15-EVPN Configuration Examples

HomeSupportSwitchesS7500E SeriesConfigure & DeployConfiguration ExamplesH3C S7500E Switch Series Configuration Examples-R7577P04-6W10015-EVPN Configuration Examples
02-H3C MDC+EVPN Configuration Examples
Title Size Download
02-H3C MDC+EVPN Configuration Examples 148.37 KB

 

H3C MDC + EVPN Configuration Examples

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Software version: Release 7577P04

Document version: 6W100-20190330

 

Copyright © 2019 New H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co., Ltd.

Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.

The information in this document is subject to change without notice.

 



Introduction

This document provides configuration examples for deploying Multitenant Device Context (MDC) in combination with Ethernet Virtual Private Network (EVPN).

·          The MDC technology can partition a physical device or an IRF fabric into multiple logical devices. Each of the logical devices is called an MDC.

·          EVPN is a Layer 2 VPN technology. It uses MP-BGP to advertise EVPN routes in the control plane and uses VXLAN to forward traffic in the data plane.

By deploying MDC in combination with EVPN, you can quickly meet EVPN service requirements on traditional networks at a lower cost while isolating traditional services from EVPN services.

Prerequisites

The configuration examples in this document were created and verified in a lab environment, and all the devices were started with the factory default configuration. When you are working on a live network, make sure you understand the potential impact of every command on your network.

This document assumes that you have basic knowledge of MDC and EVPN.

Example: Configuring MDC in combination with EVPN

Network configuration

As shown in Figure 1, a company needs to use its existing IP network to provide IPTV and OTT services for users.

To provide IPTV and OTT services while reducing cost, the company needs to deploy MDC in combination with EVPN on the network as follows:

·          Virtualize Switch A into SWA-MDC1 and SWA-MDC2. Virtualize Switch B into SWB-MDC1 and SWB-MDC2. Configure SWA-MDC2 and SWB-MDC2 as RRs to reflect BGP EVPN routes on the EVPN network. Configure SWA-MDC1 as the gateway for the IPTV network. Configure SWB-MDC1 as the gateway for the OTT network.

·          Configure Switch C and Switch D as distributed EVPN gateways.

·          Configure Switch E as border gateway to the Internet.

·          Assign Server 1 and Server 3 to VXLAN 10. Assign Server 2 and Server 4 to VXLAN 20. Achieve the following goals:

¡  The hosts in the same VXLAN can communicate at Layer 2.

¡  The hosts in different VXLANs can communicate at Layer 3 through the distributed EVPN gateways.

¡  Hosts in the VXLANs can access the Internet at Layer 3 through border gateways.

·          The IPTV network needs to receive multicast information from Source through Switch F. Configure PIM on SWA-MDC1, SWA-MDC2, SWB-MDC2, Switch D, and Switch E to establish a multicast distribution tree. Configure SWA-MDC1 as the service gateway of the IPTV network.

·          The OTT network needs to provide traditional services. Configure SWB-MDC1 as the gateway of the OTT network.

Figure 1 Network diagram

 

Table 1 Interface and IP address assignment

Device

Interface

IP address

Device

Interface

IP address

SWA-MDC1

Loopback0

6.6.6.6/32

Switch D

Loopback0

4.4.4.4/32

 

Vlan-int10

17.1.1.6/24

 

Vlan-int10

14.1.1.4/24

 

Vlan-int20

18.1.1.6/24

 

Vlan-int20

13.1.1.4/24

SWA-MDC2

Loopback0

1.1.1.1/32

 

Vlan-int30

21.1.1.4/24

 

Vlan-int10

11.1.1.1/24

Switch E

Loopback0

5.5.5.5/32

 

Vlan-int20

13.1.1.1/24

 

Vlan-int10

22.1.1.5/24

 

Vlan-int30

15.1.1.1/24

 

Vlan-int20

18.1.1.5/24

SWB-MDC1

Loopback0

7.7.7.7/32

 

Vlan-int30

15.1.1.5/24

 

Vlan-int10

20.1.1.7/24

 

Vlan-int40

16.1.1.5/24

 

Vlan-int50

19.1.1.7/24

 

Vlan-int50

19.1.1.5/24

SWB-MDC2

Loopback0

2.2.2.2/32

Switch F

Loopback0

9.9.9.9/32

 

Vlan-int10

14.1.1.2/24

 

Vlan-int10

17.1.1.9/24

 

Vlan-int20

12.1.1.2/24

 

Vlan-int20

10.1.4.1/24

 

Vlan-int40

16.1.1.2/24

 

 

 

Switch C

Loopback0

3.3.3.3/32

 

 

 

 

Vlan-int10

11.1.1.3/24

 

 

 

 

Vlan-int20

12.1.1.3/24

 

 

 

 

Analysis

To virtualize Switch A and Switch B into the required MDCs, configure MDCs on Switch A and Switch B.

For IP connectivity between SWA-MDC1, SWA-MDC2, SWB-MDC1, SWB-MDC2, Switch C, Switch D, and Switch E, configure a routing protocol on them and assign IP addresses to their interfaces, including loopback interfaces. In this example, OSPF is configured.

For Switch C and Switch D to use a VXLAN tunnel to communicate with each other, configure them as distributed EVPN gateways.

For the downlink ports of Switch C and Switch D to identify the VXLANs to which user network packets belong, configure Ethernet service instances and frame match criteria on the ports.

To enable SWA-MDC1, SWA-MDC2, SWB-MDC2, Switch D, and Switch E to establish a multicast distribution tree, configure PIM on them.

For the IPTV network and OTT network to access external networks, configure SWA-MDC1 as the IPTV network and configure SWB-MDC1 as the OTT network.

Procedures

Configuring MDCs on Switch A and Switch B

1.        Configure SWA-MDC1 on Switch A:

# Create SWA-MDC1.

<SwitchA> system-view

[SwitchA] mdc SWA-MDC1

It will take some time to create MDC...

MDC created successfully.

[SwitchA-mdc-2-SWA-MDC1] quit

# Reclaim the LPUs in slot 1 and slot 2 from the default MDC.

[SwitchA] mdc Admin

[SwitchA-mdc-1-Admin] undo location slot 1

Performing this command is equivalent to removing the card from the MDC. Continue? [Y/N]:y

[SwitchA-mdc-1-Admin] undo location slot 2

Performing this command is equivalent to removing the card from the MDC. Continue? [Y/N]:y

[SwitchA-mdc-1-Admin] quit

# Assign interfaces Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet 1/0/24 to SWA-MDC1.

[SwitchA] mdc SWA-MDC1

[SwitchA-mdc-2-SWA-MDC1] allocate interface ten-gigabitethernet 1/0/1 to ten-gigabitethernet 1/0/24

This operation will allocate the specified interfaces and all interfaces in the listed groups to the MDC. Continue? [Y/N]:y

Configuration of the interfaces will be lost. Continue? [Y/N]:y

Execute the location slot command in the current view to place the configuration into effect.

# Assign LPU 1 to SWA-MDC1.

[SwitchA-mdc-2-SWA-MDC1] location slot 1

# Start SWA-MDC1.

[SwitchA-mdc-2-SWA-MDC1] mdc start

It will take some time to start MDC...

MDC started successfully.

[SwitchA-mdc-2-SWA-MDC1] quit

2.        Configure SWA-MDC2 on Switch A:

# Create SWA-MDC2.

[SwitchA] mdc SWA-MDC2

It will take some time to create MDC...

MDC created successfully.

# Assign interfaces Ten-GigabitEthernet 2/0/1 through Ten-GigabitEthernet 2/0/24 to SWA-MDC2.

[SwitchA-mdc-3-SWA-MDC2] allocate interface ten-gigabitethernet 2/0/1 to ten-gigabitethernet 2/0/24

This operation will allocate the specified interfaces and all interfaces in the listed groups to the MDC. Continue? [Y/N]:y

Configuration of the interfaces will be lost. Continue? [Y/N]:y

Execute the location slot command in the current view to place the configuration into effect.

# Assign LPU 2 to SWA-MDC2.

[SwitchA-mdc-3-SWA-MDC2] location slot 2

# Start SWA-MDC2.

 [SwitchA-mdc-3-SWA-MDC2] mdc start

It will take some time to start MDC...

MDC started successfully.

[SwitchA-mdc-3-SWA-MDC2] quit

3.        Configure SWB-MDC1 on Switch B:

# Create SWB-MDC1.

<SwitchB> system-view

[SwitchB] mdc SWB-MDC1

It will take some time to create MDC...

MDC created successfully.

[SwitchB-mdc-2-SWB-MDC1] quit

# Reclaim the LPUs in slot 1 and slot 2 from the default MDC.

[SwitchB] mdc Admin

[SwitchB-mdc-1-Admin] undo location slot 1

Performing this command is equivalent to removing the card from the MDC. Continue? [Y/N]:y

[SwitchB-mdc-1-Admin] undo location slot 2

Performing this command is equivalent to removing the card from the MDC. Continue? [Y/N]:y

[SwitchB-mdc-1-Admin] quit

# Assign interfaces Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet 1/0/24 to SWB-MDC1.

[SwitchB] mdc SWB-MDC1

[SwitchB-mdc-2-SWB-MDC1] allocate interface ten-gigabitethernet 1/0/1 to ten-gigabitethernet 1/0/24

This operation will allocate the specified interfaces and all interfaces in the listed groups to the MDC. Continue? [Y/N]:y

Configuration of the interfaces will be lost. Continue? [Y/N]:y

Execute the location slot command in the current view to place the configuration into effect.

# Assign LPU 1 to SWB-MDC1.

[SwitchB-mdc-2-SWB-MDC1] location slot 1

# Start SWB-MDC1.

[SwitchB-mdc-2-SWB-MDC1] mdc start

It will take some time to start MDC...

MDC started successfully.

[SwitchB-mdc-2-SWB-MDC1] quit

4.        Configure SWB-MDC2 on Switch B:

# Create SWB-MDC2.

[SwitchB] mdc SWB-MDC2

It will take some time to create MDC...

MDC created successfully.

# Assign interfaces Ten-GigabitEthernet 2/0/1 through Ten-GigabitEthernet 2/0/24 to SWB-MDC2.

[SwitchB-mdc-3-SWB-MDC2] allocate interface ten-gigabitethernet 2/0/1 to ten-gigabitethernet 2/0/24

This operation will allocate the specified interfaces and all interfaces in the listed groups to the MDC. Continue? [Y/N]:y

Configuration of the interfaces will be lost. Continue? [Y/N]:y

Execute the location slot command in the current view to place the configuration into effect.

# Assign LPU 2 to SWB-MDC2.

[SwitchB-mdc-3-SWB-MDC2] location slot 2

# Start SWB-MDC2.

[SwitchB-mdc-3-SWB-MDC2] mdc start

It will take some time to start MDC...

MDC started successfully.

[SwitchB-mdc-3-SWB-MDC2] quit

Configuring the IPTV and OTT networks

Assigning IP addresses to interfaces on the devices

# Log in to SWA-MDC1 and assign IP addresses to its interfaces.

[SwitchA] switchto mdc SWA-MDC1

******************************************************************************

* Copyright (c) 2004-2017 New H3C Technologies Co., Ltd. All rights reserved.*

* Without the owner's prior written consent,                                 *

* no decompiling or reverse-engineering shall be allowed.                    *

******************************************************************************

Automatic configuration is running, press CTRL_D to break or press CTRL_B to   

switch back to the default MDC.

<SWA-MDC1> system-view

[SWA-MDC1] interface loopback 0

[SWA-MDC1-Loopback0] ip address 6.6.6.6 32

[SWA-MDC1-Loopback0] quit

[SWA-MDC1] vlan 10

[SWA-MDC1-vlan10] port ten-gigabitethernet 1/0/1

[SWA-MDC1-vlan10] quit

[SWA-MDC1] interface vlan-interface 10

[SWA-MDC1-Vlan-interface10] ip address 17.1.1.6 24

[SWA-MDC1-Vlan-interface10] quit

[SWA-MDC1] vlan 20

[SWA-MDC1-vlan20] port ten-gigabitethernet 1/0/2

[SWA-MDC1-vlan20] quit

[SWA-MDC1] interface vlan-interface 20

[SWA-MDC1-Vlan-interface20] ip address 18.1.1.6 24

[SWA-MDC1-Vlan-interface20] quit

# Use the same method to log in to the other MDCs and assign IP addresses to interfaces. (Details not shown.)

# Assign IP addresses to interfaces on Switch C.

[SwitchC] interface loopback 0

[SwitchC-Loopback0] ip address 3.3.3.3 32

[SwitchC-Loopback0] quit

[SwitchC] vlan 10

[SwitchC-vlan10] port ten-gigabitethernet 1/0/3

[SwitchC-vlan10] quit

[SwitchC] interface vlan-interface 10

[SwitchC-Vlan-interface10] ip address 11.1.1.3 24

[SwitchC-Vlan-interface10] quit

[SwitchC] vlan 20

[SwitchC-vlan20] port ten-gigabitethernet 1/0/4

[SwitchC-vlan20] quit

[SwitchC] interface vlan-interface 20

[SwitchC-Vlan-interface20] ip address 12.1.1.3 24

[SwitchC-Vlan-interface20] quit

# Use the same method to assign IP addresses to interfaces on the other switches. (Details not shown.)

Configuring the routing protocol

# On SWA-MDC1, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SWA-MDC1] ospf 100 router-id 6.6.6.6

[SWA-MDC1-ospf-100] area 0

[SWA-MDC1-ospf-100-area-0.0.0.0] network 6.6.6.6 0.0.0.0

[SWA-MDC1-ospf-100-area-0.0.0.0] network 17.1.1.0 0.0.0.255

[SWA-MDC1-ospf-100-area-0.0.0.0] network 18.1.1.0 0.0.0.255

[SWA-MDC1-ospf-100-area-0.0.0.0] quit

[SWA-MDC1-ospf-100] quit

# On SWA-MDC2, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SWA-MDC2] ospf 100 router-id 1.1.1.1

[SWA-MDC2-ospf-100] area 0

[SWA-MDC2-ospf-100-area-0.0.0.0] network 1.1.1.1 0.0.0.0

[SWA-MDC2-ospf-100-area-0.0.0.0] network 11.1.1.0 0.0.0.255

[SWA-MDC2-ospf-100-area-0.0.0.0] network 13.1.1.0 0.0.0.255

[SWA-MDC2-ospf-100-area-0.0.0.0] network 15.1.1.0 0.0.0.255

[SWA-MDC2-ospf-100-area-0.0.0.0] quit

[SWA-MDC2-ospf-100] quit

# On SWB-MDC1, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SWB-MDC1] ospf 100 router-id 7.7.7.7

[SWB-MDC1-ospf-100] area 0

[SWB-MDC1-ospf-100-area-0.0.0.0] network 7.7.7.7 0.0.0.0

[SWB-MDC1-ospf-100-area-0.0.0.0] network 19.1.1.0 0.0.0.255

[SWB-MDC1-ospf-100-area-0.0.0.0] network 20.1.1.0 0.0.0.255

[SWB-MDC1-ospf-100-area-0.0.0.0] quit

[SWB-MDC1-ospf-100] quit

# On SWB-MDC2, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SWB-MDC2] ospf 100 router-id 2.2.2.2

[SWB-MDC2-ospf-100] area 0

[SWB-MDC2-ospf-100-area-0.0.0.0] network 2.2.2.2 0.0.0.0

[SWB-MDC2-ospf-100-area-0.0.0.0] network 12.1.1.0 0.0.0.255

[SWB-MDC2-ospf-100-area-0.0.0.0] network 14.1.1.0 0.0.0.255

[SWB-MDC2-ospf-100-area-0.0.0.0] network 16.1.1.0 0.0.0.255

[SWB-MDC2-ospf-100-area-0.0.0.0] quit

[SWB-MDC2-ospf-100] quit

# On Switch C, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SwitchC] ospf 100 router-id 3.3.3.3

[SwitchC-ospf-100] area 0

[SwitchC-ospf-100-area-0.0.0.0] network 3.3.3.3 0.0.0.0

[SwitchC-ospf-100-area-0.0.0.0] network 11.1.1.0 0.0.0.255

[SwitchC-ospf-100-area-0.0.0.0] network 12.1.1.0 0.0.0.255

[SwitchC-ospf-100-area-0.0.0.0] quit

[SwitchC-ospf-100] quit

# On Switch D, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SwitchD] ospf 100 router-id 4.4.4.4

[SwitchD-ospf-100] area 0

[SwitchD-ospf-100-area-0.0.0.0] network 4.4.4.4 0.0.0.0

[SwitchD-ospf-100-area-0.0.0.0] network 13.1.3.0 0.0.0.255

[SwitchD-ospf-100-area-0.0.0.0] network 14.1.1.0 0.0.0.255

[SwitchD-ospf-100-area-0.0.0.0] network 21.1.1.0 0.0.0.255

[SwitchD-ospf-100-area-0.0.0.0] quit

[SwitchD-ospf-100] quit

# On Switch E, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SwitchE] ospf 100 router-id 5.5.5.5

[SwitchE-ospf-100] area 0

[SwitchE-ospf-100-area-0.0.0.0] network 5.5.5.5 0.0.0.0

[SwitchE-ospf-100-area-0.0.0.0] network 15.1.1.0 0.0.0.255

[SwitchE-ospf-100-area-0.0.0.0] network 16.1.1.0 0.0.0.255

[SwitchE-ospf-100-area-0.0.0.0] network 18.1.1.0 0.0.0.255

[SwitchE-ospf-100-area-0.0.0.0] network 19.1.1.0 0.0.0.255

[SwitchE-ospf-100-area-0.0.0.0] quit

[SwitchE-ospf-100] quit

# On Switch F, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SwitchF] ospf 100 router-id 9.9.9.9

[SwitchF-ospf-100] area 0

[SwitchF-ospf-100-area-0.0.0.0] network 9.9.9.9 0.0.0.0

[SwitchF-ospf-100-area-0.0.0.0] network 17.1.1.0 0.0.0.255

[SwitchF-ospf-100-area-0.0.0.0] quit

[SwitchF-ospf-100] quit

Configuring the multicast protocol

1.        Configure Switch D:

# Enable IP multicast routing and enable PIM-SM on VLAN-interface10, VLAN-interface 20, and VLAN-interface 30.

[SwitchD] multicast routing

[SwitchD-mrib] quit

[SwitchD] interface vlan-interface 10

[SwitchD-Vlan-interface10] pim sm

[SwitchD-Vlan-interface10] quit

[SwitchD] interface vlan-interface 20

[SwitchD-Vlan-interface20] pim sm

[SwitchD-Vlan-interface20] quit

[SwitchD] interface vlan-interface 30

[SwitchD-Vlan-interface30] pim sm

[SwitchD-Vlan-interface30] quit

# Configure Loopback 0 of SWB-MDC2 as the static RP.

[SwitchD] pim

[SwitchD-pim] static-rp 2.2.2.2

[SwitchD-pim] quit

2.        Configure SWA-MDC2:

# Enable IP multicast routing and enable PIM-SM on VLAN-interface 20 and VLAN-interface 30.

<SWA-MDC2> system-view

[SWA-MDC2] multicast routing

[SWA-MDC2-mrib] quit

[SWA-MDC2] interface vlan-interface 20

[SWA-MDC2-Vlan-interface20] pim sm

[SWA-MDC2-Vlan-interface20] quit

[SWA-MDC2] interface vlan-interface 30

[SWA-MDC2-Vlan-interface30] pim sm

[SWA-MDC2-Vlan-interface30] quit

# Configure Loopback 0 of SWA-MDC2 as a C-BSR and C-RP, and configure Loopback 0 of SWB-MDC2 as the static RP.

[SWA-MDC2] pim

[SWA-MDC2-pim] c-bsr 1.1.1.1

[SWA-MDC2-pim] c-rp 1.1.1.1

[SWA-MDC2-pim] static-rp 2.2.2.2

[SWA-MDC2-pim] quit

3.        Configure SWB-MDC2:

# Enable IP multicast routing and enable PIM-SM on VLAN-interface 10 and VLAN-interface 40.

<SWB-MDC2> system-view

[SWB-MDC2] multicast routing

[SWB-MDC2-mrib] quit

[SWB-MDC2] interface vlan-interface 10

[SWB-MDC2-Vlan-interface10] pim sm

[SWB-MDC2-Vlan-interface10] quit

[SWB-MDC2] interface vlan-interface 40

[SWB-MDC2-Vlan-interface40] pim sm

[SWB-MDC2-Vlan-interface40] quit

# Configure Loopback 0 of SWB-MDC2 as the static RP.

[SWB-MDC2] pim

[SWB-MDC2-pim] static-rp 2.2.2.2

[SWB-MDC2-pim] quit

4.        Configure Switch E:

# Enable IP multicast routing and enable PIM-SM on VLAN-interface 20, VLAN-interface 30, and VLAN-interface 40.

[SwitchE] multicast routing

[SwitchE-mrib] quit

[SwitchE] interface vlan-interface 20

[SwitchE-Vlan-interface20] pim sm

[SwitchE-Vlan-interface20] quit

[SwitchE] interface vlan-interface 30

[SwitchE-Vlan-interface30] pim sm

[SwitchE-Vlan-interface30] quit

[SwitchE] interface vlan-interface 40

[SwitchE-Vlan-interface40] pim sm

[SwitchE-Vlan-interface40] quit

# Configure Loopback 0 of SWB-MDC2 as the static RP.

[SwitchE] pim

[SwitchE-pim] static-rp 2.2.2.2

[SwitchE-pim] quit

5.        Configure SWA-MDC1:

# Enable IP multicast routing and enable PIM-SM on VLAN-interface 10 and VLAN-interface 20.

<SWA-MDC1> system-view

[SWA-MDC1] multicast routing

[SWA-MDC1-mrib] quit

[SWA-MDC1] interface vlan-interface 10

[SWA-MDC1-Vlan-interface10] pim sm

[SWA-MDC1-Vlan-interface10] quit

[SWA-MDC1] interface vlan-interface 20

[SWA-MDC1-Vlan-interface20] pim sm

[SWA-MDC1-Vlan-interface20] quit

# Configure Loopback 0 of SWB-MDC2 as the static RP.

[SWA-MDC1] pim

[SWA-MDC1-pim] static-rp 2.2.2.2

[SWA-MDC1-pim] quit

6.        Configure Switch F:

# Enable IP multicast routing, enable IGMP on VLAN-interface 20 (the host-side interface), and enable PIM-SM on VLAN-interface 10.

[SwitchF] multicast routing

[SwitchF-mrib] quit

[SwitchF] interface vlan-interface 10

[SwitchF-Vlan-interface10] pim sm

[SwitchF-Vlan-interface10] quit

[SwitchF] interface vlan-interface 20

[SwitchF-Vlan-interface20] igmp enable

[SwitchF-Vlan-interface20] quit

# Configure Loopback 0 of SWB-MDC2 as the static RP.

[SwitchF] pim

[SwitchF-pim] static-rp 2.2.2.2

[SwitchF-pim] quit

Configuring the EVPN network

Creating VSIs, EVPN instances, and VXLANs

1.        Configure Switch C:

# Enable L2VPN.

[SwitchC] l2vpn enable

# Disable remote MAC address learning and remote ARP learning.

[SwitchC] vxlan tunnel mac-learning disable

[SwitchC] vxlan tunnel arp-learning disable

# Create an EVPN instance on VSI vpna, and configure the switch to automatically generate an RD and a route target for the EVPN instance.

[SwitchC] vsi vpna

[SwitchC-vsi-vpna] evpn encapsulation vxlan

[SwitchC-vsi-vpna-evpn-vxlan] route-distinguisher auto

[SwitchC-vsi-vpna-evpn-vxlan] vpn-target auto

[SwitchC-vsi-vpna-evpn-vxlan] quit

# Create VXLAN 10.

[SwitchC-vsi-vpna] vxlan 10

[SwitchC-vsi-vpna-vxlan-10] quit

[SwitchC-vsi-vpna] quit

# Create an EVPN instance on VSI vpnb, and configure the switch to automatically generate an RD and a route target for the EVPN instance.

[SwitchC] vsi vpnb

[SwitchC-vsi-vpnb] evpn encapsulation vxlan

[SwitchC-vsi-vpnb-evpn-vxlan] route-distinguisher auto

[SwitchC-vsi-vpnb-evpn-vxlan] vpn-target auto

[SwitchC-vsi-vpnb-evpn-vxlan] quit

# Create VXLAN 20.

[SwitchC-vsi-vpnb] vxlan 20

[SwitchC-vsi-vpnb-vxlan-20] quit

[SwitchC-vsi-vpnb] quit

2.        Configure Switch D:

# Enable L2VPN.

[SwitchD] l2vpn enable

# Disable remote MAC address learning and remote ARP learning.

[SwitchD] vxlan tunnel mac-learning disable

[SwitchD] vxlan tunnel arp-learning disable

# Create an EVPN instance on VSI vpna, and configure the switch to automatically generate an RD and a route target for the EVPN instance.

[SwitchD] vsi vpna

[SwitchD-vsi-vpna] evpn encapsulation vxlan

[SwitchD-vsi-vpna-evpn-vxlan] route-distinguisher auto

[SwitchD-vsi-vpna-evpn-vxlan] vpn-target auto

[SwitchD-vsi-vpna-evpn-vxlan] quit

# Create VXLAN 10.

[SwitchD-vsi-vpna] vxlan 10

[SwitchD-vsi-vpna-vxlan-10] quit

[SwitchD-vsi-vpna] quit

# Create an EVPN instance on VSI vpnb, and configure the switch to automatically generate an RD and a route target for the EVPN instance.

[SwitchD] vsi vpnb

[SwitchD-vsi-vpnb] evpn encapsulation vxlan

[SwitchD-vsi-vpnb-evpn-vxlan] route-distinguisher auto

[SwitchD-vsi-vpnb-evpn-vxlan] vpn-target auto

[SwitchD-vsi-vpnb-evpn-vxlan] quit

# Create VXLAN 20.

[SwitchD-vsi-vpnb] vxlan 20

[SwitchD-vsi-vpnb-vxlan-20] quit

[SwitchD-vsi-vpnb] quit

Configuring Ethernet service instances to match packets and mapping the instances to VSIs

1.        Configure Switch C:

# On Ten-GigabitEthernet 1/0/1, create Ethernet service instance 1000 to match VLAN 10 (Server 1), and map the Ethernet service instance to VSI vpna (VXLAN 10).

[SwitchC] interface ten-gigabitethernet 1/0/1

[SwitchC-Ten-GigabitEthernet1/0/1] service-instance 1000

[SwitchC-Ten-GigabitEthernet1/0/1-srv1000] encapsulation s-vid 10

[SwitchC-Ten-GigabitEthernet1/0/1-srv1000] xconnect vsi vpna

[SwitchC-Ten-GigabitEthernet1/0/1-srv1000] quit

[SwitchC-Ten-GigabitEthernet1/0/1] quit

# On Ten-GigabitEthernet 1/0/2, create Ethernet service instance 1000 to match VLAN 11 (Server 2), and map the Ethernet service instance to VSI vpnb (VXLAN 20).

[SwitchC] interface ten-gigabitethernet 1/0/2

[SwitchC-Ten-GigabitEthernet1/0/2] service-instance 1000

[SwitchC-Ten-GigabitEthernet1/0/2-srv1000] encapsulation s-vid 11

[SwitchC-Ten-GigabitEthernet1/0/2-srv1000] xconnect vsi vpnb

[SwitchC-Ten-GigabitEthernet1/0/2-srv1000] quit

[SwitchC-Ten-GigabitEthernet1/0/2] quit

2.        Configure Switch D:

# On Ten-GigabitEthernet 1/0/1, create Ethernet service instance 1000 to match VLAN 12 (Server 3), and map the Ethernet service instance to VSI vpna (VXLAN 10).

[SwitchD] interface ten-gigabitethernet 1/0/1

[SwitchD-Ten-GigabitEthernet1/0/1] service-instance 1000

[SwitchD-Ten-GigabitEthernet1/0/1-srv1000] encapsulation s-vid 12

[SwitchD-Ten-GigabitEthernet1/0/1-srv1000] xconnect vsi vpna

[SwitchD-Ten-GigabitEthernet1/0/1-srv1000] quit

[SwitchD-Ten-GigabitEthernet1/0/1] quit

# On Ten-GigabitEthernet 1/0/2, create Ethernet service instance 1000 to match VLAN 13 (Server 4), and map the Ethernet service instance to VSI vpnb (VXLAN 20).

[SwitchD] interface ten-gigabitethernet 1/0/2

[SwitchD-Ten-GigabitEthernet1/0/2] service-instance 1000

[SwitchD-Ten-GigabitEthernet1/0/2-srv1000] encapsulation s-vid 13

[SwitchD-Ten-GigabitEthernet1/0/2-srv1000] xconnect vsi vpnb

[SwitchD-Ten-GigabitEthernet1/0/2-srv1000] quit

[SwitchD-Ten-GigabitEthernet1/0/2] quit

Configuring BGP to advertise BGP EVPN routes

1.        Configure SWA-MDC2:

# Configure SWA-MDC2 to establish BGP connections to other devices.

<SWA-MDC2> system-view

[SWA-MDC2] bgp 100

[SWA-MDC2-bgp-default] group evpn

[SWA-MDC2-bgp-default] peer 3.3.3.3 group evpn

[SWA-MDC2-bgp-default] peer 4.4.4.4 group evpn

[SWA-MDC2-bgp-default] peer 5.5.5.5 group evpn

[SWA-MDC2-bgp-default] peer evpn as-number 100

[SWA-MDC2-bgp-default] peer evpn connect-interface loopback 0

[SWA-MDC2-bgp-default] peer 2.2.2.2 as-number 100

[SWA-MDC2-bgp-default] peer 2.2.2.2 connect-interface loopback 0

# Configure BGP to advertise BGP EVPN routes, and disable route target filtering for BGP EVPN routes.

[SWA-MDC2-bgp-default] address-family l2vpn evpn

[SWA-MDC2-bgp-default-evpn] peer evpn enable

[SWA-MDC2-bgp-default-evpn] peer 2.2.2.2 enable

[SWA-MDC2-bgp-default-evpn] undo policy vpn-target

# Configure SWA-MDC2 as the RR.

[SWA-MDC2-bgp-default-evpn] reflector cluster-id 8.8.8.8

[SWA-MDC2-bgp-default-evpn] peer evpn reflect-client

[SWA-MDC2-bgp-default-evpn] quit

[SWA-MDC2-bgp-default] quit

2.        Configure SWB-MDC2:

# Configure SWB-MDC2 to establish BGP connections to other devices.

<SWB-MDC2> system-view

[SWB-MDC2] bgp 100

[SWB-MDC2-bgp-default] group evpn

[SWB-MDC2-bgp-default] peer 3.3.3.3 group evpn

[SWB-MDC2-bgp-default] peer 4.4.4.4 group evpn

[SWB-MDC2-bgp-default] peer 5.5.5.5 group evpn

[SWB-MDC2-bgp-default] peer evpn as-number 100

[SWB-MDC2-bgp-default] peer evpn connect-interface loopback 0

[SWB-MDC2-bgp-default] peer 1.1.1.1 as-number 100

[SWB-MDC2-bgp-default] peer 1.1.1.1 connect-interface loopback 0

# Configure BGP to advertise BGP EVPN routes, and disable route target filtering for BGP EVPN routes.

[SWB-MDC2-bgp-default] address-family l2vpn evpn

[SWB-MDC2-bgp-default-evpn] peer evpn enable

[SWB-MDC2-bgp-default-evpn] peer 1.1.1.1 enable

[SWB-MDC2-bgp-default-evpn] undo policy vpn-target

# Configure SWB-MDC2 as the RR.

[SWB-MDC2-bgp-default-evpn] reflector cluster-id 8.8.8.8

[SWB-MDC2-bgp-default-evpn] peer evpn reflect-client

[SWB-MDC2-bgp-default-evpn] quit

[SWB-MDC2-bgp-default] quit

3.        Configure Switch C:

# Configure Switch C to establish BGP connections to other devices.

[SwitchC] bgp 100

[SwitchC-bgp-default] peer 1.1.1.1 as-number 100

[SwitchC-bgp-default] peer 1.1.1.1 connect-interface loopback 0

[SwitchC-bgp-default] peer 2.2.2.2 as-number 100

[SwitchC-bgp-default] peer 2.2.2.2 connect-interface loopback 0

# Configure BGP to advertise BGP EVPN routes.

[SwitchC-bgp-default] address-family l2vpn evpn

[SwitchC-bgp-default-evpn] peer 1.1.1.1 enable

[SwitchC-bgp-default-evpn] peer 2.2.2.2 enable

4.        Configure Switch D:

# Configure Switch D to establish BGP connections to other devices.

[SwitchD] bgp 100

[SwitchD-bgp-default] peer 1.1.1.1 as-number 100

[SwitchD-bgp-default] peer 1.1.1.1 connect-interface loopback 0

[SwitchD-bgp-default] peer 2.2.2.2 as-number 100

[SwitchD-bgp-default] peer 2.2.2.2 connect-interface loopback 0

# Configure BGP to advertise BGP EVPN routes.

[SwitchD-bgp-default] address-family l2vpn evpn

[SwitchD-bgp-default-evpn] peer 1.1.1.1 enable

[SwitchD-bgp-default-evpn] peer 2.2.2.2 enable

5.        Configure Switch E:

# Configure Switch E to establish BGP connections to other devices.

[SwitchE] bgp 100

[SwitchE-bgp-default] peer 1.1.1.1 as-number 100

[SwitchE-bgp-default] peer 1.1.1.1 connect-interface loopback 0

[SwitchE-bgp-default] peer 2.2.2.2 as-number 100

[SwitchE-bgp-default] peer 2.2.2.2 connect-interface loopback 0

# Configure BGP to advertise BGP EVPN routes.

[SwitchE-bgp-default] address-family l2vpn evpn

[SwitchE-bgp-default-evpn] peer 1.1.1.1 enable

[SwitchE-bgp-default-evpn] peer 2.2.2.2 enable

Configuring the distributed EVPN gateways

1.        Configure Switch C:

# Configure RD and route target settings for VPN instance vpna.

[SwitchC] ip vpn-instance vpna

[SwitchC-vpn-instance-vpna] route-distinguisher 1:1

[SwitchC-vpn-instance-vpna] address-family ipv4

[SwitchC-vpn-ipv4-vpna] vpn-target 2:2

[SwitchC-vpn-ipv4-vpna] quit

[SwitchC-vpn-instance-vpna] address-family evpn

[SwitchC-vpn-evpn-vpna] vpn-target 1:1

[SwitchC-vpn-evpn-vpna] quit

[SwitchC-vpn-instance-vpna] quit

# Configure VSI-interface 1.

[SwitchC] interface vsi-interface 1

[SwitchC-Vsi-interface1] ip binding vpn-instance vpna

[SwitchC-Vsi-interface1] ip address 10.1.1.1 255.255.255.0

[SwitchC-Vsi-interface1] mac-address 1-1-1

[SwitchC-Vsi-interface1] distributed-gateway local

[SwitchC-Vsi-interface1] local-proxy-arp enable

[SwitchC-Vsi-interface1] quit

# Configure VSI-interface 2.

[SwitchC] interface vsi-interface 2

[SwitchC-Vsi-interface2] ip binding vpn-instance vpna

[SwitchC-Vsi-interface2] ip address 10.1.2.1 255.255.255.0

[SwitchC-Vsi-interface2] mac-address 2-2-2

[SwitchC-Vsi-interface2] distributed-gateway local

[SwitchC-Vsi-interface2] local-proxy-arp enable

[SwitchC-Vsi-interface2] quit

# Create VSI-interface 3. Associate VSI-interface 3 with VPN instance vpna, and configure the L3 VXLAN ID as 1000 for the VPN instance.

[SwitchC] interface vsi-interface 3

[SwitchC-Vsi-interface3] ip binding vpn-instance vpna

[SwitchC-Vsi-interface3] l3-vni 1000

[SwitchC-Vsi-interface3] quit

# Specify VSI-interface 1 as the gateway interface for VSI vpna (the VSI of VXLAN 10).

[SwitchC] vsi vpna

[SwitchC-vsi-vpna] gateway vsi-interface 1

[SwitchC-vsi-vpna] quit

# Specify VSI-interface 2 as the gateway interface for VSI vpnb (the VSI of VXLAN 20).

[SwitchC] vsi vpnb

[SwitchC-vsi-vpnb] gateway vsi-interface 2

[SwitchC-vsi-vpnb] quit

2.        Configure Switch D:

# Configure RD and route target settings for VPN instance vpna.

[SwitchD] ip vpn-instance vpna

[SwitchD-vpn-instance-vpna] route-distinguisher 1:1

[SwitchD-vpn-instance-vpna] address-family ipv4

[SwitchD-vpn-ipv4-vpna] vpn-target 2:2

[SwitchD-vpn-ipv4-vpna] quit

[SwitchD-vpn-instance-vpna] address-family evpn

[SwitchD-vpn-evpn-vpna] vpn-target 1:1

[SwitchD-vpn-evpn-vpna] quit

[SwitchD-vpn-instance-vpna] quit

# Configure VSI-interface 1.

[SwitchD] interface vsi-interface 1

[SwitchD-Vsi-interface1] ip binding vpn-instance vpna

[SwitchD-Vsi-interface1] ip address 10.1.1.1 255.255.255.0

[SwitchD-Vsi-interface1] mac-address 1-1-1

[SwitchD-Vsi-interface1] distributed-gateway local

[SwitchD-Vsi-interface1] local-proxy-arp enable

[SwitchD-Vsi-interface1] quit

# Configure VSI-interface 2.

[SwitchD] interface vsi-interface 2

[SwitchD-Vsi-interface2] ip binding vpn-instance vpna

[SwitchD-Vsi-interface2] ip address 10.1.2.1 255.255.255.0

[SwitchD-Vsi-interface2] mac-address 2-2-2

[SwitchD-Vsi-interface2] distributed-gateway local

[SwitchD-Vsi-interface2] local-proxy-arp enable

[SwitchD-Vsi-interface2] quit

# Create VSI-interface 3. Associate VSI-interface 3 with VPN instance vpna, and configure the L3 VXLAN ID as 1000 for the VPN instance.

[SwitchD] interface vsi-interface 3

[SwitchD-Vsi-interface3] ip binding vpn-instance vpna

[SwitchD-Vsi-interface3] l3-vni 1000

[SwitchD-Vsi-interface3] quit

# Specify VSI-interface 1 as the gateway interface for VSI vpna (the VSI of VXLAN 10).

[SwitchD] vsi vpna

[SwitchD-vsi-vpna] gateway vsi-interface 1

[SwitchD-vsi-vpna] quit

# Specify VSI-interface 2 as the gateway interface for VSI vpnb (the VSI of VXLAN 20).

[SwitchD] vsi vpnb

[SwitchD-vsi-vpnb] gateway vsi-interface 2

[SwitchD-vsi-vpnb] quit

Configuring border gateway Switch E

# Enable L2VPN.

<SwitchE> system-view

[SwitchE] l2vpn enable

# Disable remote MAC address learning and remote ARP learning.

[SwitchE] vxlan tunnel mac-learning disable

[SwitchE] vxlan tunnel arp-learning disable

# Configure RD and route target settings for VPN instance vpna.

[SwitchE] ip vpn-instance vpna

[SwitchE-vpn-instance-vpna] route-distinguisher 1:1

[SwitchE-vpn-instance-vpna] address-family ipv4

[SwitchE-vpn-ipv4-vpna] vpn-target 2:2

[SwitchE-vpn-ipv4-vpna] quit

[SwitchE-vpn-instance-vpna] address-family evpn

[SwitchE-vpn-evpn-vpna] vpn-target 1:1

[SwitchE-vpn-evpn-vpna] quit

[SwitchE-vpn-instance-vpna] quit

# Create VSI-interface 3. Associate VSI-interface 3 with VPN instance vpna, and configure the L3 VXLAN ID as 1000 for the VPN instance.

[SwitchE] interface vsi-interface 3

[SwitchE-Vsi-interface3] ip binding vpn-instance vpna

[SwitchE-Vsi-interface3] l3-vni 1000

[SwitchE-Vsi-interface3] quit

# Configure a default route. Set the next hop to 22.1.1.100 (the IP address of a device in the Internet).

[SwitchE] ip route-static vpn-instance vpna 0.0.0.0 0 22.1.1.100

# Redistribute the default route to the BGP IPv4 unicast routing table of VPN instance vpna.

[SwitchE] bgp 100

[SwitchE-bgp-default] ip vpn-instance vpna

[SwitchE-bgp-default-vpna] address-family ipv4 unicast

[SwitchE-bgp-default-ipv4-vpna] default-route imported

[SwitchE-bgp-default-ipv4-vpna] import-route static

[SwitchE-bgp-default-ipv4-vpna] quit

[SwitchE-bgp-default-vpna] quit

[SwitchE-bgp-default] quit

# Associate VLAN-interface 10 (the interface connected to the Internet) with VPN instance vpna.

[SwitchE] interface vlan-interface 10

[SwitchE-Vlan-interface20] ip binding vpn-instance vpna

[SwitchE-Vlan-interface20] ip address 22.1.1.5 24

[SwitchE-Vlan-interface20] quit

Verifying the configuration

Verifying the MDC configuration

# Verify that the MDCs on Switch A exist and are operating correctly.

[SwitchA] display mdc

ID         Name            Status

1          Admin           active

2          SWA-MDC1        active

3          SWA-MDC2        active

The output shows that the MDCs have been created and are operating correctly.

# Log in to SWA-MDC2.

[SwitchA] switchto mdc SWA-MDC2

******************************************************************************

* Copyright (c) 2004-2018 New H3C Technologies Co., Ltd. All rights reserved.*

* Without the owner's prior written consent,                                 *

* no decompiling or reverse-engineering shall be allowed.                    *

******************************************************************************

 

<SWA-MDC2>%Mar  2 10:43:04:214 2018 SWA-MDC2 SHELL/5/SHELL_LOGIN: -MDC=3; Console logged in from con0.

# Display the interfaces assigned to SWA-MDC2.

<SWA-MDC2> display interface brief

Brief information on interfaces in route mode:

Link: ADM - administratively down; Stby - standby

Protocol: (s) - spoofing

Interface            Link Protocol Primary IP      Description

InLoop0              UP   UP(s)    --

Loop0                UP   UP(s)    1.1.1.1

MGE0/0/0             DOWN DOWN     --

NULL0                UP   UP(s)    --

REG0                 UP   --       --

Vlan10               UP   UP       11.1.1.1

Vlan20               UP   UP       13.1.1.1

Vlan30               UP   UP       15.1.1.1

 

Brief information on interfaces in bridge mode:

Link: ADM - administratively down; Stby - standby

Speed: (a) - auto

Duplex: (a)/A - auto; H - half; F - full

Type: A - access; T - trunk; H - hybrid

Interface             Link Speed   Duplex Type PVID Description

XGE2/0/1              UP   1G(a)   F      A    30

XGE2/0/2              ADM  auto    F      A    1

XGE2/0/3              UP   1G(a)   F      A    10

XGE2/0/4              UP   1G(a)   F      A    20

XGE2/0/5              ADM  auto    F      A    1

XGE2/0/6              ADM  auto    F      A    1

XGE2/0/7              ADM  auto    F      A    1

XGE2/0/8              ADM  auto    F      A    1

XGE2/0/9              ADM  auto    F      A    1

XGE2/0/10             ADM  auto    F      A    1

XGE2/0/11             ADM  auto    F      A    1

XGE2/0/12             ADM  auto    F      A    1

XGE2/0/13             ADM  auto    F      A    1

XGE2/0/14             ADM  auto    F      A    1

XGE2/0/15             ADM  auto    F      A    1

XGE2/0/16             ADM  auto    F      A    1

XGE2/0/17             ADM  auto    F      A    1

XGE2/0/18             ADM  auto    F      A    1

XGE2/0/19             ADM  auto    F      A    1

XGE2/0/20             ADM  auto    F      A    1

XGE2/0/21             ADM  auto    F      A    1

XGE2/0/22             ADM  auto    F      A    1

XGE2/0/23             ADM  auto    F      A    1

XGE2/0/24             ADM  auto    F      A    1

# Use the same method to verify the MDC configuration on Switch B. (Details not shown.)

Verifying the EVPN network

# Display EVPN routing information on distributed EVPN gateway Switch C.

[SwitchC] display bgp l2vpn evpn

 

 BGP local router ID is 3.3.3.3

 Status codes: * - valid, > - best, d - dampened, h - history

               s - suppressed, S - stale, i - internal, e - external

               a - additional-path

       Origin: i - IGP, e - EGP, ? - incomplete

 

 Total number of routes from all PEs: 10

 

 Route distinguisher: 1:1(vpna)

 Total number of routes: 6

 

     Network            NextHop         MED        LocPrf     PrefVal Path/Ogn

 

* >i [2][0][48][a21a-36c9-0806][32][10.1.1.20]/136

                        4.4.4.4         0          100        0       i

* >i [2][0][48][a21a-39de-0907][32][10.1.2.20]/136

                        4.4.4.4         0          100        0       i

* >i [5][0][0][0.0.0.0]/80

                        5.5.5.5         0          100        0       ?

*  i                    5.5.5.5         0          100        0       ?

* >  [5][0][24][10.1.1.0]/80

                        0.0.0.0         0          100        32768   i

* >  [5][0][24][10.1.2.0]/80

                        0.0.0.0         0          100        32768   i

 

 Route distinguisher: 1:10

 Total number of routes: 6

 

     Network            NextHop         MED        LocPrf     PrefVal Path/Ogn

 

* >  [2][0][48][a21a-2df1-0606][32][10.1.1.10]/136

                        0.0.0.0         0          100        32768   i

* >i [2][0][48][a21a-36c9-0806][32][10.1.1.20]/136

                        4.4.4.4         0          100        0       i

*  i                    4.4.4.4         0          100        0       i

* >  [3][0][32][3.3.3.3]/80

                        0.0.0.0         0          100        32768   i

* >i [3][0][32][4.4.4.4]/80

                        4.4.4.4         0          100        0       i

*  i                    4.4.4.4         0          100        0       i

 

 Route distinguisher: 1:20

 Total number of routes: 6

 

     Network            NextHop         MED        LocPrf     PrefVal Path/Ogn

 

* >  [2][0][48][a21a-3300-0707][32][10.1.2.10]/136

                        0.0.0.0         0          100        32768   i

* >i [2][0][48][a21a-39de-0907][32][10.1.2.20]/136

                        4.4.4.4         0          100        0       i

*  i                    4.4.4.4         0          100        0       i

* >  [3][0][32][3.3.3.3]/80

                        0.0.0.0         0          100        32768   i

* >i [3][0][32][4.4.4.4]/80

                        4.4.4.4         0          100        0       i

*  i                    4.4.4.4         0          100        0       i

# Verify that the VXLAN tunnel interfaces are up.

[SwitchC] display interface tunnel

Tunnel1

Current state: UP

Line protocol state: UP

Description: Tunnel1 Interface

Bandwidth: 64 kbps

Maximum transmission unit: 1464

Internet protocol processing: Disabled

Last clearing of counters: Never

Tunnel source 3.3.3.3, destination 4.4.4.4

Tunnel protocol/transport UDP_VXLAN/IP

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 10 packets, 980 bytes, 0 drops

Output: 19 packets, 1520 bytes, 0 drops

 

Tunnel2

Current state: UP

Line protocol state: UP

Description: Tunnel2 Interface

Bandwidth: 64 kbps

Maximum transmission unit: 1464

Internet protocol processing: Disabled

Last clearing of counters: Never

Tunnel source 3.3.3.3, destination 5.5.5.5

Tunnel protocol/transport UDP_VXLAN/IP

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 0 packets, 0 bytes, 0 drops...

# Verify that the VSI interfaces are up on Switch C.

[SwitchC] display interface vsi-interface

Vsi-interface1

Current state: UP

Line protocol state: UP

Description: Vsi-interface1 Interface

Bandwidth: 1000000 kbps

Maximum transmission unit: 1444

Internet address: 10.1.1.1/24 (primary)

IP packet frame type: Ethernet II, hardware address: 0001-0001-0001

IPv6 packet frame type: Ethernet II, hardware address: 0001-0001-0001

Physical: Unknown, baudrate: 1000000 kbps

Last clearing of counters: Never

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 192 packets, 18816 bytes, 0 drops

 

Vsi-interface2

Current state: UP

Line protocol state: UP

Description: Vsi-interface2 Interface

Bandwidth: 1000000 kbps

Maximum transmission unit: 1444

Internet address: 10.1.2.1/24 (primary)

IP packet frame type: Ethernet II, hardware address: 0002-0002-0002

IPv6 packet frame type: Ethernet II, hardware address: 0002-0002-0002

Physical: Unknown, baudrate: 1000000 kbps

Last clearing of counters: Never

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 128 packets, 8960 bytes, 0 drops

 

Vsi-interface3

Current state: UP

Line protocol state: UP

Description: Vsi-interface3 Interface

Bandwidth: 1000000 kbps

Maximum transmission unit: 1444

Internet protocol processing: Disabled

IP packet frame type: Ethernet II, hardware address: a21a-0861-0300

IPv6 packet frame type: Ethernet II, hardware address: a21a-0861-0300

Physical: Unknown, baudrate: 1000000 kbps

Last clearing of counters: Never

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 0 packets, 0 bytes, 0 drops

# Verify that the VXLAN tunnels have been assigned to the VXLANs, and the VSI interfaces are the gateway interfaces of their respective VXLANs.

[SwitchC] display l2vpn vsi verbose

VSI Name: Auto_L3VNI1000_3

  VSI Index               : 2

  VSI State               : Down

  MTU                     : 1500

  Bandwidth               : -

  Broadcast Restrain      : Unlimited

  Multicast Restrain      : Unlimited

  Unknown Unicast Restrain: Unlimited

  MAC Learning            : Enabled

  MAC Table Limit         : -

  MAC Learning rate       : -

  Drop Unknown            : -

  Flooding                : Enabled

  Statistics              : Disabled

  Gateway Interface       : VSI-interface 3

  VXLAN ID                : 1000

 

VSI Name: vpna

  VSI Index               : 0

  VSI State               : Up

  MTU                     : 1500

  Bandwidth               : Unlimited

  Broadcast Restrain      : Unlimited

  Multicast Restrain      : Unlimited

  Unknown Unicast Restrain: Unlimited

  MAC Learning            : Enabled

  MAC Table Limit         : -

  MAC Learning rate       : -

  Drop Unknown            : -

  Flooding                : Enabled

  Statistics              : Disabled

  Gateway Interface       : VSI-interface 1

  VXLAN ID                : 10

  Tunnels:

    Tunnel Name          Link ID    State    Type        Flood proxy

    Tunnel1              0x5000000  UP       Auto        Disabled

  ACs:

    AC                                Link ID  State       Type

    XGE1/0/1 srv1000                  0        Up          Manual

 

VSI Name: vpnb

  VSI Index               : 1

  VSI State               : Up

  MTU                     : 1500

  Bandwidth               : -

  Broadcast Restrain      : Unlimited

  Multicast Restrain      : Unlimited

  Unknown Unicast Restrain: Unlimited

  MAC Learning            : Enabled

  MAC Table Limit         : -

  MAC Learning rate       : -

  Drop Unknown            : -

  Flooding                : Enabled

  Statistics              : Disabled

  Gateway Interface       : VSI-interface 2

  VXLAN ID                : 20

  Tunnels:

    Tunnel Name          Link ID    State    Type        Flood proxy

    Tunnel1              0x5000000  UP       Auto        Disabled

  ACs:

    AC                                Link ID  State       Type

    XGE1/0/2 srv1000                  0        Up          Manual

# Verify that Switch C has created ARP entries for the VMs.

[SwitchC] display arp

  Type: S-Static   D-Dynamic   O-Openflow   R-Rule   M-Multiport  I-Invalid

IP address      MAC address    VLAN/VSI   Interface                 Aging Type

11.1.1.1        a210-9a1c-0182 10         XGE1/0/3                  240   D

12.1.1.2        a21a-01b9-0242 20         XGE1/0/5                  240   D

10.1.1.10       a21a-2df1-0606 0          XGE1/0/1                  489   D

10.1.2.10       a21a-3300-0707 1          XGE1/0/2                  414   D

4.4.4.4         a21a-0fb2-0400 2          Tunnel1                   --    R

5.5.5.5         a21a-17fd-0500 2          Tunnel2                   --    R

# Verify that Switch C has created EVPN ARP entries for the local VMs.

[SwitchC] display evpn route arp

Flags: D - Dynamic   B - BGP      L - Local active

       G - Gateway   S - Static   M - Mapping

 

VPN instance: vpna                            Interface: Vsi-interface1

IP address      MAC address     Router MAC      VSI index   Flags

10.1.1.1        0001-0001-0001  a21a-0861-0300  0           GL

10.1.1.10       a21a-2df1-0606  a21a-0861-0300  0           DL

10.1.1.20       a21a-36c9-0806  a21a-0fb2-0400  0           B

 

VPN instance: vpna                            Interface: Vsi-interface2

IP address      MAC address     Router MAC      VSI index   Flags

10.1.2.1        0002-0002-0002  a21a-0861-0300  1           GL

10.1.2.10       a21a-3300-0707  a21a-0861-0300  1           DL

10.1.2.20       a21a-39de-0907  a21a-0fb2-0400  1           B

<SwitchC>

# Verify that the servers can communicate with one another and can communicate with the Internet. (Details not shown.)

Verifying the multicast network

# On Switch F, display RP information in the PIM-SM domain.

[SwitchF] display pim rp-info

 BSR RP information:

   Scope: non-scoped

     Group/MaskLen: 225.1.1.0/24

       RP address               Priority  HoldTime  Uptime    Expires

       1.1.1.1                  192       180       00:51:45  00:02:22

 

Static RP information:

       RP address               ACL   Mode    Preferred

       2.2.2.2                  ----  pim-sm  No

 

[SwitchF] display pim bsr-info

 Scope: non-scoped

     State: Accept Preferred

     Bootstrap timer: 00:01:44

     Elected BSR address: 1.1.1.1

       Priority: 64

       Hash mask length: 30

       Uptime: 00:11:18

 

[SwitchF]disp pim interface

Interface           NbrCnt HelloInt   DR-Pri     DR-Address

 Vlan10             0      30         1          10.1.4.1      (local)

 Vlan20             1      30         1          1.1.1.1

# On SWA-MDC2, display BSR information in the PIM-SM domain.

[SWA-MDC2] display pim bsr-info

 Scope: non-scoped

     State: Elected

     Bootstrap timer: 00:01:44

     Elected BSR address: 1.1.1.1

       Priority: 64

       Hash mask length: 30

       Uptime: 00:11:18

     Candidate BSR address: 1.1.1.1

       Priority: 64

       Hash mask length: 30

# On SWA-MDC2, display C-RP information in the PIM-SM domain.

[SWA-MDC2] display pim c-rp

 Scope: non-scoped

     Group/MaskLen: 224.0.0.0/4

       C-RP address             Priority  HoldTime  Uptime    Expires

       1.1.1.1 (local)          192       150       03:01:36  00:02:29

Configuration files

·          Switch A:

#

mdc Admin id 1

  undo location slot 1

  undo location slot 2

#

mdc SWA-MDC1 id 2

 location slot 1

 mdc start

 allocate interface Ten-GigabitEthernet1/0/1 to Ten-GigabitEthernet 1/0/24

#

mdc SWA-MDC2 id 3

 location slot 2

 mdc start

 allocate interface Ten-GigabitEthernet 2/0/1 to Ten-GigabitEthernet 2/0/24

#

·          SWA-MDC1:

#

ospf 100 router-id 6.6.6.6

 area 0.0.0.0

  network 6.6.6.6 0.0.0.0

  network 17.1.1.0 0.0.0.255

  network 18.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

interface LoopBack0

 ip address 6.6.6.6 255.255.255.255

#

interface Vlan-interface10

 ip address 17.1.1.6 255.255.255.0

 pim sm

#

interface Vlan-interface20

 ip address 18.1.1.6 255.255.255.0

 pim sm

#

interface Ten-GigabitEthernet1/0/1

 port link-mode bridge

 port access vlan 10

#

interface Ten-GigabitEthernet1/0/2

 port link-mode bridge

 port access vlan 20

#

multicast routing

#

pim

 static-rp 2.2.2.2

#

·          SWA-MDC2:

#

ospf 100 router-id 1.1.1.1

 area 0.0.0.0

  network 1.1.1.1 0.0.0.0

  network 11.1.1.0 0.0.0.255

  network 13.1.1.0 0.0.0.255

  network 15.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

vlan 30

#

interface LoopBack0

 ip address 1.1.1.1 255.255.255.255

#

interface Vlan-interface10

 ip address 11.1.1.1 255.255.255.0

#

interface Vlan-interface20

 ip address 13.1.1.1 255.255.255.0

 pim sm

#

interface Vlan-interface30

 ip address 15.1.1.1 255.255.255.0

 pim sm

#

interface Ten-GigabitEthernet2/0/1

 port link-mode bridge

 port access vlan 30

#

interface Ten-GigabitEthernet2/0/3

 port link-mode bridge

 port access vlan 10

#

interface Ten-GigabitEthernet2/0/4

 port link-mode bridge

 port access vlan 20

#

bgp 100

 group evpn internal

 peer evpn connect-interface LoopBack0

 peer 2.2.2.2 as-number 100

 peer 2.2.2.2 connect-interface LoopBack0

 peer 3.3.3.3 group evpn

 peer 4.4.4.4 group evpn

 peer 5.5.5.5 group evpn

 #

 address-family l2vpn evpn

  reflector cluster-id 8.8.8.8

  undo policy vpn-target

  peer evpn enable

  peer evpn reflect-client

  peer 2.2.2.2 enable

#

multicast routing

#

pim

 c-bsr 1.1.1.1

 c-rp 1.1.1.1

 static-rp 2.2.2.2

#

·          Switch B:

#

mdc Admin id 1

  undo location slot 1

  undo location slot 2

#

mdc SWB-MDC1 id 2

 location slot 1

 mdc start

 allocate interface Ten-GigabitEthernet1/0/1 to Ten-GigabitEthernet1/0/24

#

mdc SWB-MDC2 id 3

 location slot 2

 mdc start

allocate interface Ten-GigabitEthernet2/0/1 to Ten-GigabitEthernet2/0/24

#

·          SWB-MDC1:

#

ospf 100 router-id 7.7.7.7

 area 0.0.0.0

  network 7.7.7.7 0.0.0.0

  network 19.1.1.0 0.0.0.255

  network 20.1.1.0 0.0.0.255

#

vlan 10

#

vlan 50

#

interface LoopBack0

 ip address 7.7.7.7 255.255.255.255

#

interface Vlan-interface10

 ip address 20.1.1.7 255.255.255.0

#

interface Vlan-interface50

 ip address 19.1.1.7 255.255.255.0

#

interface Ten-GigabitEthernet1/0/1

 port link-mode bridge

 port access vlan 10

#

interface Ten-GigabitEthernet1/0/2

 port link-mode bridge

 port access vlan 50

#

·          SWB-MDC2:

#

ospf 100 router-id 2.2.2.2

 area 0.0.0.0

  network 2.2.2.2 0.0.0.0

  network 12.1.1.0 0.0.0.255

  network 14.1.1.0 0.0.0.255

  network 16.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

vlan 40

#

interface LoopBack0

 ip address 2.2.2.2 255.255.255.255

#

interface Vlan-interface10

 ip address 14.1.1.2 255.255.255.0

 pim sm

#

interface Vlan-interface20

 ip address 12.1.1.2 255.255.255.0

#

interface Vlan-interface40

 ip address 16.1.1.2 255.255.255.0

 pim sm

#

interface Ten-GigabitEthernet2/0/2

 port link-mode bridge

 port access vlan 40

#

interface Ten-GigabitEthernet2/0/3

 port link-mode bridge

 port access vlan 10

#

interface Ten-GigabitEthernet2/0/5

 port link-mode bridge

 port access vlan 20

#

bgp 100

 group evpn internal

 peer evpn connect-interface LoopBack0

 peer 1.1.1.1 as-number 100

 peer 1.1.1.1 connect-interface LoopBack0

 peer 3.3.3.3 group evpn

 peer 4.4.4.4 group evpn

 peer 5.5.5.5 group evpn

 #

 address-family l2vpn evpn

  reflector cluster-id 8.8.8.8

  undo policy vpn-target

  peer evpn enable

  peer evpn reflect-client

  peer 1.1.1.1 enable

#

multicast routing

#

pim

 static-rp 2.2.2.2

#

·          Switch C:

#

ip vpn-instance vpna

 route-distinguisher 1:1

 #

 address-family ipv4

  vpn-target 2:2 import-extcommunity

  vpn-target 2:2 export-extcommunity

 #

 address-family evpn

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

#

 vxlan tunnel mac-learning disable

#

ospf 100 router-id 3.3.3.3

 area 0.0.0.0

  network 3.3.3.3 0.0.0.0

  network 11.1.1.0 0.0.0.255

  network 12.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

 l2vpn enable

 vxlan tunnel arp-learning disable

#

vsi vpna

 gateway vsi-interface 1

 vxlan 10

 evpn encapsulation vxlan

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

#

vsi vpnb

 gateway vsi-interface 2

 vxlan 20

 evpn encapsulation vxlan

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

#

interface LoopBack0

 ip address 3.3.3.3 255.255.255.255

#

interface Vlan-interface10

 ip address 11.1.1.3 255.255.255.0

#

interface Vlan-interface20

 ip address 12.1.1.3 255.255.255.0

#

interface Ten-GigabitEthernet1/0/1

 port link-mode bridge

 service-instance 1000

  encapsulation s-vid 10

  xconnect vsi vpna

#

interface Ten-GigabitEthernet1/0/2

 port link-mode bridge

 service-instance 1000

  encapsulation s-vid 11

  xconnect vsi vpnb

#

interface Ten-GigabitEthernet1/0/3

 port link-mode bridge

 port access vlan 10

#

interface Ten-GigabitEthernet1/0/4

 port link-mode bridge

 port access vlan 20

#

interface Ten-GigabitEthernet1/0/5

 port link-mode bridge

 port access vlan 20

#

interface Vsi-interface1

 ip binding vpn-instance vpna

 ip address 10.1.1.1 255.255.255.0

 mac-address 0001-0001-0001

 local-proxy-arp enable

 distributed-gateway local

#

interface Vsi-interface2

 ip binding vpn-instance vpna

 ip address 10.1.2.1 255.255.255.0

 mac-address 0002-0002-0002

 local-proxy-arp enable

 distributed-gateway local

#

interface Vsi-interface3

 ip binding vpn-instance vpna

 l3-vni 1000

#

bgp 100

 peer 1.1.1.1 as-number 100

 peer 1.1.1.1 connect-interface LoopBack0

 peer 2.2.2.2 as-number 100

 peer 2.2.2.2 connect-interface LoopBack0

 #

 address-family l2vpn evpn

  peer 1.1.1.1 enable

  peer 2.2.2.2 enable

·          Switch D:

#

ip vpn-instance vpna

 route-distinguisher 1:1

 #

 address-family ipv4

  vpn-target 2:2 import-extcommunity

  vpn-target 2:2 export-extcommunity

 #

 address-family evpn

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

#

 vxlan tunnel mac-learning disable

#

ospf 100 router-id 4.4.4.4

 area 0.0.0.0

  network 4.4.4.4 0.0.0.0

  network 13.1.1.0 0.0.0.255

  network 14.1.1.0 0.0.0.255

  network 21.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

vlan 30

#

 l2vpn enable

 vxlan tunnel arp-learning disable

#

vsi vpna

 gateway vsi-interface 1

 vxlan 10

 evpn encapsulation vxlan

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

#

vsi vpnb

 gateway vsi-interface 2

 vxlan 20

 evpn encapsulation vxlan

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

#

interface LoopBack0

 ip address 4.4.4.4 255.255.255.255

#

interface Vlan-interface10

 ip address 14.1.1.4 255.255.255.0

 pim sm

#

interface Vlan-interface20

 ip address 13.1.1.4 255.255.255.0

 pim sm

#

interface Vlan-interface30

 ip address 21.1.1.4 255.255.255.0

 pim sm

#

interface Ten-GigabitEthernet1/0/1

 port link-mode bridge

 service-instance 1000

  encapsulation s-vid 12

  xconnect vsi vpna

#

interface Ten-GigabitEthernet1/0/2

 port link-mode bridge

 service-instance 1000

  encapsulation s-vid 13

  xconnect vsi vpnb

#

interface Ten-GigabitEthernet1/0/3

 port link-mode bridge

 port access vlan 10

#

interface Ten-GigabitEthernet1/0/4

 port link-mode bridge

 port access vlan 20

#

interface Ten-GigabitEthernet1/0/5

 port link-mode bridge

 port access vlan 30

#

interface Vsi-interface1

 ip binding vpn-instance vpna

 ip address 10.1.1.1 255.255.255.0

 mac-address 0001-0001-0001

 local-proxy-arp enable

 distributed-gateway local

#

interface Vsi-interface2

 ip binding vpn-instance vpna

 ip address 10.1.2.1 255.255.255.0

 mac-address 0002-0002-0002

 local-proxy-arp enable

 distributed-gateway local

#

interface Vsi-interface3

 ip binding vpn-instance vpna

 l3-vni 1000

#

bgp 100

 peer 1.1.1.1 as-number 100

 peer 1.1.1.1 connect-interface LoopBack0

 peer 2.2.2.2 as-number 100

 peer 2.2.2.2 connect-interface LoopBack0

 #

 address-family l2vpn evpn

  peer 1.1.1.1 enable

  peer 2.2.2.2 enable

#

multicast routing

#

pim

 static-rp 2.2.2.2

#

·          Switch E:

#

ip vpn-instance vpna

 route-distinguisher 1:1

 #

 address-family ipv4

  vpn-target 2:2 import-extcommunity

  vpn-target 2:2 export-extcommunity

 #

 address-family evpn

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

#

 vxlan tunnel mac-learning disable

#

ospf 100 router-id 5.5.5.5

 area 0.0.0.0

  network 5.5.5.5 0.0.0.0

  network 15.1.1.0 0.0.0.255

  network 16.1.1.0 0.0.0.255

  network 18.1.1.0 0.0.0.255

  network 19.1.1.0 0.0.0.255

  network 22.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

vlan 30

#

vlan 40

#

vlan 50

#

 l2vpn enable

 vxlan tunnel arp-learning disable

#

interface LoopBack0

 ip address 5.5.5.5 255.255.255.255

#

interface Vlan-interface10

 ip binding vpn-instance vpna

 ip address 22.1.1.5 255.255.255.0

#

interface Vlan-interface20

 ip address 18.1.1.5 255.255.255.0

 pim sm

#

interface Vlan-interface30

 ip address 15.1.1.5 255.255.255.0

 pim sm

#

interface Vlan-interface40

 ip address 16.1.1.5 255.255.255.0

 pim sm

#

interface Vlan-interface50

 ip address 19.1.1.5 255.255.255.0

#

interface Ten-GigabitEthernet1/0/1

 port link-mode bridge

 port access vlan 30

#

interface Ten-GigabitEthernet1/0/2

 port link-mode bridge

 port access vlan 40

#

interface Ten-GigabitEthernet1/0/3

 port link-mode bridge

 port access vlan 10

#

interface Ten-GigabitEthernet1/0/17

 port link-mode bridge

 port access vlan 20

#

interface Ten-GigabitEthernet1/0/18

 port link-mode bridge

 port access vlan 50

#

interface Vsi-interface3

 ip binding vpn-instance vpna

 l3-vni 1000

#

bgp 100

 peer 1.1.1.1 as-number 100

 peer 1.1.1.1 connect-interface LoopBack0

 peer 2.2.2.2 as-number 100

 peer 2.2.2.2 connect-interface LoopBack0

 #

 address-family l2vpn evpn

  peer 1.1.1.1 enable

  peer 2.2.2.2 enable

 #

 ip vpn-instance vpna

  #

  address-family ipv4 unicast

   default-route imported

   import-route static

#

multicast routing

#

pim

 static-rp 2.2.2.2

#

 ip route-static vpn-instance vpna 0.0.0.0 0 22.1.1.100

·          Switch F:

#

ospf 100 router-id 9.9.9.9

 area 0.0.0.0

  network 9.9.9.9 0.0.0.0

  network 17.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

interface LoopBack0

 ip address 9.9.9.9 255.255.255.255

#

interface Vlan-interface10

 ip address 17.1.1.9 255.255.255.0

 pim sm

#

interface Vlan-interface20

 ip address 10.1.4.1 255.255.255.0

 igmp enable

#

interface Ten-GigabitEthernet1/0/17

 port link-mode bridge

 port access vlan 20

#

interface Ten-GigabitEthernet1/0/18

 port link-mode bridge

 port access vlan 10

#

multicast routing

#

pim

 static-rp 2.2.2.2

#

Related documentation

·          H3C S7500E Switch Series EVPN Command Reference-R757X

·          H3C S7500E Switch Series EVPN Configuration Guide-R757X

·          H3C S7500E Switch Series MDC Command Reference-R757X

·          H3C S7500E Switch Series MDC Configuration Guide-R757X

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网