Author(s): Dinesh G. Dutt
Edition: 1
Publisher: O'Reilly Media, Inc.
Year: 2018
Language: English
City: Sebastopol
Tags: vxlan
Cover
Cumulus Networks
Copyright
Table of Contents
Acknowledgments
Chapter 1. Introduction to EVPN
Software Used in This Book
Chapter 2. Network Virtualization
What Is Network Virtualization?
Types of Virtual Networks
Network Tunneling
The Consequences of Tunneling
Packet Load Balancing
Network Interface Card Behavior
Maximum Transmission Unit
Lack of Visibility
VXLAN
Protocols to Implement the Control Plane
Support for Network Virtualization Technologies
Merchant Silicon
Software
Standards
Summary
Chapter 3. The Building Blocks of Ethernet VPN
A Brief History of EVPN
Architecture and Protocols for Traditional EVPN Deployment
EVPN in the Data Center
BGP Constructs for Virtual Networks
Address Family Indicator/Subsequent Address Family Indicator
Route Distinguisher
Route Target
RD, RT, and BGP Processing
Route Types
Modifications to Support EVPN over eBGP
Keeping the NEXT HOP Unmodified
Retaining Route Targets
FRR Support for EVPN
Automatic Propagation of NEXT HOP
RT/RD Derivation
What Is Not Supported in FRR
Summary
Chapter 4. Bridging with Ethernet VPN
An Overview of Traditional Bridging
Overview of Bridging with EVPN
What Ifs
Why Does NVE L3 Get an Advertisement for MACA?
Handling BUM Packets
Handling MAC Moves
Support for Dual-Attached Hosts
The Host-Switch Interconnect
VXLAN Model for Dual-Attached Hosts
Switch Peering Solutions
Handling Link Failures
Duplicate Multidestination Frames
ARP/ND Suppression
Summary
Chapter 5. Routing with Ethernet VPN
The Case for Routing in EVPN
Routing Use Cases in the Data Center
Routing Models
Where Is the Routing Performed?
Centralized Routing
Distributed Routing
How Routing Works in EVPN
Asymmetric Routing
Symmetric Routing
VRFs in EVPN Routing
Summarized Route Announcements
BGP Support for EVPN Routing
Comparing Asymmetric and Symmetric Models
Vendor Support for EVPN Routing
Summary
Chapter 6. Configuring and Administering Ethernet VPN
The Sample Topology
Configuration Cases
Configuring the MTU
The End First: Complete FRR Configurations
The Invariants: Configuration for the Spines, Firewall, and Servers
Centralized Routing
Asymmetric Distributed Routing
Symmetric Routing
Dissecting the Configuration
Configuring the Underlay
Configuring the Overlay: FRR
Configuring the Overlay: Interfaces
Examining an EVPN Network
Show Running Configuration
Show BGP Summary
Show EVPN VNIs and VTEPs
Identify Which VTEP Advertised a MAC Address
Comparing FRR and Cisco EVPN Configurations
Considerations for Deploying EVPN in Large Networks
Summary
About the Author