Professional Documents
Culture Documents
EVPN
Network Virtualization Solution for Next
Generation DCs & DC Interconnect
Ali Sajassi - Distinguished Engineer
Lukas Krattiger – Principal Engineer
Jiri Chaloupka - TME
BRKMPL-3333
#CLUS
Session Objectives
• To review EVPN strengths and its role as unified Overlay Control
Plane
• To review main use cases in DC, SP, & Ent and how EVPN enables
such use cases
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
#CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Agenda
• Overview
• History, Summary of Services
• Services - Part I
• Secure EVPN & Multi-homing
Services – Part II
• IRB, Multicast, and DC Interconnect
• Services - Part III
• EVPN & L3VPN Interworking, EVPN & VPLS Interworking,
and VPWS & FXC
• Conclusion & Q&A
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
EVPN Overview
EVPN History
Secure EVPN
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
EVPN – Next Gen Overlay Technology
EVPN
Overlay (Provides many services and supports many encapsulations)
Supported Encap: MPLS, VxLAN, NVGRE, GUE, GENEVE, SRv6
MPLS IP Segment
Underlay
(LDP & RSVP-TE) (v4 & v6) Routing
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
EVPN: Unified Overlay Solution
De-facto overlay solution for Next gen all-in-one VPN EVPN is used to address scale
transforming SP COs to NG solution to provide L2VPN, and efficiency issues as
DC to support virtualization, L3VPN, IRB, and more w/ a Enterprises need to migrate
multi-tenancy, flexible MH, single solution from traditional L2
flexible workload placement & access/aggregation networks
mobility, full cross-sectional BW Provides distributed vPE w/ to multi-tenancy fabric w/ the
utilization in fabric and access. white boxes for scaling out same characteristics as NG
instead of scaling up DC.
Supporting multiple Underlay:
MPLS, VxLAN, SR, GENVE Backhauling solution to vPE
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
EVPN: An All-in-one Solution
Services: E-LAN E-LINE E-TREE NVO Multicast L3VPN
(DC Fabric)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
EVPN for SP Distributed vPE
Unified VPN PE1
CE2
nPE
Solution EVPN uPE
EVPN
CE3 CE PW
CE1 Metro WAN PE2
VPLS
Metro CE4
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Some Buzzwords & Their Meanings
DC1 Client
• Multi-site DC interconnect
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Full Cross-Sectional BW Utilization
EVPN-VxLAN
EVPN-MPLS
(e.g., 48 out of 48 paths
VxLAN or VPLS = 100%)
Traditional L2 network (e.g., 4 out of 48 paths
Spine Spine Spine Spine
(bridging) = 8%)
(e.g., 1 out of 48 path Spine Spine Spine Spine Leaf Leaf Leaf Leaf Leaf Leaf Leaf
= 2%)
Spine Spine Spine Spine
Baremetal Baremetal
Baremetal Baremetal
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Full Cross-Sectional BW Utilization – Cont. (2)
To support full cross-sectional BW utilization, following EVPN
constructs are needed:
Load balancing
PE2 PE4
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Multi-tenancy
(multiple overlay networks)
Spines
EVI 20
EVI 10
Leafs
VM VM VM VM VM
EVPN can use BGP RT
constraint (RTC) and Outbound
Route Filtering (ORF) for further
filtering of MAC routes at RR
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Multi-Tenancy – Cont. (3)
(components of overlay networks)
VLAN-Aware Bundle Service I/F VLAN-based Service I/F VLAN Bundle Service I/F
PE PE PE
Bridge
Bridge VLAN Bridge
Domain 1
VLAN-1 Domain 1 VLAN-1 1,2 Domain 1
(BD1)
(BD1) MPLS or IP (BD1)
tunnel MAC-VRF1
Bridge (Ethernet Bridge
Domain 2 payload) Bridge Domain 2
VLAN-2 (BD2) VLAN-2 Domain 2 (BD2)
VLAN
(BD2)
MAC-VRF 3,4 MAC-VRF
MAC-VRF1
RD1 / RT1 RD1 / RT1
CE4
PE4
CE4 PE4
• Proprietary (vPC, Virtual Switch, Cluster) • Works for both MPLS & IP transport
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Flexible Client Site Connectivity – Cont. (2)
Multi-home Multi-home
Single Home
Device/Network Single- Device/Network All-
Device/Network
Active (Per-VLAN) LB Active (Per-Flow) LB
(SHD/SHN))
VM
VM VM VM
• Ethernet Segment • Typically used for MHN in • Typically used for MHD in DCs
Identifier (ESI) of ‘0’ SPs
• Per-flow LB for known unicast
• No DF election • Per VLAN DF election for traffic
all traffic
• Per-VLAN DF for BUM traffic
(default) but can be per flow
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Flexible Client Site Connectivity – Cont. (3)
To support flexible client site connectivity, following EVPN
constructs are needed:
MAC1 MAC2
• Split-horizon: BUM traffic CE1 PE1 PE3 CE2
originating CE device.
PE2 PE4
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Flexible Workload Placement w/ VM mobility
• It can be done w/ centralized GW but results • To forward both intra & inter-subnet traffic
in suboptimum inter-subnet forwarding (and optimally, EVPN-IRB is used (it also helps
scale issues at the GW!) with horizontal scaling)
Centralized DCI GW
L3
GW / DCI GW
L2
Spine Spine Spine Spine
Spine Spine Spine Spine
Spine Spine
Leaf Leaf
Leaf Leaf Leaf Leaf Leaf Leaf Leaf
L3 Leaf Leaf Leaf Leaf Leaf Leaf Leaf
L2
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Flexible Workload Placement w/ VM mobility –
Cont. (2)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Flexible Workload Placement w/ VM mobility –
Cont. (3)
EVPN-IRB (Integrated Routing & Bridging)
VM VM VM VM VM
Inter-subnet - EVPN can use BGP RT constraint
Routed (RTC) and Outbound Route
Intra-subnet - Filtering (ORF) for further filtering
Bridged of IP routes at RR
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Flexible Workload Placement w/ VM mobility –
Cont. (4)
Distributed Anycast Gateway with BGP-EVPN
Spine Identical Anycast Gateway Virtual IP
Distributed Anycast Gateway and MAC address are configured on
serves as the gateway for all IRB i/fs for the tenant
connected hosts (overlay
anycast !!)
Host GW
IP-x, MAC-x
IP-VRF IP-VRF IP-VRF IP-VRF
VM VM VM VM VM
Host-2 Host-3
All the IRB I/Fs perform active Host-1
IP-H2, MAC-H2 IP-H3, MAC-H3
forwarding IP-H1, MAC-H1
Bridge-domain 1 Bridge-domain 2 Bridge-domain 1
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Flexible Workload Placement w/ VM mobility –
Cont. (5)
• Baseline EVPN MAC Mobility Procedure (sec. 15 of EVPN)
• First time advertisement doesn’t include MAC Mobility seq #
• When a PE learns a MAC locally for which it learned it from a remote PE,
then it advertises that MAC with mobility-seq# + 1 (ESI is different)
• When a PE learns a MAC locally for which it learned it from another multi-
homing PE, the it advertises that MAC with no seq#, if the received route
didn’t have a seq# (ESI is the same)
• When a PE learns a MAC locally for which it learned it from another multi-
homing PE, the it advertises that MAC with the same seq#, if the received
route had a seq# (ESI is the same)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Flexible Workload Placement w/ VM mobility –
Cont. (5)
• EVPN MAC Mobility Enhancements
• draft-malhotra-bess-evpn-irb-extended-mobility-01
• It enhanced for IRB use cases where 1:1 fixed mapping assumption
between MAC & IP of a workload no longer holds
1. VM move results in VM IP moving to a new MAC association
• (IPa, MACa -> IPa, MACb)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Services - Part I
Secure EVPN
Use Cases
Branch
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
What is Secure-EVPN? Signaling Channel
Secured Traffic
(draft-sajassi-bess-secure-evpn-01.txt) RR
Channel
PE2
PE2
PE1
PE1 PE3
PE3
PEn PE4
PEn PE4
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
General Requirements
• Support of different VPN solutions over unsecure Internet – i.e.,
EVPN, IP-VPN, MVPN, VPLS, etc.
• With primary application for EVPN
• Leverage P2MP signaling of BGP to setup P2P SAs (secured
tunnels) among participating PEs
• Provide VPN services over the secured tunnels
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
User/Tenant Requirements
• To protect user layer 2 & 3 data and control traffic
• Implies user control & routing info advertised in BGP must be protected
• Which in turn implies BGP session must be protected
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
User/Tenant Requirements – Cont.
• To support following granularity of IPsec Security Association (SA) tunnels
a) Per PE: A single IPsec tunnel between a pair of PEs to be used for all tenants'
traffic supported by the pair of PEs
b) Per tenant: A single IPsec tunnel per tenant per pair of PEs
c) Per subnet: A single IPsec tunnel per subnet (e.g., per VLAN) of a tenant on a
pair of PEs
d) Per IP address: A single IPsec tunnel per pair of IP addresses of a tenant on a
pair of PEs
e) Per MAC address: A single IPsec tunnel per pair of MAC addresses of a tenant
on a pair of PEs
f) Per Attachment Circuit: A single IPsec tunnel per pair of Attachment Circuits
between a pair of PEs
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
General Approach
• Leverage existing Tunnel Encap attribute to signal security info
• Security info can be considered as “color” of the tunnel !!
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Signaling for cntrl
traffic SA setup
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Solution Overview – Cont.
• When a PE device first comes up and wants to setup an IPsec SA
between itself and each of the interested remote PEs, it generates
a DH pair for each of its intended IPsec SA using an algorithm
defined in the IKEv2 Diffie-Hellman Group Transform IDs [IKEv2-
IANA].
• The originating PE distributes DH public value along with a nonce
(using IPsec Tunnel TLV in Tunnel Encapsulation Attribute) to other
remote PEs via the RR.
• Each receiving PE uses this DH public number and the
corresponding nonce in creation of IPsec SA pair to the
originating PE
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Encapsulations
Two types of IPSec encapsulations for our applications
MAC Header
ENCRYPTED
IPsec encap in transport mode
without outer UDP header Payload Payload
ESP Trailer
CRC
(NP = UDP)_
CRC
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Encapsulations – Cont.
Two types of IPSec encapsulations for our applications RFC 3948
MAC Header
ENCRYPTED
Payload
CRC
ESP Trailer
(NP=UDP)
CRC
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Inheritance of Security Policy
• IPsec tunnels for EVPN & other VPNs can be setup at different level of
granularity
• For example, if an IPsec tunnel is needed between a pair of ACs, then
IPsec tunnel attribute is carried along with the EVPN route representing
each AC
• In the absence of such coloring (e.g., sending IPsec tunnel attribute
explicitly along an EVPN route), the route inherits the IPsec tunnel of next
level up (of its parent)
• For example, in the absence of Ipsec tunnel attribute for EVPN route
representing AC, the AC route inherits IPsec tunnel for tenants or peer
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Routes to be used with IPsec Tunnel Encap
Attribute
DC2 WAN
EVPN
EVPN WAN
Metro EVPN
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
EVPN - load-balancing modes
All-Active Single-Active Port-Active
(per flow) (per VLAN) (per port)
V1 V1 V1 V2 V1, V2
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
EVPN Multi-homing Sequence
Segment Auto-Discovery
ESI Auto-Sensing
Redundancy Group
Membership Auto-Discovery
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
EVPN Multihoming Sequence
Spine Spine
Segment Auto-Discovery
ESI Auto-Sensing
ES1
LACP PDU
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
EVPN Multihoming Sequence
Spine Spine
Segment Auto-Discovery
ESI Auto-Sensing
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
EVPN Multihoming Sequence
Spine Spine
Segment Auto-Discovery
Various Modes
Available
ESI Auto-Sensing
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
EVPN Multihoming Sequence
Spine Spine
Segment Auto-Discovery
ESI Auto-Sensing
RD VTEP1
ESI ES1
ES1
Host2
Host1 (MAC2)
(MAC1)
Layer-2
Layer-3
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
EVPN Multihoming Sequence
Spine Spine
Segment Auto-Discovery
ESI Auto-Sensing
RD VTEP1 RD VTEP2
ESI ES1
ES1 ESI ES1
Host2
Host1 (MAC2)
(MAC1)
Layer-2
Layer-3
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
EVPN Multihoming Sequence
Spine Spine
Ordered List of
Segment Auto-Discovery Discovered VTEP
(lowest IP)
VTEP Ordered List VTEP Ordered List
1 VTEP2 1 VTEP2
VTEP1 VTEP2 VTEP3
Redundancy Group
Membership Auto-Discovery
ES1
DF Election and VLAN Carving
Host
Host
Host2
Host1 (MAC2)
(MAC1)
Layer-2
Layer-3
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
EVPN Multihoming Sequence
Spine Spine
Segment Auto-Discovery
1 VTEP2 1 VTEP2
VTEP1 VTEP2 VTEP3
Redundancy Group
Membership Auto-Discovery
ModuloES1
Operation
DF Election and VLAN Carving VID VID mod 2 Result of Modulo
100 0 Operation to
101 1 determine DF Host
Host
102 0
Host2
VID mod N (N = # of PEs) 103 Host1 1 (MAC2)
(MAC1)
Layer-2
Layer-3
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
EVPN Multihoming Sequence
Spine Spine
Segment Auto-Discovery
1 VTEP2 1 VTEP2
VTEP1 VTEP2 VTEP3
Redundancy Group
Membership Auto-Discovery
100 0
101 1 Host
Host
102 0
Host2
VID mod N (N = # of PEs) 103 Host1 1 (MAC2)
(MAC1)
Layer-2
Layer-3
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
EVPN Multihoming Sequence
Spine Spine
Segment Auto-Discovery
ESI Auto-Sensing
RD VTEP1 ES1
DF Election and VLAN Carving ESI ES1
Ethtag MAX-ET
Label 0
Host
Host
Segment Auto-Discovery
ESI Auto-Sensing
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Enhancements to DF Election
• Default VLAN-carving DF election has the following short-comings:
1. When a link/node failure occurs, it shuffles VLANs on healthy links
2. It does not factor in status of a VLAN on an ES (or status of MAC-VRF) in
DF election
PE1
PE1
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Enhancements to DF Election – Cont. (2)
(draft-ietf-bess-evpn-df-election-framework)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Enhancements to DF Election – Cont. (3)
(draft-sajassi-bess-evpn-fast-df-recovery)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Enhancements to DF Election – Cont. 4)
(draft-sajassi-bess-evpn-per-mcast-flow-df-election)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Service Part II
Use Cases Spine Spine
Server Server
Server
Distributed Anycast
Gateway for Data Center PE PE
PE PE PE
Server
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
EVPN IRB for DC
Fabric Evolution
EVPN Integrated Routed and Bridge (IRB)
Spine Spine
• Optimizes Inter-Subnet
Forwarding
Server Server Server
• No Hair-Pinning
• Reduces Unknown Unicast
Supports Host Mobility
Server Server Server
•
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Components
EVPN Integrated Routed and Bridge (IRB)
IRB PE
MAC-VRF:
RD1/RT1
IRB I/F
Bridge IP-VRF:
Domain RD10/RT10
(BD1) MPLS or IP Tunnel
Ethernet I/F
(IP Payload)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Components – MAC-VRF
EVPN Integrated Routed and Bridge (IRB) IRB PE
MAC-VRF Properties:
• Defined as per RFC7432 MAC-VRF:
RD1/RT1
• Properties: IRB I/F
Bridge IP-VRF:
• RD and RT(s) Domain RD10/RT10
(BD1)
• VLAN-Aware
Ethernet I/F
• N BDs per MAC-VRF
• Individual Eth-Tag per BD MAC-VRF: MPLS or IP Tunnel
(Ethernet Payload)
• VLAN-Base RD2/RT2
IRB I/F
• 1 BD per MAC-VRF Bridge
Domain
• Eth-tag always 0 (BD2)
• Each BD may be linked to an IRB Interface
(Inter-Subnet forwarding)
• MPLS or IP tunnels (Ethernet Payload) Bridge Table is Populated with local
MACs, MACs learned on ACs or via
BGP EVPN
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Components – IP-VRF
EVPN Integrated Routed and Bridge (IRB) IRB PE
IP-VRF Properties
• Defined as per RFC7432 MAC-VRF:
RD1/RT1
• Properties: IRB I/F
Bridge IP-VRF:
• RD and RT(s) Domain RD10/RT10
(BD1)
MPLS or IP Tunnel
• Regular Interfaces
Ethernet I/F
(IP Payload)
• IRB Interfaces
MAC-VRF:
• MPLS or IP tunnels (IP Payload) RD2/RT2
IRB I/F
Bridge
Domain
(BD2)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Configuration – MAC-VRF
EVPN Integrated Routed and Bridge (IRB) IRB PE
MAC-VRF Configuration :
vlan101
name GREEN (BD1) MAC-VRF:
vn-segment 30001 RD1/RT1
vlan202
Bridge
name RED (BD2) Domain
vn-segment 30002 (BD1)
Ethernet I/F
evpn
vni 30001 l2 MPLS or IP Tunnel
rd auto MAC-VRF:
(Ethernet Payload)
route-target both auto RD2/RT2
vni 30002 l2 Bridge
rd auto Domain
route-target both auto (BD2)
interface nve1
member vni 30001
macst-group 239.1.1.1
member vni 30002
ingress-replication protocol bgp
Example based on NX-OS Configuration with
VXLAN #CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Configuration – IP-VRF
EVPN Integrated Routed and Bridge (IRB) IRB PE
IP-VRF Configuration :
vrf-context TENANT-YELLOW
vni 50001 MAC-VRF:
rd auto RD1/RT1
address-family ipv4/ipv6 unicast
Bridge IP-VRF:
route-target both auto Domain RD10/RT10
route-target both auto evpn (BD1)
MPLS or IP Tunnel
Ethernet I/F
vlan2501 (IP Payload)
name YELLOW
vn-segment 50001 MAC-VRF:
RD2/RT2
interface vlan2501 Bridge
vrf member TENANT-YELLOW Domain
ip forward (BD2)
ipv6 address use-link-local-only
interface nve1
member vni 50001 associate-vrf
Ethernet I/F
interface vlan101
description GREEN (IP Payload)
vrf member TENANT-YELLOW MPLS or IP Tunnel
ip address 10.1.1.1/24 MAC-VRF:
(Ethernet Payload)
fabric forwarding mode anycast-gateway RD2/RT2
IRB I/F
Bridge
interface vlan202 Domain
description RED (BD2)
vrf member TENANT-YELLOW
ip address 10.2.2.1/24
fabric forwarding mode anycast-gateway
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Symmetric IRB
EVPN Integrated Routed and Bridge (IRB)
Symmetric IRB
• ARP/MAC state is localized to PE (Leaf)
Spine Spine
• ARP/ND entry only where Host is present
• Allows Better Horizontal Scaling in DC
• Allows more efficient Encapsulation with
MPLS and VXLAN GPE
IP-VRF IP-VRF
• Symmetric Processing
MAC- MAC- MAC- MAC- • Imposition PE, at ingress, performs lookup
VRF VRF VRF VRF
and Bridge/Route operation
• Deposition PE, at egress, performs lookup
and Route/Bridge operation
• Implemented by Cisco
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Asymmetric IRB
EVPN Integrated Routed and Bridge (IRB)
Asymmetric IRB • ARP/MAC state is on every PE (Leaf)
• ARP/ND entry must be present everywhere
Spine Spine
• Limits Scale
• Requires Ethernet-based Encapsulation
IP-VRF IP-VRF
• Asymmetric Processing
• Imposition PE, at ingress, performs lookup
MAC- MAC- MAC- MAC- and Bridge/Route operation
VRF VRF VRF VRF
• Deposition PE, at egress, performs only
Bridge operation
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Symmetric IRB Operation
Control-Plane (Symmetric)
EVPN Integrated Routed and Bridge (IRB)
Border Border
Spine Spine
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Control-Plane (Symmetric) MAC/IP Route (RT-2)
RD: VPN RD
MAC: MAC-H4
EVPN Integrated Routed and Bridge (IRB) IP: IP-H4
Label1: MAC VRF Label
Border Border Label2: IP VRF Label
Ext. Community/Attributes:
2 Route Target: MAC-VRF
Route Target: IP-VRF
RR Next Hop: IP-L4
Spine Spine
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Control-Plane (Symmetric) MAC/IP Route (RT-2)
RD: VPN RD
MAC: MAC-H4
EVPN Integrated Routed and Bridge (IRB) IP: IP-H4
Label1: MAC VRF Label
Border Border Label2: IP VRF Label
Add IP-H4 to IP-VRF Table Ext. Community/Attributes:
IP-H4 nh IP-L4 [Label2] 3 2 Route Target: MAC-VRF
Route Target: IP-VRF
RR Next Hop: IP-L4
Spine Spine
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Control-Plane (Symmetric) MAC/IP Route (RT-2)
RD: VPN RD
MAC: MAC-H4
EVPN Integrated Routed and Bridge (IRB) IP: IP-H4
Label1: MAC VRF Label
Border Border Label2: IP VRF Label
Add IP-H4 to IP-VRF Table Ext. Community/Attributes:
IP-H4 nh IP-L4 [Label2] 3 2 Route Target: MAC-VRF
Route Target: IP-VRF
RR Next Hop: IP-L4
Spine Spine
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
State (Symmetric)
EVPN Integrated Routed and Bridge (IRB)
Border Border
Spine Spine
L1 L4
MAC Table: MAC-H4 nh IP-L4 [Label1] MAC Table: MAC-H1 nh IP-L1 [Label1]
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Forwarding (Symmetric)
EVPN Integrated Routed and Bridge (IRB)
Border Border
Spine Spine
2. ARP request is received at L1 and sends it to
Control-Plane
1
3
IP-SVI1 nh MAC-BVI1 #CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Forwarding (Symmetric)
EVPN Integrated Routed and Bridge (IRB)
Border Border
6. Host-1 sends data packet with MAC-SVI1 as the 6. L1 encapsulates packet using Label2 as the VPN label
destination MAC and IP-H4 as the destination IP and Next-Hop as IP-L4. Route
address.
Spine 7 Spine
7. Packet is forwarded towards L4
5. L1 receives the packet, since the destination MAC is
equal to the SVI MAC. IP lookup is performed for IP-
H4. Lookup results with IP-L4 as next hop and Label2
as VPN label
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Forwarding (Symmetric)
EVPN Integrated Routed and Bridge (IRB)
Border Border
Spine Spine
9. Host-H4 receives data packet with MAC-H4 as the
destination MAC and consumes it
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
EVPN Multicast
(Bridged & Routed)
Use Cases RCVR
RCVR
RCVR PE WAN
Spine Spine RCVR
DC
Leaf Leaf Leaf Leaf
SRC
Seamless Integration
RCVR RCVR between MVPNs
SRC
Server Server Server
Server
in Data Center
L2VPN
Service PE
PE
RCVR
Server
SRC
Server
TOR1 TOR2
SRC-10 Leaf Leaf
224.10.10.10 10.1.1.254
10.1.1.100 10.3.3.254
Spine
Spine
R
TOR3 TOR4 RCVR
RCVR-21
Leaf Leaf
10.3.3.21
VXLAN EVPN
VLAN 101 (Green) VLAN 101 (Green)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Different Subnet Forwarding – Router on-a-Stick
Traditional Forwarding in Overlays
• Multiple Copy in Core – Treated as BUM
S
SRC
• Different Subnet possible – RPF Challenges
TOR1 TOR2
• Pruning on Local Interface
SRC-10 Leaf Leaf
224.10.10.10 • Tunnel is NOT pruned if interest Receiver exists behind
10.1.1.254
10.1.1.100 one Remote VTEP 10.3.3.254
Spine
Spine
R
TOR3 TOR4 RCVR
RCVR-21
Leaf Leaf
10.3.3.21
VXLAN EVPN
VLAN 101 (Green) VLAN 101 (Green)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
EVPN and Multicast Forwarding
Spine Spine
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Functional Components
Spine Spine
Site-External DCI
(IP Routing and Increased
MTU Support)
•
VXLAN EVPN
•
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Functional Components
Tenant Routed Multicast Spine Spine
Site-External DCI
(IP Routing and Increased
• MTU Support)
•
• VXLAN EVPN
•
VTEP VTEP VTEP VTEP
DR DR DR DR
•
Baremetal Baremetal Baremetal • Baremetal Baremetal
•
SRC-10 RCVR-10 RCVR-20 RCVR-30 RCVR-11
224.10.10.10 10.1.1.10 10.2.2.20 • 10.3.3.30 10.1.1.11
10.1.1.100 •
•
•
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
DC TOR with BGP Control-Plane
Data Center Fabric Multicast
feature ngmvpn
VXLAN EVPN
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Layer-3 Extension with Multicast
Data Center Fabric Multicast
interface Vlan2001
no shutdown
vrf member TENANT1
ip forward TOR1 TOR2
*ip pim sparse-mode
Leaf Leaf
interface nve1
source-interface loopback1 TOR3 TOR4
host-reachability protocol bgp
Leaf Leaf
member vni 50001 associate-vrf
mcast-group 239.3.3.3
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Integrated Anycast RP (RP Everywhere)
Data Center Fabric Multicast
ip multicast overlay-spt-only
interface loopback51
AS65101
vrf member TENANT1
Spine
ip address 10.50.0.1/32
ip pim sparse-mode
TOR3 TOR4
Leaf RP Leaf RP
VXLAN EVPN
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Integrated Route and Bridge (IRB) with Multicast
Data Center Fabric Multicast
interface Vlan101
no shutdown
vrf member TENANT1
ip address 192.168.10.1/24 TOR1 TOR2
*ip pim sparse-mode
Leaf Leaf
fabric forwarding mode anycast-gateway
Spine
interface Vlan202
no shutdown AS65101
vrf member TENANT1 Spine
ip address 192.168.20.1/24
*ip pim sparse-mode
fabric forwarding mode anycast-gateway TOR3 TOR4
Leaf Leaf
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
EVPN DC
Interconnect
What we are going to Discuss in this Section
EVPN DC Interconnect
• Intra Data Center Deployment
• Distributed IP Anycast Gateway
DC#2 • Layer-2/Layer-3 with Host Mobility
• Multi-Tenancy
Server Server
• Inter Data Center Connection
• Hierarchical
DC#1 • Optimized Layer-2 Extension (L2VPN)
• Layer-3 Multi-Tenancy (L3VPN)
• IP or MPLS Encapsulation
Server Server
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Scenario Overview
EVPN DC Interconnect
iBGP
Core
AS65501 AS65501
DC GW DC GW DC GW DC GW
MPLS EVPN
eBGP eBGP
iBGP iBGP
AS65101 AS65202
Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Scenario Overview
EVPN DC Interconnect
iBGP
Core
RID: 10.65.50.102 RID: 10.65.50.101 RID: 10.65.50.202 RID: 10.65.50.202
AS65501 AS65501
DC GW DC GW DC GW DC GW
MPLS EVPN
eBGP eBGP
iBGP iBGP
AS65101 AS65202
Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf
RID: 10.65.10.21
RID: 10.65.10.22
RID: 10.65.10.23
RID: 10.65.10.24 #CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
DC GW with BGP Control-Plane
Configuration for EVPN Overlay Control-Plane
router bgpiBGP
65501
bgp router-id 10.65.50.101 | Router ID
address-family l2vpn evpn
Core
RID: 10.65.50.102 RID: 10.65.50.101 RID: 10.65.50.202 RID: 10.65.50.202
neighbor 10.65.50.201 | Remote DC GW
AS65501 remote DCI remote-as 65501 AS65501
| Remote DC ASN
DC GW DC GW update-source Loopback0 DC GW | Router
DC GW ID
address-family
MPLS EVPN l2vpn evpn
import re-originate stitching-rt
advertise l2vpn evpn re-originated
eBGP eBGP
neighbor 10.65.10.111 | Spine
Spine Spine remote-as 65101 Spine | Spine Spine ASN (Local DC)
Core
RID: 10.65.50.102 RID: 10.65.50.101 RID: 10.65.50.202 RID: 10.65.50.202
AS65501 AS65501
DC GW DC GW DC GW DC GW
MPLS EVPN
eBGP eBGP
iBGP iBGP
AS65101 AS65202
Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf
RID: 10.65.10.21
RID: 10.65.10.22
RID: 10.65.10.23
RID: 10.65.10.24 #CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Underlay Configuration
ESI-Based Multi-Homing
interface iBGP
loopback0
ip address 10.65.50.101/32 | Router ID
Core
interface loopback1
RID: 10.65.50.102 RID: 10.65.50.101 RID: 10.65.50.202 RID: 10.65.50.202
ip address 10.65.10.1/32 | VTEP ID
AS65501 AS65501
DC GW DC GW router isis MPLS DC GW DC GW
router-id
MPLS10.65.50.101
EVPN | Router ID
segment-routing mpls | Core Side Encap
interface interface TenGigE 0/0/0/1 | Link to Core
eBGP interface interface TenGigE 0/0/0/2 | Link to Core eBGP
interface Loopback10 | Router ID
Spine Spine Spine Spine
RID: 10.65.10.21
RID: 10.65.10.22
RID: 10.65.10.23
RID: 10.65.10.24 #CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
VXLAN VTEP & ESI-based Multi-Homing
VXLAN EVPN to MPLS EVPN Gateway
Core
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
VXLAN VTEP & ESI-based Multi-Homing
VXLAN EVPN to MPLS EVPN Gateway
interface nve 1
source-interface Loopback1 | VTEP ID
host-reachability protocol bgp
member Core
vni 30001 | Layer-2 VNI
mcast-group 239.1.1.1 | BUM Replication
ESI Type0: 65.50.10.65.50.10.10.10.10 ESI Type0: 65.50.20.65.50.20.20.20.20
ES-Import RT:
DC GWaaaa.bbbb.cccc
DC GW evpn ES-ImportDCRT:
GW cccc.bbbb.aaaa
DC GW
interface nve1
ethernet-segment
identifier type 0 65.50.10.65.50.10.10.10.10 | ESI Type0
bgp route-target aaaa.bbbb.cccc | ES-Import RT
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Scenario Overview – Anycast VTEP
Anycast VTEP
iBGP
Core
RID: 10.65.50.102 RID: 10.65.50.101 RID: 10.65.50.202 RID: 10.65.50.202
AnycastAS65501
VTEP: 10.65.10.12 AS65501
DC GW DC GW DC GW DC GW
MPLS EVPN
eBGP eBGP
iBGP iBGP
AS65101 AS65202
Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf
RID: 10.65.10.21
RID: 10.65.10.22
RID: 10.65.10.23
RID: 10.65.10.24 #CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Underlay Configuration
Anycast VTEP
interface iBGP
loopback0
ip address 10.65.50.101/32 | Router ID
Core
interface loopback1
RID: 10.65.50.102 RID: 10.65.50.101 RID: 10.65.50.202 RID: 10.65.50.202
ip address 10.65.10.1/32 | VTEP ID
AnycastAS65501
VTEP: 10.65.10.12 AS65501
DC GW DC GW interface loopback2 DC GW DC GW
ip address 10.65.10.12/32
MPLS EVPN | Anycast VTEP ID
Core
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
VXLAN VTEP & Anycast-based Multi-Homing
VXLAN EVPN to MPLS EVPN Gateway
Core
interface nve 1
source-interface Loopback1 | VTEP ID
anycast source-interface loopback2 | Anycast VTEP ID
host-reachability protocol bgp
Spine Spine
member vni 30001 Spine
| Layer-2
Spine
VNI
mcast-group 239.1.1.1 | BUM Replication
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
Layer-2 Service (EVI)
VXLAN EVPN to MPLS EVPN Gateway
Core
EVI: 40001
DC GW DC GW DC GW DC GW
MPLS EVPN
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
Layer-2 Service (EVI)
VXLAN EVPN to MPLS EVPN Gateway
Core
EVI: 40001
l2vpn
DC GW DC GW bridge group 2001 DC GW | Bridge
DC GW Group
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
Route-Target Stitching
VXLAN EVPN to MPLS EVPN Gateway
iBGP
DC GW DC GW DC GW DC GW
eBGP eBGP
iBGP iBGP
Route-Target Route-Target
AS65101 L2VNI: 30001 AS65202 L2VNI: 50001
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Route-Target Stitching
VXLAN EVPN to MPLS EVPN Gateway
iBGP
DC GW DC GW DC GW DC GW
evpn
evi 40001 | EVPN Virtual Instance
bgp
eBGP route-target import 65501:40001 | DCI RT eBGP
route-target export 65501:40001 | DCI RT
Spine Spine
route-target import 65101:30001 stitching
Spine
| VXLAN RT
Spine
Route-Target Route-Target
AS65101 L2VNI: 30001 AS65202 L2VNI: 50001
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
Services - Part III
Service Provider Network - Simplification Journey
Compass
Unified MPLS EPN 5.0 Metro Fabric
Provisioning NETCONF NETCONF
YANG YANG
Programmability
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
From Mac Bridging to Mac Routing
Common BGP Control Plane
EVPN, VPNv4/6 Overlay
Evolution:
Underlay
Segment Routing (SR: MPLS, SRv6) SR, VXLAN SR, VXLAN
Leaf
VM
PE1 DCI1
Spine Spine
Leaf
VM
A1 Access WAN/Core
Leaf
PE2 DCI2 VM
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
EVPN - Ethernet VPN
• Concepts are same!!! Pick your side!
C1 C2
VM VM VM VM
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
EVPN &
VPNv4/6
Interconnect
EVPN and VPNv4/6 Interconnect
• DCI/BL provides EVPN to VPNv4/6 stitching
• DCI/BL participates in L3 Routing not in L2 Bridging
• DCI/BL is mandatory, because of summarization!!!
A3 P3 SP2 L2
A2 P2 SP1 L1
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
EVPN and VPNv4/6 Interconnect
• DCI/BL provides EVPN to VPNv4/6 stitching Interconnect
• DCI/BL participates in L3 Routing not in L2 Bridging
• DCI/BL is mandatory, because of summarization!!!
A3 P3 SP2 L2
A2 P2 SP1 L1
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
EVPN and VPNv4/6 Interconnect
VRF A
RD DCI:0
RT import/export: VRF A Stitching
RT import/export: VRF A
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
EVPN and VPNv4/6 Interconnect
EVPN to VPNv4/6 Re-Advertise
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
EVPN and VPNv4/6 Interconnect
VPNv4/6 to EVPN Re-Advertise
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
EVPN and VPNv4 InterConnect
Anycast IRB 192.168.2.1/24
RR101 Emulates R2
RR103 RR104
IRB
R39
RR101 R2
LACP
VPNv4: 9.9.9.101/24
H2: 192.168.2.20/24 H2 IRB
IRB
LACP R37 R34 R26 R51
H1: 192.168.1.10/24 H1
IRB
R36
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
R36: BGP Configuration - RT-5
router bgp 1
bgp router-id 3.3.3.36
address-family vpnv4 unicast
!
address-family l2vpn evpn
!
neighbor-group rr
remote-as 1
update-source Loopback0
address-family l2vpn evpn
advertise vpnv4 unicast
!
vrf a
RT-5
rd auto
address-family ipv4 unicast
additional-paths receive
maximum-paths ibgp 2
!
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
R36: RT-5 Prefix
R36#show bgp vpnv4 unicast
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
R36: RT-5 Route
R36#show bgp l2vpn evpn rd 3.3.3.37:0 [5][0][24][192.168.1.0]/80
Tue Oct 16 03:35:06.480 UTC
BGP routing table entry for [5][0][24][192.168.1.0]/80, Route Distinguisher: 3.3.3.37:0
Versions:
Process bRIB/RIB SendTblVer
Speaker 84912 84912
Last Modified: Oct 16 03:23:18.399 for 00:11:48
Paths: (2 available, best #1) RT-5 prefi VRF A R37 RD
Not advertised to any peer x
Path #1: Received by speaker 0
Not advertised to any peer
Local
3.3.3.37 (metric 30) from 3.3.3.103 (3.3.3.37) VRF Agg label
Received Label 64008
Origin incomplete, metric 0, localpref 100, valid, internal, best, group-best, import-candidate, not-in-vrf
Received Path ID 0, Local Path ID 1, version 84912
Extended community: Flags 0x6: RT:100:100
Originator: 3.3.3.37, Cluster list: 3.3.3.103
EVPN ESI: 0000.0000.0000.0000.0000, Gateway Address : 0.0.0.0 VRF A Route-Target
Path #2: Received by speaker 0
Not advertised to any peer
Local
3.3.3.37 (metric 30) from 3.3.3.104 (3.3.3.37) VRF Agg label
Received Label 64008
Origin incomplete, metric 0, localpref 100, valid, internal, not-in-vrf
Received Path ID 0, Local Path ID 0, version 0
Extended community: Flags 0x6: RT:100:100
Originator: 3.3.3.37, Cluster list: 3.3.3.104 VRF A Route-Target
EVPN ESI: 0000.0000.0000.0000.0000, Gateway Address : 0.0.0.0
RP/0/RP0/CPU0:R36#
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
R36: VRF A - Routing Table
R36#show route vrf a
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
DCI R26: VRF Configuration
vrf a
address-family ipv4 unicast
import route-target
100:100 stitching VRF a RT - CO
999:100
!
VRF a RT - Core
export route-target
100:100 stitching
999:100
!
!
!
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
DCI R26: BGP Configuration
R26#show run router bgp 1 router bgp 1
Mon Oct 15 21:01:43.943 UTC !
router bgp 1 neighbor 1.1.1.101
bgp router-id 1.1.1.26 use neighbor-group rr-core
ibgp policy out enforce-modifications RR Next-Hop-change !
address-family vpnv4 unicast neighbor 3.3.3.103
! use neighbor-group rr
address-family l2vpn evpn !
! neighbor 3.3.3.104
neighbor-group rr use neighbor-group rr
remote-as 1 !
update-source Loopback0 vrf a
address-family l2vpn evpn EVPN AF - CO rd auto
import stitching-rt re-originate address-family ipv4 unicast
route-policy vpnv4-filter in additional-paths receive
route-policy vpnv4-community-set out maximum-paths ibgp 2
advertise vpnv4 unicast re-originated stitching-rt !
! !
! !
neighbor-group rr-core
remote-as 1
update-source Loopback0
address-family vpnv4 unicast
import re-originate stitching-rt
route-policy evpn-filter in
route-reflector-client BGP VRF
route-policy rt2-filter out
advertise vpnv4 unicast re-originated
!
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
DCI R26: BGP EVPN/VPNv4 Route Leaking Configuration
address-family l2vpn evpn Filter routes with VPNv4 route-policy rt2-filter
import stitching-rt re-originate community if destination in (0.0.0.0/0 ge 32) then
route-policy vpnv4-filter in drop
route-policy vpnv4-community-set out else
advertise vpnv4 unicast re-originated stitching-rt Set VPNv4 community set community evpn
! endif
end-policy
address-family vpnv4 unicast !
import re-originate stitching-rt Filter routes with EVPN
route-policy evpn-filter in community route-policy evpn-filter
route-reflector-client if community matches-any evpn then
route-policy rt2-filter out Filter /32 routes and drop
advertise vpnv4 unicast re-originated set EVPN community else
! pass
endif
end-policy
route-policy vpnv4-community-set
set community vpnv4
community-set evpn end-policy
1:111
end-set
! route-policy vpnv4-filter
community-set vpnv4 if community matches-any vpnv4 then
1:222 drop
end-set else
! pass
endif
end-policy
!
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
DCI R26: BGP EVPN/VPNv4 Route Leaking
address-family l2vpn evpn
import stitching-rt re-originate 1. Import RT 100:100 and re-
route-policy vpnv4-filter in originate with RT 999:100
route-policy vpnv4-community-set out
advertise vpnv4 unicast re-originated stitching-rt 4. Advertise re-originated
! routes with RT 100:100
address-family vpnv4 unicast 3. Import RT 999:100 and re-
import re-originate stitching-rt originate with RT 100:100
route-policy evpn-filter in
route-reflector-client
route-policy rt2-filter out 2. Advertise re-originated
advertise vpnv4 unicast re-originated routes with RT 999:100
!
vrf a
address-family ipv4 unicast
import route-target
100:100 stitching VRF a RT - CO
999:100
!
VRF a RT - Core
export route-target
100:100 stitching
999:100
!
!
!
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
EVPN and VPNv4 InterConnect
Anycast IRB 192.168.2.1/24
RR101 Emulates R2
RR103 RR104
IRB
R39
RR101 R2
LACP
VPNv4: 9.9.9.101/24
H2: 192.168.2.20/24 H2 IRB
IRB
LACP R37 R34 R26 R51
H1: 192.168.1.10/24 H1
IRB
R36
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
EVPN and VPNv4 InterConnect
Anycast IRB 192.168.2.1/24
RR101 Emulates R2
RR103 RR104
IRB
RR101 R2
LACP R39
VPNv4: 9.9.9.101/24
H2: 192.168.2.20/24 H2 IRB
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
EVPN and VPNv4 InterConnect
Anycast IRB 192.168.2.1/24
RR101 Emulates R2
RR103 RR104
IRB
RR101 R2
LACP R39
VPNv4: 9.9.9.101/24
H2: 192.168.2.20/24 H2 IRB
IRB
LACP R37 R34 R26 R51
H1: 192.168.1.10/24 H1
IRB
R36
r2#show route vrf a
Anycast IRB 192.168.1.1/24
C 9.9.9.0/24 is directly connected, 2w0d, Loopback9
L 9.9.9.101/32 is directly connected, 2w0d, Loopback9
H1 - Prefix B 192.168.1.0/24 [200/0] via 1.1.1.26 (nexthop in vrf default), 15:16:22
[200/0] via 1.1.1.28 (nexthop in vrf default), 15:16:22
B 192.168.2.0/24 [200/0] via 1.1.1.26 (nexthop in vrf default), 1d07h
H2 - Prefix [200/0] via 1.1.1.28 (nexthop in vrf default), 1d07h
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
EVPN and VPNv4 InterConnect
Anycast IRB 192.168.2.1/24
RR101 Emulates R2
RR103 RR104
IRB
RR101 R2
LACP R39
VPNv4: 9.9.9.101/24
H2: 192.168.2.20/24 H2 IRB
IRB
LACP R37 R34 R26 R51 R2 - Prefix
H1: 192.168.1.10/24 H1
IRB R36#show route vrf a
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
R26#show route vrf a
R2 VPNv4 - Core Route
B 9.9.9.0/24 [200/0] via 1.1.1.101 (nexthop in vrf default), 1d07h
B 192.168.1.0/24 [200/0] via 3.3.3.36 (nexthop in vrf default), 15:12:55
[200/0] via 3.3.3.37 (nexthop in vrf default), 15:12:55
B 192.168.1.10/32 [200/0] via 3.3.3.36 (nexthop in vrf default), 16:45:48
[200/0] via 3.3.3.37 (nexthop in vrf default), 16:45:48 H1 Host-Address
B 192.168.2.0/24 [200/0] via 3.3.3.38 (nexthop in vrf default), 1d07h
[200/0] via 3.3.3.39 (nexthop in vrf default), 1d07h
B 192.168.2.20/32 [200/0] via 3.3.3.38 (nexthop in vrf default), 1d07h
[200/0] via 3.3.3.39 (nexthop in vrf default), 1d07h H2 Host-Address
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
Low-Latency Traffic Flex-Algo128: Delay
L2/L3VPN - EVPN (SLA Low-Latency -
BGP Community)
A3 P3 SP2 L2
$ $ $ $
A2 P2 SP1 L1
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
Low-Latency Traffic Flex-Algo128: Delay
L3VPN - VPNv4 (SLA Low-Latency - BGP Community) L2/L3VPN - EVPN (SLA Low-Latency -
BGP Community)
A3 P3 SP2 L2
$ $ $ $
A2 P2 SP1 L1
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Low-Latency Traffic Flex-Algo128: Delay
L3VPN - VPNv4 (SLA Low-Latency - BGP Community) L2/L3VPN - EVPN (SLA Low-Latency -
BGP Community)
ODN A3 P3 SP2 L2
$ $ $ $
A2 P2 SP1 L1
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
EVPN-VPWS
Multihomed
Service
EVPN-VPWS
• Benefits of EVPN applied to point-to-point
services
• No signaling of PWs. Instead signals MP2P LSPs PE2 PE4
instead (ala L3VPN)
• All-active CE multi-homing (per-flow LB) CE1 MPLS CE2
• Single-active CE multi-homing (per-service LB) PE1 PE3
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
H-EVPN &
EVPN Headend (PWHE + EVPN)
PWHE PWHE
A1 PE1 PE3 A3
Multi/Single-Homed Multi/Single-Homed
Multi/Single-Homed
CE Single-Active All/Single-Active CE
All/Single-Active
EVPN EVPN-VPWS
EVPN-VPWS
VPNv4/6
A2 PE2 PE4 A4
PWHE PWHE
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
EVPN-VPWS - Testbed
Startup Sequence is almost identical with EVPN except:
RT3 and RT2 are not required
RR103 RR104
LACP R39
H2
R38 R35
R37 R34
H1 R36
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
Config: EVPN-VPWS
R36 R38/R39
l2vpn l2vpn
xconnect group 500 xconnect group 500
p2p 500 p2p 500
interface Bundle-Ether100 interface Bundle-Ether100
neighbor evpn evi 500 target 3839 source 36 neighbor evpn evi 500 target 36 source 3839
! !
! !
! !
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
Leaf/Access R36: L2vpn xconnect status & Data
Plane verification
R36#show l2vpn xconnect
Legend: ST = State, UP = Up, DN = Down, AD = Admin Down, UR = Unresolved,
SB = Standby, SR = Standby Ready, (PP) = Partially Programmed
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
Leaf/Access R36: RT-1 Per EVI Ethernet Auto-Discovery
R36#show bgp l2vpn evpn rd 3.3.3.36:500 [1][0038.3900.0000.0000.1100][3839]/120
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
Leaf/Access R36: EVPN-VPWS Instance
R36#show evpn evi vpn-id 500 detail
Statistics:
Packets Sent Received
Total : 0 0
Unicast : 0 0
BUM : 0 0
Bytes Sent Received
Total : 0 0
Unicast : 0 0
BUM : 0 0
RD Config: none
RD Auto : (auto) 3.3.3.36:500
RT Auto : 1:500
Route Targets in Use Type
------------------------------ ---------------------
1:500 Import
1:500 Export
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
EVPN-VPWS
Flexible Cross-
Connect (FXC)
EVPN – Flexible Cross-Connect Service
Challenge:
How to bring multiple access services from different sources using a single EVPN E-LINE
tunnel?
A1
CE1 CE1
A1
EVPN
PE
CE2 MPLS PE CE2
Forwarder
MUX
A2 CEn DEMUX
CEn
Normalized VLAN
VLAN translation over unique tunnel
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
EVPN – Flexible Cross-Connect Service
Request:
Can local switching preferred over ELINE tunnel?
A1
CE1 CE1
A1
EVPN
PE
CE2 MPLS PE CE2
Forwarder
MUX
A2 CEn DEMUX
CEn
Local Switching is
preferred on Backup connectivity Normalized VLAN
matching VLAN over EVPN ELINE VLAN translation over unique tunnel
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
Flexible Cross-Connect Service: Local Switching
Purpose:
Bring access services (e.g OLT) into BNG with redundancy
VRFs
BNG
VLANs EVPN
A1 A2
rewrite
VLANs
ELINE
(backup tunnel)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
Flexible Cross-Connect (FXC) - Testbed
Startup Sequence is almost identical with EVPN except:
RT3 and RT2 are not required
RR103 RR104
LACP R39
H2
R38 R35
R37 R34
H1 R36
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 162
Config: FXC VLAN-Unaware & VLAN-Aware
R36/R38/R39 VLAN-Unaware
l2vpn
RR103 RR104
flexible-xconnect-service vlan-unaware 600
interface Bundle-Ether100.10
interface Bundle-Ether100.20 LACP R39
neighbor evpn evi 600 target 363839
!
H2
H1 R36
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
Leaf/Access R36: L2vpn xconnect status & Data
Plane verification
VLAN-Unaware VLAN-Aware
R36#show l2vpn flexible-xconnect-service R36#show l2vpn flexible-xconnect-service
Legend: ST = State, UP = Up, DN = Down, AD = Admin Down, UR = Unresolved, Legend: ST = State, UP = Up, DN = Down, AD = Admin Down, UR = Unresolved,
SB = Standby, SR = Standby Ready, (PP) = Partially Programmed SB = Standby, SR = Standby Ready, (PP) = Partially Programmed
Local Outgoing Prefix Outgoing Next Hop Bytes VPN-ID Encap Ethernet Segment Id EtherTag Label
Label Label or ID Interface Switched ---------- ------ --------------------------- -------- --------
------ ----------- ------------------ ------------ --------------- ------------
64011 64039 EVPN:600 3.3.3.38 0 600 MPLS 0038.3900.0000.0000.1100 10 64012
64037 EVPN:600 3.3.3.39 0 Summary pathlist:
0x02000006 3.3.3.38 64041
0x02000007 3.3.3.39 64040
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
Leaf/Access R36: RT-1 Per EVI Ethernet Auto-Discovery
VLAN-Unaware VLAN-Aware
R36#show bgp l2vpn evpn rd 3.3.3.36:600 [1][0038.3900.0000.0000.1100][363839]/120 R36#show bgp l2vpn evpn rd 3.3.3.36:600
Thu Jun 6 05:40:06.781 UTC
BGP routing table entry for [1][0038.3900.0000.0000.1100][363839]/120, Route Distinguisher: 3.3.3.36:600 Status codes: s suppressed, d damped, h history, * valid, > best
Versions: i - internal, r RIB-failure, S stale, N Nexthop-discard
Process bRIB/RIB SendTblVer RT- Origin codes: i - IGP, e - EGP, ? - incomplete
Speaker 105 105 Target/Service-id Network Next Hop Metric LocPrf Weight Path
Last Modified: Jun 6 05:32:38.947 for 00:07:281 Route Distinguisher: 3.3.3.36:600 (default for vrf fxc:evi:600)
Paths: (2 available, best #1) ESI R38/R39 *> [1][0036.3700.0000.0000.1100][10]/120
Not advertised to any peer 0.0.0.0 0 i
Path #1: Received by speaker 0 *> [1][0036.3700.0000.0000.1100][20]/120
Not advertised to any peer 0.0.0.0 0 i
Local *>i[1][0038.3900.0000.0000.1100][10]/120
3.3.3.38 (metric 30) from 3.3.3.103 (3.3.3.38) 3.3.3.38 100 0 i
Received Label 64039 * i 3.3.3.39 100 0 i
Origin IGP, localpref 100, valid, internal, best, group-best, import-candidate, imported, rib-install *>i[1][0038.3900.0000.0000.1100][20]/120
Received Path ID 0, Local Path ID 1, version 103 3.3.3.38 100 0 i
Extended community: RT:1:600 * i 3.3.3.39 100 0 i
Originator: 3.3.3.38, Cluster list: 3.3.3.103
Source AFI: L2VPN EVPN, Source VRF: default, Source Route Distinguisher: 3.3.3.38:600
Path #2: Received by speaker 0
Not advertised to any peer
Local
Dot1q tag
3.3.3.39 (metric 30) from 3.3.3.103 (3.3.3.39)
dot1q tag ID
Received Label 64037
Origin IGP, localpref 100, valid, internal, import-candidate, imported, rib-install
ID
Received Path ID 0, Local Path ID 0, version 0
Extended community: RT:1:600
What will be tag ID value in case of QinQ?
Originator: 3.3.3.39, Cluster list: 3.3.3.103 example:
Source AFI: L2VPN EVPN, Source VRF: default, Source Route Distinguisher: 3.3.3.39:600
interface Bundle-Ether100.10 l2transport
encapsulation dot1q 10 second-dot1q 100
!
[1][0038.3900.0000.0000.1100][41060]/120
Formula: tag ID
(first_tag_value * 4096) + second_tag_value
(10 * 4096) + 100 = 41060
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
Leaf/Access R36: EVPN-VPWS Instance
R36#show evpn evi vpn-id 600 detail R36#show evpn evi vpn-id 600 detail
Thu Jun 6 06:25:06.940 UTC
VPN-ID Encap Bridge Domain Type
---------- ------ ---------------------------- ------------------- VPN-ID Encap Bridge Domain Type
600 MPLS VPWS:600 VPWS (vlan-unaware) ---------- ------ ---------------------------- -------------------
Stitching: Regular 600 MPLS fxc:600 VPWS (vlan-aware)
Unicast Label : 0 Stitching: Regular
Multicast Label: 0 Unicast Label : 0
Flow Label: N EVPN-VPWS Multicast Label: 0
Control-Word: Enabled
• No RT2 – MAC
Flow Label: N EVPN-VPWS
Forward-class: 0
• No RT3 - BUM
Control-Word: Enabled
• No RT2 – MAC
Advertise MACs: No Forward-class: 0
Advertise BVI MACs: No Advertise MACs: No • No RT3 - BUM
Aliasing: Enabled Advertise BVI MACs: No
UUF: Enabled Aliasing: Enabled
Re-origination: Enabled UUF: Enabled
Multicast source connected: No Re-origination: Enabled
Multicast source connected: No
Statistics: Statistics:
Packets Sent Received Packets Sent Received
Total : 0 0 Total : 0 0
Unicast : 0 0 Unicast : 0 0
BUM : 0 0 BUM : 0 0
Bytes Sent Received Bytes Sent Received
Total : 0 0 Total : 0 0
Unicast : 0 0 Unicast : 0 0
BUM : 0 0 BUM : 0 0
RD Config: none RD Config: none
RD Auto : (auto) 3.3.3.36:600 RD Auto : (auto) 3.3.3.36:600
RT Auto : 1:600 RT Auto : 1:600
Route Targets in Use Type Route Targets in Use Type
------------------------------ --------------------- ------------------------------ ---------------------
1:600 Import 1:600 Import
1:600 Export 1:600 Export
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 166
EVPN
Interconnect/Migration
(L2 Services)
EVPN L2 Interconnect
Everything in one Bridge Domain
• Legacy L2: REP, G8032, STP, etc.
LACP
• VPLS VPWS
• EVPN-VXLAN/EVPN-MPLS CE A3
• EoMPLS(PW)
• Ethernet – MultiHomed, SingleHomed
Leaf
VM
A3
Spine Spine
DCI/PE DCI/PE
PE1
Leaf
VM
STP/REP/ MPLS MPLS Core
A1 G.8032…. Core
Leaf
VM DCI/PE DCI/PE
PE2
A2 EVPN - VXLAN
EVPN-MPLS
EVPN - MPLS
A1 A2
VPLS
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
EVPN & VPLS Interconnect
R36 PE1
CE1 A1
VPLS EVPN
R36/R37 Configuration
evpn l2vpn
evi 100 bridge group 100
advertise-mac bridge-domain 100
! access-vfi 1
virtual vfi 1 neighbor 3.3.3.37 pw-id 37
ethernet-segment !
identifier type 0 11.11.11.11.11.11.11.11.11 neighbor 3.3.3.38 pw-id 38
!
neighbor 3.3.3.39 pw-id 39
Virtual Ethernet Segment (vES) !
!
• VPLS is Single-Active Access to EVPN evi 100
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
Virtual Ethernet-Segment (vES)
R36#show evpn ethernet-segment detail
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
EVPN & VPLS Seamless
Integration - Migration
VPLS & EVPN Seamless Integration - Migration
VFI1 is by default in Split Horizon Group 1
CE2 R37 R39 CE4
• SHG1 protects loops in MPLS Core
• Full Mesh of pseudowires(PW) is required
for Any-to-Any forwarding
R36 MPLS
VFI1
PW_R37 UP
BD1 PW_R38 UP
PW_R39 UP
CE1
R38 CE3
l2vpn
bridge group 100
bridge-domain 100
vfi 1
neighbor 3.3.3.37 pw-id 37
!
neighbor 3.3.3.38 pw-id 38
!
neighbor 3.3.3.39 pw-id 39
!
!
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
VPLS & EVPN Seamless Integration - Migration
VFI1 is by default in Split Horizon Group 1
CE2 R37 R39 CE4
• SHG1 protects loops in MPLS Core
• Full Mesh of pseudowires(PW) is required
for Any-to-Any forwarding
R36 MPLS
VFI1
PW_R37 UP
EVI100 is also by default in Split Horizon Group 1
BD1 PW_R38 UP • R36 doesn’t forward data between VFI1 and EVI100
CE1 X PW_R39 UP
l2vpn
bridge group 100
bridge-domain 100
vfi 1
neighbor 3.3.3.37 pw-id 37
!
neighbor 3.3.3.38 pw-id 38
!
neighbor 3.3.3.39 pw-id 39
!
evi 100
!
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
VPLS & EVPN Seamless Integration - Migration
VFI1 is by default in Split Horizon Group 1
CE2 R37 R39 CE4
• SHG1 protects loops in MPLS Core
• Full Mesh of pseudowires(PW) is required
for Any-to-Any forwarding
R36 MPLS
VFI1
PW_R37 UP
EVI1 is also by default in Split Horizon Group 1
BD1 PW_R38 DOWN • R36 doesn’t forward data between VFI1 and EVI100
CE1 X PW_R39 UP
BGP EVPN
EVI100 R38 CE3 R36&R38 run BGP EVPN
• PW_R38 goes DOWN
• Data Forwarding between R36 and R38 via EVI100
l2vpn
bridge group 100
bridge-domain 100
vfi 1
neighbor 3.3.3.37 pw-id 37
!
neighbor 3.3.3.38 pw-id 38
!
neighbor 3.3.3.39 pw-id 39
!
evi 100
!
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 174
Conclusion
Conclusion:
Now we know why EVPN is a Unified Overlay Solution
De-facto overlay solution for Next gen all-in-one VPN EVPN is used to address scale
transforming SP COs to NG solution to provide L2VPN, and efficiency issues as
DC to support virtualization, L3VPN, IRB, and more w/ a Enterprises need to migrate
multi-tenancy, flexible MH, single solution from traditional L2
flexible workload placement & access/aggregation networks
mobility, full cross-sectional BW Provides distributed vPE w/ to multi-tenancy fabric w/ the
utilization in fabric and access. white boxes for scaling out same characteristics as NG
instead of scaling up DC.
Supporting multiple Underlay:
MPLS, VxLAN, SR, GENVE Backhauling solution to vPE
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 176
EVPN: An All-in-one Solution
Services: E-LAN E-LINE E-TREE NVO Multicast L3VPN
(DC Fabric)
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 177
Complete your
online session • Please complete your session survey
evaluation after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live water bottle.
• All surveys can be taken in the Cisco Live
Mobile App or by logging in to the Session
Catalog on ciscolive.cisco.com/us.
Cisco Live sessions will be available for viewing
on demand after the event at ciscolive.cisco.com.
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 178
Continue your education
Demos in the
Walk-in labs
Cisco campus
#CLUS BRKMPL-3333 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
Thank you
#CLUS
#CLUS