Huawei S Series Campus Switches Troubleshooting Guide(V100 and V200)

Troubleshooting Guidelines for VXLAN

Troubleshooting Guidelines for VXLAN

A Layer 2 Tunnel Cannot Be Established in a Distributed VXLAN Gateway Scenario

Context

In a distributed VXLAN gateway scenario, VXLAN tunnels are dynamically established using BGP EVPN. Whether a tunnel can be successfully established depends on whether the corresponding VPN or EVPN instances can receive routes. VTEPs establish a Layer 2 VXLAN tunnel based on the Inclusive Multicast (Type 3) routes received from each other. A route advertised by a VTEP carries export VPN targets (specified by export-extcommunity) of the local EVPN instance. If the export VPN targets match any of the import VPN targets (specified by import-extcommunity) of the EVPN instance on the remote VTEP, the route is accepted by the remote VTEP. A Layer 2 tunnel can be established between two VTEPs if they both accept the route advertised by each other. If the VPN targets do not match, the route is discarded, causing the failure to set up the Layer 2 tunnel.

Symptom

A Layer 2 VXLAN tunnel cannot be established between VTEP2 and VTEP3 on the network using distributed VXLAN gateways, as shown in Figure 20-128.

Figure 20-128 Network using distributed VXLAN gateways

Troubleshooting Procedure

Figure 20-129 shows the troubleshooting procedure.

Figure 20-129 Flow for troubleshooting a Layer 2 VXLAN tunnel establishment failure
  1. Check whether the BGP EVPN peer relationship is successfully established, and troubleshoot the fault if the BGP EVPN peer relationship fails to be established.

    Run the display bgp evpn peer command to check the BGP EVPN peer status.

     BGP local router ID : 10.3.3.3
     Local AS number : 100
     Total number of peers : 2		  Peers in established state : 2
    
      Peer            V          AS  MsgRcvd  MsgSent  OutQ  Up/Down       State PrefRcv
    
      10.1.1.1        4         100     4010     4016     0 0066h46m Established       1
      10.2.2.2        4         100     4009     4010     0 0066h40m Established       4

    If the BGP EVPN peer state is Established, the BGP EVPN peer relationship is established. In this case, go to 2. If the BGP EVPN peer relationship fails to be established, perform the following steps to troubleshoot the fault:

    1. Check whether the IP addresses used to establish a TCP session between the BGP peers on the VTEPs are reachable. Specifically, use the source address used by the local BGP peer to establish a TCP session to ping the source address used by the remote end to establish a TCP session.

      # Check the source IP address used by BGP to establish a TCP session on the local device. Run the display current-configuration configuration bgp command in the BGP view to check the source interface used to set up a TCP session with its BGP peer, and then run the display interface command to check the IP address of the source interface.

      <VTEP2> display current-configuration configuration bgp
      #
      bgp 100
       router-id 10.2.2.2
       peer 10.1.1.1 as-number 100
       peer 10.1.1.1 connect-interface LoopBack1
       peer 10.3.3.3 as-number 100
       peer 10.3.3.3 connect-interface LoopBack1
       #
       ipv4-family unicast
        undo synchronization
        peer 10.1.1.1 enable
        peer 10.3.3.3 enable
       #
       l2vpn-family evpn
        policy vpn-target
        peer 10.1.1.1 enable
        peer 10.1.1.1 advertise irb
        peer 10.3.3.3 enable
        peer 10.3.3.3 advertise irb
       #
       ipv4-family vpn-instance vpn1
        import-route direct
        advertise l2vpn evpn
      #
      return 
      <VTEP2>display interface loopback 1
      LoopBack1 current state : UP
      Line protocol current state : UP (spoofing)
      Description:
      Route Port,The Maximum Transmit Unit is 1500
      Internet Address is 10.2.2.2/32
      Physical is Loopback
      Current system time: 2020-07-31 18:45:11+08:00
          Last 300 seconds input rate 0 bits/sec, 0 packets/sec
          Last 300 seconds output rate 0 bits/sec, 0 packets/sec
          Realtime 0 seconds input rate 0 bits/sec, 0 packets/sec
          Realtime 0 seconds output rate 0 bits/sec, 0 packets/sec
          Input: 0 packets,0 bytes
                 0 unicast,0 broadcast,0 multicast
                 0 errors,0 unknownprotocol
          Output:0 packets,0 bytes
                 0 unicast,0 broadcast,0 multicast
                 0 errors
          Input bandwidth utilization  :    0%
          Output bandwidth utilization :    0%
      

      # Check the source IP address used by BGP to establish a TCP session on the remote device. Run the display current-configuration configuration bgp command in the BGP view to check the source interface used to set up a TCP session with its BGP peer, and then run the display interface command to check the IP address of the source interface.

      <VTEP3> display current-configuration configuration bgp 100
      #
      bgp 100
       router-id 10.3.3.3
       peer 10.1.1.1 as-number 100
       peer 10.1.1.1 connect-interface LoopBack1
       peer 10.2.2.2 as-number 100
       peer 10.2.2.2 connect-interface LoopBack1
       #
       ipv4-family unicast
        undo synchronization
        peer 10.1.1.1 enable
        peer 10.2.2.2 enable
       #
       l2vpn-family evpn
        policy vpn-target
        peer 10.1.1.1 enable
        peer 10.1.1.1 advertise irb
        peer 10.2.2.2 enable
        peer 10.2.2.2 advertise irb
       #
       ipv4-family vpn-instance vpn1
        import-route direct
        advertise l2vpn evpn
      #
      return
      <VTEP3>display interface loopback 1
      LoopBack1 current state : UP
      Line protocol current state : UP (spoofing)
      Description:
      Route Port,The Maximum Transmit Unit is 1500
      Internet Address is 10.3.3.3/32
      Physical is Loopback
      Current system time: 2020-07-31 10:28:55
          Last 300 seconds input rate 0 bits/sec, 0 packets/sec
          Last 300 seconds output rate 0 bits/sec, 0 packets/sec
          Realtime 0 seconds input rate 0 bits/sec, 0 packets/sec
          Realtime 0 seconds output rate 0 bits/sec, 0 packets/sec
          Input: 0 packets,0 bytes
                 0 unicast,0 broadcast,0 multicast
                 0 errors,0 unknownprotocol
          Output:0 packets,0 bytes
                 0 unicast,0 broadcast,0 multicast
                 0 errors
          Input bandwidth utilization  :    0%
          Output bandwidth utilization :    0%
      

      # On the local device, ping the source IP address used by the remote device to establish a TCP session by specifying the local source IP address. This is to check whether the source IP address used by the BGP peer to establish the TCP session is reachable.

      <VTEP2> ping -a 10.2.2.2 10.3.3.3
      
      Pinging 10.3.3.3 with 32 bytes of data:
      Reply from 10.3.3.3: bytes=32 time=1ms TTL=126
      Reply from 10.3.3.3: bytes=32 time=1ms TTL=126
      Reply from 10.3.3.3: bytes=32 time=1ms TTL=126
      Reply from 10.3.3.3: bytes=32 time=1ms TTL=126
      
      Ping statistics for 10.3.3.3:
          Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
      Approximate round trip times in milli-seconds:
          Minimum = 1ms, Maximum = 1ms, Average = 1ms

      If the IP addresses for establishing the TCP session are reachable, go to 1.b. Otherwise, check whether the IGP routes between the devices are correctly configured.

    2. Check whether the status of the TCP session established between BGP peers is correct.

      # Run the display tcp status command to check TCP session status.

      <VTEP2> display tcp status
      TCPCB    Tid/Soid Local Add:port        Foreign Add:port      VPNID  State
      4bb714f4 65 /2    0.0.0.0:80            0.0.0.0:0             -1     Listening
      49f33cdc 262/1    0.0.0.0:179           10.1.1.1:0            0      Listening
      49f33e50 262/4    0.0.0.0:179           10.3.3.3:0            0      Listening
      4bb71380 65 /1    0.0.0.0:443           0.0.0.0:0             -1     Listening
      49f3370c 262/8    10.2.2.2:53342        10.3.3.3:179          0      Established
      49f339f4 262/7    10.2.2.2:55160        10.1.1.1:179          0      Established

      If the TCP status is correct, the BGP EVPN peer relationship can be established successfully. If the TCP status is incorrect, check whether TCP packets are discarded on the devices and the link between them. You can locate the point of packet drops by checking the CPCAR value and collecting traffic statistics, and then rectify the fault accordingly.

  2. Check whether the BGP EVPN inclusive routes are correctly learned.

    # Run the display bgp evpn all routing-table inclusive-route inclusive-route command to check whether inclusive routes are correctly generated on the local device and whether the local device has learned inclusive routes from the remote device. In the command, the inclusive route specified by inclusive-route is in the format of M:L:X.X.X.X, where M is 0, L is the mask length of the source address of the device that generates the route, and X.X.X.X is the source address of the NVE interface on the device that generates the route. You can run the display current-configuration interface nve 1 command to view the source IP address and run the display ip interface brief command to view the mask.

    # Check whether an inclusive route is correctly generated on the local device.

    <VTEP2> display current-configuration interface nve 1
    #
    interface Nve1
     source 10.2.2.2
     vni 10 head-end peer-list protocol bgp
     vni 20 head-end peer-list protocol bgp
    #
    return
    <VTEP2> display ip interface brief
    GigabitEthernet0/0/17             192.168.1.1/24       up         up        
    LoopBack1                         10.2.2.2/32          up         up(s)     
    MEth0/0/1                         unassigned           up         down      
    NULL0                             unassigned           up         up(s)     
    Nve1                              unassigned           up         up        
    Vbdif10                           192.168.10.1/24      up         up        
    Vbdif20                           192.168.20.1/24      up         up        
    Vlanif1                           unassigned           up         down      
    
    <VTEP2> display bgp evpn all routing-table inclusive-route 0:32:10.2.2.2
    
     BGP local router ID : 10.2.2.2
     Local AS number : 100
    
     Total routes of Route Distinguisher(1:10): 1
     BGP routing table entry information of 0:32:10.2.2.2:
     Imported route. 
     Label information (Received/Applied): 10/NULL
     From: 0.0.0.0 (0.0.0.0)
     Route Duration: 3d03h49m13s 
     Direct Out-interface: 
     Original nexthop: 10.2.2.2
     Qos information : 0x0
     Ext-Community:RT <1 : 100>, RT <10 : 1>, 
                   Tunnel Type <VxLan(8)>
     AS-path Nil, origin incomplete, pref-val 0, valid, local, best, select, pre 0
     PMSI: Flags 0, Ingress Replication, Label 0:0:10(10), Tunnel Identifier: 10.2.2.2
     Route Type: 3 (Inclusive Multicast Route)
     Ethernet Tag ID: 0, Originator IP: 10.2.2.2/32
     Advertised to such 2 peers:
        10.3.3.3
        10.1.1.1
    

    Use the same method to check whether the inclusive route is learned on the remote device. If the route can be learned by the remote device, the tunnel can be established successfully. If the route cannot be correctly learned, go to 3.

    # Use the same method to check whether the inclusive route generated by the remote device is correctly learned by the local device.

  3. Check whether the VPN targets of the EVPN instances on both devices match.

    # Run the display bgp evpn all routing-table inclusive-route inclusive-route command to check the export VPN targets (specified by export-extcommunity) of the learned inclusive route.

    <VTEP2> display bgp evpn all routing-table inclusive-route 0:32:10.3.3.3
    
     BGP local router ID : 10.2.2.2
     Local AS number : 100
    
     Total routes of Route Distinguisher(2:10): 1
     BGP routing table entry information of 0:32:10.3.3.3:
     Label information (Received/Applied): 10/NULL
     From: 10.3.3.3 (10.3.3.3)
     Route Duration: 3d03h19m30s 
     Relay IP Nexthop: 192.168.1.2
     Relay IP Out-Interface: GigabitEthernet0/0/17
     Original nexthop: 10.3.3.3
     Qos information : 0x0
     Ext-Community:RT <1 : 100>, RT <10 : 1>, 
                   Tunnel Type <VxLan(8)>
     AS-path Nil, origin incomplete, localpref 100, pref-val 0, valid, internal, best, select, pre 255, IGP cost 2
     PMSI: Flags 0, Ingress Replication, Label 0:0:10(10), Tunnel Identifier: 10.3.3.3
     Route Type: 3 (Inclusive Multicast Route)
     Ethernet Tag ID: 0, Originator IP: 10.3.3.3/32
     Not advertised to any peer yet
    

    # Run the display current-configuration configuration evpn-instance evpn-instance-name command to check the import VPN targets (specified by import-extcommunity) of the local EVPN instance.

    <VTEP2> display current-configuration configuration evpn-instance evpn10
    #
    evpn vpn-instance evpn10 bd-mode
     route-distinguisher 1:10
     vpn-target 1:100 10:1 export-extcommunity
     vpn-target 10:1 import-extcommunity
    #
    return

    If the import VPN targets (specified by import-extcommunity) of the local EVPN instance match the export VPN targets (specified by export-extcommunity) carried in the received inclusive route, the route can be added to the routing table of the local EVPN instance and the tunnel can be established successfully. Otherwise, the import-extcommunity attribute of the local EVPN instance needs to be adjusted, so that the import VPN targets match the export VPN targets carried in the received inclusive route.

Layer 3 Tunnels Cannot Be Established in a Distributed VXLAN Gateway Scenario (IP Prefix Routes Are Advertised)

Context

In a distributed VXLAN gateway scenario, VXLAN tunnels are dynamically established using BGP EVPN. Whether a tunnel can be successfully established depends on whether the corresponding VPN or EVPN instances can receive routes. VTEPs establish Layer 3 VXLAN tunnels by sending IP prefix routes or integrated routing and bridging (IRB) routes. A route advertised by a VTEP carries the export VPN targets (specified by export-extcommunity evpn) of the local VPN instance. If the export VPN targets match any of the import VPN targets on the remote VTEP, the route is accepted by the remote VTEP. A Layer 3 tunnel can be established if both VTEPs accept the routes advertised by each other. If the VPN targets do not match, the route is discarded, causing the failure to establish the Layer 3 tunnel.

Symptom

In a distributed VXLAN gateway scenario, a Layer 3 VXLAN tunnel cannot be established. Figure 20-130 shows the network diagram.

Figure 20-130 Network using distributed VXLAN gateways

Troubleshooting Procedure

Figure 20-131 shows the troubleshooting procedure.

Figure 20-131 Flow for troubleshooting a Layer 3 VXLAN tunnel establishment failure
  1. Check whether the BGP EVPN peer relationship is successfully established, and troubleshoot the fault if the BGP EVPN peer relationship fails to be established.

    Run the display bgp evpn peer command to check the BGP EVPN peer status.

     BGP local router ID : 10.3.3.3
     Local AS number : 100
     Total number of peers : 2		  Peers in established state : 2
    
      Peer            V          AS  MsgRcvd  MsgSent  OutQ  Up/Down       State PrefRcv
    
      10.1.1.1        4         100     4010     4016     0 0066h46m Established       1
      10.2.2.2        4         100     4009     4010     0 0066h40m Established       4

    If the BGP EVPN peer state is Established, the BGP EVPN peer relationship is established. In this case, go to 2. If the BGP EVPN peer relationship fails to be established, perform the following steps to troubleshoot the fault:

    1. Check whether the IP addresses used to establish a TCP session between the BGP peers on the VTEPs are reachable. Specifically, use the source address used by the local BGP peer to establish a TCP session to ping the source address used by the remote end to establish a TCP session.

      # Check the source IP address used by BGP to establish a TCP session on the local device. Run the display current-configuration configuration bgp command in the BGP view to check the source interface used to set up a TCP session with its BGP peer, and then run the display interface command to check the IP address of the source interface.

      <VTEP2> display current-configuration configuration bgp
      #
      bgp 100
       router-id 10.2.2.2
       peer 10.1.1.1 as-number 100
       peer 10.1.1.1 connect-interface LoopBack1
       peer 10.3.3.3 as-number 100
       peer 10.3.3.3 connect-interface LoopBack1
       #
       ipv4-family unicast
        undo synchronization
        peer 10.1.1.1 enable
        peer 10.3.3.3 enable
       #
       l2vpn-family evpn
        policy vpn-target
        peer 10.1.1.1 enable
        peer 10.1.1.1 advertise irb
        peer 10.3.3.3 enable
        peer 10.3.3.3 advertise irb
       #
       ipv4-family vpn-instance vpn1
        import-route direct
        advertise l2vpn evpn
      #
      return 
      <VTEP2>display interface loopback 1
      LoopBack1 current state : UP
      Line protocol current state : UP (spoofing)
      Description:
      Route Port,The Maximum Transmit Unit is 1500
      Internet Address is 10.2.2.2/32
      Physical is Loopback
      Current system time: 2020-07-31 18:45:11+08:00
          Last 300 seconds input rate 0 bits/sec, 0 packets/sec
          Last 300 seconds output rate 0 bits/sec, 0 packets/sec
          Realtime 0 seconds input rate 0 bits/sec, 0 packets/sec
          Realtime 0 seconds output rate 0 bits/sec, 0 packets/sec
          Input: 0 packets,0 bytes
                 0 unicast,0 broadcast,0 multicast
                 0 errors,0 unknownprotocol
          Output:0 packets,0 bytes
                 0 unicast,0 broadcast,0 multicast
                 0 errors
          Input bandwidth utilization  :    0%
          Output bandwidth utilization :    0%
      

      # Check the source IP address used by BGP to establish a TCP session on the remote device. Run the display current-configuration configuration bgp command in the BGP view to check the source interface used to set up a TCP session with its BGP peer, and then run the display interface command to check the IP address of the source interface.

      <VTEP3> display current-configuration configuration bgp 100
      #
      bgp 100
       router-id 10.3.3.3
       peer 10.1.1.1 as-number 100
       peer 10.1.1.1 connect-interface LoopBack1
       peer 10.2.2.2 as-number 100
       peer 10.2.2.2 connect-interface LoopBack1
       #
       ipv4-family unicast
        undo synchronization
        peer 10.1.1.1 enable
        peer 10.2.2.2 enable
       #
       l2vpn-family evpn
        policy vpn-target
        peer 10.1.1.1 enable
        peer 10.1.1.1 advertise irb
        peer 10.2.2.2 enable
        peer 10.2.2.2 advertise irb
       #
       ipv4-family vpn-instance vpn1
        import-route direct
        advertise l2vpn evpn
      #
      return
      <VTEP3>display interface loopback 1
      LoopBack1 current state : UP
      Line protocol current state : UP (spoofing)
      Description:
      Route Port,The Maximum Transmit Unit is 1500
      Internet Address is 10.3.3.3/32
      Physical is Loopback
      Current system time: 2020-07-31 10:28:55
          Last 300 seconds input rate 0 bits/sec, 0 packets/sec
          Last 300 seconds output rate 0 bits/sec, 0 packets/sec
          Realtime 0 seconds input rate 0 bits/sec, 0 packets/sec
          Realtime 0 seconds output rate 0 bits/sec, 0 packets/sec
          Input: 0 packets,0 bytes
                 0 unicast,0 broadcast,0 multicast
                 0 errors,0 unknownprotocol
          Output:0 packets,0 bytes
                 0 unicast,0 broadcast,0 multicast
                 0 errors
          Input bandwidth utilization  :    0%
          Output bandwidth utilization :    0%
      

      # On the local device, ping the source IP address used by the remote device to establish a TCP session by specifying the local source IP address. This is to check whether the source IP address used by the BGP peer to establish the TCP session is reachable.

      <VTEP2> ping -a 10.2.2.2 10.3.3.3
      
      Pinging 10.3.3.3 with 32 bytes of data:
      Reply from 10.3.3.3: bytes=32 time=1ms TTL=126
      Reply from 10.3.3.3: bytes=32 time=1ms TTL=126
      Reply from 10.3.3.3: bytes=32 time=1ms TTL=126
      Reply from 10.3.3.3: bytes=32 time=1ms TTL=126
      
      Ping statistics for 10.3.3.3:
          Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
      Approximate round trip times in milli-seconds:
          Minimum = 1ms, Maximum = 1ms, Average = 1ms

      If the IP addresses for establishing the TCP session are reachable, go to 1.b. Otherwise, check whether the IGP routes between the devices are correctly configured.

    2. Check whether the status of the TCP session established between BGP peers is correct.

      # Run the display tcp status command to check TCP session status.

      <VTEP2> display tcp status
      TCPCB    Tid/Soid Local Add:port        Foreign Add:port      VPNID  State
      4bb714f4 65 /2    0.0.0.0:80            0.0.0.0:0             -1     Listening
      49f33cdc 262/1    0.0.0.0:179           10.1.1.1:0            0      Listening
      49f33e50 262/4    0.0.0.0:179           10.3.3.3:0            0      Listening
      4bb71380 65 /1    0.0.0.0:443           0.0.0.0:0             -1     Listening
      49f3370c 262/8    10.2.2.2:53342        10.3.3.3:179          0      Established
      49f339f4 262/7    10.2.2.2:55160        10.1.1.1:179          0      Established

      If the TCP status is correct, the BGP EVPN peer relationship can be established successfully. If the TCP status is incorrect, check whether TCP packets are discarded on the devices and the link between them. You can locate the point of packet drops by checking the CPCAR value and collecting traffic statistics, and then rectify the fault accordingly.

  2. Check whether BGP EVPN IP prefix routes are correctly learned.

    # Run the display bgp evpn all routing-table prefix-route prefix-route command to check whether the local device has generated an IP prefix route. In the command, the IP prefix route specified by prefix-route is in the format of L:X.X.X.X:M, where L is 0, M is the mask length of the destination IP address of the route, and X.X.X.X is the destination IP address of the route. Run the display interface vbdif command to check the gateway address and mask. (The local device generates an IP prefix route based on the VXLAN gateway address and sends the route to the remote device.)

    <VTEP2> display current-configuration interface vbdif 10
    #
    interface Vbdif10
     mac-address 0000-5e00-0101
     ip binding vpn-instance vpn1
     arp collect host enable
     arp distribute-gateway enable
     ip address 192.168.10.1 255.255.255.0
    #
    return
    <VTEP2> display bgp evpnallrouting-table prefix-route 0:24:192.168.10.1
    
     BGP local router ID : 10.2.2.2
     Local AS number : 100
    
     Total routes of Route Distinguisher(3:100): 1
     BGP routing table entry information of 0:192.168.20.0:24:
     Label information (Received/Applied): 100/NULL
     From: 10.3.3.3 (10.3.3.3)
     Route Duration: 3d04h07m33s 
     Relay IP Nexthop: 192.168.1.2
     Relay IP Out-Interface: GigabitEthernet0/0/17
     Original nexthop: 10.3.3.3
     Qos information : 0x0
     Ext-Community:RT <1 : 100>, Tunnel Type <VxLan(8)>, 
                   Router's MAC <2cab-0098-15b0>
     AS-path Nil, origin incomplete, MED 0, localpref 100, pref-val 0, valid, internal, best, select, pre 255, IGP cost 2
     Route Type: 5 (Ip Prefix Route)
     Ethernet Tag ID:0, IP Prefix/Len: 192.168.20.0/24, ESI: 0000.0000.0000.0000.0000, GW IP Address: 0.0.0.0
     Not advertised to any peer yet
    
    
     VPN-Instance vpn1, Router ID 10.2.2.2:
    
     Total Number of Routes: 1
     BGP routing table entry information of 192.168.20.0/24:
     Label information (Received/Applied): 100/NULL
     From: 10.3.3.3 (10.3.3.3)
     Route Duration: 3d04h07m33s 
     Relay Tunnel Out-Interface: VXLAN
     Relay token: 0x1
     Original nexthop: 10.3.3.3
     Qos information : 0x0
     Ext-Community:RT <1 : 100>, Tunnel Type <VxLan(8)>, 
                   Router's MAC <2cab-0098-15b0>
     AS-path Nil, origin incomplete, MED 0, localpref 100, pref-val 0, valid, internal, best, select, active, pre 255
     Not advertised to any peer yet
    

    Use the same method to check whether the IP prefix route is learned on the remote device. If the route can be learned by the remote device, the tunnel can be established successfully. If the route cannot be correctly learned, go to 3.

    # Use the same method to check whether the IP prefix route generated by the remote device is correctly learned by the local device.

  3. Check whether the VPN targets of the EVPN instances on both devices match.

    # Run the display bgp evpn all routing-table prefix-route prefix-route command to check the export VPN targets (specified by export-extcommunity) of the learned IP prefix route.

    <VTEP2> display bgp evpn all routing-table prefix-route 0:24:192.168.20.0
    
     BGP local router ID : 10.2.2.2
     Local AS number : 100
    
     Total routes of Route Distinguisher(3:100): 1
     BGP routing table entry information of 0:192.168.20.0:24:
     Label information (Received/Applied): 100/NULL
     From: 10.3.3.3 (10.3.3.3)
     Route Duration: 3d04h07m33s 
     Relay IP Nexthop: 192.168.1.2
     Relay IP Out-Interface: GigabitEthernet0/0/17
     Original nexthop: 10.3.3.3
     Qos information : 0x0
     Ext-Community:RT <1 : 100>, Tunnel Type <VxLan(8)>, 
                   Router's MAC <2cab-0098-15b0>
     AS-path Nil, origin incomplete, MED 0, localpref 100, pref-val 0, valid, internal, best, select, pre 255, IGP cost 2
     Route Type: 5 (Ip Prefix Route)
     Ethernet Tag ID:0, IP Prefix/Len: 192.168.20.0/24, ESI: 0000.0000.0000.0000.0000, GW IP Address: 0.0.0.0
     Not advertised to any peer yet
    
    
     VPN-Instance vpn1, Router ID 10.2.2.2:
    
     Total Number of Routes: 1
     BGP routing table entry information of 192.168.20.0/24:
     Label information (Received/Applied): 100/NULL
     From: 10.3.3.3 (10.3.3.3)
     Route Duration: 3d04h07m33s 
     Relay Tunnel Out-Interface: VXLAN
     Relay token: 0x1
     Original nexthop: 10.3.3.3
     Qos information : 0x0
     Ext-Community:RT <1 : 100>, Tunnel Type <VxLan(8)>, 
                   Router's MAC <2cab-0098-15b0>
     AS-path Nil, origin incomplete, MED 0, localpref 100, pref-val 0, valid, internal, best, select, active, pre 255
     Not advertised to any peer yet
    

    # Run the display current-configuration configuration vpn-instance vpn-instance-name command to check the import VPN targets (specified by import-extcommunity evpn) of the local VPN instance.

    <VTEP2> display current-configuration configuration vpn-instance vpn1
    #
    ip vpn-instance vpn1
     ipv4-family
      route-distinguisher 2:100
      vpn-target 1:100 export-extcommunity evpn
      vpn-target 1:100 import-extcommunity evpn
     vxlan vni 100
    #
    return

    If the import VPN targets (specified by import-extcommunity evpn) of the local VPN instance match the export VPN targets (specified by export-extcommunity evpn) carried in the received IP prefix route, the route can be added to the routing table of the local VPN instance and the tunnel can be established successfully. Otherwise, the import-extcommunity evpn attribute of the local EVPN instance needs to be adjusted, so that the import VPN targets match the export VPN targets carried in the received IP prefix route.

Translation
Favorite
Download
Update Date:2025-05-13
Document ID:EDOC1000091883
Views:6163638
Downloads:15450
Average rating:4.27Points

Digital Signature File

digtal sigature tool