VxLAN BGP Evpn
VxLAN BGP Evpn
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda
• Introduction
• VXLAN / EVPN Technology
• NX-OS Standalone Programmability
• Data Center Network Manager
• Application Centric Infrastructure (ACI)
• ACI Programmability
• Conclusion
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
• 08:30 – 10:30 (2 hours)
• 10:30 – 10:45 (Break)
Coffee and Lunch • 10:45 – 12:45 (2 hours)
Breaks • 12:45 – 14:30 (Lunch)
• 14:30 – 16:30 (2 hours)
• 16:30 – 16:45 (Break)
• 16:45 – 18:45 (2 hours)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Thomas Scheibe
Product Management
Introduction
How to Build the Network for the Cloud?
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Designing Networks is Easy …
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Network Perspective Application Perspective
Connectivity, Infrastructure Endpoints, Compute & Storage Tiers
Automation
Security Perspective
Segmentation
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Workload Context is Key
ACTIVATION ANALYTICS
On-Premise
IT Intent
Lifecycle
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Segmentation
Macro, Micro, Nano, Context Aware
3. Mapping of domains/
tenants
Public & Private cloud Bare metal Virtual Container Fabrics Traditional network
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Abstraction to Capture Intent
Network, Application and Security
Profile
EPG EPG EPG
Consumer/ Consumer/
Provider Contracts Provider Contracts
EPG (End Point Group) = Security Zone, App Tier, Physical Location, ..
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Insights & Assurance
From Re-active to Pro-active
Process Compliance
inventory Checks
Application Connectivity
insight Analysis
Network Network
insights Verification
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Nexus Cloud Scale Foundation
Visibility Security
• FlowTable and Event • L2 (MACSec) and L3
triggered export (CloudSEC) Encryption
• Streaming data plane at line rate
statistics • Secure flow export
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Performance & Cost
Leverage Latest ASIC Technology
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Road to 400G+
Optics
50/400G 100/400G
10/40G 100G QSFP
QSFP DD QSFP DD
Switch
ASIC Technology
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Pluggable Multispeed Interfaces
SFP QSFP
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Re-Use Cabling for 10/40/100G 40/100G BiDi
Shipping
With “2 Fiber” Optics
Examples
2 fiber MMF: BiDi
SMF: LR4, SM-SR
LC connector
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
QSFP DD – Avoiding the Sins of the Past
Lessons from the Past
1G 10/25G or 40G 100G transitions resulted in same high volume form factor being adopted. Why?
X2 CPAK
CFP2
o System & network requirements do not change. Same port density per RU to maintain proven fabric designs
o Limited impact on system ecosystem – strong leverage
o Multi-speed switch port options – slower optics in higher speed ports
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Evolving Network Designs Routed Fabric
Traditional 3 Tier
VXLAN Bridging / Routing
DC Network Design
• VXLAN Flood & Learn
• VXLAN EVPN
• Separate Management Tools
(e.g. Nexus Fabric Manager)
DC Core
DC
PODs ACI
APIC • VXLAN Routing
• Policy Controller (APIC)
• Consistent policy across physical
VPC in Access
and virtual network
Routed Aggregation & Core
• Multi-hypervisor (VMware,
MSFT, OVS)
• Endpoint agnostic (bare metal,
VM, container)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
API
Network Stack
Orchestration/ Policy
Multi Site
Federation
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Brenden Buresh
VXLAN / EVPN Principal SE
Technology
VXLAN Introduction
Data Center “Fabric” Journey (Standalone)
Layer-3 HSRP HSRP
Layer-2
Spanning-Tree
Baremet al Hypervisor Hypervisor Hypervisor Baremet al Hypervisor Baremet al Baremet al Hypervisor Hypervisor
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Overlay Based Data Center: Edge Devices
Network Overlays Host Overlays
Overlay Overlay
VTEP VTEP VTEP VTEP - - - -
Hybrid Overlays
VTEP VTEP VTEP VTEP
Baremetal Baremetal Baremetal Baremetal Hypervisor Hypervisor Hypervisor Hypervisor
• Router/Switch End-Points
Overlay • Virtual End-Points only
• Protocols for Resiliency/Loops
• Single Admin Domain
• Traditional VPNs
• VXLAN, NVGRE, STT
•
- - VTEP VTEP
VXLAN, OTV, VPLS, LISP, FP
VTEP VTEP
Hypervisor Hypervisor Baremetal Baremetal
Overlay Services
• Layer-2 Underlay Transport
Tunnel Encapsulation
• Layer-3 Network
• Layer-2 and Layer-3
Data-Plane
Control-Plane
• Overlay Layer-2/Layer-3 Unicast Traffic
• Peer-Discovery
• Overlay Broadcast, Unknown Unicast,
• Route Learning and Distribution
• Local Learning
Multicast traffic (BUM traffic) forwarding
• Ingress Replication (Unicast)
• Remote Learning
• Multicast
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Overlay Taxonomy - Underlay
Layer-3
Interface Spine Spine Spine Spine
Peering
Underlay
Edge Device Leaf Leaf Leaf Leaf Leaf Leaf Leaf
LAN
Segment
Virtual
Server Physical
Server
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Overlay Taxonomy - Overlay
Tunnel Encapsulation
Spine
(VNI Namespace)
Spine Spine Spine
Overlay
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
LAN
Segment
Virtual
Server Physical
Server VTEP: VXLAN Tunnel End-Point
VNI/VNID: VXLAN Network Identifier
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Introducing VXLAN
Data-Plane
Outer MAC Outer IP UDP VXLAN Inner MAC Inner IP Payload CRC
(VXLAN)
14-byte + 20-byte +8-byte + 8-byte* = 50 Bytes
of total overhead UDP Src Port
Hash of L2/L3/L4
headers of
original Frame
(4 Bytes Optional)
Src. MAC Address Next-Hop MAC Address 48
8 Bytes
Destination Port 4789 (UDP) 16
14 Bytes
VLAN Type 0x8100 16 UDP Length 16
VLAN ID Tag 16 Checksum 0x0000 16
Ether Type 0x0800 16
Outer UD VXLA CR
Outer IP Inner MAC Payload
MAC P N C
8 Bytes
Reserved 24
Header Checksum Various 16
VNI 16M Possible Segments 24
Source IP Src, VTEP IP 32
Reserved 8
Destination IP Dest. VTEP IP 32
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
No Path Diversity
Spine
• Equal Cost Multi-Pathing (ECMP)
uses Header information to form
Path Diversity
Leaf
• Some Tunnel Protocol provide no
Leaf
101010110101010
10101010
Baremetal
AS#65500 diversity in IP or Protocol Header Baremetal
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Introducing VXLAN – Entropy
Spine
• VXLAN provides variable UDP
Source Port in Outer Header
• Hash of the inner Layer-2/Layer-
VTEP VTEP
101010110101010
10101010
Baremetal
AS#65500 3/Layer-4 Headers of the original Baremetal
Ethernet Frame.
• Enables entropy for ECMP Load
Spine
balancing in the Network
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Introducing VXLAN – Entropy
Spine
VTEP VTEP
AS#65500
Entropy Spine
happens here
Outer MAC Outer IP UDP VXLAN Inner MAC Inner IP Payload CRC
Data-Plane (VXLAN)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
A Scale Out Architecture
• Spines
• Wide vs. Big
Leaf Leaf Leaf Leaf Leaf Leaf Leaf
• Uplinks
• Symmetric to all Spines or Pods
More Leaf – More Ports – More Capacity
• SAYG: Scale as You Grow
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Folded Clos Topology – Device Roles
• Spine
• Interconnecting Leafs and Border
Leafs Spine Spine Spine Spine
• Leaf (VTEP)
• Virtual Machines
• Physical Machines
•
Leaf Leaf Leaf Leaf Leaf Leaf Leaf
FEXes
• 3rd Party Switches
• UCS FIs
• Blade Switches WAN
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Folded Clos Topology – Device Roles
• Border Spine WAN
• Interconnecting Leafs and Border
Leafs Spine Spine Spine Spine
• External Connectivity
• Leaf (VTEP)
• Virtual Machines
• Physical Machines Leaf Leaf Leaf Leaf Leaf Leaf Leaf
• FEXes
• 3rd Party Switches
• UCS FIs
• Blade Switches
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
The Super-Spine
SuperSpine
• Scale Out
SuperSpine SuperSpine
POD 1 POD 2
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
VXLAN Gateway Types
Egress packet is IEEE 802.1q
Ingress VXLAN packet tagged interface. packet is
on RED segment VTEP BRIDGED to new VLAN
• VXLAN-to-VLAN Routing
• (Layer-3 Gateway)
VXLAN Router
• VXLAN-to-VXLAN Routing
• (Layer-3 Gateway)
VXLAN Router
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
EVPN Deep Dive
What is VXLAN and EVPN ?
• EVPN
• VXLAN
• Standards based Control-Plane
• Standards based Encapsulation
• RFC 7432
• RFC 7348
• Uses Multiprotocol BGP
• Uses UDP-Encapsulation
• Uses Various Data-Planes
• Transport Independent
• VXLAN (EVPN-Overlay), MPLS,
• Layer-3 Transport (Underlay)
Provider Backbone (PBB)
• Flexible Namespace
• Many Use-Cases Covered
• 24-bit field (VNID) provides ~16M
• Bridging, MAC Mobility, First-Hop
unique identifier
& Prefix Routing, Multi-Tenancy
• Allows Segmentation
(VPN)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Introducing Ethernet VPN (EVPN)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
VXLAN and EVPN Related RFCs & Drafts (IETF)
ID Title Category
RFC 7348 Virtual Extensible Local Area Network Data Plane
draft-ietf-bess-l2vpn-evpn-prefix-
IP Prefix Advertisement in E-VPN Control Plane
advertisement
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
EVPN Layer-2 Services (1)
Single Subnet per EVI Multiple Subnets per EVI
• VLAN-based • VLAN-aware
• Per EVI BGP Route Distinguisher / Router Target per EVI / VNI
• BGP Route-Target constrain mechanism to limit propagation (import/export)
VID = VLAN ID
VNI = VXLAN Network Identifier
EVI = EVPN Virtual Instance TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
EVPN Layer-2 Services (1a)
(draft-ietf-bess-evpn-overlay – Section 5.1.2)
• VLAN-based
VID
10 VNI EVI
VID = VLAN ID
VNI = VXLAN Network Identifier
EVI = EVPN Virtual Instance TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
EVPN Layer-2 Services (1a)
(draft-ietf-bess-evpn-overlay – Section 5.1.2)
• VLAN-based
VID
10 VNI EVI
VID = VLAN ID
VNI = VXLAN Network Identifier
EVI = EVPN Virtual Instance TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
EVPN Layer-2 Services (1b)
(draft-ietf-bess-evpn-overlay – Section 6.1)
• VLAN-based
[2]:[0]:[0]:[48]:[0050.569f.d495]:[32]:[192.168.22.33]
VID
10 VNI EVI
VID = VLAN ID
VNI = VXLAN Network Identifier
EVI = EVPN Virtual Instance © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
EVPN Layer-2 Services (1b)
(draft-ietf-bess-evpn-overlay – Section 6.1)
• VLAN-based
[2]:[0]:[0]:[48]:[0050.569f.d495]:[32]:[192.168.22.33]
VID
10 VNI EVI
VID = VLAN ID
VNI = VXLAN Network Identifier
EVI = EVPN Virtual Instance © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
EVPN Layer-2 Services (1c)
(RFC 7432 – Section 6.3)
• VLAN-based • VLAN-aware
[2]:[0]:[0]:[48]:[0050.569f.d495]:[32]:[192.168.22.33]
VID
10
VID
VNI EVI VNI EVI
VID
10 20
VID
30
[2]:[0]:[20]:[48]:[0050.569f.d495]:[32]:[192.168.22.33]
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
EVPN IP-VRF Services (2)
Interface-Less Model Interface-Full Model (2 Modes)
• Route-Type 5 only • Core-facing IRB
• Next-Hop is remote VTEP • Unnumbered Core-facing IRB
(Optional)
• Two extended communities
• Encapsulation Extended Community • Route-Type 5
• Router’s MAC Address (remote VTEP) • Next-Hop is remote IRB
• One or two extended communities
• Encapsulation Extended Community
• Router’s MAC Address (remote VTEP)
• Route-Type 2
• Containing Router MAC or MAC/IP
• Interface-Less
VTEP VTEP
[5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0]
BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN)
Router MAC:0200.0ade.de22
TECDCN-2002
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
EVPN IP-VRF Services (2a)
(draft-ietf-bess-evpn-prefix-advertisement – Section 5.4.1)
• Interface-Less
VTEP VTEP
[5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0]
BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN)
Router MAC:0200.0ade.de22
TECDCN-2002
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
EVPN IP-VRF Services (2b)
(draft-ietf-bess-evpn-prefix-advertisement – Section 5.4.2)
[5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0] [5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0]
BGP 10.22.22.34 (Next-Hop) BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN) Update Encap:8 (VXLAN)
Router MAC:0200.0ade.de22 Router MAC:0200.0ade.de22
[2]:[0]:[0]:[48]:[0200.0ade.de22]:[32]:[10.22.22.34]
BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN)
Router MAC:0200.0ade.de22
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
EVPN IP-VRF Services (2b)
(draft-ietf-bess-evpn-prefix-advertisement – Section 5.4.2)
[5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0] [5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0]
BGP 10.22.22.34 (Next-Hop) BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN) Update Encap:8 (VXLAN)
Router MAC:0200.0ade.de22 Router MAC:0200.0ade.de22
[2]:[0]:[0]:[48]:[0200.0ade.de22]:[32]:[10.22.22.34]
BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN)
Router MAC:0200.0ade.de22
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
EVPN IP-VRF Services (2c)
(draft-ietf-bess-evpn-prefix-advertisement – Section 5.4.3)
• Interface-Less • Interface-Full
(Unnumbered Core-facing IRB)
[5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0] [5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0]
BGP 10.22.22.34 (Next-Hop) BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN) Update Encap:8 (VXLAN)
Router MAC:0200.0ade.de22 Router MAC:0200.0ade.de22
[2]:[0]:[0]:[48]:[0200.0ade.de22]:[0]:[0.0.0.0]
BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
EVPN IP-VRF Services (2c)
(draft-ietf-bess-evpn-prefix-advertisement – Section 5.4.3)
• Interface-Less • Interface-Full
(Unnumbered Core-facing IRB)
[5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0] [5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0]
BGP 10.22.22.34 (Next-Hop) BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN) Update Encap:8 (VXLAN)
Router MAC:0200.0ade.de22 Router MAC:0200.0ade.de22
[2]:[0]:[0]:[48]:[0200.0ade.de22]:[0]:[0.0.0.0]
BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
EVPN IRB Services (3)
V1 V2 V1 V2
MA MA
MAC IP IP MAC MAC IP IP MAC
C C
Bridge Bridge
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
EVPN IRB Services (3b)
(draft-ietf-bess-evpn-inter-subnet-forwarding – Section 4 and 5)
MA MA MA MA
IP IP IP IP
C C C C
Bridge -> Route -> Route -> Bridge Bridge -> Route -> Bridge
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
EVPN IRB Services (3c)
(draft-ietf-bess-evpn-inter-subnet-forwarding – Section 5.1)
• Symmetric IRB
VNI 50000 (L3VNI)
V1 V2
MA MA
IP IP
C C
192.168.22.33 192.168.33.44
[5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0]
BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN)
Router MAC:0200.0ade.de22
TECDCN-2002
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
EVPN IRB Services (3c)
(draft-ietf-bess-evpn-inter-subnet-forwarding – Section 5.1)
• Symmetric IRB
VNI 50000 (L3VNI)
V1 V2
MA MA
IP IP
C C
192.168.22.33 192.168.33.44
[5]:[0]:[0]:[24]:[192.168.22.0]:[0.0.0.0]
BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN)
Router MAC:0200.0ade.de22
TECDCN-2002
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
EVPN IRB Services (3d)
(draft-ietf-bess-evpn-inter-subnet-forwarding – Section 4.1)
• Symmetric IRB • Asymmetric IRB
VNI 50000 (L3VNI) VNI 40000 (L2VNI)
MA MA MA MA
IP IP IP IP
C C C C
[2]:[0]:[0]:[48]:[0200.0ade.de22]:[32]:[10.22.22.34]
BGP 10.22.22.34 (Next-Hop)
Update Encap:8 (VXLAN)
Router MAC:0200.0ade.de22
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
EVPN IRB Services (3e)
• Symmetric IRB and Asymmetric IRB is NOT interoperable per-se
• Routing is implemented different
• Symmetric IRB: Bridge -> Route -> Route -> Bridge
• Asymmetric IRB: Bridge -> Route -> Bridge
• Symmetric IRB uses Route-Type 2 with two VNI
• L3VNI for routing and L2VNI for bridging
• Asymmetric IRB uses Route-Type2 and Route-Type 5
• Type 2 with L2VNI for bridging and inter-subnet forwarding (known VNI/VTEP)
• Type 5 with L3VNI for inter-subnet forwarding (see IP-VRF Services)
• If implemented
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Conclusions - Cisco’s EVPN Implementation
• VLAN-based • VLAN-aware
• VLAN to VNI to EVI • Multiple VLAN to VNI to EVI
• More granular control (route-target) • No true MAC separation (potential)
• Interface-Less • Interface-Full
• Follows classic routing • Additional overhead (2 routes and additional
lookup)
• No need for MAC routes in routing
• Asymmetric IRB
• Symmetric IRB • Extensive usage of Adjacency Tables
• Adjacency Tables are preserved • More Centralized Gateway-like
• Configuration is flexible • “Consistent” configuration necessary if Distributed
Gateway is required
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
EVPN Operations
EVPN - Host and Subnet Route Distribution
• Host Route Distribution
RR RR decoupled from the Underlay
Spine Spine Spine Spine
protocol
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
EVPN Control Plane - Host and Subnet Routes
• BGP EVPN NLRI*
22 0000.3001.1101 // 48
0000.3001.1101 48 3001, 65500:3001 10.200.200.101
Spine Spine Spine Spine
22 0000.3001.1102 // 48
0000.3001.1102 48 3001, 65500:3001 10.200.200.104
Advertised path-id 1
Next-Hop
IP Address
Path type: internal, path
L2VNIis valid, is best path, no labeled nexthop
AS-Path: NONE, path(MPLS
sourced internal to AS
Label1)
10.200.200.101 (metric 3) fromL2VNI
10.10.10.201 (10.10.10.201)
Encap:8
Route Target
Origin IGP, MED not set, localpref 100, weight 0
VXLAN
Received label 3001
Extcommunity: RT:65500:3001 ENCAP:8
Originator: 10.10.10.101 Cluster list: 10.10.10.201
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Host Advertisements
Type MAC / Length L2VNI / RT IP / Length L3VNI / RT Next-Hop Seq.
2 0000.3001.1101 / 48
Spine Spine
3001, 65500:3001
Spine Spine
192.168.10.101 /32 • Host MAC+IP
5000, 65500:5000 10.200.200.101(Route Type 2)
• MAC and IP
2 0000.3001.1102 / 48 3001, 65500:3001 192.168.10.102 /32 5000, 65500:5000 10.200.200.104
• MPLS Label1 (L2VNI)
2 0000.3002.2101 / 48
Overlay 3002, 65500:3002 192.168.20.101 /32 • Route
5000, 65500:5000 Target for MAC-VRF
10.200.200.107
Advertised path-id 1
Next-Hop L3VNI
IP Address
Path type: internal,L2VNI
path is (MPLS
valid, is best path, no labeled nexthop
Label2)
AS-Path: NONE, path
(MPLSsourced
Label1) internal to AS
10.200.200.101 (metric 3) from 10.10.10.201 (10.10.10.201)
Encap:8
Origin IGP, MED not set, localpref 100, weight 0 VXLAN
Received label 3001 5000
Extcommunity: RT:65500:3001 RT:65500:5000 ENCAP:8 Router MAC:0200.0ade.de01
Originator: 10.10.10.101 Cluster list: 10.10.10.201
L2VNI L3VNI
Route Target Router MAC
Route Target
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Subnet Route Advertisements
Type IP / Length L3VNI / RT Next-Hop Seq.
Router MAC
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Subnet Route Advertisements
Type IP // Length
IP Length L3VNI // RT
L3VNI RT Next-Hop Seq.
5 192.168.10.0 /24
192.168.10.0
Spine
/24
Spine
5000, 65500:5000
5000, 65500:5000
Spine Spine
10.200.200.101 • IP Prefix Learning
5 192.168.10.0 /24
192.168.10.0 /24 5000, 65500:5000
5000, 65500:5000 10.200.200.104
• via BGP with VRF-Lite
• via LISP on Nexus 7000/7700
5 192.168.20.0 /24
Overlay 5000, 65500:5000 10.200.200.107 • via other routing protocol (static
or dynamic)
Leaf Leaf Leaf Leaf Leaf Leaf Leaf
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Ethernet Tag
Ethernet Identifier
Segment
V2# show bgp l2vpn evpn 192.168.10.0 (Ethtag)
Identifier (ESI) IP Address
Route Type: IP Address
Length family
BGP routing table information
IP Prefix for VRF default, address L2VPN EVPN
Route Distinguisher: 10.10.10.101:3
BGP routing table entry for [5]:[0]:[0]:[24]:[192.168.10.101]/224,
version 4
Paths: (1 available, best #1)
Flags: (0x000202) on xmit-list, is not in l2rib/evpn, is locked
Advertised path-id 1
Next-Hop
IP Address
Path type: internal, path
L3VNIis valid, is best path, no labeled nexthop
AS-Path: NONE, path (MPLS
sourced internal to AS
Label)
10.200.200.101 (metric 3) from L3VNI
10.10.10.201 (10.10.10.201)
Encap:8
Origin IGP, MED not set, localpref 100, weight 0 Router MAC
Route Target VXLAN
Received label 5000
Extcommunity: RT:65500:5000 ENCAP:8 Router MAC:0200.0ade.de01
Originator: 10.10.10.101 Cluster list: 10.10.10.201
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
VXLAN and BGP EVPN – Putting it Together
Control-Plane (BGP EVPN)
Type MAC / Length L2VNI / RT IP / Length L3VNI / RT Next-Hop Seq.
3001 5000
2 0000.3001.1101/48 192.168.10.101/32 10.200.200.101
65500:3001 65500:5000
Outer MAC Outer IP UDP VXLAN Inner MAC Inner IP Payload CRC
Data-Plane (VXLAN)
Bridging
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
VXLAN and BGP EVPN – Putting it Together
Control-Plane (BGP EVPN)
Type MAC / Length L2VNI / RT IP / Length L3VNI / RT Next-Hop Seq.
3001 5000
2 0000.3001.1101/48 192.168.10.101/32 10.200.200.101
65500:3001 65500:5000
Outer MAC Outer IP UDP VXLAN Inner MAC Inner IP Payload CRC
Data-Plane (VXLAN)
Routing
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Routing and the Router MAC – Ethernet
Router MAC
Switch Switch
SVI10 SVI20
192.168.10.1 192.168.20.1
Host A Host C
MAC: 0000.3001.1101 MAC: 0000.3002.2101
IP: 192.168.10.101 IP: 192.168.20.101
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Routing and the Router MAC – VXLAN
Router MAC
SVI10 SVI20
192.168.10.1 VTEP
VXLAN VTEP 192.168.20.1
Host A Host C
MAC: 0000.3001.1101 MAC: 0000.3002.2101
IP: 192.168.10.101 IP: 192.168.20.101
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Packet Walk – ARP Request
Host A
MAC: 0000.3001.1101
IP: 192.168.10.101
ARP Request for 192.168.10.102 Spine
Spine
TOR3 TOR4
VLAN 101 (Green)
Leaf Leaf
Host
Host B
MAC: 0000.3001.1102
VXLAN EVPN
SMAC: DMAC:
Host C
0000.3001.1101 FFFF.FFFF.FFFF MAC: 0000.3002.2101
IP: 192.168.20.101
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Packet Walk – ARP Response
Host A
MAC: 0000.3001.1101
IP: 192.168.10.101
ARP Response for 192.168.10.102 Spine
SMAC: DMAC:
0000.3001.1102 0000.3001.1101
SIP DIP VXLAN SMAC DMAC
ARP Response for
192.168.10.102
10.200.200.103 10.200.200.101 30001 0000.3001.1102 0000.3001.1101
Spine
TOR3 TOR4
VLAN 101 (Green)
Leaf Leaf
Host
Host B
MAC: 0000.3001.1102
VXLAN EVPN
SMAC: DMAC:
Host C
0000.3001.1102 0000.3001.1101 MAC: 0000.3002.2101
IP: 192.168.20.101
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Packet Walk – Bridging
Host A
MAC: 0000.3001.1101
IP: 192.168.10.101
Spine
SMAC DMAC SIP DIP
TOR3 TOR4
VLAN 101 (Green)
Leaf Leaf
Host
Host B
MAC: 0000.3001.1102
VXLAN EVPN
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Packet Walk – Routing
Host A
MAC: 0000.3001.1101
IP: 192.168.10.101
SMAC DMAC SIP DIP Spine
TOR3 TOR4
SMAC DMAC SIP DIP
VLAN 101 (Green)
Leaf Leaf
2020.0000.AAAA 0000.3002.2101 192.168.10.101 192.168.20.101
Host
Host B
MAC: 0000.3001.1102
VXLAN EVPN
Host C
MAC: 0000.3002.2101
IP: 192.168.20.101
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Packet Walk – Routing (Silent Host)
10.200.200.101
TOR1
10.200.200.102 50001 0200.0ade.de01 0200.0ade.de07
TOR2
192.168.10.101 192.168.20.101
Payload
Host
Leaf Leaf
Host A
MAC: 0000.3001.1101
IP: 192.168.10.101
Spine
Spine
TOR3 TOR4
VLAN 101 (Green)
Leaf Leaf
Host
Host B
MAC: 0000.3001.1102
VXLAN EVPN
Host C
MAC: 0000.3002.2101
IP: 192.168.20.101
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Packet Walk – Routing (Silent Host)
Host A
MAC: 0000.3001.1101
IP: 192.168.10.101
Spine
Spine
TOR3 TOR4
VLAN 101 (Green)
Leaf Leaf
ARP Request for 192.168.20.101
Host
SMAC: DMAC:
AGM FFFF.FFFF.FFFF
Host B
MAC: 0000.3001.1102
VXLAN EVPN
Host C
MAC: 0000.3002.2101
IP: 192.168.20.101
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Packet Walk – Routing (Silent Host)
Host A
MAC: 0000.3001.1101
IP: 192.168.10.101
Spine
TOR3 TOR4
VLAN 101 (Green)
Leaf Leaf
Host
Host B
MAC: 0000.3001.1102
VXLAN EVPN
Host C
ARP Response for 192.168.20.101MAC: 0000.3002.2101
IP: 192.168.20.101
SMAC: DMAC:
0000.3002.2102 AGM
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
VXLAN Design
Considerations
Underlay Design Review
MTU and Overlays
•
•
•
•
*Cisco Nexus 5600 only supports a MTU of 9192 Byte for Layer-3 Traffic
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Interface Principles
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
IP Addressing Principles
Routing
Identifier Rendezvous
Point
• p2p* Links / IP
Unnumbered
• Spine Spine Spine Spine
•
Leaf Leaf Leaf Leaf Leaf Leaf Leaf
• VTEP
Routing
• Loopback Identifier
•
•
• •
• •
•
• •
•
• •
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Unicast Routing – BGP
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Unicast Routing – eBGP Two-AS Model
All-Spine AS#65500
Spine Spine Spine Spine •
•
•
All-Leaf AS#65501 •
•
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Unicast Routing – eBGP Multi-AS Model
All-Spine AS#65500 •
•
Spine Spine Spine Spine
•
Leaf Leaf Leaf Leaf Leaf Leaf Leaf
•
•
•
•
•
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Unicast Routing – eBGP Model
•
•
•
•
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Multicast Enabled Underlay – PIM ASM
• Platform Support
• Nexus 9000 / Nexus 7000 (F3/M3)
• ASR 1000 / ASR 9000
Underlay
• RP Redundancy Leaf Leaf Leaf Leaf Leaf Leaf Leaf
• Source-Trees (Unidirectional)
• 1 Source Tree per VTEP per
Multicast Group
Hypervisor Baremetal Hypervisor Hypervisor Baremetal Hypervisor Baremetal Baremetal
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Underlay – PIM ASM with PIM Anycast-RP
RP RP
Spine Spine Spine Spine
S,G S,G
S,G S,G
Underlay S,G
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Why Do I Need Multicast Again?
Destination Group
239.1.1.1
Spine (0100.5E01.0101)
Spine Spine Spine
3
MAC VNI VTEP MAC VNI VTEP
0000.3001.1101 30001 E1/12
Overlay
3 0000.3002.2101 30002 E1/4
2
SMAC:
VTEP
MAC_LEAF1
VTEP VTEP VTEP VTEP VTEP VTEP
ARP Request for 192.168.10.102
DMAC: 0100.5E01.0101
Underlay
Src MAC: 0000.3001.1101
Dst MAC: FFFF.FFFF.FFFF SIP: IP_LEAF1
DIP: 239.1.1.1 ARP Request for 192.168.10.102
1 4 Src MAC: 0000.3001.1101
UDP Dst MAC: FFFF.FFFF.FFFF
ARP Request
Baremetal Baremetal 0000.3001.1102
0000.3001.110 30001
30001 E1/8
E1/8 Baremetal
SMAC: 0000.3001.1101 2
Host A DMAC: FFFF.FFFF.FFFF Host B 0000.3001.1101 30001 LEAF1 Host C
MAC: 0000.3001.1101 MAC: 0000.3001.1102 MAC: 0000.3002.2101
IP: 192.168.10.101 IP: 192.168.10.102 IP: 192.168.20.101
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Things to Remember
Multicast Enabled Underlay
Keep in Mind
Overlay Convergence = Underlay Convergence!
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Underlay – Ingress Replication
• A Packet Multiplication
• EVPN assists no Peer, VNI Topology
Spine Spine Spine Spine
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Overlay Design Review
Overlay
• EVPN MP-BGP Primer
• Overlay Configuration Steps
1. Define the VTEP Interface
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
EVPN MP-BGP Primer (1)
Virtual Routing and Forwarding (VRF) VRF Info
VRF Info Name: VRF-A
Layer-3 segmentation for tenants’ routing space Name: VRF-A RD: 50000:1.1.1.2 (auto)
RD: ImpRR
Route-Target
50000:1.1.1.1 (auto) RR 65000:50000 (auto)
Route Distinguisher (RD): Imp Route-Target 65000:50000 Exp Route-Target 65500:50000 (auto)
VRF Info (auto)
Exp Route-Target 65500:50000 (auto)
Name: VRF-A
8-byte field, VRF parameters; unique value to make VPN IP routes unique:
RD: RD + VPN IP prefix (auto)
50000:1.1.1.3
Imp Route-Target 65000:50000 (auto)
Selective distribute VPN routes: Exp Route-Target 65500:50000 (auto)
1
V to define the import/export rules for VPNv4 routes
Route Target (RT): 8-byte field, VRF parameter, unique value
V2
VPN Address-Family:
Distribute the MP-BGP VPN routes
RR BGP Route-Reflector
V3 iBGP Adjacency
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
EVPN MP-BGP Primer (2)
BGP Advertisement
VPN-EVPN: RD:[MAC_A][IP_A]
BGP Next-Hop: V1
Virtual Routing and Forwarding (VRF) Route Target: 65500:50000
Label: 50000
Layer-3 segmentation for tenants’ routing space
RR RR
Route Distinguisher (RD):
8-byte field, VRF parameters; unique value to make VPN IP routes unique: RD + VPN IP prefix
VPN Address-Family:
Distribute the MP-BGP VPN routes
RR BGP Route-Reflector
V3 iBGP Adjacency
Host A
MAC_A / IP_A
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Overlay
• EVPN MP-BGP Primer
• Overlay Configuration Steps
1. Define the VTEP Interface
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
1
iBGP
V2
Enable BGP for Host reachabilityV
1
V3
*Simplified BGP configuration; would have 4 BGP peers (RR)
IGP not shown
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Overlay
• EVPN MP-BGP Primer
• Overlay Configuration Steps
1. Define the VTEP Interface
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
2
route-reflector-client V1 V2
# Leaf (V1)
router bgp 65500
router-id 10.10.10.V1 Send Extended BGP Community
address-family ipv4 unicast to distribute EVPN route attributes
neighbor 10.10.10.S1 remote-as 65500 V3
update-source loopback0 *Simplified BGP configuration; would have 4 BGP peers (RR)
address-family l2vpn evpn IGP not shown
send-community both
*
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Overlay
• EVPN MP-BGP Primer
• Overlay Configuration Steps
1. Define the VTEP Interface
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
Logical Construct of Multi-Tenant VXLAN EVPN
Tenant A (VRF A)
SVI SVI SVI SVI
A B N X
• One VLAN maps to one Layer-2 VNI per Layer-2 segment • 1 Layer-3 VNI per Tenant
• A Tenant can have multiple VLANs, therefore multiple (VRF) for routing
Layer-2 VNIs • VNI X’ is used for routed
• Traffic within one Layer-2 VNI is bridged packets
• Traffic between Layer-2 VNI’s is routed
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
3
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
3
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
3
Bridge-
Domain
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Overlay
• EVPN MP-BGP Primer
• Overlay Configuration Steps
1. Define the VTEP Interface
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Gateway Functions in VXLAN
VXLAN Routing
Layer-3 Boundary
VY
VX
V2 V2
V3 Layer-3 Boundary V3
V1 V1
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Centralized Gateway (FHRP) *
VXLAN Routing
• Inter-VXLAN Routing at V2
Core/Aggregation Layer
• vPC provides MAC state synchronization V3
and HSRP peering
• Redundant VTEPs share Anycast VTEP IP
address in the Underlay V1
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Distributed IP Anycast Gateway*
VXLAN/EVPN
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Different Integrated Route/Bridge (IRB) Modes
Overlay Networks do follow two
slightly different integrated
?
Route/Bridge (IRB) semantics
Asymmetric V2
• Route and Bridge on the ingress VTEP
• Bridge on the egress VTEP
V3
Symmetric
• Route on both the ingress and egress
V1
VTEPs
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
Routing in VXLAN
VNI utilized for providing isolation at
Layer-2 and Layer-3 across VXLAN
• Received frames must be mapped to
specific VNI for VXLAN transport
V2
• The VLAN-to-VNI mapping is performed
on Routing
V3
All Routed Traffic uses the VNI
assigned to the VRF
VLAN
V1
Host Y
VLAN VNI 30001
Host A
VNI 30000
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
Asymmetric IRB
Asymmetric
• Similar to Inter-VLAN routing
• Source and Destination VNIs have to exist
on leaf nodes where routing happens V2
• Post Routing traffic shares destination VNI
with Bridged traffic
V3
• Not very suitable for distributed Routing
From Host A via VLAN/VNI “blue” routed
at V1 to VNI “red” reaching destination V1
VLAN “red”
From Host Y via VLAN/VNI “red” routed Host Y
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
Symmetric IRB
Symmetric
• Similar to creating a Transit Segment
• Regardless of where Source or Destination
VNIs exist V2
• Post Routing traffic uses different VNI than
Bridged traffic
V3
• Additional VNI for Routing traffic (per VRF)
From Host A via VLAN “blue” routed at V1
to VNI “purple” reaching destination VLAN V1
“red”
From Host Y via VLAN “red” routed at V3 to Host Y
VNI “purple” reaching destination VLAN VLAN 55
“blue”
Host A
VLAN 43
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Host Subnet Redistribution
Host “A” is a silent Host
• Not known via ARP/IP I know Subnet “A”
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
Asymmetric vs. Symmetric IRB
VXLAN Routing Block Diagram
V1 V3 V1 V3
Layer-2 VNI
Layer-2 VNI
Layer-2 VNI
Layer-2 VNI
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
4
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
4
# Anycast Gateway MAC, inherited by any interface # Anycast Gateway MAC, inherited by any interface
(SVI) using “fabric forwarding” (SVI) using “fabric forwarding”
fabric forwarding anycast-gateway-mac fabric forwarding anycast-gateway-mac
0002.0002.0002 0002.0002.0002
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
4
ethernet ethernet
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
Overlay
• EVPN MP-BGP Primer
• Overlay Configuration Steps
1. Define the VTEP Interface
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
5
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
5
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
5
# VPC Peer-Link
interface port-channelXX V5
switchport mode trunk
vpc peer-link
V4
# VPC Domain Routing Adjacency*
Routed Interface (SVI) for routing
interface Vlan3999 adjacency across VPC Peer-Link
no shutdown
ip address 10.254.254.1/30
interface loopback0
ip router ospf 1 area 0.0.0.0 ip address 10.10.10.4/32
ip ospf network point-to-point ip address 10.10.10.99/32 secondary
ip pim sparse-mode Host D
VNI 30000
*Best practice on Border Leaf nodes is to enable peering also for each defined VRF (on dedicated SVI interfaces)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Overlay
• EVPN MP-BGP Primer
• Overlay Configuration Steps
1. Define the VTEP Interface
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
6
WAN
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
6
V3
Interface-Type Options:
• Physical Routed Ports V1
• Sub-Interfaces
• VLAN SVIs over Trunk Ports Peering Interface can
be in Global or Tenant VRF
WAN
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
6
# Sub-Interface Configuration
interface Ethernet1/1
no switchport
interface Ethernet1/1.10
mtu 9216
VBL
VRF VRF VRF V2
encapsulation dot1q 10 A B C
vrf member VRF-A
ip address 10.254.254.1/30 V3
# eBGP Configuration
router bgp 65500
…
vrf VRF-A
Advertise external learned routes V1
address-family ipv4 unicast into EVPN (Route-Type 5)
advertise l2vpn evpn
aggregate-address 10.0.0.0/8 summary-only
neighbor 10.254.254.2 remote-as 65599
update-source Ethernet1/1.10
address-family ipv4 unicast
WAN
Advertise an aggregate of the internal prefixes
Ensure that non-necessary routes are not advertised
towards the External Network
AS# 65599
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
6
VBL
VRF VRF VRF V2
WAN Router Side Configuration A B C
# Interface Configuration
interface Ethernet1/1
V3
vrf member VRF-A
ip address 10.254.254.2/30
# eBGP Configuration V1
router bgp 65599
…
vrf VRF-A
address-family ipv4 unicast
neighbor 10.254.254.1 remote-as 65500
update-source Ethernet1/1
address-family ipv4 unicast WAN
AS# 65599
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
6
# Sub-Interface Configuration
interface Ethernet1/1
no switchport
interface Ethernet1/1.10 VBL
VRF VRF VRF V2
mtu 9216
encapsulation dot1q 10 A B C
vrf member VRF-A
ip address 10.254.254.1/30 V3
ip router ospf 1 area 0.0.0.0
ip ospf network point-to-point
# BGP Configuration V1
router bgp 65500
…
address-family l2vpn evpn
retain route-target all Advertise external learned routes
vrf VRF-A
address-family ipv4 unicast into EVPN (Route-Type 5)
advertise l2vpn evpn
redistribute bgp 100 route-map OSPF-BGP* WAN
Ensure that non-necessary routes are not advertised
towards the External Network Redistribute internal prefixes with route-map
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Migrating to VXLAN
EVPN
Converting from vPC
VXLAN Design Considerations
VXLAN Mode: Scalability:
• Flood-and-Learn • The number of VXLAN VNIs
• With EVPN control Plane • The number of VTEP peers
• The number of EVPN tenants
BUM Traffic Handling:
• The number of VXLAN Host IP routes
• Multicast replication
• The number of VXLAN Host MAC addresses
• Unicast/ingress replication
• The number of IPv4/IPv6 LPM routes
Deployment Scenarios: • The number of Ingress replication peers
• Brown field vs green field
• Investment protection
• Multi-vendor environment?
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
VXLAN EVPN Loop Avoidance Considerations
Layer 2
Domain
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
VXLAN EVPN Loop Avoidance – Option 1
Single logical
connection to the
external L2 domain
Layer 2
Domain
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
VXLAN EVPN Loop Avoidance – Option 2
Single logical
connection to the
external L2 domain
Layer 2
Domain
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
Starting Point – Brownfield Network (vPC Based)
WAN - Core Starting from a traditional network (named
‘Brownfield’)
Brownfield network could be built
L3 leveraging vPC, STP, FabricPath or even
L2 3rd party devices
Migration considerations equally apply to all
those cases
Assumption is also that network services
are connected in traditional fashion (routed
mode at the aggregation layer)
vPC Based Brownfield Network
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
And What About FabricPath?
WAN - Core Starting from a traditional network (named
‘Brownfield’)
Brownfield network could be built
L3 leveraging vPC, STP, FabricPath or even
L2 3rd party devices
Migration considerations equally apply to all
those cases
Assumption is also that network services
are connected in traditional fashion (routed
mode at the aggregation layer)
vPC Based Brownfield Network
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
Deployment
Building Small Initial VXLAN EVPN POD
The end goal is to migrate endpoints and network services to the ACI fabric
WAN - Core
WAN - Core
L2
L2 Trunk
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
Endpoints Integration
Mapping VLANs to L2 VNIs
WAN - Core
App1 Web App1 Web App2 Web Greenfield VXLAN EVPN Fabric
App2 Web 10.20.20.11
10.10.10.10 10.10.10.11 10.20.20.10
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
Endpoints Integration
Use Case 1: VLAN == VNI
WAN - Core Greenfield VXLAN EVPN Fabric
L2
App1 Web App1 Web
Broadcast
10.10.10.10 10.10.10.11 Domain
L2
App1 Web App1 Web Broadcast
10.20.20.10 10.20.20.11 Domain
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Endpoints Integration
Use Case 1: VLAN == VNI
WAN - Core Greenfield VXLAN EVPN Fabric
VLAN 10
Map VLAN10/L2 VNI1
VLAN 10 VLAN 20 VLAN 20
Web1
App1 Web App1 Web
10.10.10.10 10.10.10.11
Web2
App1 Web App1 Web
10.20.20.10 10.20.20.11
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Endpoints Migration
1 - Single VCenter Server Scenario
WAN - Core
Greenfield VXLAN EVPN Fabric
L3
L2
Compute
Clusters
100.1.1.3
VM
100.1.1.99
VM
100.1.1.7
VM VM
Compute
VM
Cluster BD
VM VM
Existing
VM
VM
App New Compute
Mgmt Cluster Clusters
DVS
vCenter Managed
DVS
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Endpoints Migration
1 - Single VCenter Server Scenario
1.1 Connect the new ESXi hosts to the vCenter managed DVS
WAN - Core
L3
L2
100.1.1.3
VM
100.1.1.99
VM
100.1.1.7
VM VM
VM
BD
VM VM
Existing
VM
VM
App
DVS
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Endpoints Migration
1 - Single VCenter Server Scenario
VM VM
100.1.1.3
VM
100.1.1.99 100.1.1.7
VM VM
VM
BD
VM VM
Existing
VM
App
DVS
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
Endpoints Migration
2 – Multiple VCenter Servers Scenario
WAN - Core
Greenfield VXLAN EVPN Fabric
L3
L2
Compute
Clusters
100.1.1.3
VM
100.1.1.99
VM
100.1.1.7
VM VM
Compute
VM
Cluster BD Mgmt Cluster
VM VM
Existing vCenter2
VM
VM
App New Compute
Mgmt Cluster Clusters
DVS
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
Endpoints Migration
2 – Multiple VCenter Servers Scenario
L3
L2
100.1.1.3
VM
100.1.1.99
VM
100.1.1.7
VM VM
VM
BD
VM VM
Existing
VM
VM
App
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
Endpoints Migration
2 – Multiple VCenter Servers Scenario
2.2 Migrate VMs to the new ESXi cluster*
WAN - Core
VM VM
100.1.1.3
VM
100.1.1.99
VM
100.1.1.7
VM VM VM
VM
BD
VM VM
Existing
VM
VM
App
HSRP
Default GW
L2 path between the two networks leveraged by migrated hosts to reach the default gateway
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
Migrate Default Gateway to the VXLAN Fabric
WAN - Core
Greenfield VXLAN EVPN Fabric
Anycast Default
Gateway
L3 L3
L2 L2
VLAN 10 VLAN 20
10.10.10.11 10.20.20.11
10.10.10.10 10.20.20.10
Any IP - Anywhere
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
Migration
Routing Between Brownfield and Greenfield
Routing between Brownfield and Greenfield may still be required
• Handling communication to IP subnets that remain only on
Brownfield (default gateway remains on aggregation devices)
• Handling communication with the WAN
Existing Design VXLAN EVPN Fabric
L3 Routing
HSRP
Default GW
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
Migration
Routing Between Brownfield and Greenfield
WAN - Core
Greenfield VXLAN EVPN Fabric
Default Gateway for L3 Links
VLAN 30
L3
L2
L3
L2
VLAN 30
10.10.10.11
VLAN 30 NOT carried
on the vPC connection
10.30.30.10
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
Moving L4-L7 Services
Migrating Network Services
Example of Firewall Services Migration
Starting point:
Active/Standby FW nodes
(routed mode*) connected to
the Aggregation layer
switches
WAN - Core Greenfield VXLAN EVPN Fabric
Active Standby
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
Migrating Network Services
Move the Standby Node to the VXLAN Fabric
FW Keepalives and
state synchronization
Standby
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 162
Migrating Network Services
Disconnect the Active Node from the Brownfield Network
Active
FW activated on the
VXLAN fabric
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
Migrating Network Services
Both Firewall Nodes Connected to the VXLAN Fabric
WAN - Core
Greenfield VXLAN EVPN Fabric
Standby Active
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
Interconnecting Multiple
Sites
VXLAN and DCI
Overlays Evolve and Spread
DC Local Overlay
End-to-End Overlay SS SS SS SS
S S S S S S S S
L L L L .... L L L L L .... L
Single Logical Data Center
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Changing the Paradigm with Overlays
DC Local Overlay
Multi-Site Overlay SS SS SS SS
S S S S S S S S
L L L L .... L L L L L .... L
Multiple Logical Data Center
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
VXLAN Evolves as the Control Plane Evolves!
Early Years
Yet Another Encapsulation
Flood & Learn (Multicast-based)
Data-Plane only Yesterday
VXLAN for the Data Center – Intra-DC
Control-Plane
Active VTEP Discovery
Today
Multicast and Unicast
VXLAN for DCI – Inter-DC
DCI Ready
ARP/ND caching/suppress
Multi-Homing
Failure Domain Isolation
Loop Protection
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
Inter-X Connectivity
VXLAN Multi-Pod VXLAN Multi-Fabric VXLAN Multi-Site
DCI DCI
Single Data-Plane – End-to-End Data-Plane Domain 1 Data-Plane Domain 2 Data-Plane Domain 1 Data-Plane Domain 2
Data-Plane Data-Plane
Single Fabric with End-to- Multiple Fabrics – Normalized Multiple Fabrics with
End Encapsulation through Ethernet Integrated DCI (DCI2)
Build Hierarchy in the Multiple Fabrics Interconnect Integrated DCI – Scaling
Underlay – Flatten it in the using DCI (Layer 2 and Layer 3) within and between
Overlay Fabrics
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
VXLAN EVPN – Multi-Pod
Underlay Extension
VTEP VTEP VTEP VTEP
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Pod 1 Pod n
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
Multi-Pod Characteristics – ”The Single”
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
Multi-Pod End-to-End Encapsulation
Underlay Extension
VTEP VTEP VTEP VTEP
VTEP VTEP
10.1.1.1 VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
10.2.2.7
VTEP
Unicast
Pod 1 Pod n
Baremetal Baremetal
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
Multi-Pod VXLAN Tunnel Adjacencies
Underlay Extension
VTEP VTEP VTEP VTEP
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 174
Multi-Pod Underlay Extension
POD1 Underlay Routing Table POD2 Underlay Routing Table
VTEP VTEP
10.1.1.1
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
10.2.2.7
VTEP
Pod 1 Pod 2
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 175
Multi-Pod BUM Replication
Underlay Extension
VTEP VTEP VTEP VTEP
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
BUM
Pod 1 Pod 2
Baremetal
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 176
Multi-Pod Challenges – ”The Single”
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 177
VXLAN Multi-Site https://tools.ietf.org/html/draft-sharma-multi-site-evpn
Functional Components
Site-External DCI
(IP Routing and Increased
Border Gateways MTU Support)
(Key Functional Components of
VXLAN Multi-Site Architecture)
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Site-Internal Fabric
Site 1 (Common VXLAN and Site n
BGP-EVPN Functions)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 178
VXLAN Multi-Site Characteristics
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
VXLAN Multi-Site
Main Use Cases
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 180
VXLAN Multi-Site Inter-Site Network
Routing Table
Underlay Isolation Border Site1: Border Site2:
10.1.1.101 10.2.2.101
10.1.1.102 10.2.2.102
10.1.1.111 10.2.2.222
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 181
VXLAN Multi-Site
Introducing the Border Gateway
Overlay Multi-Site
Any VTEP
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Site 1 Site n
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 182
Multi-Site – VXLAN Tunnel Adjacencies
BG102# show nve peers
Interface Peer-IP VNI Up Time
---------- ----------- ------ ----------
nve1 Overlay
10.1.1.1 Multi-Site
30000 00:12:16
nve1 10.1.1.4 30000 03:18:06
nve1 10.2.2.222 30000 00:12:23
Layer-3
Network
BGW BGW BGW BGW BGW BGW BGW BGW BGW BGW
Site 1 Site 2 Site n
Spine Spine Spine Spine Spine Spine
Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 184
Border Gateway Between Spine and Super-Spine
Super-Spine Super-Spine
BGW BGW BGW BGW BGW BGW BGW BGW BGW BGW
Site 1 Site 2 Site n
Spine Spine Spine Spine Spine Spine
Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 185
Border Gateway on Spine
Super-Spine Super-Spine
BGW BGW BGW BGW BGW BGW BGW BGW BGW BGW
Spine Spine Spine Spine Spine Spine Spine Spine Spine Spine
Site 1 Site 2 Site n
Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 186
Border Gateway Back-to-Back
Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf Leaf
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 187
VXLAN Multi-Site
Border Gateways Deployment Considerations
Border Gateways used for two main functions: Anycast Border Gateways
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 188
VXLAN Multi-Site
Anycast Border Gateway (1)
Anycast Border Gateway
Up to 4 Border Gateways
Multi-Site VIP
10.1.1.111 Border Gateway Support
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 189
VXLAN Multi-Site
Anycast Border Gateway (2)
Anycast Border Gateway
Type: 00 IP: 10.1.1.101
4 System MAC: 00:00:00:00:00:01
Ethernet Segment: 00:00:07 VNI: 30010 Per-VNI Designated Forwarder (DF) election
• Each BGW can serve as DF for a single or
BGW BGW BGW BGW
a set of Layer-2 VNIs
VTEP VTEP VTEP VTEP
• DF election and assignment is automatic
Using BGP EVPN Route Type 4 for DF election
DF DF DF DF
30010 30011 30012 30099
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 190
VXLAN Multi-Site
Anycast Border Gateway (3)
External
Connectivity Anycast Border Gateway
Point-to-Point L3 Links
(Physical/Sub-Interfaces) Single-Homed End-Points only connected with
L3 links
• Services Appliance (i.e. Firewall, ADC etc.)
BGW BGW BGW BGW
VTEP
PIP-BGW1
VTEP
PIP-BGW2
VTEP
PIP-BGW3
VTEP
PIP-BGW4
• External routers
10.1.1.101 10.1.1.102 10.1.1.103 10.1.1.104
• No SVI support on BGW nodes
.1 .1
Advertised and Reachable through Individual
Point-to-Point L3 Links
Primary IP Address (PIP)
Point-to-Point L3 Links
(Physical/Sub-Interfaces)
ADC ADC
• Intra-Site: Leaf nodes use PIP to reach the device
ADC ADC
connected to Border Gateways
0000.3010.1101 0000.3010.1102
192.168.10.101 192.168.10.102 • Inter-Site: Remote Border Gateways use PIP to
reach the device connected to Border Gateways
VTEP
Site 1
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 191
Anycast BGW vs. VPC Border Gateway
Anycast Border Gateway VPC Border Gateway
• Up to 4 BGW • 2 BGW with physical VPC Peer-Link
• Shared Nothing • Small Deployments
• Simple Failure Scenarios • End-Point or Network Services
• Any Deployments Connectivity on BGW
• No End-Point or Network Services • Migration Use-Cases (Brownfield)
Connectivity on BGW • Pseudo-BGW to BGW
• Greenfield Deployments • Classic Ethernet/FabricPath to VXLAN
EVPN
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 192
VXLAN Multi-Site
VPC Border Gateway and Transit Traffic
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 193
VXLAN Multi-Site
VPC Border Gateway and Locally Attached End-Points
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 194
VXLAN Multi-Site
VPC Border Gateway and Designated BUM Forwarder
Site 1
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 195
VXLAN Multi-Site
BUM Traffic Forwarding
Overlay Multi-Site
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
BUM
Site 1 Site n
Baremetal
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 196
VXLAN Multi-Site
BUM Replication Modes (Multicast Intra-Site)
Overlay Multi-Site
Ingress Replication
Multicast Multicast
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Site 1 Site n
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 197
VXLAN Multi-Site
BUM Replication Modes (Ingress Replication Only)
Overlay Multi-Site
Ingress Replication
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Site 1 Site n
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 198
VXLAN Multi-Site
BUM Replication Modes (Mixed Mode Intra-Site)
Overlay Multi-Site
Ingress Replication
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Site 1 Site n
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 199
VXLAN Multi-Site
BUM Traffic Policing
Overlay Multi-Site
Storm Control
VTEP VTEP Broadcast 0-100% VTEP VTEP
BGW BGW
Unknown Unicast 0-100% BGW BGW
Multicast 0-100%
Spine Overlay Site 1
Spine Spine Spine Spine Overlay Site n
Spine Spine Spine
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
BUM
Site 1 Site n
Baremetal
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 200
VXLAN Multi-Site
Connectivity to the External Layer 3 Domain
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 201
VXLAN Multi-Site
Border Gateways and VRF-Lite to External Routers
Site 1
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 202
VXLAN Multi-Site
Border Gateway and Shared Border (aka ‘GOLF’)
External router operates like a
traditional VXLAN EVPN VTEP
(Layer 3 only)
Single MP-BGP EVPN peering
External
VRF-AVRF-B VRF-C
established with the external routers
Connectivity
Single MP-BGP EVPN routing
to exchange routes for all the VRFs
instance to exchange routes
Routed interface extending
‘underlay’ connectivity to
for all VRFs
VXLAN Data-Plane between the
the external routers
Multi-Site BGWs and the external routers
Site-External
Overlay
Same spine uplinks used for all
VXLAN encapsulated traffic (North-
South and East-West)
BGW BGW BGW BGW
VXLAN Data Plane
Required because of the use of DCI link
VTEP VTEP VTEP VTEP
between BGW and WAN tracking
Edge Router
Site-Internal
BGW BGW
Legacy
infrastructure offers
only L2 services
L3 VTEP VTEP VTEP VTEP VTEP VTEP VTEP
L2
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 205
VXLAN Multi-Site and Legacy Site Integration
Starting from Legacy Networks Only (1)
Pair of Pseudo-BGWs
Pair of Pseudo-BGWs (EX/FX Switches)
(EX/FX Switches) BGW BGW
A pair of Pseudo-BGWs inserted in each legacy site to extend Layer-2 and Layer-
3 connectivity between sites
• Replacement of traditional DCI technologies (EoMPLS, VPLS, OTV, …)
Slowly phase out the legacy networks and replace them with VXLAN EVPN fabrics
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 206
VXLAN Multi-Site and Legacy Site Integration
Starting from Legacy Networks Only (2)
Convert the nodes to
Convert the nodes to full BGWs functions
full BGWs functions
VTEP VTEP VTEP VTEP
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 207
VXLAN Multi-Site and Legacy Site Integration
Starting from Legacy Networks Only (3)
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Decommission the legacy networks and leave only the VXLAN EVPN
fabrics in place
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 208
VXLAN EVPN – Multi-Site
Multi-Site Core
• Border Gateway (BGW) to Border Gateway (BGW)
reachability required
• Reachability Back-to-Back (full-mesh) or via Layer-3
transport network
• Any Routing Protocol for BG reachability No Underlay Extension
• IPv4 Unicast Transport
VTEP
(Ingress
VTEP
Replication) VTEP VTEP
• BGP full-mesh or Route-Server (eBGP ”Route Reflector”)
for Overlay Control-Plane Multi-Site Border Gateway (BGW):
• Seamless insertion into existing VXLAN EVPN Fabrics
Spine Spine Spine
(Border Gateways require Nexus 9x00-EX/-FX)
Spine Spine Spine Spine Spine
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 209
Multi-Site Advantages – ”The Multiple”
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 210
Inter-X Connectivity
Multi-Pod Multi-Fabric Multi-Site
Underlay Control Plane Unified Underlay Domain Separated Underlay Domains Separated Underlay Domains
Broadcast Suppression/Limit
no yes yes
(DCI)
Layer-2 Loop Prevention Loop mitigation (Edge Protection) VPC at Border Loop mitigation (At DCI)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 211
Virtual Peer Link
(vPC) Update
Traditional vPC Recap
vPC Domain
Peer Keepalive
vPC
Server Server
Server
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 213
vPC for VXLAN and VXLAN EVPN
Spine Spine
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 214
vPC for VXLAN and VXLAN EVPN
Spine Spine
vPC1 vPC2
Server Server
Server
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 215
vPC for VXLAN EVPN
Spine Spine
vPC1 vPC2
Subnet X Subnet Y
192.168.11.0/24 192.168.12.0/24
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 216
vPC for VXLAN EVPN (advertise-pip)
Spine Spine
Subnet X Subnet Y
192.168.11.0/24 192.168.12.0/24
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 217
vPC without Peer-Link for (vPC2) VXLAN EVPN
Spine Spine
vPC1 vPC2
Orphan Port Orphan Port
Peer Keepalive
vPC
Server
Peer Keepalive remains Server
• Out-of-Band (mgmt0 or dedicated link)*
• In-Band (dedicated Loopback)
Server
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 218
vPC without Peer-Link for (vPC2) VXLAN EVPN
Spine Spine
vPC1 vPC2
Peer Keepalive
vPC
Server Server
Server
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 219
vPC without Peer-Link for (vPC2) VXLAN EVPN
• Introduction in NX-OS 9.2(3) • Smaller VTEP Scale per Fabric
• Part of Essentials License • initial release at ~1/3
• “always PIP” mode results in 3 VTEPs
• Supported FX/FX2 Platforms per vPC domain
• EX-based Platform in future • Compensated with upcoming VTEP scale
increase (9.3(x))
• PIM ASM and Ingress-
Replication for BUM • Leaf and Border deployments
only
• PIM BiDir under consideration
• no BGW for Multi-Site support
• TRM Support
• No FEX
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 220
VXLAN Tenant Routed
Multicast (TRM)
Same Subnet Forwarding no IGMP Snooping
Traditional Forwarding in VXLAN Overlays
R Spine
TOR3 TOR4
Leaf Leaf
VXLAN EVPN
VLAN 101 (Green) VLAN 101 (Green)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 222
Same Subnet Forwarding with IGMP Snooping
Traditional Forwarding in VXLAN Overlays
RCVR-11
Leaf Leaf
10.10.10.11
VXLAN EVPN
VLAN 101 (Green) VLAN 101 (Green)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 223
Different Subnet Forwarding – Router on-a-Stick
Traditional Forwarding in VXLAN Overlays
S
SRC
TOR1 TOR2
SRC-10 Leaf Leaf
224.10.10.10 10.10.10.254
10.10.10.100 10.20.20.254
Spine
Spine
R
TOR3 TOR4 RCVR
RCVR-21
Leaf Leaf
10.20.20.21
VXLAN EVPN
VLAN 101 (Green) VLAN 101 (Green)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 224
Different Subnet Forwarding – Router on-a-Stick
Traditional Forwarding in VXLAN Overlays
S
SRC
TOR1 TOR2
SRC-10 Leaf Leaf
224.10.10.10 10.10.10.254
10.10.10.100 10.20.20.254
Spine
Spine
R
TOR3 TOR4 RCVR
RCVR-21
Leaf Leaf
10.20.20.21
VXLAN EVPN
VLAN 101 (Green) VLAN 101 (Green)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 225
Different Subnet Forwarding – Router on-a-Stick
Traditional Forwarding in VXLAN Overlays
• Multiple Copy in Core – Treated as BUM
S
SRC
• Different Subnet possible – RPF Challenges
TOR1 TOR2
• Pruning on Local Interface
SRC-10 Leaf Leaf
224.10.10.10 • VXLAN is NOT pruned if interest Receiver exists behind
10.10.10.254
10.10.10.100 one Remote VTEP 10.20.20.254
Spine
Spine
R
TOR3 TOR4 RCVR
RCVR-21
Leaf Leaf
10.20.20.21
VXLAN EVPN
VLAN 101 (Green) VLAN 101 (Green)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 226
Functional Components
Tenant Routed Multicast (TRM)
Spine Spine
Site-External DCI
(IP Routing and Increased
MTU Support)
•
•
• VXLAN EVPN
•
VTEP VTEP VTEP VTEP
•
DR DR DR DR
•
•
•
•
Baremetal Baremetal Baremetal
• Baremetal Baremetal
•
SRC-10 RCVR-10 RCVR-20 • RCVR-30 RCVR-11
224.10.10.10 10.10.10.10 20.20.20.20 30.30.30.30 10.10.10.11
10.10.10.100
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 227
Same Subnet Forwarding w/IGMP Snooping
TRM Forwarding (Layer-2 Only Mode)
•
S
•
SRC
TOR1 • TOR2
SRC-10
224.10.10.10
Leaf
• Leaf
10.10.10.100
•
R Spine
RCVR-11
Leaf Leaf
10.10.10.11
VXLAN EVPN
VLAN 101 (Green) VLAN 101 (Green)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 228
Different Subnet Forwarding
TRM Forwarding (Layer-3 Mode)
TOR1 TOR2
Leaf Leaf
Spine
TOR3 TOR4
Leaf Leaf
VXLAN EVPN
VLAN 101 (Green) VLAN 101 (Green)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 229
Different and Same Subnet Forwarding
TRM Forwarding (Layer-3 Mode)
•
S
•
SRC
TOR1 • TOR2
SRC-10
224.10.10.10
Leaf
• Leaf
10.10.10.100
•
R
Spine
L3VNI 50001
RCVR
RCVR-20 Spine
10.20.20.20 R
R TOR3 TOR4 RCVR
RCVR-21
Leaf Leaf
RCVR
10.20.20.21
RCVR-10
10.10.10.10
VXLAN EVPN
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 230
Local and Remote Forwarding
TRM Forwarding (Layer-3 Mode)
S
SRC
TOR1 TOR2
SRC-10 Leaf Leaf
224.10.10.10
10.10.10.100 TTL Decrement
RCVR-20 Spine
10.20.20.20 R
R TOR3 TOR4 RCVR
RCVR-21
Leaf Leaf
RCVR
10.20.20.21
RCVR-10
10.10.10.10
VXLAN EVPN
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 231
Overlay Rendezvous Point
TRM Forwarding (Layer-3 Mode)
•
S
•
SRC
TOR1 • TOR2
SRC-10 Leaf • Leaf
224.10.10.10
10.10.10.100 TTL Decrement
•
R TTL Decrement Spine
•
(routed) L3VNI 50001
•
RCVR
RCVR-20 Spine
•
10.20.20.20 R
R TOR3 TOR4 RCVR
RCVR-21
Leaf Leaf
RCVR
10.20.20.21
RCVR-10
10.10.10.10
VXLAN EVPN
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 232
Nicolas Delecroix
Nexus 9K Standalone Technical Marketing Engineer
Programmability
Extensibility: Guest Shell
and Docker
Securely Run Custom On-Box Linux Apps
$ dohost
NX-OS Guest Shell: Secure Linux Container 64
JSON Bit
CLI
Open-Source Your Custom Apps
bootflash: Apps (C, Python, Go…)
Network
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Linux + Nexus 9K = ♥︎
[root@guestshell ~]# ifconfig Eth1-42
Eth1-42: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 13.0.0.42 netmask 255.255.255.0 broadcast 13.0.0.255
ether 54:7f:ee:8e:27:bc txqueuelen 100 (Ethernet)
RX packets 3790 bytes 258373 (252.3 KiB)
RX errors 0 dropped 3553 overruns 0 frame 0
TX packets 772 bytes 201535 (196.8 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 236
Linux NX-OS Network Synchronization
[guestshell@guestshell ~]$ ifconfig Eth1-49
interface Ethernet1/49 Eth1-49:
mtu 9216 flags=4163<UP,BROADCAST,RUNNING,MULTICAST>
ip address 10.0.1.2/30 mtu 9216
no shutdown inet 10.0.1.2 netmask 255.255.255.252
broadcast 10.0.1.3
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 237
Linux NX-OS Network Synchronization
[guestshell@guestshell ~]$ ifconfig Vlan10
interface Vlan10 Vlan10: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>
no shutdown mtu 1500
ip address 192.168.1.1/24 inet 192.168.1.1 netmask 255.255.255.0
broadcast 192.168.1.255
switch# sh ip route
IP Route Table for VRF "default"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%<string>' in via output denotes VRF <string>
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 239
The Guest Shell is Secure
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 240
Linux Apps Can Interact with the External World
Nexus 9K
Your Custom Applications Existing 3rd Party Linux
(Python, C++ etc.) Applications
NX-OS CLI
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 241
Docker Engine
NX-OS 9.2(1) – July 2018
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 242
Standardization, Flexibility, and Efficiency
Guest Shell Docker Engine
Number of container instances One Many
Access to storage and network Yes Yes
Linux distribution type CentOS Any
Container manipulation NX-OS CLI (# guestshell *) Standard Linux docker tool
primitives
Definition of the container Must be done on a Nexus 9K Can be done from any
image content computer supporting Docker
Repository of existing None Docker Hub
container images
Container orchestration None Docker Swarm or Kubernetes
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 243
Demo: Docker on N9K
switch(config)# feature bash-shell
switch(config)# run bash sudo su
bash-4.3#
# Start Docker
bash-4.3# service docker start
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 246
Automation
Legacy Automation is Challenging
• Expect scripts written in TCL.
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 248
248
Telnet NX-API NX-API
SNMP NETCONF / RESTCONF / gRPC
or CLI REST
Client YANG Clients
SSH Client Client
Management Server
NX-OS Infra
(CLI Mgr, Syslog Mgr, ...) CLI
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 249
NX-API
{
"jsonrpc": "2.0",
"method": "cli",
CLI "params": {
"cmd": "show version",
Request "version": 1
Management },
Server }
"id": 1
{
"jsonrpc": "2.0",
"result": {
"body": {
"bios_cmpl_time": "03/02/2017",
JSON "bootflash_size": 7906304,
"kickstart_ver_str": "7.0(3)I7(3)",
Response "chassis_id": "Nexus 9508",
... Nexus 9K
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 251
Demo: NX-API
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Get Started With Just Two Commands
Ready-to-use Docker container with a pre-build Python environment,
and NX-API apps ready to run:
[devops@server ~]$ docker run -it ndelecro/nx-os-programmability
Status: Downloaded newer image for docker.io/ndelecro/nx-os-
programmability:latest
root@a3d1f69d8067:~#
TECDCN-2002
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 255
[devops@server ~]$ docker run -it ndelecro/nx-os-programmability
Status: Downloaded newer image for docker.io/ndelecro/nx-os-programmability:latest
root@a3d1f69d8067:~# cd NX-API_CLI/VXLAN_BGP_EVPN/
root@a3d1f69d8067:~/NX-API_CLI/VXLAN_BGP_EVPN# ./1.Create_L2VNI.py vteps 42 42000 239.1.1.1 e1/41
TECDCN-2002
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 256
[devops@server ~]$ docker run -it ndelecro/nx-os-programmability
Status: Downloaded newer image for docker.io/ndelecro/nx-os-programmability:latest
root@a3d1f69d8067:~# cd NX-API_CLI/VXLAN_BGP_EVPN/
root@a3d1f69d8067:~/NX-API_CLI/VXLAN_BGP_EVPN# ./1.Create_L2VNI.py vteps 42 42000 239.1.1.1 e1/41
****** VTEP 93180-EX-1 ******
vlan 42
vn-segment 42000
int nve1
member vni 42000
mcast-group 239.1.1.1
suppress-arp
evpn
vni 42000 l2
rd auto
route-target import auto
route-target export auto
int e1/41
switchport access vlan 42
• Advanced features:
Configure
• Variables • Events
• Conditionals • Loops
Targets
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 261
Management NX-API NX-API NETCONF / RESTCONF / gRPC
SSH SNMP
Server CLI REST YANG
NX-OS Infra
(CLI Mgr, Syslog Mgr, ...) CLI
Ansible module that will do the actual work Blue: Ansible keyword or module
White: a value that you define
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Ansible Inventory
[nxos_spines]
9364-1
9364-2 Best practice: use Ansible Vault for
password encryption.
[older_routers]
router-A
router-B
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 265
Demo: Ansible
VXLAN BGP EVPN Automation
[devops@server ~]$ cat vxlan.yml
---
- name: Create L2VNI
hosts: nxos_vteps
tasks:
- name: Create VLAN and map to to VNI
nxos_vlan:
vlan_id: 2200
mapped_vni: 20200
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 268
[devops@server ~]$ ansible-playbook vxlan.yml
PLAY [Create L2VNI] ************************************************************
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 270
[devops@server ~]$ cat rollback.yml
...
Checkpoint and Rollback! tasks:
- name: Create checkpoint
nxos_rollback:
checkpoint_file: backup.cfg
TECDCN-2002
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 272
[devops@server ~]$ ansible-playbook rollback.yml
TASK [Create checkpoint]
*************************************************************************************************
changed: [93180-FX-2]
TECDCN-2002
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 273
[devops@server ~]$ ansible-playbook rollback.yml
TASK [Create checkpoint]
*************************************************************************************************
changed: [93180-FX-2]
PLAY RECAP
*************************************************************************************************
93180-FX-2 : ok=5 changed=3 unreachable=0 failed=1
tasks:
- name: Enable scp-server feature
nxos_feature:
feature: scp-server
state: enabled
- debug:
var: install_state TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
[devops@server ~]$ ansible-playbook install_nxos.yml
TECDCN-2002
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 277
TASK [Install NX-OS]
************************************************************************************************
changed: [93180-EX-1]
PLAY RECAP
*************************************************************************************************
93180-EX-1 : ok=1 changed=1 unreachable=0 failed=0
93180-FX-2 : ok=1 changed=1 unreachable=0 failed=0
root@a3d1f69d8067:~#
TECDCN-2002
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 281
NETCONF/YANG
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 283
Read all VRFs with OpenConfig
<get-config>
<source>
<running/>
</source>
<filter>
<network-instances xmlns="http://openconfig.net/yang/network-instance">
<network-instance/>
</network-instances>
</filter>
</get-config>
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 284
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2">
<data>
<network-instances xmlns="http://openconfig.net/yang/network-instance">
<network-instance>
<config>
<description/>
<enabled>true</enabled>
<name>default</name>
<type>L3VRF</type>
</config>
<name>default</name>
</network-instance>
<network-instance>
<config>
<description/>
<enabled>true</enabled>
<name>Testing1</name>
<type>L3VRF</type>
</config>
... TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 285
Telnet NX-API NX-API
SNMP
or CLI REST
Client
Client YDK
SSH Client
Management Server
NX-OS Infra
(CLI Mgr, Syslog Mgr, ...) CLI
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 286
Choosing an Automation
Strategy Discussion
Prototyping and
Validating with N9Kv
Nexus 9000v (N9Kv)
• N9Kv is:
• A simulation platform that runs N9K NX-OS as a virtual machine.
• Abstracting N9K hardware: supervisor, one line card, interfaces.
• Using a software data-plane.
• Supported in VIRL.
• N9Kv is not:
• A replacement for N9K physical platform.
• Designed to be used as a switch in a production data center.
Mod Sw Hw Slot
--- ----------------------- ------ ----
1 9.2(2) 0.0 NA
• Learning Tool
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 293
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Inline Upgrade and Downgrade
NX-OS 9.2(1) – July 2018
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 295
n9kv-1# sh mod | i Nexus
1 128 Nexus 9000v Ethernet Module N9K-9000v active *
Guest Shell
POAP
BGP v4
vPC
Guest Shell
POAP
BGP v4
vPC
VXLAN-EVPN
Programmable Fabric LAN-Classic Management
Nexus 5K, 7K-9K Nexus 1K, 2K, 3K, 5K-7K-9K
Automation and Control
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 302
DCNM Functionality Dashboard
Trend Analysis Host/Endpoint
Inventory & Health Configuration Automation and VM Analytics Monitoring
• Discovery & Fabric • Image Management • VXLAN Fabric Builder • VM Net Trace • VM Lifecycle
Builder • Backup / Restore • Classic Underlay • Monitor Graphs • Network Location
• CPU/Mem/Temp • Templates (POAP) • Interface Monitoring • Fabric-Wide View
• Traffic • Overlay (VRF/VNI)
• Health-Monitor • REST APIs
• Link View • Brownfield Migration
• VM-connectivity
Visualization and Alert/ Storage IP Media Net
Troubleshooting Notifications Management Controller
Bootstrap Devices
Discover Existing
[POAP]
Fabrics / Networks
STP/VPC
Fabric Builder
Create New VXLAN
DFA / FabricPath
Fabrics
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 305
VXLAN Fabric Builder Auto-Deployment
VXLAN Fabric
Auto-Deployment
Managed-
Turn-Key VTEP Simplified
Fabric
Deployment Deployment
Operations
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 306
POAP for Classic Deployments
Best
Practice
Template
+ -VXLAN
-Custom
POAP Bootstrap
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 307
Day 1+ Operations
Manage, Monitor, Visualize, Search
Challenge: Manage & Grow Underlay with minimal overhead & keep consistent intent
Deployed Fabric Manage Monitor / Visualize /
Search / Update
Underlay:
• SDN Networks [VTEPs]
• Image Update [ISSU]
• View Fabric Topology
• Monitor Health, Events,
Performance
[cpu/mem/iface/syslog]
• Add Devices/Expand
Cisco Advantage:
• Turnkey Management
• Integrated Views
• Comprehensive Fabric Views
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 308
Day 1+ Operations
Overlay Visibility, Growth
Challenge: Manage / Monitor SDN Overlay’s across a large fabric
Overlay Tasks: Monitor / Visualize / Search
• Visualize Overlays [VXLAN, VLAN, etc..]
• Add, Manage SDN Networks
• Shows VM Networking Path [vCenter]
• Find, Track VMs, Workloads [EPL]
• Find VN’s and VNI’s [VXLAN]
• View VXLAN E2E Connectivity [OAM]
• Identify Errors
• Validate Compliance
Cisco Advantage:
• Seamless Overlay/Underlay Correlation
• Easy to find workloads, VN’s, VNI’s on vast
fabric
• Easy to See Host-Network chain
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 309
Day 1+ Operations
Verify Compliance
Challenge: Ensure Deployment [Underlay, Overlay, Access] is Correct
Compliance Tasks: Detect and Fix
• Monitor Fabric
• Compare device configuration
against Fabric policy
• Remediate [revert or change Policy]
On-Demand
remediation
Cisco Advantage:
• Constant Monitoring
• Compliance engine brings fabric back to
intended configuration
• No un-anticipated behavior
Compliance engine remediates to intended configuration
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 310
Here is What That Looks Like in DCNM...
DCI
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 311
Getting Started with
DCNM
VXLAN User Experience with DCNM
• DCNM Differentiates Underlay vs. Overlay
• Use Fabric Builder
OR
• Use POAP templates for Underlay configuration
• VXLAN Best-Practice Templates from cisco.com
• Basic Manageability for “Classic” configurations
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 313
Discovering the Data Center
• DCNM Data Sources Include: SAN, LAN, VMware, & Storage Arrays
Deploy Fabric
-Switch VTEP
Fabric
Configures
Automatically during Underlay
POAP Installed
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 315
NEW in
DCNM 11
Auto-VPC
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 316
VXLAN Fabric Compliance
NEW in
DCNM 11
2 Preview Compliance
Remediation
4 Fabric Repaired!
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 317
POAP Dashboard for non-VXLAN Deployments
Control DHCP, File Server, and POAP Template Definitions from Here
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 318
POAP Dashboard
Boot/Discovery
Status
Choose Template
Copy / Paste
Settings
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 320
Let’s Focus on New
VXLAN Functions
Top Down Deployment
• Deploys Configuration Profile for
VRF, Segment or Interface to -VRF
Switch without a Trigger -VNI
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 322
Adding A New VXLAN Fabric
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 323
Creating A New Network
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 324
Deploying The Network
1) Select Network
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 325
Deploying The Network – Selecting Switches
Double-Click Deploy to this switch Ready to Deploy
[De-Select to remove Network]
In Progress Deployed
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 326
Controls
Deploy Details
Show / Troubleshoot Deployment
Preview
Add Switches to
Fabric
Refresh
Auto-Refresh
on/off
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 327
External Fabric Connectivity Provisioning
Border Node Deployments
• Setting up base and setup
configuration
• Deploying VRFs
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 328
VXLAN Multi-Site Deployment
Fabric 1 Fabric 2
Border Leaf
B Extensions B
VNI 34112 VNI 34112
VNI 26214 VNI 26214
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 329
EVPN Multi-Site Deployment
Support for Border Gateways
• Multi-Site Underlay & Overlay inter-
fabric connection setup
• B2B and Route-Server based topology
support
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 330
Troubleshoot VXLAN Using OAM
Show Fabric
Reachability
Helps Troubleshoot
Problems
Switch to Switch or
Host to Host
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 331
But What About
Fabricpath or VLAN
“Fabrics”?
Fabricpath SDN or Standard VLAN Deployment
Use Fabric Settings and Auto-Configuration Menus
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 333
Multiple Fabrics Architectures via One DCNM
DCI
DCNM gives you a consistent operations experience and single pane of glass
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 334
VXLAN / Fabric Recap...
• Multiple Fabrics on the same pane of glass
• Best Practice Templates for Underlay Provisioning
• Easy Overlay Deployment
• Manage Classic Configurations and new Fabrics
• VPC / STP networks
• Fabricpath
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 335
Cool Features for LAN
Fabrics
(Let’s Explore)
Features in DCNM
Top-Down Provisioning
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 337
Topology Views
Real-Time
Search
Detected VTEP
Health Score
(color)
Link Pop-Up Pop-Up Switch
Dashboard
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 338
Topology Views- VMM Integration
Display Connectivity
Details
Display connected
Physical Hosts
Display Port-Group
Display DVS/Vswitch
Details
Display VMs
Filter by VMM
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 339
Endpoint Locator
• How many hosts on vlan 10 on eth1/1
on Leaf10 at 11/01/2017 between 2am -
3am?
• How many networks and VRFs are
active on leafs 1-10?
• Network activity heat-map
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 340
Switch Dashboard Interfaces
Interface Page Programmable Show Commands
Interface History
Policy
Add I/F Edit shut / no shut Show
History
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 341
Template Library
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 342
Monitoring
Stack Traces
and show near-real-
time sample
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 343
Built-In REST API-Docs Using Swagger
https://<dcnm-server-IP>/api-docs
DCNM GUI uses
REST API
Inspect with
Browser Tools
[e.g. . Google
Developer Tools]
Automate
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 345
Switch
• Dynamic Arrangement
• Multi-Fabric/Overlay
• Arrange by Tier Activate Beacon
• [Core, Ag, Access Leaf, Spine etc..]
Switch Color
• Metadata Tags
Shows Health
• Show FEX links
Metadata Tags
• Device Pop-Over System & User-Defined
Switch Details
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Exploring Topology Side-By-Side Views
• Dynamic Arrangement
• Multi-Fabric/Overlay
• Arrange by Tier
• [Core, Ag, Access
Leaf, Spine etc..]
• Metadata Tags
• Show FEX links
• Device Pop-Over
• Side-By Side View
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 347
Azeem Suleman
Principal Engineer
Application Centric
Infrastructure (ACI)
ACI: An Innovative Approach to Policy Based
Segmentation
Provided Provided Provided
Contract Contract Contract
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 349
Application Policy Infrastructure Controller (APIC)
Root
Policy Virtual
Infra Fabric
Universe Network
Applications
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 350
ACI: The Elements
APICs L-Size (Recommended VMware VMs
3 Recommended for Production Physical for 1000+ physical leaf ports) Virtual
(Recommended for 2-4 leaves,
2 VMs + 1 Physical APIC)
At least 1 physical APIC required M-size (Recommended
for <1000 physical leaf ports)
Virtual
SPINES Modular Fixed Nexus vPod
9300 (vSpine)
Nexus 9500 (9332C, 9364C)
(w/9700 LCs)
LEAVES Virtual
Virtual/Container networking integration Fixed Nexus 9300 vPod
included (except vPod mode) (100M/1/10/25/40/50/100/400G) (vLeaf)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 351
The DC network before The DC network NOW
Classic modular switching
ACI
Supervisors (1 or 2)
APICs
(1,3 or more)
Fabric Modules (3- 5)
Up to 18 RUs Scale-up
SPINE
(2 to 6)
Linecards (Copper, Fiber,1/10G)
Zero-touch VXLAN
No STP
LEAVES
(1 to 200 or more*) Scale as you need
Single VXLAN Network**
Evolution from Nexus 5000 and Nexus 7000
Single chassis (e.g. Nexus 7000) * > 200 Leaves with MultiPod/Multi-Site
** Other topologies available (e.g. 3-tier, etc.)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 352
Cisco, as Open as • Standard APIs across portfolio
You Want it to Be • Programmable hardware
• Large ecosystem of partners
• Extensible for homegrown tools
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Simplify the Entire IT • Operational simplicity
Operations Lifecycle • From build to ongoing support
• Integrated automation
• Policy based management
Fully • Open API’s
Packaged
Systems Off The Shelf
ACI
Be Open
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
ACI: How difficult is it to bring it up?
Let’s start with a single site
LLDP
Exchange
Spine Layer Nexus 9000
1 Connect all leaves to spines
Connect APIC(s) to any leaf or leaves
Certificate
2
Validation
Console into to each of the APICs
DME Start
Follow the initial configuration wizard
• Spine – OOB, Inband management and 1 console per Sup for 95xx
• Leaf – OOB, Inband management and 1 console
• APIC – CIMC and dual home connection, standby APIC (if possible)
• Fabric Name, Fabric ID, Infra TEP Pool /22, Infra VLAN(3967), BD Multicast Range, NTP, AAA
• Export backups / snapshots periodically
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 355
ACI: How difficult is it to bring it up?
What tasks & configuration did ACI just saved me from doing manually on every switch
BEFORE NOW
External to Internal Route
redistribution (MBGP)
Multicast and Control Plane
(MBGP)
Tenant A Tenant B
A Tenant is a container for all
network, security,
troubleshooting and L4 – 7
service policies.
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 358
Where VRF is defined
Tenant A Tenant B
VRF 1 VRF 1 VRFs (contexts) are defined
within a tenant to allow
isolated and potentially
overlapping IP address
space.
VRF 2 VRF 2
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 359
What is Bridge Domain (BD)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 360
Bridge Domain
Forwarding L2 unknown unicast based on spine-proxy mapping database
or flood and learn over VXLAN
THIS doesn’t turn on or off the mapping database for MAC addresses.
MAC addresses are always learned in the mapping database
This option is only relevant if you do hardware-proxy forwarding and if “Unicast routing” is
enabled. ARP packets are flooded in the BD
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 361
Bridge Domain Recommendations
Enforce
Subnet
L2 Unknown ARP Unicast Subnet
Scenario Check for
Unicast Flooding Routing Configured
IP
Learning
IP Routed Traffic. No FW + LB, No Floating IP Hardware Proxy Disabled Enabled Yes (if Yes
required. No Silent Hosts required)
IP Routed Traffic. No FW + LB. Silent Hosts. Hardware Proxy Disabled Enabled Yes Yes
Non IP, switched traffic. Silent Hosts. Flood N/A Disabled No N/A
Hosts with IP address may float between Hardware Proxy Enabled Enabled Yes Yes
MAC. FW + LB. NIC Teaming
Migration – Extending L2 from ACI with L3 Hardware Proxy Enabled Enabled If required If required
GW still on legacy network
L2 Forwarding
Forward to
Yes Does spine knows No
Remote leaf Drop
remote Leaf Dst Mac
that floods it
Summary
Forward to Forward to Flood within
local port remote leaf BD Spine Proxy
L2 or L3 ?
L2
Test Production
2.2.2.0 IP Change 1.1.1.0
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 364
What is End Point Group (EPG)
Tenant A Tenant B
EPGs exist within a single
VRF 1 VRF 1 bridge domain only – they do
Bridge Domain 1 EPG Bridge Domain 1 EPG not span bridge domains.
Bridge Domain 2 EPG Bridge Domain 2 EPG
EPGs defines the policy
enforcement entities/classes.
VRF 2 VRF 2
Class-based policies are
Bridge Domain 3 EPG EPG Bridge Domain 3 EPG EPG
applied between EPGs
Bridge Domain 4 EPG Bridge Domain 4 EPG
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 365
Application Policy Logical Construct
Tenant
VRF 1 VRF 2
Network
Bridge Domain 172 Bridge Domain 10 Bridge Domain 100
Subnet 172.1.1.0/24
Subnet 10.1.1.0/24 Subnet 10.1.1.0/24
Subnet 172.1.2.0/24 Subnet 10.1.2.0/24
… …
Subnet 172.20.1.0/24
EPG web
EPG WEB EPG DB Policy “HTTP”
App
Policy “HTTP” EPG db
Policy “SQL”
EPG APP Policy “SQL”
EPG app
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 366
Application Policy Logical Construct
Mapping the Configuration to the Packet
Coke-Tenant
• ACI Fabric leverages VXLAN Encapsulation to build VRF 1
network overlay
Bridge Domain 1 EPG
• VXLAN Source Group is used as a tag/label to identify the
specific end point for each application function (EPG) Bridge Domain 2 EPG
VXLAN Header:
Flags Flags/DRE Source Class ID == EPG VNID == BD/VRF M/LB/SP
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 367
End Point Group (EPG) Definition
• An Endpoint group (EPG) is a set of devices (end points) that share the
same policy requirements.
• Classification can be based on:
Application
• VLAN Profile
• VxLAN
• MAC Address EPG EPG
• IP Address
• VM Properties etc.
EP EP EP EP
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 368
End Points (EPs)
• EPs are devices which attach to the network either virtually or physically, e.g.:
• Virtual Machine
• Physical Server (running Bare Metal or Hypervisor)
• External Layer 2 / 3 device
• Firewall / Load balancer etc. ACI Endpoint
Traditional Endpoint
- MAC or MAC/IP IPv4 is /32
L2 – MAC Table L3 – ARP Table Route
- MAC Address - IP / MAC - VLAN / VxLAN EPG (pcTag)
- VLAN - Interface
- Interface - Interface - VRF
- VRF - Flags Local, vPC, static, etc.
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 369
Endpoint Classification
Web App DB
Classification:
Classification: Classification: Classification:
L3_Out : Network/Mask
• EPG Classification on L3 Outside • EPG Classification on an access/server port is based on different attributes
is based on IP address • Port + VLAN, Port + VXLAN, Network/Mask
Network/Mask
• IP/MAC, VM Attributes for AVS attached VM’s
• IP & MAC Host Address
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 370
Understanding Networks and Groups Abstractions
Legend
Tenant Child/Parent Object
(fvTenant) Relationship (Pointer)
Application Bridge
Outside VRF Contract
Profile Domain
(fvCtx) (vzBrCP)
Filter
Network (fvAp) (fvBD)
Subnet
(fvSubnet)
Subject
Endpoint
Group
(fvAEPg)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 371
By default …
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 372
By default …
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 373
Intra EPG default can be changed
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 374
Every EPG belongs to a VRF and
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 375
Application Network Profile
A group of EPGs related to each other to represent an application
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 376
ACI: What changes?
Easy as 1-2-3-4-5
BEFORE NOW
Unclear network connectivity 2
Create Application Profiles
Show VLAN would show all and every VLAN per-Switch An Application Profile is a graphical representation of our network
without understanding how they connect between each configuration. Think of it as a “folder of VLANs” at the Fabric level.
other A Tenant may have multiple Application Profiles
Switch 1 Switch 5
Switch 2 Switch 6
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
ACI: What changes?
Easy as 1-2-3-4-5
BEFORE NOW
Create VLANs per Switch 3
Create End Point Groups (EPGs)
Add VLANs per Switch, name each of them and then configure We will create an EPG and name it just as we would with a VLAN. You
trunks to extend connectivity. Additionally configure HSRP/VRRP may also add one Bridge Domain per EPG with an IP address (just like
for Gateways at the distribution/core layer an SVI) in case you want ACI Anycast Gateway functionality
Switch(config)#feature hsrp
Switch(config)#interface vlan 1
Switch(config-if)#ip address 1.1.1.253 255.255.255.0
Switch(config-if)#no shut
Collapsed HSRP/VRRP Switch(config-if)#hsrp 1 Spine Layer
Core Switch(config-hsrp)#ip 1.1.1.1 255.255.255.0 Tenant Production
Gateways Switch(config-hsrp)#priority 100 Application Profile SAP
Switch(config-hsrp)#preempt
Switch(config-hsrp)#no shut VXLAN
802.1q Switch(config)#interface vlan 2
Switch(config-if)#ip address 2.2.2.253 255.255.255.0
Anycast GW Leaf Layer
Switch(config-if)#no shut
Switch(config-if)#hsrp 2
Access Layer Switch(config-hsrp)#ip 2.2.2.1 255.255.255.0
Switch(config-hsrp)#priority 100
Switch(config)#vlan 1
Switch(config-hsrp)#preempt
Switch(config-hsrp)#no shut
BD 1.1.1.1 BD 2.2.2.1
Switch(config-vlan)#name Netweaver
Switch(config)#vlan 2
Switch(config-vlan)#name HANA
EPG EPG
Switch(config)#int e1/1
Switch(config-if)#switchport mode trunk
Netweaver HANA
Switch(config-if)#switchport trunk allowed vlan 1-2
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 378
Contracts
• Contracts are semantics to specify EPG to EPG communication in ACI
• Communication policy includes filters (ACLs), QoS and Service Graphs
• Contract filters are similar to Access Control Lists
• Contracts can be defined between EPGs or between L3out External EPGs and regular
EPGs
Contract - MyContract
Subject
Service
Graph
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 379
EPGs Provide and/or Consume Contracts
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 380
Contract Scope Defines Where They Will Be
Applied
• Application Profile:
• Contract is applied between EPGs if they are of the
same AP
• VRF:
• Contract applied between EPGs if they are part of the
same VRF.
• Tenant:
• Contract applied if EPGs are in the same tenant, even
if different VRF
• Global:
• Contract can be exported, and is applied even if EPGs
may be part of different tenants
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 381
Contract Filters Define L2-4 Traffic
Filters can be re-used by many contracts
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 382
Contract Filters Define L2-4 Traffic (contd.)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 383
Configure Contracts for all EPG in a VRF (vzAny)
• vzAny represents the collection of EPGs that Tenant
belong to the same VRF, including L3 VRF1
external. BD1
EPG2
• With cross-VRF contracts, vzAny can be a
consumer, not provider
Tenant Shared Tenant Shared
Tenant ONE Tenant ONE
Services Services
EPG1
EPG1 VRF1 VRF Services
VRF1 VRF Services
EPG shared
EPG shared
vzAny service
vzAny service EPG2
EPG2
NOT “SUPPORTED”
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 384
ACI: What changes?
Easy as 1-2-3-4-5
BEFORE NOW
4
Create Contracts
Create ACLs per Switch/Port We will create a Contract to specify how 2 EPGs may talk between
Specify the type of traffic you want each switch to allow each other. This contract will be pushed to the whole fabric (physical,
virtual, etc.) consistently. NO complex IP + Ports to specify like ACLs
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 385
Types of Fabric Routes Ensure BGP RR
is configured to
enable MP-BGP
MP-BGP
overlay-1
L3Out-1 L3Out-2
E1 E2 ext
ext
1 BD-B1 BD-B2 2
subnet subnet subnet subnet
ext-S1 int-S1 int-S2 ext-S2
• Internal Routes: Subnets defined under BD are internal routes and create static pervasive routes
within the fabric.
• External Routes: Routes learned via a routing protocol or static routes configured under an L3Out.
These routes are redistributed into MP-BGP and advertise to all leafs that contain the VRF
• Transit Routes – Routes advertised between L3Outs.
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 386
Types of Fabric Routes – Internal Routes
Subnet: int-S2 3 Subnet int-S2 installed on border leaf
Scope: when creating contract
MP-BGP between EPG
Private to VRF E2 and external overlay-1
EPG ext2
Advertise Externally
Share Between VRFs
L3Out-1 L3Out-2
1
E1 E2 ext
ext
1 BD-B1 BD-B2 2 2
subnet subnet subnet C1 subnet
ext-S1 int-S1 int-S2 ext-S2
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 387
Types of Fabric Routes – External Routes
ext-S1
ospf, eigrp, static route RD: L1:V1
redistributed into bgp and RT: ASN:V1 MP-BGP
exported into mp-bgp
overlay-1
ext-S1
L3Out-1 L3Out-2
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 388
Types of Fabric Routes – Transit Routes
MP-BGP
overlay-1
ext-S1
ext-S1
L3Out-1 L3Out-2
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 389
L3 External Subnet Review
• External Subnets for the External EPG (Security Import)
Used to classify dataplane packets into external EPG for policy enforcement
• Export Route Control - filter Transit Routes advertised out of the fabric.
• Aggregate Export - allows prefixes to be aggregated together in export direction (0/0 or ::/0 only)
• Aggregate Import - allows prefixes to be aggregated together in import direction (0/0 or ::/0 only)
• Aggregate Shared Route - allows prefixes to be aggregated together for shared route control
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 390
ACI: What changes?
Easy as 1-2-3-4-5
BEFORE NOW
5
Configure IP Routing Create L3 Out
Configure the routing protocol you may need on each Specify on which leaf and port of the fabric you want to enable external
switch/router to learn routes coming from the outside routing. Those routes will be imported inside the ACI Fabric with BGP (auto-
configured) and Spines will serve as Route Reflectors. L3 Outs need a
contract to communicate to EPGs and BDs need to be associated to L3 Outs
OSPF Router
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 391
Global Settings
Best Practices Summary
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 392
ACI Fabric Endpoint Learning Evolution
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 393
Forwarding Flow
Drop and ARP
Forward to Does spine knows glean
remote leaf Dest IP in coop ? For destination
No
Yes IP
Summary
Flooded frame
Forward to
Yes
Does spine knows
No
Drop
remote leaf DMAC in coop ?
reached re mote
leaf
Forward to
Flood within Border Leaf
Forward to Forward to Forward to Forward to Drop
Spine Proxy Spine Proxy Per routing-
local port remote leaf BD (GIPo) local port remote leaf
table
Yes No
Hardware Does Leaf know
Flood
Proxy Dst IP as
L3OUT Routes?
L2 or L3 ?
L2 L3
(DMAC != ACI MAC) (DMAC == ACI_MAC)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 395
ACI: How do I start?
Easy as 1-2-3-4-5
5) Once all servers are migrated
Your existing network Your new ACI Fabric to the ACI Fabric, you may
remove your old gear
Internet/WAN If you add more leaves or spines,
Contract
VLAN 1 EPG 1 APIC will auto-discover and auto-
VLAN 2 EPG 2
configure them. It is that SIMPLE!
Nexus 7000
(or L2/L3 Boundary)
Nexus 9000
Spine Layer
802.1q
VXLAN
Nexus 5000 Nexus 9000
(or L2 Access/ToR) Anycast GW Leaf Layer
APIC Cluster
EPG 1
EPG 2
VLAN 1 1.1.1.0/24 1 1.1.1.0/24 2.2.2.0/24
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 396
ACI Software Release
Guideline
4 Direct Upgrade From One Long Lived To Next Long Lived R el ease Wil l Be Supported
5 Long Lived R el eases Are R ecommended For Networks That Wil l Not be Upgraded Frequentl y
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 397
ACI Software Release Cadence
Major Releases =>
Target
NEW !
ACI Multi-POD ACI Remote-Leaf Cloud ACI
Multiple Networks Physical Remote Leaf ACI Extensions to
(Pods) in a single extends an Availability AWS and Azure
Availability Zone Zone (Fabric) to Public Cloud
(Fabric) ACI 3.0 remote locations ACI 4.0
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 401
ACI Multi-Site
Multi-Site Orchestrator Site N
(MSO)
3 VM Cluster
VM VM VM VM VM VM VM
Any Routed IP Network
Site1 Site 2
VM VM VM VM VM VM VM VM VM VM VM VM VM VM
No Multicast <= 1s RTT Required (MSO APIC) Single central management (MSO)
Phased Changes (Zones) Up to 12 Sites, distributed gateway Automated L2 DCI VXLAN extension
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 402
ACI Multi-Site
Software and Hardware Requirements
• Support all ACI leaf switches (1st Gen, EX, FX, FX2) Any Routed Network
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 403
ACI Multi-Site
Software and Hardware Requirements
• Support all ACI leaf switches (1st Gen, EX, FX, FX2) Any Routed Network
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 404
ACI Anywhere Shipping
IP / WAN
CloudSec
MACSEC MACSEC
Today Future
VM VM VM
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 405
Remote Location A
ACI Remote Leaf RL
VM VM VM VM VM VM VM
Any Routed IP Network
Satellite DC
Remote Location B
RL
Pod 1 VM
VM VM VM VM VM VM VM
Brownfield
Remote Location C
RL
VM VM VM VM VM VM VM
Telco/Co-lo
VM VM VM VM VM VM VM
Zero Touch Auto <= 300 ms RTT Required Single central management
Discovery of Remote Leaf Up to 20 Remote Locations Automated L2 VXLAN extension
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 406
ACI Remote Leaf Requirements
Hardware & Software
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 407
ACI Anywhere: ACI Virtual Edge
Decoupled From Hypervisor Kernel APIs
Multi-Site Orchestrator
Data Center 1
Data Center 2
(ACI Site 1) IPN
IP Network
(ACI Site 2)
WAN
Local Router
VM
ACI Virtual Edge VM
Nexus 9000
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 408
ACI Anywhere: ACI Virtual Pod
Extend ACI To Bare-metal Clouds, Remote Data Centers, and Legacy Infrastructure
Multi-Site Orchestrator
Data Center 1
Data Center 2
(ACI Site 1) IPN
IP Network
(ACI Site 2)
WAN
Local Router
Pod 1 Pod 2
VM
ACI Virtual Edge VM
Nexus 9000
VM VM VM VM VM VM VM
VM VM VM VM VM VM VM (Remote Leaf Network)
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 410
Challenges in building a Multi Cloud environment
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 411
ACI Anywhere: Public Cloud Extensions
Seamlessly Connect Multiple Data Centers
Multi-Site Orchestrator
Data Center 1
Infra VPC
(ACI Site 1) IPN
IP Network
Nexus 9000
(DC Network) VXLAN User VPC User VPC
Encrypted L2 Extension
Encrypted
WAN
Local Router
VM EPG
Web ACI Virtual
Contract
APPEdge
EPG
Contract VMEPG
DB
SG
Web
SG Rule
SG
APP
SG Rule
SG
DB
Nexus 9000
VM VM VM VM VM VM VM
Customer
Premise AWS
AWS Instances
Internet
Router Internet
Gateway
VM VM VM AWS Instances
User VPC-2
AWS Region
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 413
For your info
& reference
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 414
For your info
& reference
Network Adapter
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 415
For your info
& reference
Cloud Hierarchy
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 416
For your info
& reference
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 417
Use case #1: Hybrid-Cloud Deployment
Multi-Site Orchestrator
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 418
Use case #2: Cloud First with Multiple Regions
Cloud APIC
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 419
Use case #3: Multi-Cloud
Multi-Site Orchestrator
https://apic/doc/html/
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 422
Visore – Web Based MO Query and Browser Tool
https://<IP>/visore.html
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 423
Network Monitoring and Troubleshooting Tools
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 424
Capacity Dashboard
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 425
Configuration Rollback
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 426
Endpoint Tracker
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 427
Traffic Map
Help visualize and quickly spot high traffic density and underutilized
nodes in the Cisco ACI™ fabric.
A grid is presented with a list of node IDs or vPC pairs on each axis.
Traffic flow between a given pair of nodes or between a vPC pair is
presented using color-coded cells on the heat map.
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 428
What is Ftriage
ACI Debugging
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 429
3.1
Tabular Views To See Individual
Faults
Port / Interface State
Changes
Fault List
Link Flapping Table
3.2
User Can
Improved Change
Folder Top GUI
Structure For
Header In Order To Admin Security Management GUI Alias
Fabric / Access Policies And
Distinguish L4-L7
Between Multiple
Apics
Fabric Fabric Fabric External Access
Fabric Fabric
APIC Alias Fabric Access
Policies
Policies
TECDCN-2002
Policies
Policies © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 430
3.1
Simplified Workflows To
Guide Users Step By Step
In A Single View
Infra Workflows
Configuration
3.2
3.2
Topology by Zone
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 432
Usability Enhancements 4.1
Unified Reskin
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 433
Usability Enhancements 4.1
Alert List
• User can mark any tab as their favorite tab and they will be navigated to that tab
every time the policy load
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 435
ACI 4.2: Usability Enhancements 4.2
Simplify L3Out in 3 Steps
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco ACI App Center Apps
Programmable Infrastructure: Open API’s for Value Added Applications
https://aciappcenter.cisco.com/
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 437
Insights & Assurance
Network Insights & Network Assurance
OpStack
Architecture and Planning
NAE Policy Explorer
• Network Policy exploration
• Ad-hoc connectivity and segmentation
discovery
Network Operations
Network Assurance Engine (NAE)
• Policy/ Control/Data plane Assurance
• Incident and Problem Management
• Compliance and Audit
App on APIC
Note: NAE PE capability
will also be available in
NAE itself in the future
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 440
Network Assurance Engine: How It Works
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 441
User Interface: Centered Around “Smart Events”
Incidence and
Change Compliance and
Problem
Management Visualization
Management
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 442
Network Insights Applications
Providing Network Health Visibility & Enabling Proactive Insights
New Apps
Enhance Availability, Uptime & Network Wide Visibility © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 443
Network Insights Applications
Apps
DCNM APIC
Platform
App Hosting Framework App Hosting Framework
App Store App Store
Data collection and ingestion Data correlation and analysis Data visualization and action
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 444
Network Insights Resources
Understand What’s Running In Your Network
Network
Event Analytics
Insights
Resources
Flow Analytics
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 445
Network Insights Resources
Understand What’s Running In Your Network
Resource
Event Analytics Dashboard Analytics
Data Collection
Anomaly
Detection
Remediation
Event Analytics Dashboard Displays Faults, Events, And Audit Logs In A Time Series Fashion.
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 446
Network Insights Resources
Understand What’s Running In Your Network
Packet Drops
Latency
Flow Analytics Dashboard Displays Key Indicators Of Infrastructure Data Plane Health.
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 447
Network Insights Advisor
Before Network Insights
After Network Insights Advisor
Advisor
Time to resolve issue in Hours
Notice/Anomaly Detection 4
Success NIA immediately flags anomalies NIA helps prevent Significant OPEX, CAPEX and
metrics and optimizes your network downtimes/outages time savings
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 448
Network Insights Advisor
Anomalies
• Compliance, Consistency, unplanned
events
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 449
Network Insights Resources For your info
& reference
System
• Resource Utilization (fabric wide)
• Trend Monitoring
(rising/falling)
• Fabric Capacity
• Environmental
Operations
• Statistics
• Flow Analytics
• Event Analytics
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 450
Network Insights Advisor For your info
Notify About Anomalies & reference
Known Anomalies
Weekly
Sync Recommend:
Upgrade S/W to NXOS
7.0(3)I7(3) in SAL1820SDRE
NIA
2 Detect
Insight
DB Fabric
Monitor 1
4 Implement
Notifications
s Detected:
PSIRT: SAL1820SDRE
p
3 Alert / Inform
Recommend:
Upgrade S/W to NXOS
7.0(3)I7(3) in SAL1820SDRE
NIA
Push
Insight
Notification
DB Fabric
Monitor 1
4 Implement
p PSIRT
2 Identify Switches
s S/W p p p
Notify
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 453
Browse - Anomalies For your info
& reference
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 454
Detail – Process Details For your info
& reference
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 455
System - Resource Utilization For your info
& reference
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 456
For your info
& reference
Resource
Utilization
Details
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 457
Operations – Flow Analytics For your info
& reference
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 458
Flow Details Drill-Down For your info
& reference
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 459
Operations – Event Analytics For your info
& reference
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 460
For your info
& reference
Flow Details
Drill-Down
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Nicolas Delecroix
Technical Marketing Engineer
ACI Programmability
The APIC REST API is the Core of ACI Programmability
REST API
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 463
ACI Object Model
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 464
How to Identify Objects
Distinguished Name
fvAp fvAEPg
vzBrCP vzSubj
fabricTopology fabricPod
fabricNode
EPG in tenant “Cisco” under application “DNS” Interface Eth1/4 on leaf 102 in pod 1
uni/tn-Cisco/ap-DNS/epg1 topology/pod-1/paths-102/pathep-[eth1/4]
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 465
The REST API Exposes the Object Model
http://apic/api/mo/uni/tn-Cisco/ap-Software/epg-Download.xml
http://apic/api/class/l1PhysIf.xml?query-target-filter=eq(l1PhysIf.speed,"10G")
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 466
Create / Update Operations
<fvTenant name="NewTenant">
<fvAp name="NewApplication">
<fvAEPg name="WebTier">
<fvRsPathAtt encap="vlan-1” mode=“regular”
tDn="topology/pod-1/paths-17/pathep-[eth1/1]"/>
</fvAEPg>
</fvAp>
</fvTenant>
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 467
Query Target Filters
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 468
Object Store Browser
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
ACI Python SDK
ACI Python SDK, AKA Cobra
• Cobra is a native Python API library that abstracts the APIC REST API
• Supports lookups, creations, modifications, deletions
• Objects in Cobra are a 1:1 representation of objects in the ACI object model
• All data has client side consistency checks performed
• Packaged as .egg, install with easy_install
from cobra.model.fv import Tenant
from cobra.model.pol import Uni
from cobra.mit.request import ConfigRequest
uniMo = Uni('')
t = Tenant(uniMo, 'Tenant1') # We create a tenant as a child of the universe
c = ConfigRequest() # Create a ConfigRequest to contain our new object
c.addMo(t) # Add our tenant to the ConfigRequest
moDir.commit(c) # Commit our configuration request
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 472
Simple 3-Tier App with Cobra
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 473
We auto-generated the ACI Python API…
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 474
• Use the GUI to
perform actions
• GUI creates REST
• API Inspector
shows REST
• Arya auto-
generates code
from REST
• So you can
automate tasks,
without having to
write any code
• Available at
http://github.com/
datacenter/ACI
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 475
Ansible for ACI
Ansible for ACI
REST API
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 477
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 478
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
You can create
arbitrarily
complex/rich items.
This example shows
how to use a single
play to create
provider or consumer
ACI contracts. No
need to create two
plays (one for
consumer contracts,
one for provider)!
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 481
Query ACI
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Conclusions
Evolving Network Designs – Routed Fabrics
ACI
• VXLAN Routing APIC
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 484
API
Network Stack
Orchestration/ Policy
Multi Site
Federation
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 485
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
cs.co/ciscolivebot#TECDCN-2002
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 486
Complete your online
session survey
• Please complete your Online Session
Survey after each session
• Complete 4 Session Surveys & the Overall
Conference Survey (available from
Thursday) to receive your Cisco Live T-
shirt
• All surveys can be completed via the Cisco
Events Mobile App or the Communication
Stations
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 487
Continue Your Education
TECDCN-2002 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 488
Thank you