BRKDCN 2304
BRKDCN 2304
BRKDCN-2304
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Session Goals and Non-Goals
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Related Sessions
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Quick Break
Before we Start
With Some Help of my Friends
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Agenda
• Introduction
• Multi-Tenancy Functionality in Enterprise Data Centers
• Data Plane and Control Plane Considerations with VXLAN EVPN
• Layer 4-7 Services Integration
• Other useful Things?
• Fabric Provisioning and Management
• Conclusion
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
What is Multi-Tenancy?
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
What Does this Mean for Data Centers?
Service Orchestration
Compute
Separated
Shared
Storage Resources Network
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Agenda
• Introduction
• Multi-Tenancy Functionality in Enterprise Data Centers
• Data Plane and Control Plane Considerations with VXLAN EVPN
• Layer 4-7 Services Integration
• Other useful Things?
• Fabric Provisioning and Management
• Conclusion
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Introduction
What is Multi-Tenancy for the Data Center
Infrastructure?
• Process of creating an environment where resources are split and combined, based
on consumption, demand, supply and policies
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Multi-Tenancy ”Layers”
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Rules and Policies
Tenant-2
• Applications, network services, and
tenant identification
• Enforcement of separation between
segments
Multi-Tenant
• Providing network policy
Network
• Controlled shared access to select networks and
resources
Tenant-1
Tenant-3
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Agenda
• Introduction
• Multi-Tenancy Functionality in Enterprise Data Centers
• Data Plane and Control Plane Considerations with VXLAN EVPN
• Layer 4-7 Services Integration
• Where to Head Next?
• Fabric Provisioning and Management
• Conclusion
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Multi-Tenancy
Functionality in
Enterprise Data
Centers
Multi-Tenancy Functionality
Functionality
Mechanism
Identifier
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Layer-2 Network
Segmentation
Network Segmentation
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Micro-segmentation
Network Micro-Segmentation in Traditional
Networks
• Private VLAN (PVLAN) is a good example of such mechanism
• Restricts access within a segment
• Grants access to shared service or gateway
Shared
Host A resource
Host B Default
Network Fabric
Gateway
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
ACI Micro-segmentation
BRKDCT-3001: Leveraging Micro Segmentation to Build Comprehensive Data Center Security Architecture
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Tenant
Segmentation
Layer-2 Segment Termination
Default VRF
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Restricting Forwarding between Segments with
ACL
• Access Control Lists (ACL) between VLANs
Destination VLAN 10 VLAN 20 VLAN 30 VLAN 40
Source
Tenant-A
VLAN 10 SVI 10
VLAN 10 ✔ ✔ ✘ ✘
VLAN 20 ✔ ✔ ✘ ✘
VLAN 20 SVI 20
VLAN 30 ✘ ✘ ✔ ✔
VLAN 30 SVI 30
✘ VLAN 40 ✘ ✘ ✔ ✔
• Number and complexity of ACLs becomes too
VLAN 40 SVI 40 high
Tenant-B • No overlapping IP subnets between tenants
Default VRF
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Routing Domain – VRF
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Question: How do we bring L2
and L3 separation together on a
device and within a fabric?
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Agenda
• Introduction
• Multi-Tenancy Functionality in Enterprise Data Center
• Data Plane and Control Plane Considerations with VXLAN EVPN
• Data plane
• Control plane: Underlay and Overlay
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
What is Data Plane and Control Plane?
• Data plane – everything related to forwarding of the actual data: MAC address
tables, routing tables, ARP/ND tables, port and fabric buffers, frame/packet/header
formatting etc.
• Control plane – everything related to populating and managing above mentioned
tables. For example:
• SpanningTree protocols build loop-free switched networks
• OSPF or MP-BGP protocols populate and distribute routing information
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
What is a Fabric?
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
What is a Fabric?
Spine
L3 Leaf
L2
VM VM Physical
Hosts OS OS
Virtual
*Clos, Charles (Mar 1953). "A study of non-blocking switching networks". Bell System Technical Journal.
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Data Plane
Choice of Data Planes
• VXLAN
• MPLS Functionality
Mechanism
Identifier
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Classic Ethernet IEEE 802.1Q Format
Classic Ethernet
• 12 bit namespace provides 4096 Frame
DMAC SMAC 802.1Q Etype Payload CRC
unique VLAN IDs
• Data-Plane based learning, also
known as Flood & Learn Destination MAC (DMAC)
TPID TCI
4 bytes 802.1Q 0x8100 PCP CFI VID
(16 bits) (3 bits) (1 bits) (12 bits)
Data (Payload)
CRC/FCS
VLAN ID
12 bits
TPID = Tag Protocol Identifier, TCI = Tag Control Information, PCP = Priority Code
Point,
CFI = Canonical Format Indicator, VID = VLAN Identifier
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Dot1Q Use Cases
VLAN 10 VRF-A
VLAN 20 VRF-B
VLAN 30 VRF-C
VRF-A VRF-A
VRF-C VRF-C
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
VXLAN Taxonomy (1)
Edge Device
Edge Device
Local LAN
Local LAN Segment
IP Interface
Segment
Physical
Host Physical
Edge Device
Local LAN Host
Segment
Virtual Switch
Virtual Hosts
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
VXLAN Taxonomy (2)
VTEP
VTEP
V V
Local LAN
Local LAN Segment
Segment Encapsulation
Physical
Host VTEP V Physical
Local LAN Host
Segment
Virtual Switch
VTEP – VXLAN Tunnel End-Point
VNI/VNID – VXLAN Network Identifier
Virtual Hosts
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
How is this different from
STP/802.1Q based
deployments?
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Add a Control Plane as a Secret
Sauce!
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Let’s Pick the
Control Plane
Standards Based Control-Plane for Fabrics
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
What Makes Control-Plane based Fabrics so
Special?
• Underlay Control plane
• Discover and learn the fabric topology, i.e. location of fabric
nodes
Fabric
• Overlay Control plane Control
• Learn and distribute the end-host reachability information
Mechanism
Identifier
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Underlay Control-
Plane
Underlay Control-Plane for VXLAN with EVPN
RR RR
MAN/WAN
• Use MP-BGP on the leaf nodes to distribute the end-host reachability information
iBGP Adjacencies
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Overlay Control-Plane for VXLAN with EVPN
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
The Old Fashioned Way to Configure Default
Gateway
• SVIs for Layer-2 segments
configured on all Leaf nodes
• Full sync of ARP & MAC states of all
VLANs across the Network
• Flooding to ALL nodes in the network
• Source and Destination VLAN has
to exist on Switch where routing
happens
• Unnecessary waste of resources
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
The Scoped Configuration with Distributed
Gateway
• Logical Configuration only instantiated at
respective Leaf (scoped)
• ARP & MAC state only for local hosted
VLAN/Segment-ID and SVI
• Flooding only to respective Leafs (where
VLAN/Segment-ID is instantiated)
• Host demanded provisioning; two models
available
• top-down Orchestration, push to Leaf
• bottom-up Orchestration, pull by Leaf
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Data is Routed via Transit Segment
Host Y
VLAN 55
Host A
VLAN 43
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
VNI and VLAN IDs
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Let’s Sum It Up
Building Blocks for Multi-Tenancy in EVPN
Fabrics
L3- L2-
VRF VLAN
L3- L2-
VNI VNI
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Layer-2 Multi-Tenancy
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
L3 Separation – VRF
VRF-B
VNI 30000 SVI 30
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Multi-Tenancy ”Layers”
Fabric
Control
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Agenda
• Introduction
• Multi-Tenancy Functionality in Enterprise Data Center
• Data Plane and Control Plane Considerations with VXLAN EVPN
• Layer 4-7 Services Integration
• Types of Service Deployment
• How to attach Services Nodes?
• Service Node Deployment with VXLAN EVPN
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Layer 4-7
Services
Integration
Types of Service
Deployment
Prerequisites for Connecting Services
• This will affect what network configurations are deployed in the fabric
• Be sure to define upfront the role of the service node (policy
enforcement intra-tenant, inter-tenant, etc.)
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Intra-Tenant Services
Apply PBR
Tenant-A Tenant-B
FW as default FW as
gateway VLAN 10 VLAN 40 L3 hop
VLAN 20 VLAN 30
Apply PBR
Option 1 : FW as default GW
Option 2 : PBR with FW as L3 hop
Option 3 : FW in transparent (less common)
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Inter-Tenants Services
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Tenant Edge Services
Filtering for North-South Communication
• Filtering/policy enforcement between Tenants and the external
world
Internet/
Per tenant physical WAN
FW or virtual context
Tenant-A Tenant-B
VLAN 10 VLAN 40
Tenant as a security zone:
allows intra-tenant
communication
VLAN 20 VLAN 30
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Let’s Translate
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
How to Attach
Services Nodes?
Service Node Deployment Examples
Cluster Active/Stan
dby
M0/0
Management Network
Primary
M0/0
Inside Outside
M0/0
Secondary
M0/0
Cluster
Control Links
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
How to Physically Connect Service Nodes
Fabric Fabric
BGP AS#100 BGP AS#100
Cluster Active/Standby
For clustered systems vPC is OK For Active/Standby systems vPC
(Cluster nodes need to be attached to the same vPC is NOT a recommended choice
pair) (no Multicast routing via vPC, no IPv6, etc.)
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Where and How to Connect Services Nodes
• Border Leaf
• Inter-VRF
SL Service Leaf
• External RR RR
L Leaf
Fabric
• Service Leaf BGP AS#100 BL Border Leaf
• Intra-VRF, Inter-VLAN
• Not recommended
H1 H2
Internet/ 10.10.10.20
(VLAN 40)
20.10.10.20
(VLAN 111)
WAN VRF-A VRF-B
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Logical
Connectivity to an
EVPN Fabric
Transparent Insertion of Active/Standby Services
BL BL
• IGP
• 2 SVIs per VRF for peering to
11 12
upstream Router 10 11 10 13 13 12
• BGP
• Needs only a single SVI per VRF Failover
State
Backup link
Primary link
BL Border Leaf
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Routed Insertion of Active/Standby Services
BL BL
10 11 10 13 13 12
State
Backup link
Primary link
BL Border Leaf
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Routed Insertion of Clustered Services
BL vPC Domain
BL
10 11 10
•
13
Backup link
Primary link
BL Border Leaf
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Transparent Insertion of Clustered Services
vPC Domain
BL BL
10 11 10
•
13
ClusterLink
Backup link
Primary link
BL Border Leaf
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
External Virtual
Router/Service
Attachment
External Virtual Router/Service Attachment to the
Fabric
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
External Virtual Node Attachment to the Fabric
vpc1 vpc2
vlan10 vlan10
vlan 10 vlan 10
vn-segment 30010 vn-segment 30010
interface bond0
ip address 192.168.10.100/24
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
External Virtual Node Attachment to the Fabric
vlan 10 vlan 10
Lo10 Lo10
vn-segment 30010 vn-segment 30010
vlan 3967 10.10.10.11/32 10.10.10.12/32 vlan 3967
system nve infra-vlans 3967 vpc1 vpc2 system nve infra-vlans 3967
Supported
neighbor 10.10.10.12
remote-as 65501
ebgp-multihop 5
update-source loopback 10 86
External Virtual Node Attachment to the Fabric
Virtual Nodes Connected to Separate Leaf Pairs
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
External Virtual Node Attachment to the Fabric
Virtual Nodes Connected to Separate Leaf Pairs
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
EVPN External
Connectivity
How to Integrate Service
3 Ways to route to or via a
Service:
• Dynamic/Static Routing RR RR
SL Service Leaf
• Recursive Next Hop (RNH) L
Leaf
Fabric
• Host Mobility Manager Route
(HMM) Tracking
BGP AS#100 BL
Border Leaf
BL1 L1 L2 SL1
H1 H2
Internet/ 10.10.10.20
(VLAN 40)
20.10.10.20
(VLAN 111)
WAN VRF-A VRF-B
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
VXLAN/EVPN Fabric External Routing
WAN
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Dynamic/Static Routing
Firewall establishes routing adjacencies with both
the Border Leaf and the Edge Router
OSPF VRF-A
Internet/ H1
10.10.10.20
H2
20.10.10.20
WAN OSPF VRF-B
(VLAN 40)
VRF-A
(VLAN 111)
VRF-B
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
VXLAN/EVPN Fabric External Routing
WAN
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
VXLAN/EVPN Fabric External Routing (eBGP)
# Sub-Interface Configuration
interface Ethernet1/1
no switchport
interface Ethernet1/1.10
encapsulation dot1q 10
VBL
VRF VRF VRF V2
vrf member VRF-A A B C
ip address 10.254.254.1/30
V3
# eBGP Configuration
router bgp 100
… Advertise external learned routes
vrf VRF-A
into EVPN (Route-Type 5)
V1
address-family ipv4 unicast
advertise l2vpn evpn
aggregate-address 10.0.0.0/8 summary-only Advertise an aggregate of the internal
neighbor 10.254.254.2 remote-as 65599 prefixes
update-source Ethernet1/1.10
address-family ipv4 unicast
WAN
Ensure that non-necessary routes are not advertised
AS# 65599
towards the External Network
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
VXLAN/EVPN Fabric External Routing (eBGP)
# Interface Configuration
VBL
interface Ethernet1/1.10
encapsulation dot1q 10
vrf member VRF-A VRF VRF VRF V2
ip address 10.254.254.2/30 A B C
# eBGP Configuration V3
router bgp 65599
…
vrf VRF-A
address-family ipv4 unicast
neighbor 10.254.254.1 remote-as 100
V1
update-source Ethernet1/1.10
address-family ipv4 unicast
WAN
AS# 65599
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
VXLAN/EVPN Fabric External Routing (OSPF)
# Sub-Interface Configuration
interface Ethernet1/1
no switchport
interface Ethernet1/1.10
encapsulation dot1q 10
vrf member VRF-A
ip address 10.254.254.1/30 VBL
VRF VRF VRF V2
ip router ospf 1 area 0.0.0.0
A B C
ip ospf network point-to-point
# BGP Configuration V3
router bgp 100
… Advertise external learned routes
vrf VRF-A
address-family ipv4 unicast into EVPN (Route-Type 5) V1
advertise l2vpn evpn
redistribute bgp 100 route-map OSPF-BGP* Redistribute internal prefixes with route-map
WAN
*Ensure that non-necessary routes are not advertised
towards the External Network
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
What about Static
Routes
Check Availability of Static Routes Next Hop
• 2 Solutions
• Recursive Next Hop (RNH)
• Host Mobility Manager Tracking (HMM Tracking)
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Recursive Next Hop (RNH)
Fabric
BGP AS#100
VTEP
10.10.10.21 BL1 L1 L2
99.99.99.0/2
99.99.99.0/24
Internet/ H1
10.10.10.20
H2
20.10.10.20
4
WAN VRF-B
20.20.10.20
(VLAN 40)
VRF-A
(VLAN 111)
VRF-B
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Recursive Next Hop (RNH)
99.99.99.0/2
99.99.99.0/24
Internet/ H1
10.10.10.20
H2
20.10.10.20
4
WAN VRF-B
20.20.10.20
(VLAN 40)
VRF-A
(VLAN 111)
VRF-B
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Recursive Next Hop (RNH)
'*' L2#sh
denotes ip best
routeucast
vrf VRF-B 99.99.99.0
next-hop
'**'IPdenotes
Route Table
best for VRFnext-hop
mcast ”VRF-B"
Fabric
'*' denotes best ucast next-hop
'[x/y]' denotes [preference/metric] BGP AS#100
'**' denotes
'%<string>' best
in via mcast
output next-hop
denotes VRF <string>
'[x/y]' denotes [preference/metric]
'%<string>' in via output denotes VRF <string>
20.20.10.20/32, ubest/mbest: 1/0 VTEP
BL1 L1 L2
10.10.10.21
*via 10.10.10.21%default, [200/0], 08:39:50, bgp-100, internal, tag 100
99.99.99.0/24,
(evpn) segid: 50001 ubest/mbest: 1/0
tunnelid: 0x1afb00c9 encap: VXLAN
*via 20.20.10.20, [1/0], 00:00:11, static segid: 50001 tunnelid: 0x1afb00c9 e
ncap: VXLAN
99.99.99.0/2
99.99.99.0/24
Internet/ H1
10.10.10.20
H2
20.10.10.20
4
WAN VRF-B
20.20.10.20
(VLAN 40)
VRF-A
(VLAN 111)
VRF-B
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
HMM Tracking
Fabric
BGP AS#100
VTEP
10.10.10.21 BL1 L1 L2
99.99.99.0/2
99.99.99.0/24
Internet/ H1
10.10.10.20
H2
20.10.10.20
4
WAN VRF-B
20.20.10.20
(VLAN 40)
VRF-A
(VLAN 111)
VRF-B
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
HMM Tracking
VTEP
10.10.10.21 BL1 L1 L2
99.99.99.0/2
99.99.99.0/24
Internet/ H1
10.10.10.20
H2
20.10.10.20
4
WAN VRF-B
20.20.10.20
(VLAN 40)
VRF-A
(VLAN 111)
VRF-B
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
HMM Tracking
99.99.99.0/2
99.99.99.0/24
Internet/ H1
10.10.10.20
H2
20.10.10.20
4
WAN VRF-B
20.20.10.20
(VLAN 40)
VRF-A
(VLAN 111)
VRF-B
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Policy Based
Routing for EVPN
Policy-Based Routing with VXLAN
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
PBR Support for the VXLAN BGP EVPN Fabric
feature pbr
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
PBR Support for the VXLAN BGP EVPN Fabric
feature pbr
interface Vlan2500
ip L3 VXLANroute-map dummy
policy
Leaf ipv6 policy route-map bummy
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Service Node
Deployment in
EVPN
Inter-VRF Scenario
Inter-VRF Firewall: Transparent Mode
Border Leaf
1
Internet/ eBGP for VRF-A
H1
SIP: 10.10.10.20
10.10.10.20
H2
20.10.10.20
WAN DMAC: G_MAC
SMAC: H1_MAC
(VLAN 40)
VRF-A
(VLAN 111)
VRF-B
VLAN 40
FW Active
Internet/ FW Standby
WAN
= Spine = Leaf = BorderLeaf = Fabric RR = Route-Reflector = Edge-Router / DCI-
Interface Device
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Inter-VRF Firewall: Transparent Mode
Redundant Deployment (Cluster)
• Peering is done on a VRF basis via an
SVI on each Border Leaf to FW RR RR
Internet/
WAN
= Spine = Leaf = BorderLeaf = Fabric RR = Route-Reflector = Edge-Router / DCI-
Interface Device
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Inter-VRF Firewall: Routed Mode (Layer 3)
Internet/ H1
10.10.10.20
H2
20.10.10.20
WAN OSPF VRF-B
(VLAN 40)
VRF-A
(VLAN 111)
VRF-B
FW Active
Internet/ FW Standby
WAN
= Spine = Leaf = BorderLeaf = Fabric RR = Route-Reflector = Edge-Router / DCI-
Interface Device
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
Inter-VRF Firewall: Routed Mode
Redundant Deployment (Cluster)
• Peering is done on a VRF basis via an
SVI on each Border Leaf to FW RR RR
Internet/
WAN
= Spine = Leaf = BorderLeaf = Fabric RR = Route-Reflector = Edge-Router / DCI-
Interface Device
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
Intra-VRF Scenario
Intra-VRF, Inter-VLAN Firewall: Transparent
Mode
• Inter-VLAN traffic flows for a single VRF can RR RR
also be filtered by the Firewall
• These secured VLANs are deployed in L2 Fabric
forwarding mode, i.e. Layer 2 Profile is BGP AS#100
applied to these VLANs on Leaf nodes
• With Firewall in transparent mode, Border
BL1
Leaf or Service Leaf becomes the VLAN L1 L2
termination point
• It is important to ensure that Firewall does
not propagate STP BPDUs, as the ports on
Leaf nodes should be configured with BPDU Internet/ H1 H2
10.10.10.20 20.10.10.20
Guard
WAN (VLAN 40)
VRF-A
(VLAN 111)
VRF-A
Load-Balancer
• Load Balancer can connect to any Leaf, Services Leaf or RR
a Border Leaf with Layer 3 point-to-point link
the following:
• “Back-end” communication with the applications
servers happens over a dedicated “Services
Segment” link.
OSPF=>iBGP
• Load balancer is statically configured with the L1 SL1
default route through the second arm (Services
Segment) VIP-X1: 50.10.10.100
mapped to
Server 1: 20.10.10.11
Server 2: 20.10.10.12
H1 Server1 Server2
10.10.10.20 20.10.10.11 20.10.10.12
(VLAN 40) (VLAN 111) (VLAN 111)
VRF-A VRF-A VRF-A
RR
EVPN
RR
VRF/VRFs Space
RR RR
DC #1 DC #2
EVPN iBGP Border Leaf Border Leaf EVPN iBGP
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Leaf Leaf
Inter-DC
EVPN eBGP
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Multi-Pod with Services
iBGP eBGP iBGP
Spine Spine VXLAN Overlay
RR
EVPN
RR
VRF/VRFs Space
RR RR
DC #1 DC #2
EVPN iBGP Border Leaf Border Leaf EVPN iBGP
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Leaf Leaf
Inter-DC
EVPN eBGP
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Multi-Fabric
Spine
Next hop Self Next hop Self
Spine
VXLAN Overlay
RR
EVPN
RR
VRF/VRFs Space
RR RR
Inter-DC
eBGP
DC #1 DC #2
iBGP Border Leaf Border Leaf iBGP
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Leaf Leaf
Failure DomainGlobal
Containment:
Default VRF
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Multi-Fabric with Services
Spine
Next hop Self Next hop Self
Spine
VXLAN Overlay
RR
EVPN
RR
VRF/VRFs Space
RR RR
Inter-DC
eBGP
DC #1 DC #2
iBGP Border Leaf Border Leaf iBGP
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Leaf Leaf
VLAN Hand-off
OTV OTV OTV OTV
OTV/VPLS Domain
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Multi-Fabric with Services
Ensure Traffic symmetry going out of
and into fabric
Spine
Next hop Self Next hop Self
Spine
VXLAN Overlay
RR
EVPN
RR
VRF/VRFs Space
RR RR
Inter-DC
eBGP
DC #1 DC #2
iBGP Border Leaf Border Leaf iBGP
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Leaf Leaf
VLAN Hand-off
OTV OTV OTV OTV
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
Network Services
Integration Models
with VXLAN Multi-
Site
VXLAN Multi-Site and Network Services Integration
WAN
Active FW Standby FW
WAN
Independent Active/Standby pairs deployed in
Active/Standby Active/Standby separate Sites
Inter-Site
Network
FW FW
VTEP VTEP VTEP VTEP
Spine VXLAN EVPN Spine Spine VXLAN EVPN Spine Need to avoid the creation of asymmetric paths
VTEP
Site1
VTEP VTEP VTEP VTEP
Site2
VTEP VTEP VTEP
crossing different active FW nodes
Baremet Baremet
Only possible for N-S flows with perimeter FWs and
host routes advertisement or with PBR
al al
Active/Standby FW Active/Standby FW
WAN
Site1
Spine VXLAN EVPNSpine
Site2
Individual mode: supported with Cisco ASA software
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
and hardware for N-S and E-W flows
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
Active/Active FW Cluster Bareme
tal
Active/Standby
Pair across Sites
Active and Standby pair deployed across Sites
Inter-Site
DCI
Network
…. ….
VTEP Multi-Site VTEP VTEP Multi-Site VTEP
VIP1 VIP2
Fabric BGW BGW BGW BGW
Site1 Site2
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Active Standby
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Active/Standby Pair across Sites
Deployment Considerations
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
FW as Default
Gateway Peering
with the Fabric
Active/Standby Pair across Sites 1
FW as Default Gateway Peering with the Fabric
Logical View
• FW allows to apply intra-tenant security
External L3 policies (east-west) and between an internal
Routing function Domain subnet and the external L3 domain (north-
of the VXLAN
EVPN Fabric south) or a subnet in a different tenant (inter-
tenant)
Site 1 Inter-Site Site 2
Network • FW inside network(s) deployed as L2-only can
be extended across sites to allow flexible
IGP/BGP
Peering deployment for endpoints
Active Standby • FW outside interface used to peer with the
fabric
• The active FW can only peer with the leaf node(s)
in the local fabric (on a L3 interface or regular SVI)
• No need to extend the FW outside BD across sites
BDs Extended
via Multi-Site
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
Active/Standby Pair across Sites 1
FW as Default Gateway Peering with the Fabric
Logical View
External L3
Routing function Domain • After an active FW failure, two sequential
of the VXLAN events must happen:
EVPN Fabric
1. The standby FW must detect the failure
Site 1 Inter-Site Site 2 event and take over the active role
Network
2. Routing adjacencies must be re-
IGP/BGP established with the fabric by the newly
Peering activated FW
X Active
• The overall recovery process could lead to
long traffic outage (15+ seconds)
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Active/Standby Pair across Sites 1
FW as Default Gateway Peering with the Fabric
Logical View
• FW allows to apply intra-tenant security
External L3 policies (east-west) and between an internal
Routing function Domain subnet and the external L3 domain (north-
of the VXLAN
EVPN Fabric south) or a subnet in a different tenant (inter-
tenant)
Site 1 Inter-Site Site 2
Network • FW inside network(s) deployed as L2-only can
be extended across sites to allow flexible
Static Static
Routing Routing deployment for endpoints
Active Standby • Two deployment options:
1. Centralized static routing with HMM
tracking
2. Distributed static routing with recursive
next-hop
BDs Extended
via Multi-Site
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
FW Using Static Routing with the Fabric
Centralized Static Routing with HMM Tracking (Configuration)
Inter-Site
DCI Network
Multi-Site Multi-Site
…. ….
VTEP VTEP VTEP VTEP
VIP1 VIP2
BGW BGW BGW BGW
Fabric
VXLAN EVPN VXLAN EVPN
Spine Spine Spine Spine
Site1 Site2
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
FW-IP
vrf context VRF1
Active vni 50000 Standby
ip route <endpoint-subnet> <FW-IP> tag 12345 track 1
!
track 1 ip route <FW-IP> reachability hmm Config applied only
vrf member VRF1 only on the leaf nodes
!
connected to the
router bgp 65001
vrf customera Active and Standby
address-family ipv4 unicast FWs
advertise l2vpn evpn
redistribute static route-map fabric-rmap-redist-subnet
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
FW Using Static Routing with the Fabric
Centralized Static Routing with HMM Tracking
Inter-Site
DCI Network
Multi-Site Multi-Site
…. ….
VTEP VTEP VTEP VTEP
VIP1 VIP2
BGW BGW BGW BGW
Fabric
VXLAN EVPN VXLAN EVPN
Spine Spine Spine Spine
Site1 Site2
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
FW-IP External L3
Domain
Active Standby
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
FW Using Static Routing with the Fabric
Distributed Static Routing with Recursive Next-Hop (Configuration)
Inter-Site
DCI Network
Multi-Site Multi-Site
…. ….
VTEP VTEP VTEP VTEP
VIP1 VIP2
BGW BGW BGW BGW
Fabric
VXLAN EVPN VXLAN EVPN
Spine Spine Spine Spine
Site1 Site2
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
FW-IP
Active Standby
vrf context VRF1
vni 50000
ip route <endpoint-subnet> <FW-IP>
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
FW Using Static Routing with the Fabric
Distributed Static Routing with Recursive Next-Hop
Inter-Site
DCI Network
Multi-Site Multi-Site
…. ….
VTEP VTEP VTEP VTEP
VIP1 VIP2
BGW BGW BGW BGW
Fabric
VXLAN EVPN VXLAN EVPN
Spine Spine Spine Spine
Site1 Site2
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
FW-IP External L3
Domain
Active Standby
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
FW Using Static Routing with the Fabric
Centralized vs. Distributed Static Routing
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
FW as Default
Gateway Peering
Directly with the
External Routers
Active/Standby Pair across Sites 3
FW as Default Gateway Peering with the Fabric
Logical View
External L3
Bridging function Domain • VXLAN EVPN Fabric only performs Layer 2
of the VXLAN forwarding
EVPN Fabric
• FW inside network can be extended across
Site 1 Inter-Site Site 2
Network sites to allow flexible deployment for
IGP/BGP
Peering
endpoints
• Inter-sites bridging to allow endpoints to
reach their default gateway
Active Standby
• FW outside network used to peer with the
external router
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Active/Standby Pair across Sites 3
FW as Default Gateway Peering with the Fabric
FW Outside Network is Not Stretched FW Outside Network is Stretched
External L3 External L3
Domain Domain
• The active FW peers only with the external router(s) • The active FW peers with the external routers
connected to the local site connected to all the sites
• Longer convergence after a FW failover event • No need to re-establish peering adjacencies after a
(similar to the previous scenario) FW failover traffic outage only dependent on FW
failure detection mechanism
• Optimal inbound/outbound traffic paths for the
endpoints part of the site with the active FW • Sub-optimal inbound/outbound traffic paths for the
endpoints part of the site with the active FW
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Fabric as Default
Gateway and Use
of a Perimeter FW
Active/Standby Pair across Sites 4
Fabric as Default Gateway and Use of a Perimeter FW (Intra-Tenant)
Logical View
External L3
Domain • Communication between subnets part of
separate VRFs (tenants) can happen through
Active
Routing function Inter-Tenants E-W
Standby
the FW front-ending each VRF
of the VXLAN Communication • Use a a single FW with multiple interfaces
EVPN Fabric Site 2
(one for each VRF)
VRF VRF VRF VRF
Tenant 1 Tenant 2 Tenant 2 Tenant 1 • Alternatively, use of a FW context dedicated
Inter-Site to each VRF. The external network performs
Network
the role of “fusion routing” between FW
contexts belonging to separate tenants
Site 1
BDs Extended
via Multi-Site
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
Independent
Services in each
Site
Independent Active/Standby pairs deployed in
separate Sites
Inter-Site
DCI Network
…. ….
VTEP Multi-Site VTEP VTEP Multi-Site VTEP
VIP1 VIP2
Fabric BGW BGW BGW BGW
Site1 Site2
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
Independent Active/Standby pairs deployed in separate Sites
Deployment Considerations
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
Independent Active/Standby pairs deployed in separate Sites
Intra-Tenant Communication
Logical View
Symmetric Intra-Tenant Symmetric Intra-Tenant • Endpoints subnets can be stretched across
N-S Communication N-S Communication
sites or locally defined in each site
External L3
• All the subnets in the same VRF are
Domain
considered part of the same security zone, so
communication is allowed without traversing
Active/Standby Active/Standby
the FW
Site 1 Inter-Site
Network
Site 2 • FW deployed in L3 mode and connected
between the BL nodes and the external
Inter-Site Routing routers
Intra-Tenant E-W • Applies security enforcement to intra-tenant
Communication N-S flows
• Host-route advertisement on the BL nodes to avoid
creation of asymmetric path though separate
stateful FW services
Host-Route
Advertisement
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
Independent Active/Standby pairs deployed in separate Sites
Local Host-Route Advertisement
Best path to EP1 via Only path to EP1 via
Site 1 Site 1
External L3 External L3
EP1 advertisement Domain EP1 advertisement Domain
(AS-Path: 65001) (AS-Path: EP1 advertisement EP1 advertisement
Active/Standby Active/Standby 65001,65002) Active/Standby Active/Standby filtered out
EVPN EVPN
• When using BGP for peering between the fabric and the • When using an IGP for peering between the fabric and the
external router (FW or L3 device), by default local host external router (FW or L3 device), it is possible to
routes are advertised with a better metric (because of AS- redistribute only BGP internal (i.e. local) host-routes into the
Path length) IGP
route-map EVPN-to-OSPF permit 10
match route-type internal
Configuration on !
BL Nodes in router ospf 1
vrf VRF1
both sites router-id <RID>
redistribute bgp <ASN> route-map EVPN-to-OSPF
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
Independent Active/Standby pairs deployed in separate Sites
Inter-Tenants Communication
Logical View
Host-Route
Advertisement
External L3
Domain • Communication between subnets part of
separate VRFs (tenants) can happen through
Active/Standby Active/Standby
the FW front-ending each VRF
Inter-Tenants E-W
Site 1 Communication Site 2 • Host route advertisement for local hosts
VRF VRF VRF between the fabric and the local FW
VRF
Tenant 2 Tenant 1
Tenant 1 Tenant 2 • Inter-site communication between hosts
Inter-Site
Network
part of separate VRFs must traverse FWs
deployed in both sites
• Host routes injected in the external L3
domain to allow this communication
BDs Extended
via Multi-Site
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
Independent Active/Standby pairs deployed in separate Sites
Deployment Options for Host-Routes Advertisement
External L3 External L3
Domain Domain
Host-Route Host-Route
Advertisement Advertisement
IGP/BGP
Peering
Multi-Hop
BGP Peering
IGP/BGP
Site 1 Peering Site 1
• Separate IGP/BGP peering FW-fabric and • Multi-Hop BGP peering between the fabric
FW-external router and the external router
• FW must be capable of receiving and • Host-routes exchanged directly with the
forwarding host route information external router
• FW is not aware of host route advertisement
and can simply leverage static routes
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
Active/Active
Cluster across
Sites
Active/Active FW Cluster stretched across Sites
Split-Spanned Ether-Channel Mode
Requires anycast IP service Not supported
support across Sites
Inter-Site
DCI Network
…. ….
VTEP Multi-Site VTEP VTEP Multi-Site VTEP
VIP1 VIP2
Fabric BGW BGW BGW BGW
Site1 Site2
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Cluster with
split-spanned
MAC1/IP1 MAC1/IP1 ether-channel MAC1/IP1 MAC1/IP1
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
Active/Active FW Cluster stretched across Sites
Individual Mode
Supported on Cisco ASA software No supported on Cisco FirePower
(and some 3rd party FWs) software and hardware(no current
Inter-Site plans to add such support)
DCI Network
…. ….
VTEP Multi-Site VTEP VTEP Multi-Site VTEP
VIP1 VIP2
Fabric BGW BGW BGW BGW
Site1 Site2
VTEP VTEP VTEP VTEP VTEP VTEP VTEP VTEP
Cluster in
individual mode
MAC1/IP1 MAC2/IP2 MAC3/IP3 MAC4/IP4
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
Active/Active FW Cluster in Individual Mode
Deployment Considerations
• Recommended use of Policy Based Routing to redirect traffic to the local service
node(s)
Only supported with 2nd generation leaf HW (EX and newer)
When specifying multiple next-hops in the same PBR statement, in VXLAN deployments
traffic is load-balanced per flow across all of them by default
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
Active/Active FW Cluster in Individual Mode
Use of Policy-Based Routing (PBR) - Configuration
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 166
Use of Policy-Based Routing (PBR)
Intra-Site East-West Communication (1)
Inter-Site
DCI Network
…. ….
VTEP Multi-Site VTEP VTEP Multi-Site VTEP
VIP1 VIP2
Fabric BGW BGW BGW BGW
PBR on Cluster in
endpoint SVI
individual mode
MAC1/IP1 MAC2/IP2 MAC3/IP3 MAC4/IP4
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Use of Policy-Based Routing (PBR)
Intra-Site East-West Communication (2)
Inter-Site
DCI Network
…. ….
VTEP Multi-Site VTEP VTEP Multi-Site VTEP
VIP1 VIP2
Fabric BGW BGW BGW BGW
PBR on
endpoint SVI
Cluster in
individual mode
MAC1/IP1 MAC2/IP2 MAC3/IP3 MAC4/IP4
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
Use of Policy-Based Routing (PBR)
Inter-Site East-West Communication (1)
Inter-Site
DCI Network
…. ….
VTEP Multi-Site VTEP VTEP Multi-Site VTEP
VIP1 VIP2
Fabric BGW BGW BGW BGW
PBR on Cluster in
endpoint SVI
individual mode
MAC1/IP1 MAC2/IP2 MAC3/IP3 MAC4/IP4
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
Use of Policy-Based Routing (PBR)
Inter-Site East-West Communication (2)
Inter-Site
DCI Network
…. ….
VTEP Multi-Site VTEP VTEP Multi-Site VTEP
VIP1 VIP2
Fabric BGW BGW BGW BGW
Redirection
over CCL link
Cluster in PBR on
endpoint SVI
individual mode
MAC1/IP1 MAC2/IP2 MAC3/IP3 MAC4/IP4
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
Use of Policy-Based Routing (PBR)
North-South Communication (1)
Inter-Site
DCI Network
…. ….
VTEP Multi-Site VTEP VTEP Multi-Site VTEP
VIP1 VIP2
Fabric BGW BGW BGW BGW
External L3
Domain
Cluster in
individual mode
MAC1/IP1 MAC2/IP2 MAC3/IP3 MAC4/IP4
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
Use of Policy-Based Routing (PBR)
North-South Communication (2)
Inter-Site
DCI Network
…. ….
VTEP Multi-Site VTEP VTEP Multi-Site VTEP
VIP1 VIP2
Fabric BGW BGW BGW BGW
External L3
Domain
PBR on Cluster in
endpoint SVI
individual mode
MAC1/IP1 MAC2/IP2 MAC3/IP3 MAC4/IP4
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
Agenda
• Introduction
• Multi-Tenancy Functionality in Enterprise Data Center
• Data Plane and Control Plane Considerations with VXLAN EVPN
• Layer 4-7 Services Integration
• Other useful Things?
• Centralized Route Leaking in EVPN
• Fabric Provisioning and Management
• Conclusion
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
Other Useful
Things?
Centralized Route
Leaking in EVPN
Centralized Route Leaking
Extranet and Shared Services Support
Solution
External • Use Cases – Shared Services,
Network
External Connectivity
Border Border
VRF VTEP VTEP VTEP VTEP VRF • Centralize Location for leaking
Tenant1 Tenant2
routes
Baremetal Baremetal Baremetal
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
Centralized Route Leaking
Extranet and Shared Services Support
Guidelines
External • We do NOT export already
Network
Border Border
imported routes
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 180
Centralized Route Leaking
Extranet and Shared Services Support
Guidelines
External • We do NOT export already
Network
Border Border vrf context Tenant1 imported routes
vni 50001
rd auto
address-family ipv4 unicast
route-target both auto • Routes need to advertised
VXLAN EVPN route-target both auto evpn
route-target import 65501:50002
vrf context Tenant2
explicitly
vni 50002
VRF VTEP VTEP VTEP rd auto
VTEP VRF
Tenant1 address-family Tenant2
ipv4 unicast • Routes need to be LESS specific
route-target both auto
route-target both auto evpn
Baremetal Baremetal route-target import 65501:50001
Baremetal
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 181
Centralized Route Leaking
Extranet and Shared Services Support
Guidelines
External • We do NOT export already
Network
Border Border
imported routes
router bgp 65501
vrf Tenant1
• Routes need to advertised
address-family ipv4 unicast
VXLAN EVPN advertise l2vpn evpn
explicitly
network 52.52.52.0/23 (subnet to reach in VRF Tenant2)
redistribute direct route-map FABRIC-RMAP-REDIST-SUBNET
vrf Tenant2
VRF VTEP VTEP VTEP VTEP
address-familyVRFipv4 unicast
Tenant1 Tenant2
advertise l2vpn evpn • Routes need to be LESS specific
network 51.51.51.0/23 (subnet to reach in VRF Tenant1)
redistribute direct route-map FABRIC-RMAP-REDIST-SUBNET
Baremetal Baremetal Baremetal
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 182
Centralized Route Leaking
Extranet and Shared Services Support
Guidelines
External interface Vlan10
• We do NOT export already
Network no shutdown
Border Border vrf
vrfcontext
member Tenant1
Tenant1 imported routes
vniaddress
ip 50001 10.10.10.1/24 tag 12345
rd auto
fabric
router forwarding
bgp 65501 mode anycast-gateway
address-family
vrf Tenant1 ipv4 unicast
route-target
interface Vlan20
address-family both auto
ipv4 • Routes need to advertised
unicast
VXLAN EVPN noroute-target both evpn
shutdownl2vpn
advertise auto evpn
vrf
route-target
vrf member52.52.52.0/23
network
ip context
address
Tenant1
Tenant2
20.20.20.1/24
redistribute
explicitly
import 65501:50002
(subnet to reach in VRF Tenant2)
tag 12345
direct route-map FABRIC-RMAP-REDIST-SUBNET
vniTenant2
50002
fabric
vrf forwarding mode anycast-gateway
VRF VTEP VTEP VTEP rdaddress-family
VTEP auto VRF
ipv4 unicast
Tenant1 address-family
interface Vlan30
advertise Tenant2
ipv4evpn
l2vpn • Routes need to be LESS specific
unicast
noroute-target
shutdown
network both auto (subnet to reach in VRF Tenant1)
51.51.51.0/23
route-target
vrf both
member Tenant2
redistribute auto
direct evpn FABRIC-RMAP-REDIST-SUBNET
route-map
Baremetal Baremetal iproute-target
Baremetal import 65501:50001
address 30.30.30.1/24 tag 12345
fabric forwarding mode anycast-gateway
Host A Host B Host C
10.10.10.101 20.20.20.102 30.30.30.103
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 183
Fabric Provisioning
and Management
Programmable Fabric (with Open NXOS)
VXLAN
EVPN
Open NXOS
Scalable
Modular OS with Open NX-
Layer 2 & Layer 3 Multi-Tenancy
APIs or YANG
Host Mobility with Optimal
Routing
Automation Ecosystem with
Standards-Based Puppet, Ansible, etc..
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 185
DCNM Fabric Management
Programmable Fabric
On Demand Provisioning
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 186
Day 1+ Operations: Manage, Monitor Visualize, Search
Challenge: Manage & Grow Underlay with minimal overhead & keep consistent intent
Cisco Advantage:
• Turnkey Management
• Integrated Views
• Comprehensive Fabric Views
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 187
Day 1+ Operations: Overlay Visibility, Growth
Challenge: Manage / Monitor SDN Overlay’s across a large fabric
Cisco Advantage:
• Seamless Overlay/Underlay Correlation
• Easy to find workloads, VN’s, VNI’s on vast
fabric
• Easy to See Host-Network chain
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 188
Day 1+ Operations: Verify Compliance
Challenge: Ensure Deployment [Underlay, Overlay, Access] is Correct
• Monitor Fabric
• Compare device configuration
against Fabric policy
• Remediate [revert or change Policy]
On-Demand
remediation
Cisco Advantage:
• Constant Monitoring
• Compliance engine brings fabric back to
intended configuration
• No un-anticipated behavior
Compliance engine remediates to intended configuration
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 189
Multi Tenancy and
Service Integration
with DCNM
Deploying The Network
1) Select Network
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 191
Deploying The Network – Selecting Switches
In Progress Deploye
d
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 192
Controls
Deploy Details
Show / Troubleshoot Deployment
Preview
Add Switches to
Fabric
Refresh
Auto-Refresh
on/off
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 193
External Fabric Connectivity Provisioning
Border Node Deployments
• Setting up base and setup
configuration
• Deploying VRFs
• Deploying using sub-
interfaces with pool
management of dot1q IDs
• IPv4 & IPv6 support
• VPC Support
• Deploying Networks for
vanilla VLAN hand-off
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 194
External Connectivity using VRF-LITE
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 195
External Connectivity using VRF-LITE
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 196
External Connectivity using VRF-LITE
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 197
Verifying External Connectivity using VRF-LITE
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 198
L4-L7 Service Attachment Use-cases
Intra-tenant/Inter-tenant One-armed/Two-armed
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 199
L4-L7 Service Attachment GUI
• The anchor screen lists the defined service nodes and associated route peering and service
policies for a selected easy fabric.
• Enabling/disabling the route peering and service policy will cause the corresponding network
and VRF configuration to be updated. User can preview the generated configurations on
involved switches and deploy them on one shot. Select
Fabric
• User can export/import route peering and service policies.
enable/attach
service policy
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 200
Topology – Redirected Flow
• The redirected flow section is added to the switch info overlay screen when user double-clicks the icon of the
switch, which has service configured network attached, on the topology.
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 201
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 202
Continue your education
Demos in the
Walk-in labs
Cisco campus
BRKDCN-2304 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 203
Thank you