Configuring VXLAN in Distributed Gateway Mode Using BGP EVPN
Pre-configuration Tasks
Before configuring user communication over VXLAN tunnels, ensure route reachability.
Configuration Process
Figure 1-55 shows the flowchart of configuring VXLAN in distributed gateway mode.
Configuration Task |
IPv4 Overlay Network |
IPv6 Overlay Network |
---|---|---|
(Optional) Configuring Three-Segment VXLAN to Implement Layer 3 Interworking |
Supported |
Not supported |
(Optional) Configuring ARP Broadcast Suppression |
Supported |
Not supported |
(Optional) Configuring NS Multicast Suppression |
Not supported |
Supported |
(Optional) Configuring Isolation on the Access Side |
Supported |
Supported |
(Optional) Configuring Unidirectional Isolation from the Access Side to the Tunnel Side |
Supported |
Supported |
(Optional) Configuring the Local Proxy ARP Function |
Supported |
Not supported |
(Optional) Configuring the Routed Proxy ND Function |
Not supported |
Supported |
(Optional) Configuring the Local Proxy ND Function |
Not supported |
Supported |
(Optional) Configuring Traffic Suppression in a BD |
Supported |
Supported |
(Optional) Configuring a Static MAC Address Entry |
Supported |
Supported |
(Optional) Configuring a Static ARP Entry |
Supported |
Not supported |
(Optional) Configuring a Static IPv6 Neighbor Entry |
Not supported |
Supported |
- Configuring Deployment Mode for VXLAN Access Service
- Configuring a VXLAN Tunnel
- Configuring a Layer 3 VXLAN Gateway
- (Optional) Configuring Three-Segment VXLAN to Implement Layer 3 Interworking
- (Optional) Configuring ARP Broadcast Suppression
- (Optional) Configuring NS Multicast Suppression
- (Optional) Configuring Isolation on the Access Side
- (Optional) Configuring Unidirectional Isolation from the Access Side to the Tunnel Side
- (Optional) Configuring the Local Proxy ARP Function
- (Optional) Configuring the Routed Proxy ND Function
- (Optional) Configuring the Local Proxy ND Function
- (Optional) Configuring Traffic Suppression in a BD
- (Optional) Configuring a Static MAC Address Entry
- (Optional) Configuring a Static ARP Entry
- (Optional) Configuring a Static IPv6 Neighbor Entry
- (Optional) Enabling User Host Information Update Triggered by a MAC Address Entry Change
- Verifying the VXLAN Configuration in Distributed Gateway Mode Using BGP EVPN
Configuring Deployment Mode for VXLAN Access Service
Context
When configuring VXLAN on a device, you need to select a deployment mode for the VXLAN access service on the downlink interface.
Based on VLAN: You can associate one or more VLANs with a BD to add users in these VLANs to the BD. This VLAN-based mode implements larger-granularity control, but is easy to configure. It applies to VXLAN deployment on a live network.
Based on encapsulation mode: The device sends packets of different encapsulation modes to different Layer 2 sub-interfaces based on the VLAN tags contained in the packets. You can bind a Layer 2 sub-interface to a BD to add specified users to the BD. This mode implements refined and flexible control but requires more complex configuration. It applies to VXLAN deployment on a new network.
When NAC authentication is configured on the access-side main interface, VXLAN Layer 2 sub-interfaces cannot be created on the main interface to connect to the VXLAN.
Procedure
- Run system-view
The system view is displayed.
- (Optional) Run set vxlan resource super-mode
The super VXLAN resource mode is set.
By default, the device supports 4094 BDs. The device supports 16000 BDs after the super VXLAN resource mode is set.
After setting the super VXLAN resource mode, save the configuration and then restart the device to make the configuration take effect.
When the super VXLAN resource mode is configured, the forwarding performance of some services may degrade, such as the IP multicast, VPLS, VLAN mapping, Layer 3 traffic forwarding of sub-interfaces, and VLAN stacking services.
- Run bridge-domain bd-id
A BD is created and the BD view is displayed.
By default, no BD is created.
- (Optional) Run description description
The description is configured for the BD.
By default, no description is configured for a BD.
- Run quit
Exit from the BD view and return to the system view.
- (Optional) Specify an interface as a VXLAN access-side interface.
Run interface interface-type interface-number
The interface view is displayed.
Run port nvo3 mode access
The interface is specified as a VXLAN access-side interface.
By default, a device's interface cannot perform VXLAN encapsulation for common IP packets that carry VXLAN packets and have the destination UDP port number 4789 when the tunnel-side is LE2D2X48SEC0.
Run quit
Return to the system view.
- Configure a service access point.
- Based on VLAN:
Run vlan vlan-id
A VLAN is created and the VLAN view is displayed.
Run quit
Exit from the VLAN view and return to the system view.
Run bridge-domain bd-id
The view of an existing BD is displayed.
Run l2 binding vlan vlan-id
A VLAN is associated with the BD so that data packets can be forwarded in the BD.
By default, a VLAN is not associated with a BD.
One VLAN can be associated with only one BD, but one BD can be associated with multiple VLANs.
After a global VLAN is associated with a BD, you need to add corresponding interfaces to the VLAN.
- If member interfaces of a voice VLAN are located on cards except the LE1D2S04SEC0, LE1D2X32SEC0, LE1D2H02QEC0, and X series cards, the voice VLAN cannot be associated with a BD.
- In NAC authentication scenarios, if there are online users in a VLAN, running the undo l2 binding vlan command to unbind the VLAN from a BD makes the users go offline.
- If a VLAN is an ISP VLAN authorized to users and users exist in the VLAN on the device, the VLAN cannot be associated with a BD.
- If a VLAN is used as the management VLAN of a Fit AP, it is not recommended that the VLAN be associated with a BD.
- Based on encapsulation mode:
Run interface interface-type interface-number.subnum mode l2
A Layer 2 sub-interface is created, and the sub-interface view is displayed.
Run rewrite pop { single | double | none }
The device is configured to remove VLAN tags from packets received by the Layer 2 sub-interface.
By default, the device removes two VLAN tags from packets received by Layer 2 sub-interfaces that use QinQ encapsulation, removes one VLAN tag from packets received by Layer 2 sub-interfaces that use Dot1q encapsulation.
- You can only configure the rewrite pop single command on Layer 2 sub-interfaces that use Dot1q encapsulation and no VLAN segment can be configured for Layer 2 sub-interfaces.
- You can only configure the rewrite pop double command on Layer 2 sub-interfaces that use QinQ encapsulation and no VLAN segment can be configured for Layer 2 sub-interfaces.
- You can only configure the rewrite pop none command on Layer 2 sub-interfaces that use Dot1q or QinQ encapsulation.
Run encapsulation { dot1q vid low-pe-vid [ to high-pe-vid ] | default | untag | qinq vid low-vlan-vid [ to high-vlan-vid ] ce-vid low-ce-vid [ to high-ce-vid ] }
An encapsulation mode is configured for a Layer 2 sub-interface to specify the type of packets that can pass through the sub-interface.
By default, the encapsulation mode of packets allowed to pass a Layer 2 sub-interface is not configured.
When configuring an encapsulation mode on a Layer 2 sub-interface, pay attention to the following points:
The VLAN ID in dot1q mode or outer VLAN ID in qinq mode cannot be the same as the allowed VLAN of the corresponding main interface or the global VLAN.
On the same main interface, the VLAN ID in dot1q mode and the outer VLAN ID in qinq mode must be different.
After NAC authentication is configured on the main interface, the traffic encapsulation type on a Layer 2 sub-interface cannot be set to default.
When the encapsulation mode of a Layer 2 sub-interface is default, the corresponding main interface cannot be added to any VLAN, including VLAN 1.
Before the encapsulation mode of a Layer 2 sub-interface is set to default, the main interface has only one sub-interface.
After the encapsulation mode of a Layer 2 sub-interface is set to default, no other sub-interface can be created on the main interface.
When the encapsulation mode of a Layer 2 sub-interface is set to untag, the corresponding main interface cannot be added to VLAN 1, and other sub-interfaces of the main interface cannot be set to untag.
You can configure only one encapsulation mode for each Layer 2 sub-interface. If an encapsulation mode has been configured for a Layer 2 sub-interface, run the undo encapsulation command to delete the original mode before you configure another mode.
- Before configuring a VLAN segment on a Dot1q or QinQ Layer 2 sub-interface, you must run the rewrite pop none command.
Run bridge-domain bd-id
A specified Layer 2 sub-interface is associated with a BD so that data packets can be forwarded in the BD.
By default, a Layer 2 sub-interface is not associated with a BD.
- Based on VLAN:
Configuring a VXLAN Tunnel
Context
To allow VXLAN tunnel establishment using EVPN, configure an EVPN instance, establish a BGP EVPN peer relationship, and configure ingress replication.
Configure a BGP EVPN peer relationship. Configure VXLAN gateways to establish BGP EVPN peer relationships so that they can exchange EVPN routes. If an RR has been deployed, each VXLAN gateway only needs to establish a BGP EVPN peer relationship with the RR.
(Optional) Configure an RR. If you configure an RR, each VXLAN gateway only needs to establish a BGP EVPN peer relationship with the RR. The deployment of RRs reduces the number of BGP EVPN peer relationships to be established, simplifying configuration. A live-network device can be used as an RR, or a standalone RR can be deployed.
Configure an EVPN instance. EVPN instances are used to receive and advertise EVPN routes.
Configure ingress replication. After ingress replication is configured for a VNI, the system uses BGP EVPN to construct a list of remote VTEPs. After a VXLAN gateway receives BUM packets, its sends a copy of the BUM packets to every VXLAN gateway in the list.
(Optional) Configure subscription to the status of the exact route to a VXLAN tunnel destination. After this function is configured, a VXLAN tunnel is considered Up only if its source IP address and the destination IP address are reachable.
Procedure
- Configure a BGP EVPN peer relationship.
- (Optional) Configure an RR. If an RR is configured, each VXLAN gateway only needs to establish a BGP EVPN peer relationship with the RR, reducing the number of BGP EVPN peer relationships
to be established and simplifying configuration.
- Configure an EVPN instance.
- Create a bridge domain (BD) and bind it to an EVPN instance.
- Configure an ingress replication list.
- (Optional) Run vxlan tunnel-status track exact-route
Subscription to the status of the exact route to a VXLAN tunnel destination is enabled.
By default, subscription to the status of the exact route to a VXLAN tunnel destination is disabled.
By default, if the source IP address of a VXLAN tunnel is reachable using an exact route and the network segment where the destination IP address belongs is reachable using a route, this VXLAN tunnel is considered Up. In real-world networking, there may be multiple destination addresses on the same network segment. If the network segment is considered reachable because one of the destination addresses is reachable, the tunnel status is reported incorrectly when an IP address on this network segment becomes unreachable. As a result, network faults cannot be discovered in a timely manner. To address this issue, run the vxlan tunnel-status track exact-route command to enable subscription to the status of the exact route to a VXLAN tunnel destination. Subsequently, the VXLAN tunnel is considered Up only when the destination VTEP is reachable using an exact route.
Follow-up Procedure
Because of card differences, when the LE1D2S04SEC0 card, LE1D2X32SEC0 card, LE1D2H02QEC0 card, and X series cards function as access-side cards and the switch encapsulates received packets, VXLAN packets in the same tunnel have the same source IP address, source MAC address, destination IP address, and destination MAC address, and only their transport-layer source port numbers are changed. To prevent a Higig-Trunk on an MPU or SFU from unevenly load balancing inter-card VXLAN traffic, you need to configure the transport-layer source port number as a load balancing factor for the Higig-Trunk on the MPU or SFU to perform load balancing.
Run the load-distribution enhanced ip-field l4-sport command in the system view to configure a Higig-Trunk on an MPU or SFU to use the transport-layer source port number as a load balancing factor when performing load balancing.
This configuration takes effect for MPUs, SFUs, and the LE1D2S04SEC0 card, LE1D2X32SEC0 card, LE1D2H02QEC0 card, and X series cards on which the load balancing mode of a Higig-Trunk is enhanced mode. For details on how to configure enhanced load balancing mode for a Higig-Trunk on the LE1D2S04SEC0 card, LE1D2X32SEC0 card, LE1D2H02QEC0 card, and X series cards, see the load-distribution mode command.
You are advised to perform the preceding configuration on forwarding devices along the VXLAN tunnel. If VXLAN packets pass through an Eth-Trunk on a forwarding device, you are advised to run the load-balance command to set the load balancing mode of the Eth-Trunk to enhanced mode, and run the ipv4 field command to configure the transport-layer source port number of packets as a load balancing factor in the load balancing profile.
Configuring a Layer 3 VXLAN Gateway
Context
When distributed VXLAN gateways are deployed using BGP EVPN, Layer 3 VXLAN gateways must be configured to implement inter-subnet communication.
In distributed VXLAN gateway scenarios, inter-subnet communication between hosts requires Layer 3 forwarding. To allow this, Layer 3 VXLAN gateways must learn host routes. Perform the following operations on VXLAN gateways:
Configure a VPN instance whose routes can be installed into the routing table of the EVPN instance. This VPN instance is used to store host routes or network segment routes, differentiating tenants.
Bind the VPN instance to a Layer 3 VXLAN gateway, enable distributed gateway, and configure host route advertisement.
Configure the type of route to be advertised between VXLAN gateways. VXLAN gateways can send different routing information through different types of routes. If an RR is deployed on the network, only the type of route to be advertised between the RR and VXLAN gateways needs to be configured.
When configuring a VXLAN Layer 3 gateway, choose configuration steps according to the Overlay network IP layer protocol.
When the Overlay network is an IPv4 network, you can choose Configuration of VXLAN Layer 3 Gateway for an IPv4 overlay network.
When the Overlay network is an IPv6 network, you can choose Configuration of VXLAN Layer 3 Gateway for an IPv6 overlay network.
Follow-up Procedure
If a device uses an interface on the LE2D2X48SEC0 card as the tunnel-side interface, the device can decapsulate received VXLAN packets and forward them at Layer 3 only after a VXLAN loopback interface is configured. As a result, you need to configure an Eth-Trunk interface as the VXLAN loopback interface when the device functions as the Layer 3 VXLAN gateway. Perform the configuration as follows:
Run interface eth-trunk trunk-id
The Eth-Trunk interface view is displayed.
Run service type vxlan-tunnel
The Eth-Trunk interface is configured as a VXLAN loopback interface.
By default, an Eth-Trunk interface is not a VXLAN loopback interface.
Run trunkport interface-type interface-number
A physical interface is added to the Eth-Trunk interface.
After an Eth-Trunk is configured as a VXLAN loopback interface, STP is automatically disabled on the Eth-Trunk. The Eth-Trunk then does not support STP configuration commands. After the configuration is canceled, STP is automatically enabled on the Eth-Trunk.
Only one Eth-Trunk on a switch can be configured as the VXLAN loopback interface. VXLAN packets from all VBDIF interfaces are encapsulated and decapsulated by this loopback interface.
An Eth-Trunk containing member interfaces cannot be configured as a VXLAN loopback interface.
The configurations allowed on an Eth-Trunk to be configured as a loopback interface include description, enable snmp trap updown, jumboframe enable, mixed-rate link enable, qos car inbound, qos phb marking enable, set flow-stat interval, shutdown, local-preference enable, traffic-policy (interface view), and trust. If other configurations exist on the Eth-Trunk, the Eth-Trunk cannot be configured as a loopback interface.
After an Eth-Trunk is configured as a loopback interface, the Eth-Trunk supports only the following configurations: authentication open ucl-policy enable, description, enable snmp trap updown, jumboframe enable, mixed-rate link enable, qos car inbound, qos phb marking enable, set flow-stat interval, shutdown, local-preference enable, statistic enable (interface view), traffic-policy (interface view), vcmp disable, and trust.
Before running the undo service type vxlan-tunnel command, delete all the member interfaces of the Eth-Trunk interface and all VBDIF interfaces on the device.
Only interfaces on the X series, LE1D2S04SEC0, LE1D2X32SEC0, LE1D2H02QEC0, and LE2D2X48SEC0 cards can be added to a VXLAN loopback interface.
(Optional) Configuring Three-Segment VXLAN to Implement Layer 3 Interworking
Context
As shown in Figure 1-57, BGP EVPN must be configured to create VXLAN tunnels between distributed gateways in each campus and to create VXLAN tunnels between VTEP nodes so that the inter-subnet hosts in campus A and campus B can communicate with each other.
If a three-segment VXLAN is deployed, both devices that establish a BGP peer relationship between two campuses must regenerate the EVPN routes received within their local campus before advertising the EVPN routes to each other.
Procedure
- Run system-view
The system view is displayed.
- Run bgp as-number
The BGP view is displayed.
- Run l2vpn-family evpn
The BGP-EVPN address family view is displayed.
- Run peer ipv4-address import reoriginate
The function to re-originate routes received from BGP EVPN peers is enabled.
- Run peer ipv4-address advertise route-reoriginated evpn ip
The function to advertise re-originated EVPN routes to BGP EVPN peers is enabled.
After route re-origination is enabled, VTEP 2 or VTEP 3 changes the next hop of a received EVPN route to itself, replaces the router MAC address in the gateway MAC address attribute with its own router MAC address, and replaces the Layer 3 VNI with the VPN instance Layer 3 VNI.
(Optional) Configuring ARP Broadcast Suppression
Context
After you enable ARP broadcast suppression on a Layer 2 VXLAN gateway, configure Border Gateway Protocol Ethernet Virtual Private Network (BGP EVPN) on Layer 2 and Layer 3 VXLAN gateways to allow ARP broadcast suppression to take effect. BGP EVPN can then generate host information based on learned ARP entries and advertise the host information to Layer 2 VXLAN gateways. After the Layer 2 VXLAN gateways receive ARP broadcast packets, they convert the ARP broadcast packets into unicast packets based on the learned host information before forwarding the packets out. This decreases the number of broadcast packets in a BD, improving network performance.
Procedure
- Configure BGP EVPN on Layer 2 and Layer 3 VXLAN gateways to advertise host information.
Run system-view
The system view is displayed.
Run bgp as-number
The BGP view is displayed.
Run l2vpn-family evpn
The BGP-EVPN address family view is displayed.
By default, the BGP-EVPN address family view is disabled.
By default, a device does not advertise ARP or IRB routes to a BGP EVPN peer. Configure advertisement of ARP or IRB routes to implement ARP broadcast suppression. The following two configurations cannot coexist.
Run peer ipv4-address advertise arp
ARB route advertisement is configured.
Run peer ipv4-address advertise irb
IRB route advertisement is configured.
- Enable BGP EVPN on a Layer 3 VXLAN gateway to collect host information.
Run system-view
The system view is displayed.
Run interface vbdif bd-id
The VBDIF interface view is displayed.
Run arp collect host enable
BGP EVPN is enabled to collect host information.
By default, BGP EVPN is disabled from collecting host information.
- Enable ARP broadcast suppression on a Layer 2 VXLAN gateway.
Run system-view
The system view is displayed.
Run bridge-domain bd-id
The BD view is displayed.
Run arp broadcast-suppress [ mismatch-discard ] enable
ARP broadcast suppression is enabled.
By default, ARP broadcast suppression is disabled.
(Optional) Configuring NS Multicast Suppression
Context
On an IPv6 overlay network, IPv6 host neighbor discovery is implemented through NS multicast. When a gateway receives an NS message for IPv6 address resolution, it forwards the message in a multicast way in its BD. If the number of received NS messages within a period is large and all of them need to be forwarded, too many VXLAN network resources will be consumed, affecting proper service running. To address this issue, NS multicast suppression needs to be implemented. After this function is enabled, when receiving an NS message, the gateway checks whether it can obtain the destination user information in the NS message. If the gateway can obtain the destination user information, it performs multicast-to-unicast processing to reduce or suppress NS message flooding.
Procedure
- Configure BGP EVPN on Layer 2 and Layer 3 VXLAN gateways to advertise host information.
Run system-view
The system view is displayed.
Run bgp as-number
The BGP view is displayed.
Run l2vpn-family evpn
The BGP-EVPN address family view is displayed.
By default, the BGP-EVPN address family view is disabled.
By default, a device does not advertise ND or IRBv6 routes to a BGP EVPN peer. Configure advertisement of ND or IRBv6 routes to implement NS multicast suppression. The following two configurations cannot coexist.
Run peer ipv4-address advertise nd
ND route advertisement is configured.
Run peer ipv4-address advertise irbv6
IRBv6 route advertisement is configured.
- Enable BGP EVPN on a Layer 3 VXLAN gateway to collect host IPv6 information.
Run system-view
The system view is displayed.
Run interface vbdif bd-id
The VBDIF interface view is displayed.
Run ipv6 nd collect host enable
BGP EVPN is enabled to collect host IPv6 information.
By default, BGP EVPN is disabled from collecting host IPv6 information.
- Enable NS multicast suppression on a Layer 2 VXLAN gateway.
Run system-view
The system view is displayed.
Run bridge-domain bd-id
The BD view is displayed.
Run ipv6 nd multicast-suppress [ mismatch-discard ] enable
NS multicast suppression is enabled.
By default, NS multicast suppression is disabled.
(Optional) Configuring Isolation on the Access Side
Context
In a virtual extensible LAN (VXLAN), users connected to the same bridge domain (BD) can directly communicate with each other. To isolate users in a BD on the access side, configure the isolation function on the access side.
This configuration only applies to the VXLAN access-side interfaces on LE1D2S04SEC0, LE1D2X32SEC0, LE1D2H02QEC0, and X series cards.
Procedure
- Run system-view
The system view is displayed.
- Run bridge-domain bd-id
The BD view is displayed.
- Run isolate enable
The isolation function in a BD on the access side is enabled.
By default, the isolation function in a BD on the access side is not configured.
- Run quit
Return to the system view.
- (Optional) When the user connected to a BD through a VLAN or a Layer 2 sub-interface needs to communicate with other users on the access side in the BD, configure the access-side mode of this VLAN or Layer 2 sub-interface to Hub.
- Configure the access-side mode of VLAN access to Hub.
Run vlan vlan-id
The VLAN view is displayed.
Run hub-mode enable
The access-side mode of the VLAN is set to hub.
- Configure the access-side mode of Layer 2 sub-interface access to Hub.
Run interface interface-type interface-number.subinterface-number mode l2
The Layer 2 sub-interface view is displayed.
Run hub-mode enable
The access-side mode of the Layer 2 sub-interface is set to hub.
- Configure the access-side mode of VLAN access to Hub.
(Optional) Configuring Unidirectional Isolation from the Access Side to the Tunnel Side
Context
On a VXLAN network, users in the same BD can directly communicate with each other. To isolate unidirectional traffic from the access side to the tunnel side in a BD, you can configure unidirectional isolation from the access side to the tunnel side.
This configuration only applies to the VXLAN access-side interfaces on LE1D2S04SEC0, LE1D2X32SEC0, LE1D2H02QEC0, and X series cards.
Procedure
- Run system-view
The system view is displayed.
- Run bridge-domain bd-id
The view of a created BD is displayed.
- Run isolate remote enable
Unidirectional isolation from the access side to the tunnel side is enabled in the BD.
By default, unidirectional isolation from the access side to the tunnel side is disabled in a BD.
(Optional) Configuring the Local Proxy ARP Function
Context
(Optional) Configuring the Routed Proxy ND Function
Context
On an IPv6 overlay network, if two hosts physically belong to different network segments and no gateway is configured, configure the routed proxy ND function on the VBDIF interface of the device that connects the two hosts, so as to ensure the communication between the two hosts.
Procedure
- Run system-view
The system view is displayed.
- Run interface vbdif bd-id
The VBDIF view is displayed.
- Run ipv6 enable
The IPv6 function is enabled on the interface.
By default, the IPv6 function is disabled on an interface.
- Run ipv6 nd proxy enable
The routed proxy ND function is enabled.
By default, the routed proxy ND function is disabled.
(Optional) Configuring the Local Proxy ND Function
Context
On an IPv6 overlay network, if two hosts belong to the same BD but they are isolated, to enable the hosts to communicate with each other, enable the local proxy ND function on VBDIF interfaces to implement interconnection.
Procedure
- Run system-view
The system view is displayed.
- Run interface vbdif bd-id
The VBDIF view is displayed.
- Run ipv6 enable
The IPv6 function is enabled on the interface.
By default, the IPv6 function is disabled on an interface.
- Run ipv6 nd proxy enable
The local proxy ND function is enabled.
By default, the local proxy ND function is disabled.
(Optional) Configuring Traffic Suppression in a BD
Context
To limit the rate of broadcast, multicast, or unknown unicast packets in a BD and prevent broadcast storm, configure traffic suppression for the packets as required.
It is recommended that you configure traffic suppression in a BD in VXLAN scenarios.
Procedure
- Run system-view
The system view is displayed.
- Run bridge-domain bd-id
A BD is created and the BD view is displayed.
- Configure traffic suppression in a BD. Run one or more of the following commands as required.
Run broadcast-suppression cir cir-value [ cbs cbs-value ]
Broadcast traffic suppression is enabled in a BD.
By default, broadcast traffic suppression is disabled in a BD.
Run multicast-suppression cir cir-value [ cbs cbs-value ]
Multicast traffic suppression is enabled in a BD.
By default, multicast traffic suppression is disabled in a BD.
Run unknown-unicast-suppression cir cir-value [ cbs cbs-value ]
Unknown unicast traffic suppression is enabled in a BD.
By default, unknown unicast traffic suppression is disabled in a BD.
The EA, EC, and ED series cards (except LE1D2S04SEC0, LE1D2X32SEC0, LE1D2H02QEC0, and LE2D2X48SEC0) do not support traffic suppression in a BD.
(Optional) Configuring a Static MAC Address Entry
Context
When the device creates a MAC address table by learning source MAC addresses, the device cannot distinguish packets from authorized and unauthorized users. This threatens network security. If an unauthorized user uses the MAC address of an authorized user as the source MAC address of attack packets and connects to another interface of the device, the device learns an incorrect MAC address entry. The device incorrectly forwards the packets to the unauthorized user. Actually, the packets should be forwarded to the authorized user. You can manually add a static MAC address entry to the MAC address tables on the VXLAN access side and tunnel side. The static MAC address entry binds the MAC address to a specified interface, which prevents unauthorized users from intercepting data of authorized users. In addition, a manually configured static MAC address entry improves the unicast packet forwarding efficiency and saves bandwidth.
Procedure
- Run system-view
The system view is displayed.
- Run mac-address static mac-address interface-type interface-number.subnum bridge-domain bd-id { default | untag | vid vlan-id1 [ ce-vid vlan-id2 ] }
A static MAC address entry is configured on a Layer 2 sub-interface on a VXLAN access-side interface.
Alternatively, run mac-address static mac-address interface-type interface-number bridge-domain bd-id vid vlan-id3
A VLAN-based static MAC address entry is configured on a VXLAN access-side interface.
Before you configure a static MAC address entry on a VXLAN access-side interface, the interface must be connected to the VXLAN network first. Parameters here must be the same as those configured to connect to the interface to the VXLAN network.
(Optional) Configuring a Static ARP Entry
Context
Static ARP entries are manually configured and maintained. They will not be aged out or overridden by dynamic ARP entries. You can configure static ARP entries on a Layer 3 VXLAN gateway to improve communication security. Static ARP entries enable the local device and a specified device to communicate with each other using only specified MAC addresses. Attackers cannot modify mappings between IP addresses and MAC addresses in static ARP entries.
Procedure
- Run system-view
The system view is displayed.
- Run arp static ip-address mac-address bridge-domain bd-id [ vid vlan-id1 [ cevid vlan-id2 ] ] interface interface-type interface-number.subnumer
A static VXLAN ARP entry is configured on a Layer 2 sub-interface on a VXLAN access-side interface.
Alternatively, run arp static ip-address mac-address bridge-domain bd-id [ vid vlan-id3 ] interface interface-type interface-number
A VLAN-based static VXLAN ARP entry is configured on a VXLAN access-side interface.
If a static ARP entry already exists, the new configuration cannot be delivered.
The specified ip-address must be in the same network segment as the outbound interface address in the ARP entry.
To specify the vid vlan-id and cevid vlan-id parameters, set the same encapsulation type as that on the interface first.
When you configure a static ARP entry on an interface of the card except the LE1D2S04SEC0, LE1D2X32SEC0, LE1D2H02QEC0, SA, and X series card, you must configure a static MAC address entry for the MAC address in the ARP entry. Otherwise, the switch will broadcast traffic from this MAC address.
(Optional) Configuring a Static IPv6 Neighbor Entry
Context
On a VXLAN, if a Layer 3 gateway on a VXLAN is not enabled to send ND protocol packets, run the ipv6 neighbor command to configure a static IPv6 neighbor entry. To filter out invalid ND protocol packets, you can also run this command to bind the destination IPv6 addresses of these packets to nonexistent MAC addresses.
Procedure
- Run system-view
The system view is displayed.
- Run interface vbdif bd-id
A VBDIF interface is created, and the VBDIF interface view is displayed.
By default, no VBDIF interface is created.
- Run ipv6 enable
The IPv6 function is enabled on the interface.
By default, the IPv6 function is disabled on an interface.
- Run ipv6 neighbor ipv6-address mac-address { vid vlan-id1 [ cevid vlan-id2 ] } interface interface-type interface-num.subnum
A static IPv6 neighbor entry is configured on a Layer 2 sub-interface on a VXLAN access-side interface.
Alternatively, run ipv6 neighbor ipv6-address mac-address vid vlan-id3 interface interface-type interface-num
A VLAN-based static IPv6 neighbor entry is configured on a VXLAN access-side interface.
(Optional) Enabling User Host Information Update Triggered by a MAC Address Entry Change
Context
If user hosts migrate between different gateways in a distributed VXLAN gateway scenario and do not send gratuitous ARP or NA packets after the migration, you can configure user host information update triggered by a MAC address entry change to ensure that user hosts can successfully go online after the migration. After this function is configured, the switch can be triggered to send ARP or NS requests to update user host information by changes in the user hosts' MAC address entries on the switch before and after the migration.
Procedure
- Run system-view
The system view is displayed.
- Run interface vbdif bd-id
The VBDIF interface view is displayed.
- Run mac-address update host enable
User host information update triggered by a MAC address entry change is enabled.
By default, user host information update triggered by a MAC address entry change is disabled.
Verifying the VXLAN Configuration in Distributed Gateway Mode Using BGP EVPN
Prerequisites
All configurations related to VXLAN in distributed gateway mode (BGP EVPN) are completed.
If directly connected users exist in a centralized gateway deployment scenario, the VTEP address carried in Type 2 routes (MAC/IP routes) is the device's VTEP address, causing a route recursion failure. Therefore, check on route recursion results is not performed for Type 2 routes (MAC/IP routes), and the routes are marked as valid routes.
Procedure
- Run the display bridge-domain [ bd-id [ brief | verbose ] ] command to query the configuration of the bridge domain (BD).
- Run the display interface nve [ nve-number | main ] to query the status of the NVE interface.
- Run the display vxlan tunnel [ tunnel-id ] [ verbose ] command to query the information about the VXLAN tunnel.
- Run the display vxlan vni [ vni-id [ verbose ] ] command to query the VXLAN configuration of the VNI.
- Run the display vxlan peer [ vni vni-id ] command to query the IP address of the destination VTEP of the VNI.
- Run the display vxlan encapsulation interface interface-type interface-number [ bridge-domain bd-id | default | dot1q [ vid pe-vid ] | qinq [ vid vlan-vid [ ce-vid ce-vid ] ] | untag ] command to query the VXLAN encapsulation information about the Layer 2 sub-interface of the primary interface.
- Run the display evpn vpn-instance [ verbose ] [ evpn-instance-name ] command to query the information about the EVPN instance.
- Run the display bgp evpn peer [ ipv4-address verbose | verbose ] command to query the information about the BGP EVPN peer.
- Run the display interface vbdif [ bd-id ] command to query the status, configurations, and statistics about the VBDIF.
- Run the display arp broadcast-suppress user bridge-domain bd-id command to query the ARP broadcast suppression table of a specified BD.
- Run the display arp static command to query the static ARP entry that has been configured.
- Run the display mac-address static [ verbose ] command to query the static MAC address entry that has been configured.
- Run the display bgp evpn all routing-table [ inclusive-route [ inclusive-route ] | mac-route [ mac-route ] | prefix-route [ prefix-route ] ] command or the display bgp evpn route-distinguisher route-distinguisher routing-table { inclusive-route [ inclusive-route ] | mac-route [ mac-route ] | prefix-route [ prefix-route ] } command to query the information about the EVPN route.
- Run the display bgp evpn all routing-table statistics command to query the statistics about the EVPN route.
- Configuring Deployment Mode for VXLAN Access Service
- Configuring a VXLAN Tunnel
- Configuring a Layer 3 VXLAN Gateway
- (Optional) Configuring Three-Segment VXLAN to Implement Layer 3 Interworking
- (Optional) Configuring ARP Broadcast Suppression
- (Optional) Configuring NS Multicast Suppression
- (Optional) Configuring Isolation on the Access Side
- (Optional) Configuring Unidirectional Isolation from the Access Side to the Tunnel Side
- (Optional) Configuring the Local Proxy ARP Function
- (Optional) Configuring the Routed Proxy ND Function
- (Optional) Configuring the Local Proxy ND Function
- (Optional) Configuring Traffic Suppression in a BD
- (Optional) Configuring a Static MAC Address Entry
- (Optional) Configuring a Static ARP Entry
- (Optional) Configuring a Static IPv6 Neighbor Entry
- (Optional) Enabling User Host Information Update Triggered by a MAC Address Entry Change
- Verifying the VXLAN Configuration in Distributed Gateway Mode Using BGP EVPN