interfaces irb unit 900 family inet address 10.1.8.1/24 virtual-gateway-address 10.1.8.254 set interfaces irb unit 900 family inet6 address 2001:db8::10:1:8:1/112 virtual-gateway-address 2001:db8::10:1:8:254 set interfaces irb unit 900 family inet6 address fe80::10:1:8:1/112 set interfaces irb unit 900 family inet6 nd6-stale-time 600 set interfaces irb unit 900 virtual-gateway-v4-mac 00:00:5e:90:00:00 set interfaces irb unit 900 virtual-gateway-v6-mac 00:00:5e:90:00:00 set interfaces irb unit 1000 proxy-macip-advertisement set interfaces irb unit 1000 virtual-gateway-accept-data set interfaces irb unit 1000 family inet address 10.1.9.1/24 virtual-gateway-address 10.1.9.254 set interfaces irb unit 1000 family inet6 address 2001:db8::10:1:9:1/112 virtual-gateway-address 2001:db8::10:1:9:254 set interfaces irb unit 1000 family inet6 address fe80::10:1:9:1/112 set interfaces irb unit 1000 family inet6 nd6-stale-time 600 set interfaces irb unit 1000 virtual-gateway-v4-mac 00:00:5e:a0:00:00 set interfaces irb unit 1000 virtual-gateway-v6-mac 00:00:5e:a0:00:00
Verifying the VLAN-Aware Model for a CRB Overlay with Virtual Switches or MAC-VRF Instances on a Spine Device
To verify this style of overlay on a spine device, run the commands in this section.
Most commands here show output for a virtual switch instance configuration. With a MAC-VRF instance configuration, you can alternatively use:
show mac-vrf forwarding
commands that are aliases for theshow ethernet-switching
commands in this section.The
show mac-vrf routing database
command, which is an alias for theshow evpn database
command in this section.The
show mac-vrf routing instance
command, which is an alias for theshow evpn instance
command in this section.
See MAC-VRF Routing Instance Type Overview for tables of show mac-vrf
forwarding
and show ethernet-switching
command mappings, and
show mac-vrf routing
command aliases for show evpn
commands.
Otherwise, you can use the commands in this section for either virtual switch instances or MAC-VRF instances.
The output with a MAC-VRF instance configuration displays similar information for MAC-VRF routing instances as this section shows for virtual switch instances. One main difference you might see is in the output with MAC-VRF instances on devices where you enable the shared tunnels feature. With shared tunnels enabled, you see VTEP interfaces in the following format:
vtep-index.shared-tunnel-unit
where:
index is the index associated with the MAC-VRF routing instance.
shared-tunnel-unit is the unit number associated with the shared tunnel remote VTEP logical interface.
For example, if a device has a MAC-VRF instance with index 26 and the instance connects to two remote VTEPs, the shared tunnel VTEP logical interfaces might look like this:
vtep-26.32823 vtep-26.32824
- Verify the IRB interfaces for VNIs 90000 and 100000 are operational for both IPv4
and IPv6. content_copy zoom_out_map
user@spine-1> show interfaces terse irb | find irb\.900 irb.900 up up inet 10.1.8.1/24 10.1.8.254/24 inet6 2001:db8::10:1:8:1/112 2001:db8::10:1:8:254/112 fe80::10:1:8:1/112 irb.1000 up up inet 10.1.9.1/24 10.1.9.254/24 inet6 2001:db8::10:1:9:1/112 2001:db8::10:1:9:254/112 fe80::10:1:9:1/112
- (MAC-VRF instances only) Verify the VLANs you configured as part of the MAC-VRF
instance. content_copy zoom_out_map
user@spine-1> show mac-vrf forwarding instance MAC-VRF-1 Information for routing instance and VLAN: Flags (DL - disable learning, SE - stats enabled, AD - packet action drop, LH - MAC limit hit, MI - mac+ip limit hit) Inst Logical Routing VLAN name Index IRB Flags Tag type system instance index RTT Default MAC-VRF-1 26 vlan Default MAC-VRF-1 VNI-90000 3403 4204 900 vlan Default MAC-VRF-1 VNI-100000 3425 4203 1000 . . . user@spine-1> show vlans VNI-90000 Routing instance VLAN name Tag Interfaces MAC-VRF-1 VNI-90000 NA esi.105902* esi.89032* vtep-26.32823* vtep-26.32824* vtep-26.32827*
- Verify switching details about the EVPN routing instance. This output includes
information about the route distinguisher (192.168.1.10:900), VXLAN encapsulation, ESI
(00:00:00:00:00:01:00:00:00:02), verification of the VXLAN tunnels for VLANs 900 and
1000, EVPN neighbors (Spine 2 - 4, and Leaf 10 - 12), and the source VTEP IP address
(192.168.0.1). content_copy zoom_out_map
user@spine-1> show evpn instance VS1 extensive Instance: VS1 Route Distinguisher: 192.168.0.1:900 Encapsulation type: VXLAN MAC database status Local Remote MAC advertisements: 2 14 MAC+IP advertisements: 14 26 Default gateway MAC advertisements: 4 0 Number of local interfaces: 0 (0 up) Number of IRB interfaces: 2 (2 up) Interface name VLAN VNI Status L3 context irb.1000 100000 Up master irb.900 90000 Up master Number of bridge domains: 2 VLAN Domain ID Intfs / up IRB intf Mode MAC sync IM route label SG sync IM core nexthop 8191 90000 0 0 irb.900 Extended Enabled 90000 Disabled 8191 100000 0 0 irb.1000 Extended Enabled 100000 Disabled Number of neighbors: 6 Address MAC MAC+IP AD IM ES Leaf-label 192.168.0.2 4 10 2 2 0 192.168.0.3 4 10 2 2 0 192.168.0.4 4 10 2 2 0 192.168.1.10 1 2 2 2 0 192.168.1.11 0 0 2 2 0 192.168.1.12 1 2 2 2 0 Number of ethernet segments: 3 ESI: 00:00:00:00:00:01:00:00:00:02 Status: Resolved Number of remote PEs connected: 3 Remote PE MAC label Aliasing label Mode 192.168.1.12 90000 0 all-active 192.168.1.11 90000 0 all-active 192.168.1.10 100000 0 all-active ESI: 05:19:17:f3:41:00:01:5f:90:00 Local interface: irb.900, Status: Up/Forwarding Number of remote PEs connected: 3 Remote PE MAC label Aliasing label Mode 192.168.0.3 90000 0 all-active 192.168.0.2 90000 0 all-active 192.168.0.4 90000 0 all-active ESI: 05:19:17:f3:41:00:01:86:a0:00 Local interface: irb.1000, Status: Up/Forwarding Number of remote PEs connected: 3 Remote PE MAC label Aliasing label Mode 192.168.0.3 100000 0 all-active 192.168.0.2 100000 0 all-active 192.168.0.4 100000 0 all-active Router-ID: 192.168.0.1 Source VTEP interface IP: 192.168.0.1
- Verify the MAC address table on the leaf device. Note:
00:00:5e:90:00:00 and 00:00:5e:a0:00:00 are the IP subnet gateways on the spine device.
02:0c:10:09:02:01 and 02:0c:10:08:02:01 are end systems connected through the leaf device.
content_copy zoom_out_mapuser@spine-1> show ethernet-switching table instance VS1 MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC) Ethernet switching table : 5 entries, 5 learned Routing instance : VS1 Vlan MAC MAC Logical Active name address flags interface source VNI_100000 00:00:5e:a0:00:00 DR esi.2454 05:19:17:f3:41:00:01:86:a0:00 VNI_100000 06:4b:8c:cd:13:f8 D vtep.32773 192.168.0.2 VNI_100000 06:4b:8c:cd:c4:38 D vtep.32787 192.168.0.3 VNI_100000 02:0c:10:09:02:01 DR esi.2467 00:00:00:00:00:01:00:00:00:02 VNI_100000 06:38:e1:6f:30:29 D vtep.32796 192.168.0.4 MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC) Ethernet switching table : 5 entries, 5 learned Routing instance : VS1 Vlan MAC MAC Logical Active name address flags interface source VNI_90000 00:00:5e:90:00:00 DR esi.2455 05:19:17:f3:41:00:01:5f:90:00 VNI_90000 06:4b:8c:cd:13:f8 D vtep.32773 192.168.0.2 VNI_90000 06:4b:8c:cd:c4:38 D vtep.32787 192.168.0.3 VNI_90000 02:0c:10:08:02:01 DR esi.2467 00:00:00:00:00:01:00:00:00:02 VNI_90000 06:38:e1:6f:30:29 D vtep.32796 192.168.0.4
- Verify the end system MAC address is reachable from all three leaf devices. content_copy zoom_out_map
user@spine-1> show ethernet-switching vxlan-tunnel-end-point esi | find esi.2467 00:00:00:00:00:01:00:00:00:02 VS1 2467 2097182 esi.2467 3 RVTEP-IP RVTEP-IFL VENH MASK-ID FLAGS 192.168.1.10 vtep.32789 2522 2 2 192.168.1.11 vtep.32782 2475 1 2 192.168.1.12 vtep.32779 2466 0 2 ESI RTT VLNBH INH ESI-IFL LOC-IFL #RVTEPs
- Verify the end system is reachable through the forwarding table. content_copy zoom_out_map
user@spine-1> show route forwarding-table table VS1 destination 02:0c:10:09:02:01/48 extensive Routing table: VS1.evpn-vxlan [Index 11] Bridging domain: VNI_100000.evpn-vxlan [Index 9] VPLS: Enabled protocols: Bridging, ACKed by all peers, EVPN VXLAN, Destination: 02:0c:10:09:02:01/48 Learn VLAN: 0 Route type: user Route reference: 0 Route interface-index: 676 Multicast RPF nh index: 0 P2mpidx: 0 IFL generation: 0 Epoch: 0 Sequence Number: 0 Learn Mask: 0x400000000000000006000000000000000000000 L2 Flags: control_dyn, esi Flags: sent to PFE Next-hop type: indirect Index: 2097182 Reference: 3 Nexthop: Next-hop type: composite Index: 2467 Reference: 2 Nexthop: Next-hop type: composite Index: 2522 Reference: 6 Next-hop type: indirect Index: 2097154 Reference: 5 Nexthop: 172.16.10.1 Next-hop type: unicast Index: 2172 Reference: 11 Next-hop interface: ae10.0 Nexthop: Next-hop type: composite Index: 2475 Reference: 6 Next-hop type: indirect Index: 2097193 Reference: 5 Nexthop: 172.16.11.1 Next-hop type: unicast Index: 2194 Reference: 11 Next-hop interface: ae11.0 Nexthop: Next-hop type: composite Index: 2466 Reference: 6 Next-hop type: indirect Index: 2097195 Reference: 5 Nexthop: 172.16.12.1 Next-hop type: unicast Index: 2916 Reference: 11 Next-hop interface: ae12.0
- Verify end system information (MAC address, IP address, etc.) has been added to the
IPv4 ARP table and IPv6 neighbor table. content_copy zoom_out_map
user@spine-1> show arp no-resolve expiration-time | match "irb.900|irb.1000" 06:4b:8c:cd:13:f8 10.1.8.2 irb.900 [vtep.32773] none 1035 06:4b:8c:cd:c4:38 10.1.8.3 irb.900 [vtep.32787] none 1064 06:38:e1:6f:30:29 10.1.8.4 irb.900 [vtep.32796] none 964 02:0c:10:08:02:01 10.1.8.201 irb.900 [.local..11] none 781 06:4b:8c:cd:13:f8 10.1.9.2 irb.1000 [vtep.32773] none 910 06:4b:8c:cd:c4:38 10.1.9.3 irb.1000 [vtep.32787] none 1344 06:38:e1:6f:30:29 10.1.9.4 irb.1000 [vtep.32796] none 1160 02:0c:10:09:02:01 10.1.9.201 irb.1000 [.local..11] none 1099 user@spine-1> show ipv6 neighbors | match "irb.900|irb.1000" 2001:db8::10:1:8:2 06:4b:8c:cd:13:f8 stale 969 yes no irb.900 [vtep.32773] 2001:db8::10:1:8:3 06:4b:8c:cd:c4:38 stale 1001 yes no irb.900 [vtep.32787] 2001:db8::10:1:8:4 06:38:e1:6f:30:29 stale 971 yes no irb.900 [vtep.32796] 2001:db8::10:1:8:201 02:0c:10:08:02:01 stale 1178 no no irb.900 [.local..11] 2001:db8::10:1:9:2 06:4b:8c:cd:13:f8 stale 955 yes no irb.1000 [vtep.32773] 2001:db8::10:1:9:3 06:4b:8c:cd:c4:38 stale 1006 yes no irb.1000 [vtep.32787] 2001:db8::10:1:9:4 06:38:e1:6f:30:29 stale 990 yes no irb.1000 [vtep.32796] 2001:db8::10:1:9:201 02:0c:10:09:02:01 stale 1199 no no irb.1000 [.local..11] fe80::10:1:8:2 06:4b:8c:cd:13:f8 stale 991 yes no irb.900 [vtep.32773] fe80::10:1:8:3 06:4b:8c:cd:c4:38 stale 989 yes no irb.900 [vtep.32787] fe80::10:1:8:4 06:38:e1:6f:30:29 stale 966 yes no irb.900 [vtep.32796] fe80::10:1:9:2 06:4b:8c:cd:13:f8 stale 978 yes no irb.1000 [vtep.32773] fe80::10:1:9:3 06:4b:8c:cd:c4:38 stale 994 yes no irb.1000 [vtep.32787] fe80::10:1:9:4 06:38:e1:6f:30:29 stale 1006 yes no irb.1000 [vtep.32796]
- Verify that the EVPN database contains the MAC address (02:0c:10:08:02:01) and ARP
information learned from an end system connected to the leaf device. content_copy zoom_out_map
user@spine-1> show evpn database mac-address 02:0c:10:08:02:01 extensive Instance: VS1 VN Identifier: 90000, MAC address:: 02:0c:10:08:02:01 Source: 00:00:00:00:00:01:00:00:00:02, Rank: 1, Status: Active Remote origin: 192.168.1.10 Remote origin: 192.168.1.11 Remote origin: 192.168.1.12 Timestamp: Sep 10 23:47:37 (0x59b63189) State: <Remote-To-Local-Adv-Done> IP address: 10.1.8.201 Flags: <Proxy> Remote origin: 192.168.1.10 Remote origin: 192.168.1.11 Remote origin: 192.168.1.12 IP address: 2001:db8::10:1:8:201 Remote origin: 192.168.1.10 Remote origin: 192.168.1.11 Remote origin: 192.168.1.12 History db: Time Event Sep 10 23:47:39 2017 Applying remote state to peer 192.168.1.11 Sep 10 23:47:39 2017 Remote peer 192.168.1.11 updated Sep 10 23:47:39 2017 MAC+IP not updated, source l2ald is not owner (type2) Sep 10 23:47:39 2017 Updated Sep 10 23:47:39 2017 No change to MAC state Sep 10 23:47:39 2017 Applying remote state to peer 192.168.1.12 Sep 10 23:47:39 2017 Remote peer 192.168.1.12 updated Sep 10 23:47:39 2017 MAC+IP not updated, source l2ald is not owner (type2) Sep 10 23:47:39 2017 Updated Sep 10 23:47:39 2017 No change to MAC state
Configuring the VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances on a Leaf Device
To configure a VLAN-aware CRB overlay in a virtual switch or a MAC-VRF instance on a leaf device, perform the following:
The following example shows the configuration for Leaf 10, as shown in Figure 8.

- Ensure the IP fabric underlay is in place. To configure an IP fabric on leaf devices, see IP Fabric Underlay Network Design and Implementation.
- Confirm that your IBGP overlay is up and running. To configure an IBGP overlay on your leaf devices, see Configure IBGP for the Overlay.
- Configure a virtual switch instance (VS1) or a MAC-VRF instance (MAC-VRF-1) to
enable EVPN-VXLAN. Also, map VLANs 900 and 1000 to VNIs 90000 and 100000 in the
instance.
For a virtual switch instance, use
instance-type virtual-switch
.Leaf 10 (Virtual Switch Instance):
content_copy zoom_out_mapset routing-instances VS1 vtep-source-interface lo0.0 set routing-instances VS1 instance-type virtual-switch set routing-instances VS1 route-distinguisher 192.168.1.10:900 set routing-instances VS1 vrf-target target:62273:90000 set routing-instances VS1 vrf-target auto set routing-instances VS1 protocols evpn encapsulation vxlan set routing-instances VS1 protocols evpn extended-vni-list all set routing-instances VS1 protocols evpn default-gateway no-gateway-community set routing-instances VS1 vlans VNI_90000 interface ae12.900 set routing-instances VS1 vlans VNI_90000 vxlan vni 90000 set routing-instances VS1 vlans VNI_100000 interface ae12.1000 set routing-instances VS1 vlans VNI_100000 vxlan vni 100000
With MAC-VRF instances, use
instance-type mac-vrf
. You also configure the service type when you create the MAC-VRF instance. Here we configureservice-type vlan-aware
with the two VLANs VNI_90000 and VNI_100000, and their VNI mappings.Leaf 10 (MAC-VRF Instance):
content_copy zoom_out_mapset routing-instances MAC-VRF-1 vtep-source-interface lo0.0 set routing-instances MAC-VRF-1 instance-type mac-vrf set routing-instances MAC-VRF-1 service-type vlan-aware set routing-instances MAC-VRF-1 route-distinguisher 192.168.1.10:900 set routing-instances MAC-VRF-1 vrf-target target:62273:90000 set routing-instances MAC-VRF-1 vrf-target auto set routing-instances MAC-VRF-1 protocols evpn encapsulation vxlan set routing-instances MAC-VRF-1 protocols evpn extended-vni-list all set routing-instances MAC-VRF-1 protocols evpn default-gateway no-gateway-community set routing-instances MAC-VRF-1 vlans VNI_90000 interface ae12.900 set routing-instances MAC-VRF-1 vlans VNI_90000 vxlan vni 90000 set routing-instances MAC-VRF-1 vlans VNI_100000 interface ae12.1000 set routing-instances MAC-VRF-1 vlans VNI_100000 vxlan vni 100000
- (MAC-VRF instances only) Enable shared tunnels on the device.
A device can have problems with VTEP scaling when the configuration uses multiple MAC-VRF instances. As a result, to avoid this problem, we require that you enable the shared tunnels feature on the QFX5000 line of switches with a MAC-VRF instance configuration. When you configure the shared-tunnels option, the device minimizes the number of next-hop entries to reach remote VTEPs. The following statement globally enables shared VXLAN tunnels on the device:
content_copy zoom_out_mapset forwarding-options evpn-vxlan shared-tunnels
This statement is optional on the QFX10000 line of switches, which can handle higher VTEP scaling than QFX5000 switches.
Note:This setting requires you to reboot the device.
- Configure the leaf device to communicate with the end system. In this example,
configure an aggregated Ethernet interface on Leaf 10—in this case, ae12 with two
member interfaces. With the interface definition, include LACP options, an ESI in
all-active mode, and VLANs 900 and 1000 (which this example uses for the VLAN-aware
service type). Figure 9 illustrates the
topology. Figure 9: ESI Topology for Leaf 10, Leaf 11, and Leaf 12
Leaf 10:
content_copy zoom_out_mapset interfaces ae12 flexible-vlan-tagging set interfaces ae12 encapsulation extended-vlan-bridge set interfaces ae12 esi 00:00:00:00:00:01:00:00:00:02 set interfaces ae12 esi all-active set interfaces ae12 aggregated-ether-options minimum-links 1 set interfaces ae12 aggregated-ether-options lacp active set interfaces ae12 aggregated-ether-options lacp periodic fast set interfaces ae12 aggregated-ether-options lacp system-id 00:01:00:00:00:02 set interfaces ae12 aggregated-ether-options lacp hold-time up 300 set interfaces ae12 unit 900 vlan-id 900 set interfaces ae12 unit 1000 vlan-id 1000 set interfaces et-0/0/23 ether-options 802.3ad ae12 set interfaces et-0/0/35 ether-options 802.3ad ae12
Note that in this example, you configure the aggregated Ethernet interface to support the service provider configuration style. See Flexible Ethernet Service Encapsulation for more information on the service provider style configuration for switch interfaces.
Verifying the VLAN-Aware CRB Overlay with Virtual Switches or MAC-VRF Instances on a Leaf Device
To verify this style of overlay on a leaf device, run the commands in this section.
Most commands here show output for a virtual switch instance configuration. With a MAC-VRF instance configuration, you can alternatively use:
show mac-vrf forwarding
commands that are aliases for theshow ethernet-switching
commands in this section.The
show mac-vrf routing instance
command, which is an alias for theshow evpn instance
command in this section.
See MAC-VRF Routing Instance Type Overview for tables of show mac-vrf
forwarding
and show ethernet-switching
command mappings, and
show mac-vrf routing
command aliases for show evpn
commands.
Otherwise, you can use the commands in this section for either virtual switch instances or MAC-VRF instances.
The output with a MAC-VRF instance configuration displays similar information for MAC-VRF routing instances as this section shows for virtual switch instances. One main difference you might see is in the output with MAC-VRF instances on devices where you enable the shared tunnels feature. With shared tunnels enabled, you see VTEP interfaces in the following format:
vtep-index.shared-tunnel-unit
where:
index is the index associated with the MAC-VRF routing instance.
shared-tunnel-unit is the unit number associated with the shared tunnel remote VTEP logical interface.
For example, if a device has a MAC-VRF instance with index 26 and the instance connects to two remote VTEPs, the shared tunnel VTEP logical interfaces might look like this:
vtep-26.32823 vtep-26.32824
- Verify that the aggregated Ethernet interface is operational on the leaf
device. content_copy zoom_out_map
user@leaf-10> show interfaces terse ae12 Interface Admin Link Proto Local Remote ae12 up up ae12.900 up up eth-switch ae12.1000 up up eth-switch ae12.32767 up up
- (MAC-VRF instances only) Verify the VLANs you configured as part of the MAC-VRF
instance. content_copy zoom_out_map
user@leaf-10> show mac-vrf forwarding instance MAC-VRF-1 Information for routing instance and VLAN: Flags (DL - disable learning, SE - stats enabled, AD - packet action drop, LH - MAC limit hit, MI - mac+ip limit hit) Inst Logical Routing VLAN name Index IRB Flags Tag type system instance index RTT Default MAC-VRF-1 27 vlan Default MAC-VRF-1 VNI-90000 3424 NA vlan Default MAC-VRF-1 VNI-100000 3425 NA . . . user@leaf-10> show vlans VNI-90000 Routing instance VLAN name Tag Interfaces MAC-VRF-1 VNI-90000 NA ae12.900* esi.19955* esi.20938* vtep-27.32820* vtep-27.32821* vtep-27.32822* xe-0/0/18:2.900*
- Verify switching details about the EVPN routing instance. This output includes
information about the route distinguisher (192.168.1.10:900), VXLAN encapsulation, ESI
(00:00:00:00:00:01:00:00:00:02), verification of the VXLAN tunnels for VLANs 900 and
1000, EVPN neighbors (Spine 1 - 4, and Leaf 11 and 12), and the source VTEP IP address
(192.168.1.10). content_copy zoom_out_map
user@leaf-10> show evpn instance VS1 extensive Instance: VS1 Route Distinguisher: 192.168.1.10:900 Encapsulation type: VXLAN MAC database status Local Remote MAC advertisements: 0 20 MAC+IP advertisements: 0 32 Default gateway MAC advertisements: 0 0 Number of local interfaces: 2 (2 up) Interface name ESI Mode Status AC-Role ae12.1000 00:00:00:00:00:01:00:00:00:02 all-active Up Root ae12.900 00:00:00:00:00:01:00:00:00:02 all-active Up Root Number of IRB interfaces: 0 (0 up) Number of bridge domains: 2 VLAN Domain ID Intfs / up IRB intf Mode MAC sync IM route label SG sync IM core nexthop None 90000 1 1 Extended Enabled 90000 Disabled None 100000 1 1 Extended Enabled 100000 Disabled Number of neighbors: 6 Address MAC MAC+IP AD IM ES Leaf-label 192.168.0.1 4 10 2 2 0 192.168.0.2 4 10 2 2 0 192.168.0.3 4 10 2 2 0 192.168.0.4 4 10 2 2 0 192.168.1.11 2 4 2 2 0 192.168.1.12 2 4 2 2 0 Number of ethernet segments: 3 ESI: 00:00:00:00:00:01:00:00:00:02 Status: Resolved by IFL ae12.900 Local interface: ae12.1000, Status: Up/Forwarding Number of remote PEs connected: 2 Remote PE MAC label Aliasing label Mode 192.168.1.12 100000 0 all-active 192.168.1.11 90000 0 all-active DF Election Algorithm: MOD based Designated forwarder: 192.168.1.10 Backup forwarder: 192.168.1.11 Backup forwarder: 192.168.1.12 Last designated forwarder update: Sep 10 23:22:07 ESI: 05:19:17:f3:41:00:01:5f:90:00 Status: Resolved Number of remote PEs connected: 4 Remote PE MAC label Aliasing label Mode 192.168.0.1 90000 0 all-active 192.168.0.3 90000 0 all-active 192.168.0.2 90000 0 all-active 192.168.0.4 90000 0 all-active ESI: 05:19:17:f3:41:00:01:86:a0:00 Status: Resolved Number of remote PEs connected: 4 Remote PE MAC label Aliasing label Mode 192.168.0.1 100000 0 all-active 192.168.0.3 100000 0 all-active 192.168.0.2 100000 0 all-active 192.168.0.4 100000 0 all-active Router-ID: 192.168.1.10 Source VTEP interface IP: 192.168.1.10
- View the MAC address table on the leaf device to confirm that spine device and end
system MAC addresses appear in the table. Note:
00:00:5e:90:00:00 and 00:00:5e:a0:00:00 are the IP subnet gateways on the spine device.
02:0c:10:09:02:01 and 02:0c:10:08:02:01 are end systems connected through the leaf device.
content_copy zoom_out_mapuser@leaf-10> show ethernet-switching table instance VS1 MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC) Ethernet switching table : 6 entries, 6 learned Routing instance : VS1 Vlan MAC MAC Logical Active name address flags interface source VNI_100000 00:00:5e:a0:00:00 DR esi.2139 05:19:17:f3:41:00:01:86:a0:00 VNI_100000 06:4b:8c:67:0f:f0 D vtep.32799 192.168.0.1 VNI_100000 06:4b:8c:cd:13:f8 D vtep.32798 192.168.0.2 VNI_100000 06:4b:8c:cd:c4:38 D vtep.32804 192.168.0.3 VNI_100000 02:0c:10:09:02:01 DR ae12.1000 VNI_100000 06:38:e1:6f:30:29 D vtep.32807 192.168.0.4 MAC flags (S - static MAC, D - dynamic MAC, L - locally learned, P - Persistent static SE - statistics enabled, NM - non configured MAC, R - remote PE MAC, O - ovsdb MAC) Ethernet switching table : 6 entries, 6 learned Routing instance : VS1 Vlan MAC MAC Logical Active name address flags interface source VNI_90000 00:00:5e:90:00:00 DR esi.2144 05:19:17:f3:41:00:01:5f:90:00 VNI_90000 06:4b:8c:67:0f:f0 D vtep.32799 192.168.0.1 VNI_90000 06:4b:8c:cd:13:f8 D vtep.32798 192.168.0.2 VNI_90000 06:4b:8c:cd:c4:38 D vtep.32804 192.168.0.3 VNI_90000 02:0c:10:08:02:01 DR ae12.900 VNI_90000 06:38:e1:6f:30:29 D vtep.32807 192.168.0.4
- Verify that the IP subnet gateway ESIs discovered in Step 3 (esi.2144 for VNI 90000
and esi.2139 for VNI 100000) are reachable from all four spine devices. content_copy zoom_out_map
user@leaf-10> show ethernet-switching vxlan-tunnel-end-point esi | find esi.2144 05:19:17:f3:41:00:01:5f:90:00 VS1 2144 2097224 esi.2144 4 RVTEP-IP RVTEP-IFL VENH MASK-ID FLAGS 192.168.0.4 vtep.32807 2033 3 2 192.168.0.2 vtep.32798 2092 2 2 192.168.0.3 vtep.32804 2174 1 2 192.168.0.1 vtep.32799 2093 0 2 ESI RTT VLNBH INH ESI-IFL LOC-IFL #RVTEPs user@leaf-10> show ethernet-switching vxlan-tunnel-end-point esi | find esi.2139 05:19:17:f3:41:00:01:86:a0:00 VS1 2139 2097221 esi.2139 4 RVTEP-IP RVTEP-IFL VENH MASK-ID FLAGS 192.168.0.4 vtep.32807 2033 3 2 192.168.0.2 vtep.32798 2092 2 2 192.168.0.3 vtep.32804 2174 1 2 192.168.0.1 vtep.32799 2093 0 2
- Verify the IP subnet gateway on the spine device (00:00:5e:a0:00:00) is reachable
through the forwarding table. content_copy zoom_out_map
user@leaf-10> show route forwarding-table table VS1 destination 00:00:5e:a0:00:00/48 extensive Routing table: VS1.evpn-vxlan [Index 10] Bridging domain: VNI_100000.evpn-vxlan [Index 15] VPLS: Enabled protocols: Bridging, ACKed by all peers, EVPN VXLAN, Destination: 00:00:5e:a0:00:00/48 Learn VLAN: 0 Route type: user Route reference: 0 Route interface-index: 571 Multicast RPF nh index: 0 P2mpidx: 0 IFL generation: 0 Epoch: 0 Sequence Number: 0 Learn Mask: 0x40000000000000000f000000000000000000000 L2 Flags: control_dyn, esi Flags: sent to PFE Next-hop type: indirect Index: 2097221 Reference: 2 Nexthop: Next-hop type: composite Index: 2139 Reference: 2 Nexthop: Next-hop type: composite Index: 2033 Reference: 9 Next-hop type: indirect Index: 2097223 Reference: 5 Nexthop: 172.16.10.14 Next-hop type: unicast Index: 2106 Reference: 10 Next-hop interface: ae4.0 Nexthop: Next-hop type: composite Index: 2092 Reference: 9 Next-hop type: indirect Index: 2097172 Reference: 5 Nexthop: 172.16.10.6 Next-hop type: unicast Index: 1951 Reference: 11 Next-hop interface: ae2.0 Nexthop: Next-hop type: composite Index: 2174 Reference: 9 Next-hop type: indirect Index: 2097174 Reference: 5 Nexthop: 172.16.10.10 Next-hop type: unicast Index: 2143 Reference: 11 Next-hop interface: ae3.0 Nexthop: Next-hop type: composite Index: 2093 Reference: 9 Next-hop type: indirect Index: 2097165 Reference: 5 Nexthop: 172.16.10.2 Next-hop type: unicast Index: 2153 Reference: 11 Next-hop interface: ae1.0
Centrally-Routed Bridging Overlay — Release History
Table 1 provides a history of all of the features in this section and their support within this reference design.
Release | Description |
---|---|
19.1R2 | QFX10002-60C and QFX5120-32C switches running Junos OS Release 19.1R2 and later releases in the same release train support all features documented in this section. |
17.3R3-S2 | Adds support for Contrail Enterprise Multicloud, where you can configure CRB overlays from the Contrail Command GUI. |
17.3R3-S1 | All devices in the reference design that support Junos OS Release 17.3R3-S1 and later releases in the same release train also support all features documented in this section |