Apstra EVPN Support Addendum
When deploying EVPN on Apstra-supported devices and NOSs, be aware of several caveats and limitations. Even though EVPN is a standard, vendors implement protocols in very different manners. Also, different ASICs support varying feature sets that impact EVPN BGP VXLAN implementations (Routing In and Out of Tunnels (RIOT) for example). The following sections describe supported EVPN deployment implementations.
Qualified Vendor and NOS
Apstra software supports EVPN on the following hardware. For recommended NOS versions, see Qualified Device and NOS.
Hardware ASIC Support
Apstra supports EVPN on the following hardware ASICs:
-
Arista DCS 7280SE with Arad chipset
-
Cisco Cloudscale
-
Mellanox Spectrum A1
-
Trident Trident2 (see below)
-
Trident Trident2+ (see below)
-
Trident Trident3 (see below)
-
Trident Tomahawk (see below)
-
Juniper Q5
ASIC | Example Switches | Notes |
---|---|---|
Arista Trident2 | Arista DCS-7050 | Can use as Spine, Leaf, or Border Leaf. Must set up EOS Recirculation interface(s) to use as a Layer3 Leaf (see Arista VXLAN documentation for more information). |
Arista Trident3 | DCS-7050CX3 | Can use as Spine, Leaf, or Border Leaf. |
Arista XP80 | Arista DCS-7160 | Ca use as Spine, Leaf, or Border Leaf. |
Arista Jericho | DCS-7280R | Can use as Spine, Leaf, or Border Leaf. |
Cisco Cloudscale | Cisco 93180YC-EX | Can use as Spine, Leaf, or Border Leaf |
Cisco Trident2 with ALE | Cisco 9396PX, 9372PX, 9332PQ, 9504 | Can use as Spine, Leaf, or Border Leaf (see TCAM Carving in NXOS section). |
Cisco Trident2+ | Cisco 3132Q-V | Can't use as Border Leaf |
Juniper Q5 | Juniper QFX10002 | Can use as Spine, Leaf, or Border Leaf |
Juniper Trident2 | Juniper QFX5100 | Can use as Spine or Layer2 Leaf |
Juniper Trident2+ | Juniper QFX5110 | Can use as Spine, Leaf, or Border Leaf |
Juniper Trident3 | Juniper QFX5120 | Can use as Spine, Leaf, or Border Leaf |
For recommended NOS versions, refer to Qualified Devices and NOS <device_support>.
Limitations
EVPN Layer2 Limitations
- VLAN (Rack-local) Virtual networks must be in the default routing zone.
- VxLAN (Inter-rack) Virtual networks can't be part of the default routing zone.
EVPN Layer3 Limitations
- Generic systems with BGP peering to non-default routing zones must connect to leaf devices.
- Generic systems with BGP peering only to the default routing zone can connect to leaf devices, spine devices or superspine devices.
- Multi-zone security segmentations only support up to 16 routing zones (VRFs) on Arista (HW Limitation)
- Inter routing zone (VRF) routing must be handled on a generic system (EVPN type 5 route leaking)
- All BGP sessions and loopback addresses are part of the default routing zone.
TCAM Carving in NX-OS
To successfully deploy EVPN on Cisco Nexus devices other then Cisco Cloudscale, you must first configure Cisco NXOS TCAM carving. These other devices may include Cisco NXOSv, or Cisco Nexus "Trident2" devices such as 9396PX, 9372PX, 9332PQ, or 9504. On Cisco NXOS the ARP Suppression feature is used in order to minimize ARP flooding.
For details, see Juniper Support Knowledge Base article KB36733
Before installing the device agent, we recommend that you apply TCAM Carving during device management setup or during Cisco Power-on Auto Provisioning (POAP). TCAM Carving requires a device reboot.
Alternatively, you can apply TCAM Carving with configlets when you deploy the blueprint. You must manually reboot devices.
Use show hardware access-list tcam region
to show and verify
TCAM allocation on Cisco NX-OS.
Cisco NXOSv TCAM Carving
hardware access-list tcam region vacl 0 hardware access-list tcam region racl 0 hardware access-list tcam region arp-ether 256
no hardware access-list tcam region arp-ether 256 no hardware access-list tcam region racl 0 no hardware access-list tcam region vacl 0
Cisco Trident2 TCAM Carving
hardware access-list tcam region l3qos 0 hardware access-list tcam region arp-ether 256 double-wide
no hardware access-list tcam region l3qos 0 no hardware access-list tcam region arp-ether 256 double-wide
Arista EOS VxLAN Routing
- Recirculation Interface for Arista Trident2 Devices
- VxLAN Routing System Profile for Arista Jericho Devices
- VxLAN Routing Profile for Arista Arad Devices
Recirculation Interface for Arista Trident2 Devices
VxLAN Routing for Trident2 devices (for example, 7050QX-32) is supported but requires assigning EOS recirculation interfaces to unused physical interfaces on the device. You can use configlets to deploy this to all devices that require this configuration.
interface Recirc-Channel501 switchport recirculation features vxlan interface Ethernet35 traffic-loopback source system device mac channel-group recirculation 501 interface Ethernet36 traffic-loopback source system device mac channel-group recirculation 501
interface Ethernet35 no traffic-loopback source system device mac no channel-group recirculation 501 interface Ethernet36 no traffic-loopback source system device mac no channel-group recirculation 501 no interface Recirc-Channel501
VxLAN Routing System Profile for Arista Jericho Devices
We recommend when using VxLAN Routing for Jericho devices (for example, 7280SR-48C6) that you assign EOS VxLAN Routing System Profile on the device.
Before installing the device agent, we recommend that you apply the Arista TCAM system profile during the device management setup or during Arista Zero-Touch Provisioning (ZTP). TCAM system profile requires a device reboot.
Alternatively, you can use configlets to deploy this to all devices requiring this configuration and manually reboot the devices.
hardware tcam system profile vxlan-routing
hardware tcam no system profile vxlan-routing
VxLAN Routing Profile for Arista Arad Devices
We recommend when using VxLAN Routing for Arista Arad devices (for example, on 7280SE platform) that you assign EOS VxLAN Routing Profile on the device.
Before installing the device agent, we recommend that you apply the Arista TCAM system profile during the device management setup or during Arista Zero-Touch Provisioning (ZTP). TCAM system profile requires a device reboot.
Alternatively, you can use configlets to deploy this to all devices requiring this configuration and manually reboot the devices.
hardware tcam profile vxlan-routing
Graph Node VTEP Types
Unicast VTEPs
Unicast VTEPs do not apply to Arista.
Cisco Unicast VTEPs - Vendor Definition: Anycast VTEP
Apstra IP Allocation
Unique per leaf in MLAG pair
Not allocated to singleton switches
MLAG Configuration
interface loopback1 IP address 10.0.0.1/32 IP address 10.0.0.3/32 secondary interface nve1 source-interface loopback1
interface loopback1 IP address 10.0.0.2/32 IP address 10.0.0.3/32 secondary interface nve1 source-interface loopback1
Single Switch Configuration
interface loopback1 IP address 10.0.0.1/32 interface nve1 source-interface loopback1
Logical VTEPs
Arista Logical VTEPs
Apstra IP Allocation
Logical VTEP configured as primary IP on loopback1 interface for both MLAG and singleton switches
All top of rack nodes share same logical VTEP IP:
- MLAG leaf devices share same logical VTEP IP
- Singleton leaf device gets its own VTEP IP
MLAG Configuration
interface loopback1 IP address: 10.0.0.1/32 IP address: 10.0.0.4/32 secondary interface vxlan1 vxlan source-interface loopback1
interface loopback1 IP address: 10.0.0.1/32 IP address: 10.0.0.4/32 secondary interface vxlan1 vxlan source-interface loopback1
Single Switch Configuration
interface loopback1 IP address: 10.0.0.5/32 IP address 10.0.0.4/32 secondary interface vxlan1 vxlan source-interface loopback1
Anycast VTEP
Anycast VTEPs do not apply to Cisco.
Arista Anycast VTEPs
Apstra IP Allocation
One anycast VTEP for entire blueprint, shared between all Arista leaf devices
Configured as secondary IP on loopback1 interface
MLAG Configuration
interface loopback1 IP address 10.0.0.1/32 IP address 10.0.0.5/32 secondary interface vxlan1 vxlan source-interface loopback1
interface loopback1 IP address 10.0.0.1/32 IP address 10.0.0.5/32 secondary interface vxlan1 vxlan source-interface loopback1
Single Switch Configuration
interface loopback1 IP address 10.0.0.5/32 IP address 10.0.0.4/32 secondary interface vxlan1 vxlan source-interface loopback1