H3C S12500X-AF & S12500-X & S9800 Switch Series Configuration Examples-Release 27xx-6W100

HomeSupportConfigure & DeployConfiguration ExamplesH3C S12500X-AF & S12500-X & S9800 Switch Series Configuration Examples-Release 27xx-6W100
64-MDC + EVPN Configuration Examples
Title Size Download
64-MDC + EVPN Configuration Examples 158.47 KB

 

H3C S12500X-AF & S12500-X & S9800

MDC + EVPN Configuration Examples

 

S12500X-AF Switch Series

S12500-X Switch Series

S9800 Switch Series

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Document version: 6W100-20190628

 

Copyright © 2019 New H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co., Ltd.

Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.

The information in this document is subject to change without notice



Introduction

This document provides configuration examples for deploying Multitenant Device Context (MDC) in combination with Ethernet Virtual Private Network (EVPN).

·     The MDC technology can partition a physical device or an IRF fabric into multiple logical devices. Each of the logical devices is called an MDC.

·     EVPN is a Layer 2 VPN technology. It uses MP-BGP to advertise EVPN routes in the control plane and uses VXLAN to forward traffic in the data plane.

By deploying MDC in combination with EVPN, you can quickly meet EVPN service requirements on traditional networks at a lower cost while isolating traditional services from EVPN services.

Prerequisites

The configuration examples in this document were created and verified in a lab environment, and all the devices were started with the factory default configuration. When you are working on a live network, make sure you understand the potential impact of every command on your network.

This document assumes that you have basic knowledge of MDC and EVPN.

Example: Configuring MDC in combination with EVPN

Network configuration

As shown in Figure 1, a company needs to use its existing IP network to provide IPTV and OTT services for users. Switch A and Switch B are S12500X-AF, S12500-X, or S9800 switches. Switch C, Switch D, and Switch E are S6860 switches.

To provide IPTV and OTT services while reducing cost, the company needs to deploy MDC in combination with EVPN on the network as follows:

·     Virtualize Switch A into SWA-MDC1 and SWA-MDC2. Virtualize Switch B into SWB-MDC1 and SWB-MDC2. Configure SWA-MDC2 and SWB-MDC2 as RRs to reflect BGP EVPN routes on the EVPN network. Configure SWA-MDC1 as the gateway for the IPTV platform. Configure SWB-MDC1 as the gateway for the OTT platform.

·     Configure Switch C and Switch D as distributed EVPN gateways.

·     Configure Switch E as border gateway to the Internet.

·     Assign Server 1 and Server 3 to VXLAN 10. Assign Server 2 and Server 4 to VXLAN 20. Achieve the following goals:

¡     The hosts in the same VXLAN can communicate at Layer 2.

¡     The hosts in different VXLANs can communicate at Layer 3 through the distributed EVPN gateways.

¡     Hosts in the VXLANs can access the Internet at Layer 3 through border gateways.

·     The IPTV network needs to receive multicast information from Source through Switch F. Configure PIM on SWA-MDC1, SWA-MDC2, SWB-MDC2, Switch D, and Switch E to establish a multicast distribution tree. Configure SWA-MDC1 as the service gateway of the IPTV network.

·     The OTT network needs to provide traditional services. Configure SWB-MDC1 as the gateway of the OTT network.

Figure 1 Network diagram

 

Table 1 Interface and IP address assignment

Device

Interface

IP address

Device

Interface

IP address

SWA-MDC1

Loopback0

6.6.6.6/32

Switch D

Loopback0

4.4.4.4/32

 

Vlan-int10

17.1.1.6/24

 

Vlan-int10

14.1.1.4/24

 

Vlan-int20

18.1.1.6/24

 

Vlan-int20

13.1.1.4/24

SWA-MDC2

Loopback0

1.1.1.1/32

 

Vlan-int30

21.1.1.4/24

 

Vlan-int10

11.1.1.1/24

Switch E

Loopback0

5.5.5.5/32

 

Vlan-int20

13.1.1.1/24

 

Vlan-int10

22.1.1.5/24

 

Vlan-int30

15.1.1.1/24

 

Vlan-int20

18.1.1.5/24

SWB-MDC1

Loopback0

7.7.7.7/32

 

Vlan-int30

15.1.1.5/24

 

Vlan-int10

19.1.1.7/24

 

Vlan-int40

16.1.1.5/24

 

Vlan-int50

20.1.1.7/24

 

Vlan-int50

19.1.1.5/24

SWB-MDC2

Loopback0

2.2.2.2/32

Switch F

Loopback0

9.9.9.9/32

 

Vlan-int10

14.1.1.2/24

 

Vlan-int10

17.1.1.9/24

 

Vlan-int20

12.1.1.2/24

 

Vlan-int20

10.1.4.1/24

 

Vlan-int40

16.1.1.2/24

 

 

 

Switch C

Loopback0

3.3.3.3/32

 

 

 

 

Vlan-int10

11.1.1.3/24

 

 

 

 

Vlan-int20

12.1.1.3/24

 

 

 

 

Analysis

To virtualize Switch A and Switch B into the required MDCs, configure MDCs on Switch A and Switch B.

For IP connectivity between SWA-MDC1, SWA-MDC2, SWB-MDC1, SWB-MDC2, Switch C, Switch D, and Switch E, configure a routing protocol on them and assign IP addresses to their interfaces, including loopback interfaces. In this example, OSPF is configured.

For Switch C and Switch D to use a VXLAN tunnel to communicate with each other, configure them as distributed EVPN gateways.

For the downlink ports of Switch C and Switch D to identify the VXLANs to which user network packets belong, configure Ethernet service instances and frame match criteria on the ports.

To enable SWA-MDC1, SWA-MDC2, SWB-MDC2, Switch D, and Switch E to establish a multicast distribution tree, configure PIM on them.

For the IPTV platform and OTT platform to access external networks, configure SWA-MDC1 as the IPTV platform and configure SWB-MDC1 as the OTT platform.

Software versions used

Table 2 shows the software versions used in this configuration example.

Table 2 Product and software version compatibility

Product

Software version

S12500X-AF Switch Series

S12500X-CMW710-R2712

S12500-X Switch Series

S12500X-CMW710-R2712

S9800 Switch Series

S9800-CMW710-R2712

S6860 Switch Series

S6860-CMW710-R2612

 

Restrictions and guidelines for S12500X-AF, S12500-X, and S9800 switches

When you configure S12500X-AF switches, follow these restrictions and guidelines:

·     You can assign hardware resources to MDCs before or after you start the MDCs. As a best practice, assign MDCs resources before starting them.

·     Before assigning an interface to or reclaiming an interface from an MDC, make sure no other users are configuring the interface.

·     Interfaces on LPUs are grouped.

¡     The interfaces in a group must be assigned to or removed from the same MDC at the same time. Interface grouping varies by LPU model.

¡     Different groups of interfaces on an LPU can be assigned to different MDCs. You must assign the LPU to the MDCs.

·     An interface can be assigned to only one MDC. An interface to be assigned to a non-default MDC must belong to the default MDC. To assign an interface that belongs to one non-default MDC to another non-default MDC, you must reclaim the interface first.

·     To assign physical interfaces to an MDC, you must reclaim the LPUs where the physical interfaces reside from all MDCs. After assigning physical interfaces to an MDC, you must assign the LPUs where the physical interfaces reside to the MDC.

·     By default, interfaces on the device are disabled (in ADM or Administratively Down state). To have an interface operate, you must use the undo shutdown command to enable that interface.

Restrictions and guidelines for S6860 switches

EVPN网关从AC接收到报文后,如果EVPN网关对报文进行三层转发,则不管报文接收接口上是否配置qos trust dscp命令,设备都信任IP报文自带的DSCP优先级,以此优先级进行优先级映射;如果对报文进行二层转发,则只有在报文接收接口上配置了qos trust dscp命令,设备才会信任IP报文自带的DSCP优先级。

When forwarding packets from ACs at Layer 3, EVPN gateways use the DSCP values in packets for priority mapping, regardless of whether the qos trust dscp command is configured on the incoming interfaces. When forwarding packets from ACs at Layer 2, EVPN gateways use the DSCP values in packets for priority mapping only if the qos trust dscp command is configured on the incoming interfaces.

EVPN网关组网中,在VTEPEVPN网关的三层接口(除VSI虚接口外)上无法通过策略路由匹配VXLAN报文的外层源和目的IP地址。如需匹配VXLAN报文的外层源和目的IP地址,请在VSI虚接口上应用策略路由。

Layer 3 interfaces (except VSI interfaces) on VTEPs and EVPN gateways cannot use a PBR policy to match VXLAN packets by outer layer source and destination IP addresses. To match VXLAN packets by outer layer source and destination IP addresses, apply a PBR policy on a VSI interface.

Make sure a VSI interface uses the same MAC address to provide service on distributed EVPN gateways connected to different sites.

When you configure a border device, follow these restrictions and guidelines:

·     You cannot use the mac-address command to configure MAC addresses for Layer 3 Ethernet interfaces, Layer 3 aggregate interfaces, or their subinterfaces.

·     If you apply an ACL to a Layer 3 Ethernet interface or Layer 3 aggregate interface to match packets, the ACL also matches packets on the subinterfaces.

·     If you apply a QoS policy with no rules for inner or outer VLAN IDs to a Layer 3 Ethernet interface, the policy is also applied to the subinterfaces.

·     A QoS policy applied to Layer 3 Ethernet interface that has no rules for inner or outer VLAN IDs also takes effect on the subinterfaces.

·     If you apply a PBR policy to a Layer 3 Ethernet interface or Layer 3 aggregate interface, the policy is also applied to the subinterfaces.

·     A PBR policy applied to a Layer 3 Ethernet interface or Layer 3 aggregate interface also takes effect on the subinterfaces.

·     Broadcast, multicast, or unicast suppression settings configured on a Layer 3 Ethernet interface also take effect on the subinterfaces.

·     A QoS policy rule does not match packets to be forwarded at Layer 3 that do not carry the specified VLAN IDs if the following conditions are met:

¡     You apply the QoS policy to an interface that is not a Layer 3 Ethernet interface.

¡     The rule matches inner or outer VLAN IDs.

·     You cannot use the arp mode uni command to configure an interface on a border device as a customer-side port.

If both ARP flood suppression and local proxy ARP are enabled on a distributed EVPN gateway, only local proxy ARP takes effect. As a best practice, do not use these features together on distributed EVPN gateways.

For an EVPN gateway to perform Layer 3 forwarding, follow these guidelines for frame match criteria of Ethernet service instances:

·     If the frame match criterion is encapsulation untagged, the access mode must be Ethernet. If not, the access mode must be VLAN.

·     The frame match criterion cannot contain both inner and outer VLAN tags.

By default, interfaces on the device are disabled (in ADM or Administratively Down state). To have an interface operate, you must use the undo shutdown command to enable that interface.

Procedures

Configuring MDCs on Switch A and Switch B

1.     Configure SWA-MDC1 on Switch A:

# Create SWA-MDC1.

<SwitchA> system-view

[SwitchA] mdc SWA-MDC1

It will take some time to create MDC...

MDC created successfully.

[SwitchA-mdc-2-SWA-MDC1] quit

# Reclaim the LPUs in slot 1 and slot 2 from the default MDC.

[SwitchA] mdc Admin

[SwitchA-mdc-1-Admin] undo location slot 1

The configuration associated with the specified slot of MDC will be lost. Continue? [Y/N]:y

[SwitchA-mdc-1-Admin] undo location slot 2

The configuration associated with the specified slot of MDC will be lost. Continue? [Y/N]:y

[SwitchA-mdc-1-Admin] quit

# Assign interfaces Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet 1/0/24 to SWA-MDC1.

[SwitchA] mdc SWA-MDC1

[SwitchA-mdc-2-SWA-MDC1] allocate interface ten-gigabitethernet 1/0/1 to ten-gigabitethernet 1/0/24

Configuration of the interfaces will be lost. Continue? [Y/N]:y

Execute the location slot command in this view to make the configuration take effect.

# Assign LPU 1 to SWA-MDC1.

[SwitchA-mdc-2-SWA-MDC1] location slot 1

# Start SWA-MDC1.

[SwitchA-mdc-2-SWA-MDC1] mdc start

It will take some time to start MDC...

MDC started successfully.

[SwitchA-mdc-2-SWA-MDC1] quit

2.     Configure SWA-MDC2 on Switch A:

# Create SWA-MDC2.

[SwitchA] mdc SWA-MDC2

It will take some time to create MDC...

MDC created successfully.

# Assign interfaces Ten-GigabitEthernet 2/0/1 through Ten-GigabitEthernet 2/0/24 to SWA-MDC2.

[SwitchA-mdc-3-SWA-MDC2] allocate interface ten-gigabitethernet 2/0/1 to ten-gigabitethernet 2/0/24

Configuration of the interfaces will be lost. Continue? [Y/N]:y

Execute the location slot command in this view to make the configuration take effect.

# Assign LPU 2 to SWA-MDC2.

[SwitchA-mdc-3-SWA-MDC2] location slot 2

# Start SWA-MDC2.

 [SwitchA-mdc-3-SWA-MDC2] mdc start

It will take some time to start MDC...

MDC started successfully.

[SwitchA-mdc-3-SWA-MDC2] quit

3.     Configure SWB-MDC1 on Switch B:

# Create SWB-MDC1.

<SwitchB> system-view

[SwitchB] mdc SWB-MDC1

It will take some time to create MDC...

MDC created successfully.

[SwitchB-mdc-2-SWB-MDC1] quit

# Reclaim the LPUs in slot 1 and slot 2 from the default MDC.

[SwitchB] mdc Admin

[SwitchB-mdc-1-Admin] undo location slot 1

The configuration associated with the specified slot of MDC will be lost. Continue? [Y/N]:y

[SwitchB-mdc-1-Admin] undo location slot 2

The configuration associated with the specified slot of MDC will be lost. Continue? [Y/N]:y

[SwitchB-mdc-1-Admin] quit

# Assign interfaces Ten-GigabitEthernet 1/0/1 through Ten-GigabitEthernet 1/0/24 to SWB-MDC1.

[SwitchB] mdc SWA-MDC1

[SwitchB-mdc-2-SWB-MDC1] allocate interface ten-gigabitethernet 1/0/1 to ten-gigabitethernet 1/0/24

Configuration of the interfaces will be lost. Continue? [Y/N]:y

Execute the location slot command in this view to make the configuration take effect.

# Assign LPU 1 to SWB-MDC1.

[SwitchB-mdc-2-SWB-MDC1] location slot 1

# Start SWB-MDC1.

[SwitchB-mdc-2-SWB-MDC1] mdc start

It will take some time to start MDC...

MDC started successfully.

[SwitchB-mdc-2-SWB-MDC1] quit

4.     Configure SWB-MDC2 on Switch B:

# Create SWB-MDC2.

[SwitchB] mdc SWB-MDC2

It will take some time to create MDC...

MDC created successfully.

# Assign interfaces Ten-GigabitEthernet 2/0/1 through Ten-GigabitEthernet 2/0/24 to SWB-MDC2.

[SwitchB-mdc-3-SWB-MDC2] allocate interface ten-gigabitethernet 2/0/1 to ten-gigabitethernet 2/0/24

Configuration of the interfaces will be lost. Continue? [Y/N]:y

Execute the location slot command in this view to make the configuration take effect.

# Assign LPU 2 to SWB-MDC2.

[SwitchB-mdc-3-SWB-MDC2] location slot 2

# Start SWB-MDC2.

[SwitchB-mdc-3-SWB-MDC2] mdc start

It will take some time to start MDC...

MDC started successfully.

[SwitchB-mdc-3-SWB-MDC2] quit

Configuring the IPTV and OTT networks

Assigning IP addresses to interfaces on the devices

# Log in to SWA-MDC1 and assign IP addresses to its interfaces.

[SwitchA] switchto mdc SWA-MDC1

******************************************************************************

* Copyright (c) 2004-2017 New H3C Technologies Co., Ltd. All rights reserved.*

* Without the owner's prior written consent,                                 *

* no decompiling or reverse-engineering shall be allowed.                    *

******************************************************************************

Automatic configuration is running, press CTRL_D to break or press CTRL_B to   

switch back to the default MDC.

<SWA-MDC1> system-view

[SWA-MDC1] interface loopback 0

[SWA-MDC1-Loopback0] ip address 6.6.6.6 32

[SWA-MDC1-Loopback0] quit

[SWA-MDC1] vlan 10

[SWA-MDC1-vlan10] port ten-gigabitethernet 1/0/1

[SWA-MDC1-vlan10] quit

[SWA-MDC1] interface vlan-interface 10

[SWA-MDC1-Vlan-interface10] ip address 17.1.1.6 24

[SWA-MDC1-Vlan-interface10] quit

[SWA-MDC1] vlan 20

[SWA-MDC1-vlan20] port ten-gigabitethernet 1/0/2

[SWA-MDC1-vlan20] quit

[SWA-MDC1] interface vlan-interface 20

[SWA-MDC1-Vlan-interface20] ip address 18.1.1.6 24

[SWA-MDC1-Vlan-interface20] quit

# Use the same method to log in to the other MDCs and assign IP addresses to interfaces. (Details not shown.)

# Assign IP addresses to interfaces on Switch C.

[SwitchC] interface loopback 0

[SwitchC-Loopback0] ip address 3.3.3.3 32

[SwitchC-Loopback0] quit

[SwitchC] vlan 10

[SwitchC-vlan10] port ten-gigabitethernet 1/0/3

[SwitchC-vlan10] quit

[SwitchC] interface vlan-interface 10

[SwitchC-Vlan-interface10] ip address 11.1.1.3 24

[SwitchC-Vlan-interface10] quit

[SwitchC] vlan 20

[SwitchC-vlan20] port ten-gigabitethernet 1/0/4

[SwitchC-vlan20] quit

[SwitchC] interface vlan-interface 20

[SwitchC-Vlan-interface20] ip address 12.1.1.3 24

[SwitchC-Vlan-interface20] quit

# Use the same method to assign IP addresses to interfaces on the other switches. (Details not shown.)

Configuring the routing protocol

# On SWA-MDC1, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SWA-MDC1] ospf 100 router-id 6.6.6.6

[SWA-MDC1-ospf-100] area 0

[SWA-MDC1-ospf-100-area-0.0.0.0] network 6.6.6.6 0.0.0.0

[SWA-MDC1-ospf-100-area-0.0.0.0] network 17.1.1.0 0.0.0.255

[SWA-MDC1-ospf-100-area-0.0.0.0] network 18.1.1.0 0.0.0.255

[SWA-MDC1-ospf-100-area-0.0.0.0] quit

[SWA-MDC1-ospf-100] quit

# On SWA-MDC2, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SWA-MDC2] ospf 100 router-id 1.1.1.1

[SWA-MDC2-ospf-100] area 0

[SWA-MDC2-ospf-100-area-0.0.0.0] network 1.1.1.1 0.0.0.0

[SWA-MDC2-ospf-100-area-0.0.0.0] network 11.1.1.0 0.0.0.255

[SWA-MDC2-ospf-100-area-0.0.0.0] network 13.1.1.0 0.0.0.255

[SWA-MDC2-ospf-100-area-0.0.0.0] network 15.1.1.0 0.0.0.255

[SWA-MDC2-ospf-100-area-0.0.0.0] quit

[SWA-MDC2-ospf-100] quit

# On SWB-MDC1, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SWB-MDC1] ospf 100 router-id 7.7.7.7

[SWB-MDC1-ospf-100] area 0

[SWB-MDC1-ospf-100-area-0.0.0.0] network 7.7.7.7 0.0.0.0

[SWB-MDC1-ospf-100-area-0.0.0.0] network 19.1.1.0 0.0.0.255

[SWB-MDC1-ospf-100-area-0.0.0.0] network 20.1.1.0 0.0.0.255

[SWB-MDC1-ospf-100-area-0.0.0.0] quit

[SWB-MDC1-ospf-100] quit

# On SWB-MDC2, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SWB-MDC2] ospf 100 router-id 2.2.2.2

[SWB-MDC2-ospf-100] area 0

[SWB-MDC2-ospf-100-area-0.0.0.0] network 2.2.2.2 0.0.0.0

[SWB-MDC2-ospf-100-area-0.0.0.0] network 12.1.1.0 0.0.0.255

[SWB-MDC2-ospf-100-area-0.0.0.0] network 14.1.1.0 0.0.0.255

[SWB-MDC2-ospf-100-area-0.0.0.0] network 16.1.1.0 0.0.0.255

[SWB-MDC2-ospf-100-area-0.0.0.0] quit

[SWB-MDC2-ospf-100] quit

# On Switch C, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SwitchC] ospf 100 router-id 3.3.3.3

[SwitchC-ospf-100] area 0

[SwitchC-ospf-100-area-0.0.0.0] network 3.3.3.3 0.0.0.0

[SwitchC-ospf-100-area-0.0.0.0] network 11.1.1.0 0.0.0.255

[SwitchC-ospf-100-area-0.0.0.0] network 12.1.1.0 0.0.0.255

[SwitchC-ospf-100-area-0.0.0.0] quit

[SwitchC-ospf-100] quit

# On Switch D, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SwitchD] ospf 100 router-id 4.4.4.4

[SwitchD-ospf-100] area 0

[SwitchD-ospf-100-area-0.0.0.0] network 4.4.4.4 0.0.0.0

[SwitchD-ospf-100-area-0.0.0.0] network 13.1.3.0 0.0.0.255

[SwitchD-ospf-100-area-0.0.0.0] network 14.1.1.0 0.0.0.255

[SwitchD-ospf-100-area-0.0.0.0] network 21.1.1.0 0.0.0.255

[SwitchD-ospf-100-area-0.0.0.0] quit

[SwitchD-ospf-100] quit

# On Switch E, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SwitchE] ospf 100 router-id 5.5.5.5

[SwitchE-ospf-100] area 0

[SwitchE-ospf-100-area-0.0.0.0] network 5.5.5.5 0.0.0.0

[SwitchE-ospf-100-area-0.0.0.0] network 15.1.1.0 0.0.0.255

[SwitchE-ospf-100-area-0.0.0.0] network 16.1.1.0 0.0.0.255

[SwitchE-ospf-100-area-0.0.0.0] network 18.1.1.0 0.0.0.255

[SwitchE-ospf-100-area-0.0.0.0] network 19.1.1.0 0.0.0.255

[SwitchE-ospf-100-area-0.0.0.0] quit

[SwitchE-ospf-100] quit

# On Switch F, configure OSPF and advertise the route information about the networks connected to the interfaces.

[SwitchF] ospf 100 router-id 9.9.9.9

[SwitchF-ospf-100] area 0

[SwitchF-ospf-100-area-0.0.0.0] network 9.9.9.9 0.0.0.0

[SwitchF-ospf-100-area-0.0.0.0] network 17.1.1.0 0.0.0.255

[SwitchF-ospf-100-area-0.0.0.0] quit

[SwitchF-ospf-100] quit

Configuring the multicast protocol

1.     Configure Switch D:

# Enable IP multicast routing and enable PIM-SM on VLAN-interface10, VLAN-interface 20, and VLAN-interface 30.

[SwitchD] multicast routing

[SwitchD-mrib] quit

[SwitchD] interface vlan-interface 10

[SwitchD-Vlan-interface10] pim sm

[SwitchD-Vlan-interface10] quit

[SwitchD] interface vlan-interface 20

[SwitchD-Vlan-interface20] pim sm

[SwitchD-Vlan-interface20] quit

[SwitchD] interface vlan-interface 30

[SwitchD-Vlan-interface30] pim sm

[SwitchD-Vlan-interface30] quit

# Configure Loopback 0 of SWB-MDC2 as the static RP.

[SwitchD] pim

[SwitchD-pim] static-rp 2.2.2.2

[SwitchD-pim] quit

2.     Configure SWA-MDC2:

# Enable IP multicast routing and enable PIM-SM on VLAN-interface 20 and VLAN-interface 30.

<SWA-MDC2> system-view

[SWA-MDC2] multicast routing

[SWA-MDC2-mrib] quit

[SWA-MDC2] interface vlan-interface 20

[SWA-MDC2-Vlan-interface20] pim sm

[SWA-MDC2-Vlan-interface20] quit

[SWA-MDC2] interface vlan-interface 30

[SWA-MDC2-Vlan-interface30] pim sm

[SWA-MDC2-Vlan-interface30] quit

# Configure Loopback 0 of SWA-MDC2 as a C-BSR and C-RP, and configure Loopback 0 of SWB-MDC2 as the static RP.

[SWA-MDC2] pim

[SWA-MDC2-pim] c-bsr 1.1.1.1

[SWA-MDC2-pim] c-rp 1.1.1.1

[SWA-MDC2-pim] static-rp 2.2.2.2

[SWA-MDC2-pim] quit

3.     Configure SWB-MDC2:

# Enable IP multicast routing and enable PIM-SM on VLAN-interface 10 and VLAN-interface 40.

<SWB-MDC2> system-view

[SWB-MDC2] multicast routing

[SWB-MDC2-mrib] quit

[SWB-MDC2] interface vlan-interface 10

[SWB-MDC2-Vlan-interface10] pim sm

[SWB-MDC2-Vlan-interface10] quit

[SWB-MDC2] interface vlan-interface 40

[SWB-MDC2-Vlan-interface40] pim sm

[SWB-MDC2-Vlan-interface40] quit

# Configure Loopback 0 of SWB-MDC2 as the static RP.

[SWB-MDC2] pim

[SWB-MDC2-pim] static-rp 2.2.2.2

[SWB-MDC2-pim] quit

4.     Configure Switch E:

# Enable IP multicast routing and enable PIM-SM on VLAN-interface 20, VLAN-interface 30, and VLAN-interface 40.

[SwitchE] multicast routing

[SwitchE-mrib] quit

[SwitchE] interface vlan-interface 20

[SwitchE-Vlan-interface20] pim sm

[SwitchE-Vlan-interface20] quit

[SwitchE] interface vlan-interface 30

[SwitchE-Vlan-interface30] pim sm

[SwitchE-Vlan-interface30] quit

[SwitchE] interface vlan-interface 40

[SwitchE-Vlan-interface40] pim sm

[SwitchE-Vlan-interface40] quit

# Configure Loopback 0 of SWB-MDC2 as the static RP.

[SwitchE] pim

[SwitchE-pim] static-rp 2.2.2.2

[SwitchE-pim] quit

5.     Configure SWA-MDC1:

# Enable IP multicast routing and enable PIM-SM on VLAN-interface 10 and VLAN-interface 20.

<SWA-MDC1> system-view

[SWA-MDC1] multicast routing

[SWA-MDC1-mrib] quit

[SWA-MDC1] interface vlan-interface 10

[SWA-MDC1-Vlan-interface10] pim sm

[SWA-MDC1-Vlan-interface10] quit

[SWA-MDC1] interface vlan-interface 20

[SWA-MDC1-Vlan-interface20] pim sm

[SWA-MDC1-Vlan-interface20] quit

# Configure Loopback 0 of SWB-MDC2 as the static RP.

[SWA-MDC1] pim

[SWA-MDC1-pim] static-rp 2.2.2.2

[SWA-MDC1-pim] quit

6.     Configure Switch F:

# Enable IP multicast routing, enable IGMP on VLAN-interface 20 (the host-side interface), and enable PIM-SM on VLAN-interface 10.

[SwitchF] multicast routing

[SwitchF-mrib] quit

[SwitchF] interface vlan-interface 10

[SwitchF-Vlan-interface10] pim sm

[SwitchF-Vlan-interface10] quit

[SwitchF] interface vlan-interface 20

[SwitchF-Vlan-interface20] igmp enable

[SwitchF-Vlan-interface20] quit

# Configure Loopback 0 of SWB-MDC2 as the static RP.

[SwitchF] pim

[SwitchF-pim] static-rp 2.2.2.2

[SwitchF-pim] quit

Configuring the EVPN network

Creating VSIs, EVPN instances, and VXLANs

1.     Configure Switch C:

# Enable L2VPN.

[SwitchC] l2vpn enable

# Set the VXLAN hardware resource mode.

[SwitchC] hardware-resource vxlan l3gw8k

# Disable remote MAC address learning and remote ARP learning.

[SwitchC] vxlan tunnel mac-learning disable

[SwitchC] vxlan tunnel arp-learning disable

# Create an EVPN instance on VSI vpna, and configure the switch to automatically generate an RD and a route target for the EVPN instance.

[SwitchC] vsi vpna

[SwitchC-vsi-vpna] evpn encapsulation vxlan

[SwitchC-vsi-vpna-evpn-vxlan] route-distinguisher auto

[SwitchC-vsi-vpna-evpn-vxlan] vpn-target auto

[SwitchC-vsi-vpna-evpn-vxlan] quit

# Create VXLAN 10.

[SwitchC-vsi-vpna] vxlan 10

[SwitchC-vsi-vpna-vxlan-10] quit

[SwitchC-vsi-vpna] quit

# Create an EVPN instance on VSI vpnb, and configure the switch to automatically generate an RD and a route target for the EVPN instance.

[SwitchC] vsi vpnb

[SwitchC-vsi-vpnb] evpn encapsulation vxlan

[SwitchC-vsi-vpnb-evpn-vxlan] route-distinguisher auto

[SwitchC-vsi-vpnb-evpn-vxlan] vpn-target auto

[SwitchC-vsi-vpnb-evpn-vxlan] quit

# Create VXLAN 20.

[SwitchC-vsi-vpnb] vxlan 20

[SwitchC-vsi-vpnb-vxlan-20] quit

[SwitchC-vsi-vpnb] quit

2.     Configure Switch D:

# Enable L2VPN.

[SwitchD] l2vpn enable

# Set the VXLAN hardware resource mode.

[SwitchD] hardware-resource vxlan l3gw8k

# Disable remote MAC address learning and remote ARP learning.

[SwitchD] vxlan tunnel mac-learning disable

[SwitchD] vxlan tunnel arp-learning disable

# Create an EVPN instance on VSI vpna, and configure the switch to automatically generate an RD and a route target for the EVPN instance.

[SwitchD] vsi vpna

[SwitchD-vsi-vpna] evpn encapsulation vxlan

[SwitchD-vsi-vpna-evpn-vxlan] route-distinguisher auto

[SwitchD-vsi-vpna-evpn-vxlan] vpn-target auto

[SwitchD-vsi-vpna-evpn-vxlan] quit

# Create VXLAN 10.

[SwitchD-vsi-vpna] vxlan 10

[SwitchD-vsi-vpna-vxlan-10] quit

[SwitchD-vsi-vpna] quit

# Create an EVPN instance on VSI vpnb, and configure the switch to automatically generate an RD and a route target for the EVPN instance.

[SwitchD] vsi vpnb

[SwitchD-vsi-vpnb] evpn encapsulation vxlan

[SwitchD-vsi-vpnb-evpn-vxlan] route-distinguisher auto

[SwitchD-vsi-vpnb-evpn-vxlan] vpn-target auto

[SwitchD-vsi-vpnb-evpn-vxlan] quit

# Create VXLAN 20.

[SwitchD-vsi-vpnb] vxlan 20

[SwitchD-vsi-vpnb-vxlan-20] quit

[SwitchD-vsi-vpnb] quit

Configuring Ethernet service instances to match packets and mapping the instances to VSIs

1.     Configure Switch C:

# On Ten-GigabitEthernet 1/0/1, create Ethernet service instance 1000 to match VLAN 10 (Server 1), and map the Ethernet service instance to VSI vpna (VXLAN 10).

[SwitchC] interface ten-gigabitethernet 1/0/1

[SwitchC-Ten-GigabitEthernet1/0/1] service-instance 1000

[SwitchC-Ten-GigabitEthernet1/0/1-srv1000] encapsulation s-vid 10

[SwitchC-Ten-GigabitEthernet1/0/1-srv1000] xconnect vsi vpna

[SwitchC-Ten-GigabitEthernet1/0/1-srv1000] quit

[SwitchC-Ten-GigabitEthernet1/0/1] quit

# On Ten-GigabitEthernet 1/0/2, create Ethernet service instance 1000 to match VLAN 11 (Server 2), and map the Ethernet service instance to VSI vpnb (VXLAN 20).

[SwitchC] interface ten-gigabitethernet 1/0/2

[SwitchC-Ten-GigabitEthernet1/0/2] service-instance 1000

[SwitchC-Ten-GigabitEthernet1/0/2-srv1000] encapsulation s-vid 11

[SwitchC-Ten-GigabitEthernet1/0/2-srv1000] xconnect vsi vpnb

[SwitchC-Ten-GigabitEthernet1/0/2-srv1000] quit

[SwitchC-Ten-GigabitEthernet1/0/2] quit

2.     Configure Switch D:

# On Ten-GigabitEthernet 1/0/1, create Ethernet service instance 1000 to match VLAN 12 (Server 3), and map the Ethernet service instance to VSI vpna (VXLAN 10).

[SwitchD] interface ten-gigabitethernet 1/0/1

[SwitchD-Ten-GigabitEthernet1/0/1] service-instance 1000

[SwitchD-Ten-GigabitEthernet1/0/1-srv1000] encapsulation s-vid 12

[SwitchD-Ten-GigabitEthernet1/0/1-srv1000] xconnect vsi vpna

[SwitchD-Ten-GigabitEthernet1/0/1-srv1000] quit

[SwitchD-Ten-GigabitEthernet1/0/1] quit

# On Ten-GigabitEthernet 1/0/2, create Ethernet service instance 1000 to match VLAN 13 (Server 4), and map the Ethernet service instance to VSI vpnb (VXLAN 20).

[SwitchD] interface ten-gigabitethernet 1/0/2

[SwitchD-Ten-GigabitEthernet1/0/2] service-instance 1000

[SwitchD-Ten-GigabitEthernet1/0/2-srv1000] encapsulation s-vid 13

[SwitchD-Ten-GigabitEthernet1/0/2-srv1000] xconnect vsi vpnb

[SwitchD-Ten-GigabitEthernet1/0/2-srv1000] quit

[SwitchD-Ten-GigabitEthernet1/0/2] quit

Configuring BGP to advertise BGP EVPN routes

1.     Configure SWA-MDC2:

# Configure SWA-MDC2 to establish BGP connections to other devices.

<SWA-MDC2> system-view

[SWA-MDC2] bgp 100

[SWA-MDC2-bgp-default] group evpn

[SWA-MDC2-bgp-default] peer 3.3.3.3 group evpn

[SWA-MDC2-bgp-default] peer 4.4.4.4 group evpn

[SWA-MDC2-bgp-default] peer 5.5.5.5 group evpn

[SWA-MDC2-bgp-default] peer evpn as-number 100

[SWA-MDC2-bgp-default] peer evpn connect-interface loopback 0

[SWA-MDC2-bgp-default] peer 2.2.2.2 as-number 100

[SWA-MDC2-bgp-default] peer 2.2.2.2 connect-interface loopback 0

# Configure BGP to advertise BGP EVPN routes, and disable route target filtering for BGP EVPN routes.

[SWA-MDC2-bgp-default] address-family l2vpn evpn

[SWA-MDC2-bgp-default-evpn] peer evpn enable

[SWA-MDC2-bgp-default-evpn] peer 2.2.2.2 enable

[SWA-MDC2-bgp-default-evpn] undo policy vpn-target

# Configure SWA-MDC2 as the RR.

[SWA-MDC2-bgp-default-evpn] reflector cluster-id 8.8.8.8

[SWA-MDC2-bgp-default-evpn] peer evpn reflect-client

[SWA-MDC2-bgp-default-evpn] quit

[SWA-MDC2-bgp-default] quit

2.     Configure SWB-MDC2:

# Configure SWB-MDC2 to establish BGP connections to other devices.

<SWB-MDC2> system-view

[SWB-MDC2] bgp 100

[SWB-MDC2-bgp-default] group evpn

[SWB-MDC2-bgp-default] peer 3.3.3.3 group evpn

[SWB-MDC2-bgp-default] peer 4.4.4.4 group evpn

[SWB-MDC2-bgp-default] peer 5.5.5.5 group evpn

[SWB-MDC2-bgp-default] peer evpn as-number 100

[SWB-MDC2-bgp-default] peer evpn connect-interface loopback 0

[SWB-MDC2-bgp-default] peer 1.1.1.1 as-number 100

[SWB-MDC2-bgp-default] peer 1.1.1.1 connect-interface loopback 0

# Configure BGP to advertise BGP EVPN routes, and disable route target filtering for BGP EVPN routes.

[SWB-MDC2-bgp-default] address-family l2vpn evpn

[SWB-MDC2-bgp-default-evpn] peer evpn enable

[SWB-MDC2-bgp-default-evpn] peer 1.1.1.1 enable

[SWB-MDC2-bgp-default-evpn] undo policy vpn-target

# Configure SWB-MDC2 as the RR.

[SWB-MDC2-bgp-default-evpn] reflector cluster-id 8.8.8.8

[SWB-MDC2-bgp-default-evpn] peer evpn reflect-client

[SWB-MDC2-bgp-default-evpn] quit

[SWB-MDC2-bgp-default] quit

3.     Configure Switch C:

# Configure Switch C to establish BGP connections to other devices.

[SwitchC] bgp 100

[SwitchC-bgp-default] peer 1.1.1.1 as-number 100

[SwitchC-bgp-default] peer 1.1.1.1 connect-interface loopback 0

[SwitchC-bgp-default] peer 2.2.2.2 as-number 100

[SwitchC-bgp-default] peer 2.2.2.2 connect-interface loopback 0

# Configure BGP to advertise BGP EVPN routes.

[SwitchC-bgp-default] address-family l2vpn evpn

[SwitchC-bgp-default-evpn] peer 1.1.1.1 enable

[SwitchC-bgp-default-evpn] peer 2.2.2.2 enable

4.     Configure Switch D:

# Configure Switch D to establish BGP connections to other devices.

[SwitchD] bgp 100

[SwitchD-bgp-default] peer 1.1.1.1 as-number 100

[SwitchD-bgp-default] peer 1.1.1.1 connect-interface loopback 0

[SwitchD-bgp-default] peer 2.2.2.2 as-number 100

[SwitchD-bgp-default] peer 2.2.2.2 connect-interface loopback 0

# Configure BGP to advertise BGP EVPN routes.

[SwitchD-bgp-default] address-family l2vpn evpn

[SwitchD-bgp-default-evpn] peer 1.1.1.1 enable

[SwitchD-bgp-default-evpn] peer 2.2.2.2 enable

5.     Configure Switch E:

# Configure Switch E to establish BGP connections to other devices.

[SwitchE] bgp 100

[SwitchE-bgp-default] peer 1.1.1.1 as-number 100

[SwitchE-bgp-default] peer 1.1.1.1 connect-interface loopback 0

[SwitchE-bgp-default] peer 2.2.2.2 as-number 100

[SwitchE-bgp-default] peer 2.2.2.2 connect-interface loopback 0

# Configure BGP to advertise BGP EVPN routes.

[SwitchE-bgp-default] address-family l2vpn evpn

[SwitchE-bgp-default-evpn] peer 1.1.1.1 enable

[SwitchE-bgp-default-evpn] peer 2.2.2.2 enable

Configuring the distributed EVPN gateways

1.     Configure Switch C:

# Configure RD and route target settings for VPN instance vpna.

[SwitchC] ip vpn-instance vpna

[SwitchC-vpn-instance-vpna] route-distinguisher 1:1

[SwitchC-vpn-instance-vpna] address-family ipv4

[SwitchC-vpn-ipv4-vpna] vpn-target 2:2

[SwitchC-vpn-ipv4-vpna] quit

[SwitchC-vpn-instance-vpna] address-family evpn

[SwitchC-vpn-evpn-vpna] vpn-target 1:1

[SwitchC-vpn-evpn-vpna] quit

[SwitchC-vpn-instance-vpna] quit

# Configure VSI-interface 1.

[SwitchC] interface vsi-interface 1

[SwitchC-Vsi-interface1] ip binding vpn-instance vpna

[SwitchC-Vsi-interface1] ip address 10.1.1.1 255.255.255.0

[SwitchC-Vsi-interface1] mac-address 1-1-1

[SwitchC-Vsi-interface1] distributed-gateway local

[SwitchC-Vsi-interface1] local-proxy-arp enable

[SwitchC-Vsi-interface1] quit

# Configure VSI-interface 2.

[SwitchC] interface vsi-interface 2

[SwitchC-Vsi-interface2] ip binding vpn-instance vpna

[SwitchC-Vsi-interface2] ip address 10.1.2.1 255.255.255.0

[SwitchC-Vsi-interface2] mac-address 2-2-2

[SwitchC-Vsi-interface2] distributed-gateway local

[SwitchC-Vsi-interface2] local-proxy-arp enable

[SwitchC-Vsi-interface2] quit

# Create VSI-interface 3. Associate VSI-interface 3 with VPN instance vpna, and configure the L3 VXLAN ID as 1000 for the VPN instance.

[SwitchC] interface vsi-interface 3

[SwitchC-Vsi-interface3] ip binding vpn-instance vpna

[SwitchC-Vsi-interface3] l3-vni 1000

[SwitchC-Vsi-interface3] quit

# Specify VSI-interface 1 as the gateway interface for VSI vpna (the VSI of VXLAN 10).

[SwitchC] vsi vpna

[SwitchC-vsi-vpna] gateway vsi-interface 1

[SwitchC-vsi-vpna] quit

# Specify VSI-interface 2 as the gateway interface for VSI vpnb (the VSI of VXLAN 20).

[SwitchC] vsi vpnb

[SwitchC-vsi-vpnb] gateway vsi-interface 2

[SwitchC-vsi-vpnb] quit

2.     Configure Switch D:

# Configure RD and route target settings for VPN instance vpna.

[SwitchD] ip vpn-instance vpna

[SwitchD-vpn-instance-vpna] route-distinguisher 1:1

[SwitchD-vpn-instance-vpna] address-family ipv4

[SwitchD-vpn-ipv4-vpna] vpn-target 2:2

[SwitchD-vpn-ipv4-vpna] quit

[SwitchD-vpn-instance-vpna] address-family evpn

[SwitchD-vpn-evpn-vpna] vpn-target 1:1

[SwitchD-vpn-evpn-vpna] quit

[SwitchD-vpn-instance-vpna] quit

# Configure VSI-interface 1.

[SwitchD] interface vsi-interface 1

[SwitchD-Vsi-interface1] ip binding vpn-instance vpna

[SwitchD-Vsi-interface1] ip address 10.1.1.1 255.255.255.0

[SwitchD-Vsi-interface1] mac-address 1-1-1

[SwitchD-Vsi-interface1] distributed-gateway local

[SwitchD-Vsi-interface1] local-proxy-arp enable

[SwitchD-Vsi-interface1] quit

# Configure VSI-interface 2.

[SwitchD] interface vsi-interface 2

[SwitchD-Vsi-interface2] ip binding vpn-instance vpna

[SwitchD-Vsi-interface2] ip address 10.1.2.1 255.255.255.0

[SwitchD-Vsi-interface2] mac-address 2-2-2

[SwitchD-Vsi-interface2] distributed-gateway local

[SwitchD-Vsi-interface2] local-proxy-arp enable

[SwitchD-Vsi-interface2] quit

# Create VSI-interface 3. Associate VSI-interface 3 with VPN instance vpna, and configure the L3 VXLAN ID as 1000 for the VPN instance.

[SwitchD] interface vsi-interface 3

[SwitchD-Vsi-interface3] ip binding vpn-instance vpna

[SwitchD-Vsi-interface3] l3-vni 1000

[SwitchD-Vsi-interface3] quit

# Specify VSI-interface 1 as the gateway interface for VSI vpna (the VSI of VXLAN 10).

[SwitchD] vsi vpna

[SwitchD-vsi-vpna] gateway vsi-interface 1

[SwitchD-vsi-vpna] quit

# Specify VSI-interface 2 as the gateway interface for VSI vpnb (the VSI of VXLAN 20).

[SwitchD] vsi vpnb

[SwitchD-vsi-vpnb] gateway vsi-interface 2

[SwitchD-vsi-vpnb] quit

Configuring border gateway Switch E

# Enable L2VPN.

<SwitchE> system-view

[SwitchE] l2vpn enable

# Set the VXLAN hardware resource mode.

[SwitchE] hardware-resource vxlan border8k

# Disable remote MAC address learning and remote ARP learning.

[SwitchE] vxlan tunnel mac-learning disable

[SwitchE] vxlan tunnel arp-learning disable

# Configure RD and route target settings for VPN instance vpna.

[SwitchE] ip vpn-instance vpna

[SwitchE-vpn-instance-vpna] route-distinguisher 1:1

[SwitchE-vpn-instance-vpna] address-family ipv4

[SwitchE-vpn-ipv4-vpna] vpn-target 2:2

[SwitchE-vpn-ipv4-vpna] quit

[SwitchE-vpn-instance-vpna] address-family evpn

[SwitchE-vpn-evpn-vpna] vpn-target 1:1

[SwitchE-vpn-evpn-vpna] quit

[SwitchE-vpn-instance-vpna] quit

# Create VSI-interface 3. Associate VSI-interface 3 with VPN instance vpna, and configure the L3 VXLAN ID as 1000 for the VPN instance.

[SwitchE] interface vsi-interface 3

[SwitchE-Vsi-interface3] ip binding vpn-instance vpna

[SwitchE-Vsi-interface3] l3-vni 1000

[SwitchE-Vsi-interface3] quit

# Configure a default route. Set the next hop to 22.1.1.100 (the IP address of a device in the Internet).

[SwitchE] ip route-static vpn-instance vpna 0.0.0.0 0 22.1.1.100

# Redistribute the default route to the BGP IPv4 unicast routing table of VPN instance vpna.

[SwitchE] bgp 100

[SwitchE-bgp-default] ip vpn-instance vpna

[SwitchE-bgp-default-vpna] address-family ipv4 unicast

[SwitchE-bgp-default-ipv4-vpna] default-route imported

[SwitchE-bgp-default-ipv4-vpna] import-route static

[SwitchE-bgp-default-ipv4-vpna] quit

[SwitchE-bgp-default-vpna] quit

[SwitchE-bgp-default] quit

# Associate VLAN-interface 10 (the interface connected to the Internet) with VPN instance vpna.

[SwitchE] interface vlan-interface 10

[SwitchE-Vlan-interface20] ip binding vpn-instance vpna

[SwitchE-Vlan-interface20] ip address 22.1.1.5 24

[SwitchE-Vlan-interface20] quit

Verifying the configuration

Verifying the MDC configuration

# Verify that the MDCs on Switch A exist and are operating correctly.

[SwitchA] display mdc

ID         Name            Status

1          Admin           active

2          SWA-MDC1        active

3          SWA-MDC2        active

The output shows that the MDCs have been created and are operating correctly.

# Log in to SWA-MDC2.

[SwitchA] switchto mdc SWA-MDC2

******************************************************************************

* Copyright (c) 2004-2018 New H3C Technologies Co., Ltd. All rights reserved.*

* Without the owner's prior written consent,                                 *

* no decompiling or reverse-engineering shall be allowed.                    *

******************************************************************************

 

<SWA-MDC2>%Mar  2 10:43:04:214 2018 SWA-MDC2 SHELL/5/SHELL_LOGIN: -MDC=3; Console logged in from con0.

# Display the interfaces assigned to SWA-MDC2.

<SWA-MDC2> display interface brief

Brief information on interfaces in route mode:

Link: ADM - administratively down; Stby - standby

Protocol: (s) - spoofing

Interface            Link Protocol Primary IP      Description

InLoop0              UP   UP(s)    --

Loop0                UP   UP(s)    1.1.1.1

MGE0/0/0             DOWN DOWN     --

NULL0                UP   UP(s)    --

REG0                 UP   --       --

Vlan10               UP   UP       11.1.1.1

Vlan20               UP   UP       13.1.1.1

Vlan30               UP   UP       15.1.1.1

 

Brief information on interfaces in bridge mode:

Link: ADM - administratively down; Stby - standby

Speed: (a) - auto

Duplex: (a)/A - auto; H - half; F - full

Type: A - access; T - trunk; H - hybrid

Interface             Link Speed   Duplex Type PVID Description

XGE2/0/1              UP   1G(a)   F      A    30

XGE2/0/2              ADM  auto    F      A    1

XGE2/0/3              UP   1G(a)   F      A    10

XGE2/0/4              UP   1G(a)   F      A    20

XGE2/0/5              ADM  auto    F      A    1

XGE2/0/6              ADM  auto    F      A    1

XGE2/0/7              ADM  auto    F      A    1

XGE2/0/8              ADM  auto    F      A    1

XGE2/0/9              ADM  auto    F      A    1

XGE2/0/10             ADM  auto    F      A    1

XGE2/0/11             ADM  auto    F      A    1

XGE2/0/12             ADM  auto    F      A    1

XGE2/0/13             ADM  auto    F      A    1

XGE2/0/14             ADM  auto    F      A    1

XGE2/0/15             ADM  auto    F      A    1

XGE2/0/16             ADM  auto    F      A    1

XGE2/0/17             ADM  auto    F      A    1

XGE2/0/18             ADM  auto    F      A    1

XGE2/0/19             ADM  auto    F      A    1

XGE2/0/20             ADM  auto    F      A    1

XGE2/0/21             ADM  auto    F      A    1

XGE2/0/22             ADM  auto    F      A    1

XGE2/0/23             ADM  auto    F      A    1

XGE2/0/24             ADM  auto    F      A    1

# Use the same method to verify the MDC configuration on Switch B. (Details not shown.)

Verifying the EVPN network

# Display EVPN routing information on distributed EVPN gateway Switch C.

[SwitchC] display bgp l2vpn evpn

 

 BGP local router ID is 3.3.3.3

 Status codes: * - valid, > - best, d - dampened, h - history

               s - suppressed, S - stale, i - internal, e - external

               a - additional-path

       Origin: i - IGP, e - EGP, ? - incomplete

 

 Total number of routes from all PEs: 10

 

 Route distinguisher: 1:1(vpna)

 Total number of routes: 6

 

     Network            NextHop         MED        LocPrf     PrefVal Path/Ogn

 

* >i [2][0][48][a21a-36c9-0806][32][10.1.1.20]/136

                        4.4.4.4         0          100        0       i

* >i [2][0][48][a21a-39de-0907][32][10.1.2.20]/136

                        4.4.4.4         0          100        0       i

* >i [5][0][0][0.0.0.0]/80

                        5.5.5.5         0          100        0       ?

*  i                    5.5.5.5         0          100        0       ?

* >  [5][0][24][10.1.1.0]/80

                        0.0.0.0         0          100        32768   i

* >  [5][0][24][10.1.2.0]/80

                        0.0.0.0         0          100        32768   i

 

 Route distinguisher: 1:10

 Total number of routes: 6

 

     Network            NextHop         MED        LocPrf     PrefVal Path/Ogn

 

* >  [2][0][48][a21a-2df1-0606][32][10.1.1.10]/136

                        0.0.0.0         0          100        32768   i

* >i [2][0][48][a21a-36c9-0806][32][10.1.1.20]/136

                        4.4.4.4         0          100        0       i

*  i                    4.4.4.4         0          100        0       i

* >  [3][0][32][3.3.3.3]/80

                        0.0.0.0         0          100        32768   i

* >i [3][0][32][4.4.4.4]/80

                        4.4.4.4         0          100        0       i

*  i                    4.4.4.4         0          100        0       i

 

 Route distinguisher: 1:20

 Total number of routes: 6

 

     Network            NextHop         MED        LocPrf     PrefVal Path/Ogn

 

* >  [2][0][48][a21a-3300-0707][32][10.1.2.10]/136

                        0.0.0.0         0          100        32768   i

* >i [2][0][48][a21a-39de-0907][32][10.1.2.20]/136

                        4.4.4.4         0          100        0       i

*  i                    4.4.4.4         0          100        0       i

* >  [3][0][32][3.3.3.3]/80

                        0.0.0.0         0          100        32768   i

* >i [3][0][32][4.4.4.4]/80

                        4.4.4.4         0          100        0       i

*  i                    4.4.4.4         0          100        0       i

# Verify that the VXLAN tunnel interfaces are up.

[SwitchC] display interface tunnel

Tunnel0

Current state: UP

Line protocol state: UP

Description: Tunnel0 Interface

Bandwidth: 64 kbps

Maximum transmission unit: 1464

Internet protocol processing: Disabled

Last clearing of counters: Never

Tunnel source 3.3.3.3, destination 4.4.4.4

Tunnel protocol/transport UDP_VXLAN/IP

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 10 packets, 980 bytes, 0 drops

Output: 19 packets, 1520 bytes, 0 drops

 

Tunnel1

Current state: UP

Line protocol state: UP

Description: Tunnel1 Interface

Bandwidth: 64 kbps

Maximum transmission unit: 1464

Internet protocol processing: Disabled

Last clearing of counters: Never

Tunnel source 3.3.3.3, destination 5.5.5.5

Tunnel protocol/transport UDP_VXLAN/IP

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 0 packets, 0 bytes, 0 drops

# Verify that the VSI interfaces are up on Switch C.

[SwitchC] display interface vsi-interface

Vsi-interface1

Current state: UP

Line protocol state: UP

Description: Vsi-interface1 Interface

Bandwidth: 1000000 kbps

Maximum transmission unit: 1444

Internet address: 10.1.1.1/24 (primary)

IP packet frame type: Ethernet II, hardware address: 0001-0001-0001

IPv6 packet frame type: Ethernet II, hardware address: 0001-0001-0001

Physical: Unknown, baudrate: 1000000 kbps

Last clearing of counters: Never

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 192 packets, 18816 bytes, 0 drops

 

Vsi-interface2

Current state: UP

Line protocol state: UP

Description: Vsi-interface2 Interface

Bandwidth: 1000000 kbps

Maximum transmission unit: 1444

Internet address: 10.1.2.1/24 (primary)

IP packet frame type: Ethernet II, hardware address: 0002-0002-0002

IPv6 packet frame type: Ethernet II, hardware address: 0002-0002-0002

Physical: Unknown, baudrate: 1000000 kbps

Last clearing of counters: Never

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 128 packets, 8960 bytes, 0 drops

 

Vsi-interface3

Current state: UP

Line protocol state: UP

Description: Vsi-interface3 Interface

Bandwidth: 1000000 kbps

Maximum transmission unit: 1444

Internet protocol processing: Disabled

IP packet frame type: Ethernet II, hardware address: a21a-0861-0300

IPv6 packet frame type: Ethernet II, hardware address: a21a-0861-0300

Physical: Unknown, baudrate: 1000000 kbps

Last clearing of counters: Never

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 0 packets, 0 bytes, 0 drops

# Verify that the VXLAN tunnels have been assigned to the VXLANs, and the VSI interfaces are the gateway interfaces of their respective VXLANs.

[SwitchC] display l2vpn vsi verbose

VSI Name: Auto_L3VNI1000_3

  VSI Index               : 2

  VSI State               : Down

  MTU                     : 1500

  Bandwidth               : Unlimited

  Broadcast Restrain      : Unlimited

  Multicast Restrain      : Unlimited

  Unknown Unicast Restrain: Unlimited

  MAC Learning            : Enabled

  MAC Table Limit         : -

  MAC Learning rate       : -

  Drop Unknown            : -

  Flooding                : Enabled

  Statistics              : Disabled

  Gateway Interface       : VSI-interface 3

  VXLAN ID                : 1000

 

VSI Name: vpna

  VSI Index               : 0

  VSI State               : Up

  MTU                     : 1500

  Bandwidth               : Unlimited

  Broadcast Restrain      : Unlimited

  Multicast Restrain      : Unlimited

  Unknown Unicast Restrain: Unlimited

  MAC Learning            : Enabled

  MAC Table Limit         : -

  MAC Learning rate       : -

  Drop Unknown            : -

  Flooding                : Enabled

  Statistics              : Disabled

  Gateway Interface       : VSI-interface 1

  VXLAN ID                : 10

  Tunnels:

    Tunnel Name          Link ID    State    Type        Flood proxy

    Tunnel0              0x5000000  UP       Auto        Disabled

  ACs:

    AC                                Link ID  State       Type

    XGE1/0/1 srv1000                  0        Up          Manual

 

VSI Name: vpnb

  VSI Index               : 1

  VSI State               : Up

  MTU                     : 1500

  Bandwidth               : Unlimited

  Broadcast Restrain      : Unlimited

  Multicast Restrain      : Unlimited

  Unknown Unicast Restrain: Unlimited

  MAC Learning            : Enabled

  MAC Table Limit         : -

  MAC Learning rate       : -

  Drop Unknown            : -

  Flooding                : Enabled

  Statistics              : Disabled

  Gateway Interface       : VSI-interface 2

  VXLAN ID                : 20

  Tunnels:

    Tunnel Name          Link ID    State    Type        Flood proxy

    Tunnel0              0x5000000  UP       Auto        Disabled

  ACs:

    AC                                Link ID  State       Type

    XGE1/0/2 srv1000                  0        Up          Manual

# Verify that Switch C has created ARP entries for the VMs.

[SwitchC] display arp

  Type: S-Static   D-Dynamic   O-Openflow   R-Rule   M-Multiport  I-Invalid

IP address      MAC address    VLAN/VSI   Interface                 Aging Type

11.1.1.1        a210-9a1c-0182 10         XGE1/0/3                  240   D

12.1.1.2        a21a-01b9-0242 20         XGE1/0/5                  240   D

10.1.1.10       a21a-2df1-0606 0          XGE1/0/1                  489   D

10.1.2.10       a21a-3300-0707 1          XGE1/0/2                  414   D

4.4.4.4         a21a-0fb2-0400 2          Tunnel0                   --    R

5.5.5.5         a21a-17fd-0500 2          Tunnel1                   --    R

# Verify that Switch C has created EVPN ARP entries for the local VMs.

[SwitchC] display evpn route arp

Flags: D - Dynamic   B - BGP      L - Local active

       G - Gateway   S - Static   M - Mapping

 

VPN instance: vpna                            Interface: Vsi-interface1

IP address      MAC address     Router MAC      VSI index   Flags

10.1.1.1        0001-0001-0001  a21a-0861-0300  0           GL

10.1.1.10       a21a-2df1-0606  a21a-0861-0300  0           DL

10.1.1.20       a21a-36c9-0806  a21a-0fb2-0400  0           B

 

VPN instance: vpna                            Interface: Vsi-interface2

IP address      MAC address     Router MAC      VSI index   Flags

10.1.2.1        0002-0002-0002  a21a-0861-0300  1           GL

10.1.2.10       a21a-3300-0707  a21a-0861-0300  1           DL

10.1.2.20       a21a-39de-0907  a21a-0fb2-0400  1           B

<SwitchC>

# Verify that the servers can communicate with one another and can communicate with the Internet. (Details not shown.)

Verifying the multicast network

# On Switch F, display RP information in the PIM-SM domain.

[SwitchF] display pim rp-info

 BSR RP information:

   Scope: non-scoped

     Group/MaskLen: 225.1.1.0/24

       RP address               Priority  HoldTime  Uptime    Expires

       1.1.1.1                  192       180       00:51:45  00:02:22

 

Static RP information:

       RP address               ACL   Mode    Preferred

       2.2.2.2                  ----  pim-sm  No

 

[SwitchF] display pim bsr-info

 Scope: non-scoped

     State: Accept Preferred

     Bootstrap timer: 00:01:44

     Elected BSR address: 1.1.1.1

       Priority: 64

       Hash mask length: 30

       Uptime: 00:11:18

 

[SwitchF]disp pim interface

Interface           NbrCnt HelloInt   DR-Pri     DR-Address

 Vlan10             0      30         1          10.1.4.1      (local)

 Vlan20             1      30         1          1.1.1.1

# On SWA-MDC2, display BSR information in the PIM-SM domain.

[SWA-MDC2] display pim bsr-info

 Scope: non-scoped

     State: Elected

     Bootstrap timer: 00:01:44

     Elected BSR address: 1.1.1.1

       Priority: 64

       Hash mask length: 30

       Uptime: 00:11:18

     Candidate BSR address: 1.1.1.1

       Priority: 64

       Hash mask length: 30

# On SWA-MDC2, display C-RP information in the PIM-SM domain.

[SWA-MDC2] display pim c-rp

 Scope: non-scoped

     Group/MaskLen: 224.0.0.0/4

       C-RP address             Priority  HoldTime  Uptime    Expires

       1.1.1.1 (local)          192       150       03:01:36  00:02:29

Configuration files

·     Switch A:

#

mdc SWA-MDC1 id 2

 mdc start

 allocate interface Ten-GigabitEthernet1/0/1 to Ten-GigabitEthernet 1/0/24

#

mdc SWA-MDC2 id 3

 mdc start

 allocate interface Ten-GigabitEthernet 2/0/1 to Ten-GigabitEthernet 2/0/24

#

·     SWA-MDC1:

#

ospf 100 router-id 6.6.6.6

 area 0.0.0.0

  network 6.6.6.6 0.0.0.0

  network 17.1.1.0 0.0.0.255

  network 18.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

interface LoopBack0

 ip address 6.6.6.6 255.255.255.255

#

interface Vlan-interface10

 ip address 17.1.1.6 255.255.255.0

 pim sm

#

interface Vlan-interface20

 ip address 18.1.1.6 255.255.255.0

 pim sm

#

interface Ten-GigabitEthernet1/0/1

 port link-mode bridge

 port access vlan 20

 combo enable fiber

#

interface Ten-GigabitEthernet1/0/2

 port link-mode bridge

 port access vlan 10

 combo enable fiber

#

multicast routing

#

pim

 static-rp 2.2.2.2

#

·     SWA-MDC2:

#

ospf 100 router-id 1.1.1.1

 area 0.0.0.0

  network 1.1.1.1 0.0.0.0

  network 11.1.1.0 0.0.0.255

  network 13.1.1.0 0.0.0.255

  network 15.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

vlan 30

#

interface LoopBack0

 ip address 1.1.1.1 255.255.255.255

#

interface Vlan-interface10

 ip address 11.1.1.1 255.255.255.0

#

interface Vlan-interface20

 ip address 13.1.1.1 255.255.255.0

 pim sm

#

interface Vlan-interface30

 ip address 15.1.1.1 255.255.255.0

 pim sm

#

interface Ten-GigabitEthernet2/0/1

 port link-mode bridge

 port access vlan 30

 combo enable fiber

#

interface Ten-GigabitEthernet2/0/3

 port link-mode bridge

 port access vlan 10

 combo enable fiber

#

interface Ten-GigabitEthernet2/0/4

 port link-mode bridge

 port access vlan 20

 combo enable fiber

#

bgp 100

 group evpn internal

 peer evpn connect-interface LoopBack0

 peer 2.2.2.2 as-number 100

 peer 2.2.2.2 connect-interface LoopBack0

 peer 3.3.3.3 group evpn

 peer 4.4.4.4 group evpn

 peer 5.5.5.5 group evpn

 #

 address-family l2vpn evpn

  reflector cluster-id 8.8.8.8

  undo policy vpn-target

  peer evpn enable

  peer evpn reflect-client

  peer 2.2.2.2 enable

#

multicast routing

#

pim

 c-bsr 1.1.1.1

 c-rp 1.1.1.1

 static-rp 2.2.2.2

#

·     Switch B:

#

mdc SWB-MDC1 id 2

 mdc start

 allocate interface Ten-GigabitEthernet1/0/1 to Ten-GigabitEthernet1/0/24

#

mdc SWB-MDC2 id 3

 mdc start

allocate interface Ten-GigabitEthernet2/0/1 to Ten-GigabitEthernet2/0/24

#

·     SWB-MDC1:

#

ospf 100 router-id 7.7.7.7

 area 0.0.0.0

  network 7.7.7.7 0.0.0.0

  network 19.1.1.0 0.0.0.255

  network 20.1.1.0 0.0.0.255

#

vlan 10

#

vlan 50

#

interface LoopBack0

 ip address 7.7.7.7 255.255.255.255

#

interface Vlan-interface10

 ip address 19.1.1.7 255.255.255.0

#

interface Vlan-interface50

 ip address 20.1.1.7 255.255.255.0

#

interface Ten-GigabitEthernet1/0/1

 port link-mode bridge

 port access vlan 10

 combo enable fiber

#

interface Ten-GigabitEthernet1/0/2

 port link-mode bridge

 port access vlan 50

 combo enable fiber

#

·     SWB-MDC2:

#

ospf 100 router-id 2.2.2.2

 area 0.0.0.0

  network 2.2.2.2 0.0.0.0

  network 12.1.1.0 0.0.0.255

  network 14.1.1.0 0.0.0.255

  network 16.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

vlan 40

#

interface LoopBack0

 ip address 2.2.2.2 255.255.255.255

#

interface Vlan-interface10

 ip address 14.1.1.2 255.255.255.0

 pim sm

#

interface Vlan-interface20

 ip address 12.1.1.2 255.255.255.0

#

interface Vlan-interface40

 ip address 16.1.1.2 255.255.255.0

 pim sm

#

interface Ten-GigabitEthernet2/0/2

 port link-mode bridge

 port access vlan 40

 combo enable fiber

#

interface Ten-GigabitEthernet2/0/3

 port link-mode bridge

 port access vlan 10

 combo enable fiber

#

interface Ten-GigabitEthernet2/0/5

 port link-mode bridge

 port access vlan 20

 combo enable fiber

#

bgp 100

 group evpn internal

 peer evpn connect-interface LoopBack0

 peer 1.1.1.1 as-number 100

 peer 1.1.1.1 connect-interface LoopBack0

 peer 3.3.3.3 group evpn

 peer 4.4.4.4 group evpn

 peer 5.5.5.5 group evpn

 #

 address-family l2vpn evpn

  reflector cluster-id 8.8.8.8

  undo policy vpn-target

  peer evpn enable

  peer evpn reflect-client

  peer 1.1.1.1 enable

#

multicast routing

#

pim

 static-rp 2.2.2.2

#

·     Switch C:

#

ip vpn-instance vpna

 route-distinguisher 1:1

 #

 address-family ipv4

  vpn-target 2:2 import-extcommunity

  vpn-target 2:2 export-extcommunity

 #

 address-family evpn

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

#

 vxlan tunnel mac-learning disable

#

ospf 100 router-id 3.3.3.3

 area 0.0.0.0

  network 3.3.3.3 0.0.0.0

  network 11.1.1.0 0.0.0.255

  network 12.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

 l2vpn enable

 vxlan tunnel arp-learning disable

#

vsi vpna

 gateway vsi-interface 1

 vxlan 10

 evpn encapsulation vxlan

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

#

vsi vpnb

 gateway vsi-interface 2

 vxlan 20

 evpn encapsulation vxlan

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

#

interface LoopBack0

 ip address 3.3.3.3 255.255.255.255

#

interface Vlan-interface10

 ip address 11.1.1.3 255.255.255.0

#

interface Vlan-interface20

 ip address 12.1.1.3 255.255.255.0

#

interface Ten-GigabitEthernet1/0/1

 port link-mode route

 combo enable fiber

 xconnect vsi vpna

#

interface Ten-GigabitEthernet1/0/2

 port link-mode route

 combo enable fiber

 xconnect vsi vpnb

#

interface Ten-GigabitEthernet1/0/3

 port link-mode bridge

 port access vlan 10

 combo enable fiber

#

interface Ten-GigabitEthernet1/0/5

 port link-mode bridge

 port access vlan 20

 combo enable fiber

#

interface Vsi-interface1

 ip binding vpn-instance vpna

 ip address 10.1.1.1 255.255.255.0

 mac-address 0001-0001-0001

 local-proxy-nd enable

 distributed-gateway local

#

interface Vsi-interface2

 ip binding vpn-instance vpna

 ip address 10.1.2.1 255.255.255.0

 mac-address 0002-0002-0002

 local-proxy-nd enable

 distributed-gateway local

#

interface Vsi-interface3

 ip binding vpn-instance vpna

 l3-vni 1000

#

bgp 100

 peer 1.1.1.1 as-number 100

 peer 1.1.1.1 connect-interface LoopBack0

 peer 2.2.2.2 as-number 100

 peer 2.2.2.2 connect-interface LoopBack0

 #

 address-family l2vpn evpn

  peer 1.1.1.1 enable

  peer 2.2.2.2 enable

 

·     Switch D:

#

ip vpn-instance vpna

 route-distinguisher 1:1

 #

 address-family ipv4

  vpn-target 2:2 import-extcommunity

  vpn-target 2:2 export-extcommunity

 #

 address-family evpn

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

#

 vxlan tunnel mac-learning disable

#

ospf 100 router-id 4.4.4.4

 area 0.0.0.0

  network 4.4.4.4 0.0.0.0

  network 13.1.1.0 0.0.0.255

  network 14.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

vlan 30

#

 l2vpn enable

 vxlan tunnel arp-learning disable

#

vsi vpna

 gateway vsi-interface 1

 vxlan 10

 evpn encapsulation vxlan

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

#

vsi vpnb

 gateway vsi-interface 2

 vxlan 20

 evpn encapsulation vxlan

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

#

interface LoopBack0

 ip address 4.4.4.4 255.255.255.255

#

interface Vlan-interface10

 ip address 14.1.1.4 255.255.255.0

 pim sm

#

interface Vlan-interface20

 ip address 13.1.1.4 255.255.255.0

 pim sm

#

interface Vlan-interface30

 ip address 21.1.1.4 255.255.255.0

 pim sm

#

interface Ten-GigabitEthernet1/0/1

 port link-mode route

 combo enable fiber

 xconnect vsi vpna

#

interface Ten-GigabitEthernet1/0/2

 port link-mode route

 combo enable fiber

 xconnect vsi vpnb

#

interface Ten-GigabitEthernet1/0/3

 port link-mode bridge

 port access vlan 10

 combo enable fiber

#

interface Ten-GigabitEthernet1/0/4

 port link-mode bridge

 port access vlan 20

 combo enable fiber

#

interface Ten-GigabitEthernet1/0/5

 port link-mode bridge

 port access vlan 30

 combo enable fiber

#

interface Vsi-interface1

 ip binding vpn-instance vpna

 ip address 10.1.1.1 255.255.255.0

 mac-address 0001-0001-0001

 local-proxy-arp enable

 distributed-gateway local

#

interface Vsi-interface2

 ip binding vpn-instance vpna

 ip address 10.1.2.1 255.255.255.0

 mac-address 0002-0002-0002

 local-proxy-arp enable

 distributed-gateway local

#

interface Vsi-interface3

 ip binding vpn-instance vpna

 l3-vni 1000

#

bgp 100

 peer 1.1.1.1 as-number 100

 peer 1.1.1.1 connect-interface LoopBack0

 peer 2.2.2.2 as-number 100

 peer 2.2.2.2 connect-interface LoopBack0

 #

 address-family l2vpn evpn

  peer 1.1.1.1 enable

  peer 2.2.2.2 enable

#

multicast routing

#

pim

 static-rp 2.2.2.2

#

·     Switch E:

#

ip vpn-instance vpna

 route-distinguisher 1:1

 #

 address-family ipv4

  vpn-target 2:2 import-extcommunity

  vpn-target 2:2 export-extcommunity

 #

 address-family evpn

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

#

 vxlan tunnel mac-learning disable

#

ospf 100 router-id 5.5.5.5

 area 0.0.0.0

  network 5.5.5.5 0.0.0.0

  network 15.1.1.0 0.0.0.255

  network 16.1.1.0 0.0.0.255

  network 18.1.1.0 0.0.0.255

  network 19.1.1.0 0.0.0.255

  network 22.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

vlan 30

#

vlan 40

#

vlan 50

#

 l2vpn enable

 vxlan tunnel arp-learning disable

#

interface LoopBack0

 ip address 5.5.5.5 255.255.255.255

#

interface Vlan-interface10

 ip address 22.1.1.5 255.255.255.0

#

interface Vlan-interface20

 ip address 18.1.1.5 255.255.255.0

 pim sm

#

interface Vlan-interface30

 ip address 15.1.1.5 255.255.255.0

 pim sm

#

interface Vlan-interface40

 ip address 16.1.1.5 255.255.255.0

 pim sm

#

interface Vlan-interface50

 ip address 19.1.1.5 255.255.255.0

#

interface Ten-GigabitEthernet1/0/1

 port link-mode bridge

 port access vlan 30

 combo enable fiber

#

interface Ten-GigabitEthernet1/0/2

 port link-mode bridge

 port access vlan 40

 combo enable fiber

#

interface Ten-GigabitEthernet1/0/3

 port link-mode bridge

 port access vlan 10

 combo enable fiber

#

interface Ten-GigabitEthernet1/0/17

 port link-mode bridge

 port access vlan 20

 combo enable fiber

#

interface Ten-GigabitEthernet1/0/18

 port link-mode bridge

 port access vlan 50

 combo enable fiber

#

interface Vsi-interface3

 ip binding vpn-instance vpna

 l3-vni 1000

#

bgp 100

 peer 1.1.1.1 as-number 100

 peer 1.1.1.1 connect-interface LoopBack0

 peer 2.2.2.2 as-number 100

 peer 2.2.2.2 connect-interface LoopBack0

 #

 address-family l2vpn evpn

  peer 1.1.1.1 enable

  peer 2.2.2.2 enable

 #

 ip vpn-instance vpna

  #

  address-family ipv4 unicast

   default-route imported

   import-route static

#

multicast routing

#

pim

 static-rp 2.2.2.2

#

 ip route-static vpn-instance vpna 0.0.0.0 0 22.1.1.100

·     Switch F:

#

ospf 100 router-id 9.9.9.9

 area 0.0.0.0

  network 9.9.9.9 0.0.0.0

  network 17.1.1.0 0.0.0.255

#

vlan 10

#

vlan 20

#

interface LoopBack0

 ip address 9.9.9.9 255.255.255.255

#

interface Vlan-interface10

 ip address 17.1.1.9 255.255.255.0

 pim sm

#

interface Vlan-interface20

 ip address 10.1.4.1 255.255.255.0

 igmp enable

#

interface Ten-GigabitEthernet1/0/17

 port link-mode bridge

 port access vlan 20

 combo enable fiber

#

interface Ten-GigabitEthernet1/0/18

 port link-mode bridge

 port access vlan 10

 combo enable fiber

#

multicast routing

#

pim

 static-rp 2.2.2.2

#

Related documentation

·     H3C S12500X-AF & S12500-X & S9800 Switch Series MDC Command Reference (R27xx)

·     H3C S12500X-AF & S12500-X & S9800 Switch Series MDC Configuration Guide (R27xx)

·     H3C S6860 Switch Series EVPN Command Reference (R26xx)

·     H3C S6860 Switch Series EVPN Configuration Guide (R26xx)

 

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网