Professional Documents
Culture Documents
BRKDCN 2988
BRKDCN 2988
BRKDCN-2988
• VXLAN EVPN Multi-Site
Overview
• Design VXLAN EVPN
Multi-Site with NDFC
• Why NDFC?
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Data Center
Network
Requirements
What are our basic network requirements?
1) Provide paths for endpoints to communicate at
Layer2(MAC) and Layer3(IP)
2) Provide separation of endpoint into Layer2
forwarding domains (VLAN or BD)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
What are our basic network requirements?
1) Provide paths for endpoints to communicate at
Layer2(MAC) and Layer3(IP)
2) Provide separation of endpoint into Layer2
forwarding domains (VLAN or BD)
3) Routing between IPv4/IPv6 subnets and allow
separation of these into multiple VRFs
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
What are our basic network requirements?
1) Provide paths for endpoints to communicate at 4) Communication to external L2 networks (DCI)
Layer2(MAC) and Layer3(IP)
2) Provide separation of endpoint into Layer2
forwarding domains (VLAN or BD)
3) Routing between IPv4/IPv6 subnets and allow
separation of these into multiple VRFs
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
What are our basic network requirements?
1) Provide paths for endpoints to communicate at 4) Communication to external L2 networks (DCI)
Layer2(MAC) and Layer3(IP) 5) Communication to external L3 networks (WAN)
2) Provide separation of endpoint into Layer2
forwarding domains (VLAN or BD)
3) Routing between IPv4/IPv6 subnets and allow
separation of these into multiple VRFs
VRF-1
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
What are our basic network requirements?
6) Allow security policies in order to limit communication to between endpoints to allowed protocols.
ip access-list web-in
VLAN 10 VRF1 VLAN 20 permit tcp Subnet1 Subnet2 eq 80
Subnet1 Subnet2 ip access-list web-out
permit tcp Subnet2 eq 80 Subnet1
EP1 EP3
80
ip access-group web1 in
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
What Physical Topology is required?
• Physical topology must support our endpoint communication
(layer-2 / layer-3), and the location of endpoints within the physical
network will affect the supporting design/configuration.
VRF-1
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Data Center Network Evolution
Well-Known but Legacy Methods
Core
Access
Classic Spanning-Tree
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Data Center Network Evolution
Well-Known but Legacy Methods
Core
Access
Core
Layer-2 FabricPath
Leaf
FabricPath (Mac-in-Mac)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Data Center Network Challenges
Of Legacy Methods
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Next Generation– VXLAN BGP EVPN Fabrics
Becoming Industry De-Facto Standard
• An IGP is recommended for the underlay
(OSPF or IS-IS) R R
• BGP can also be used if needed
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Data Center Network Challenges
Solving it with VXLAN EVPN
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
First Design
Highly Available
Data Center
What defines a Highly Available Data Center?
Ask yourself
Do we have Network redundancy beyond a single rack? Do we have Application availability beyond a single rack?
Can we survive a single rack failure? How big is the Do we have Network and Application availability
change or failure domain? beyond a single location?
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Is your DC Highly Available Yet?
Where do you stand? “The Single” Or…
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Is your DC Highly Available Yet?
Where do you stand? “The Single” Or “The Multiple”
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
VXLAN EVPN Multi-Site
Architecture
VXLAN EVPN Multi-Site Overview
Functional Components
Region-A
Backbone
Site-External DCI Active Workloads
(Layer 2 & Layer 3)
Border Border
AZ-1 AZ-2
Gateway Gateway
Spine Spine
Site-Internal Fabric
Leaf VM VM Leaf
Application 1
Workload deployed across AZs
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Border Gateway
Deployment Considerations
Border Gateways main functions and use-cases:
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Border Gateway
When to use what
Site 1 Site 2
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
BGW Node Placement Option
Flexible Design option-1
Dedicated Border Gateway
Multi-Site DCI
Flexible scale-out approach for VXLAN EVPN Multi-Site DCI
R = RR/RP
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
BGW Node Placement Option
Flexible Design option-2
BGW on Spine nodes (Border Gateway Spine)
Flexible scale-out approach for VXLAN EVPN Multi-Site DCI Multi-Site DCI
Anycast BGW only
R = RR/RP
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
BGW Node Placement Option
Flexible Design option-3
BGW on top of Super-Spine nodes
Multi-Site DCI
Scale-out Multi-Clos Fabric to Interconnect the PODs using
Super-Spine
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Border Node Placement Option
Flexible Design option-4
BGW on Super-Spine nodes (BGW Super-Spine)
Scale-out Multi-Clos Fabric to Interconnect the PODs using
Super-Spine Multi-Site DCI
Architecture beyond a single server room. Simpler capacity
planning
POD-1 POD-2
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
VXLAN Multi-Site Architecture
DCI- BGW to Cloud
• Scalable design option with horizontal scale-out
within and across multiple sites. Backbone Core
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
VXLAN Multi-Site Architecture
DCI- BGW Back-to-Back
• Available option for connecting 2 or 3 sites.
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Multi-Destination Traffic Forwarding
EVPN Route-Type 4 (Ethernet Segment Route)
• BGW advertises BGP EVPN Type-4 update to all of their BGP EVPN peers (Site-Internal and Site-External)
• BGW will use this information for DF (Designated Forwarded) election on per VLAN/VNI
• EVPN Type-4 update will also carry ES Import Route-Target Extended Community
• Remote site BGWs will not install the route due to different RT and Site ID
• Command to check: show bgp l2vpn evpn route-type 4
• BGP routing table entry for [4]:[0300.0000.00fd.e900.0309]:[32]:[10.1.1.1]/136
• [4] = EVPN Route-Type 4 evpn multisite border-gateway 65001
• [03]= ESI Type MAC-based delay-restore time 300
• [0000.0000.fde9] = ESI system MAC for Site-ID and RT {fde9 = 65001}
• [000309] = ESI local discriminator
• [32] = IP Address Length
• [10.1.1.1] = Sender (BGW Primary IP) used for DF election process
Border Border
Gateway Gateway
AZ-1 AZ-2
Region-A
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Multi-Destination Traffic Forwarding
BGW Designated Forwarded (DF) Election
• BGW learns about other BGWs originator IPs on the same site from exchanging EVPN Type 4 routes. The originator IP
address used is the BGW NVE source interface's primary IP address.
• Each BGW creates an ordinal list of originator IP in numerical order from lowest to highest. Every BGW is then given an
ordinal value based on its position in the ordinal list starting from position 0. The BGW with the lowest originator IP would
get an ordinal value of 0. The ordinal value decides which BGW will be the DF for a VLAN/VNI.
• If there are 4 BGWs in one site. The ordinal list of the BGWs will be arranged as shown below.
• Ordinal List = 10.1.1.1, 10.1.1.2, 10.1.1.3, 10.1.1.4 {I=0, I=1, I=2, I=3}
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Multi-Destination Traffic Forwarding
EVPN Route-Type 3 (Inclusive Multicast Ethernet Tag Route)
• BGW advertises BGP EVPN Type-3 only towards Site-External DCI • Remote: Learning from Site 2 BGW to Site 1 BGW
• Receiving BGW switch does not forward it to Site-Internal Fabric BGP routing table entry for [3]:[0]:[32]:[20.3.0.4]/88
• Command to check: show bgp l2vpn evpn route-type 3, Path type: external, path is valid, is best path
• show l2route evpn imet all detail Imported to 1 destination(s)
• Local: Advertising from Site 1 BGW to Site 2 BGW Imported paths list: L2-10000
BGP routing table entry for [3]:[0]:[32]:[10.3.0.4]/88 AS-Path: 65002 , path sourced external to AS
AS-Path: NONE, path locally originated Extcommunity: RT:65001:10000 ENCAP:8
Extcommunity: RT:65001:10000 ENCAP:8 PMSI Tunnel Attribute:
PMSI Tunnel Attribute: flags: 0x00, Tunnel type: Ingress Replication
flags: 0x00, Tunnel type: Ingress Replication Label: 10000, Tunnel Id: 20.3.0.4
Label: 10000, Tunnel Id: 10.3.0.4
Path-id 1 advertised to peers: 20.2.0.4
Border Border
Gateway Gateway
AZ-1 AZ-2
Region-A
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
VXLAN Multi-Site Architecture
DCI- BGW Back-to-Back BUM (w/o Local L3 link)
DF VNI 4800
DF VNI 4800
Border Border
Gateway Gateway
AZ-1 AZ-2
Region-A
Drop due to Designated Forwarder (DF) rule
Physical connection
BUM packet
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
VXLAN Multi-Site Architecture
DCI- BGW Back-to-Back BUM (with Local L3 link)
DF VNI 4800
DF VNI 4800
Border Border
Gateway Gateway
AZ-1 AZ-2
Region-A
Drop due to Designated Forwarder (DF) rule
Physical connection
BUM packet
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
VXLAN Multi-Site Architecture
DCI- BGW Back-to-Back (with Local L3 link)
• Available option for connecting 2 or 3 sites.
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
VXLAN Multi-Site Architecture Route Server
• Ensure that PIP / VIP of all BGWs are known by AZ-1 AZ-2
every BGW and MTU must accommodate VXLAN
encapsulated traffic. Region-A
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
VXLAN Multi-Site Architecture
DCI- BGW to Centralized Router-Server Route Server
• BGP Route-Server (RS) function can be used in a
highly scalable design to act as the central EVPN
peering point for the Multi-Site.
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Special Considerations for
Layer-3 extension across
Multi-Site
VXLAN Native Data Plane Security
Rogue VTEP
VTEP3
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Why can this become an issue for
Layer-3 communication across sites?
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Inter-Site Layer 3 Traffic – Control Plane
Inter-Site Type-2 and Type-5 EVPN updates always carry the local Multi-Site VIP as next-hop address
• Only exception are Type-5 updates for L3 networks locally connected to the BGWs
EP1 EP2
10.10.1.1 10.10.2.1
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Inter-Site Layer 3 Traffic – Data Plane
Inter-Site Layer 3 traffic is always sourced by local BGWs from their specific PIP address
Same applies to Intra-Site traffic between local BGW and leaf nodes
VXLAN Original
PIP-2 VIP-2
Header Packet
PIP-10 PIP-20
10.13.0.10 VXLAN Original VXLAN Original 10.23.0.10
PIP-10 VIP-1 PIP-11 PIP-20
Header Packet Header Packet
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
How to Prevent this issue?
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Option-1: Advertise-PIP
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Option-1: Advertise-PIP
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Option-1: Advertise-PIP
router bgp 65001
On both VPC peer Border
address-family l2vpn evpn
advertise-pip Devices. In case of VXLAN Multi-
Backbone Site, deploy the configs on local
Interface nve1 and remote BGW*
advertise virtual-rmac
* Maintenance window required.
VPC VIP
10.13.0.3
V V • The provision to use the primary IP address (PIP) on a vPC peer, as the
PIP-1 PIP-2
10.13.0.1 10.13.0.2 next-hop when advertising prefix routes (EVPN Route-type 5). This
includes direct, connected, attached, and external routes. In this way,
the traffic will always be destined to the right vPC peer destination
traffic will always then be advertised by the right vPC border peer that
R R was the BGP next-hop in the EVPN Route-type 5 advertisements.
• The advertise-pip command lets BGP use the PIP as next-hop when
MP-BGP EVPN Table advertising prefix routes or leaf-generated routes if vPC is enabled.
V V Backbone → With the advertise-pip and advertise virtual-rmac commands enabled,
10.13.0.1, 10.13.0.2 EVPN type 5 routes are advertised with PIP, and EVPN type 2 routes
are still advertised with VIP. In addition, a virtual MAC will be used with
the VIP that is shared by both vPC peers, and individual peer specific
VXLAN EVPN Site
system Router MAC will be used with PIP when the advertise-pip
feature is enabled.
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Option-2: Per-VTEP, Per-VRF Loopback
• Define on all the BGW nodes a loopback interface (in a specific VRF)
and advertise the information across site with a Type-5 EVPN update
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Option-3: Extend one L2VNI End-to-End
• An L2VNI must be stretched between the local leaf nodes and BGW nodes.
An L2VNI must be stretched across sites (i.e. defined on the local and remote
BGW nodes). Does not necessarily need to be the same L2VNI
vlan 99
vn-segment 9999
vlan 2300
name Net-App
vn-segment 30001
interface nve1
no shutdown On local and remote BGW
host-reachability protocol bgp
source-interface loopback1
multisite border-gateway interface loopback100
member vni 9999 associate-vrf
member vni 30001
multisite ingress-replication
mcast-group 239.1.1.1
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Installing PIP Addresses as NVE Peers
Adopting any of the 3 solutions described in the previous slide ensures that the PIP addresses of
the BGWs can be installed as NVE peers in the local leaf nodes and in the remote BGW nodes
VXLAN Original
PIP-2 VIP-2
Header Packet
PIP-10 PIP-20
10.13.0.10 VXLAN Original VXLAN Original 10.23.0.10
PIP-10 VIP-1 PIP-11 PIP-20
Header Packet Header Packet
NVE Peers
EP1 10.10.0.2, 10.23.0.1, 10.23.0.2
EP2
10.10.1.1 10.10.2.1
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Some more
Important Requirements!
Multi-Site Route-Target Problem
vrf context myvrf_50000 vrf context myvrf_50000
vni 50000 vni 50000
rd auto rd auto
address-family ipv4 unicast address-family ipv4 unicast
route-target both auto route-target both auto
route-target both auto evpn {65001:50000} route-target both auto evpn {65002:50000}
address-family ipv6 unicast address-family ipv6 unicast
route-target both auto route-target both auto
route-target both auto evpn {65001:50000} route-target both auto evpn {65002:50000}
evpn evpn
vni 30000 l2 vni 30000 l2
rd auto rd auto
route-target import auto {65001:30000} route-target import auto {65002:30000}
route-target export auto {65001:30000} route-target export auto {65002:30000}
ASN ASN
EVPN Multi-Site Overlay
65001 65002
Border Gateway Border Gateway
VXLAN EVPN Site-1 VXLAN EVPN Site-2
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
EVPN Route-Target Re-Write
The ”rewrite-evpn-rt-asn” command modifies the incoming EVPN advertisements by swapping the
remote AS portion in the RT with the local ASN, provided the update is coming from a neighbor that is
locally configured.
ASN ASN
EVPN Multi-Site Overlay
65001 65002
Border Gateway Border Gateway
VXLAN EVPN Site-1 VXLAN EVPN Site-2
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Route-Server in DCI
EVPN Route-Target Re-Write by Route-Server
router bgp 65099
address-family l2vpn evpn
retain route-target all
template peer OVERLAY-PEERING
update-source loopback0
ebgp-multihop 5
address-family l2vpn evpn
send-community
send-community extended
route-map unchanged out
neighbor 20.2.0.4
inherit peer OVERLAY-PEERING
remote-as 65002
address-family l2vpn evpn Route-Server
rewrite-evpn-rt-asn
ASN ASN
EVPN Multi-Site Overlay
65001 ASN 65099 65002
Border Gateway Border Gateway
VXLAN EVPN Site-1 VXLAN EVPN Site-2
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Peer-Type Fabric-External
EVPN Split-Horizon and Route Re-Origination
ASN ASN
EVPN Multi-Site Overlay
65001 65002
Border Gateway Border Gateway
VXLAN EVPN Site-1 VXLAN EVPN Site-2
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Failure Detection on BGWs
Use of Interface Tracking
• Because of the critical role played by the BGWs, it is
critical to consider the required behavior during different
DCI failure scenarios.
Site-External DCI • Tracking the state of the interfaces connecting the BGWs
to the spines (“fabric-tracking”) and to the ISN (“dci-
tracking”)
Border
Gateway
• The “dci-tracking” configuration is also required on
Layer-3 interfaces locally connecting Anycast BGW
nodes, needed for example, back-to-back topologies.
Site-Internal Fabric
Spine • Allows to define via configuration how the BGW is
connected in the topology and to take proper action
depending on the specific failure.
Leaf
• The BGW node that gets isolated from the fabric or from
evpn multi-site dci-tracking the ISN needs to stop receiving traffic flows if it can not
forward them to the destination.
evpn multi-site fabric-tracking
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Failure Detection on BGWs
Fabric Isolation
• The Site-Internal interfaces on BGW nodes are constantly
tracked to determine their status (‘evpn multisite fabric-
DCI tracking’ command)
Site-External DCI
Multi-Site VIP
10.100.1.1
Border
Gateway
PIP PIP PIP PIP
10.10.10.1 10.10.10.2 10.10.10.3 10.10.10.4
Site-Internal Fabric
Spine
Leaf
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Failure Detection on BGWs
Fabric Isolation • The Site-Internal interfaces on BGW nodes are constantly
tracked to determine their status (‘evpn multisite fabric-
tracking’ command)
DCI
• If all the Site-Internal interfaces are detected as down on a
BGW:
Site-External DCI
1) The BGW will isolate itself from Multi-Site traffic. Hence , it will
Multi-Site VIP shutdown Lo100 aka VIP and stop advertising to remote sites. So,
10.100.1.1
the traffic from remote site will never come to this BGW as it will no
Border
longer be part of the ECMP.
Gateway PIP PIP PIP
10.10.10.2 10.10.10.3 10.10.10.4 2) The BGW site external BGP session will be up and running but it
will withdraw all EVPN routes (Type 2,3,4,5)
3) Next, the remaining BGWs will receive that type 4 withdrawal from
the failed BGW, and it will re-run the DF election. For example , if
Site-Internal Fabric BGW 1 was DF for VLAN 10 then a new election will happen
Spine
between the remaining BGWs.
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Failure Detection on BGWs
DCI Isolation
• The Site-External interfaces on BGW nodes are
constantly tracked to determine their status (‘evpn
DCI multisite dci-tracking’ command)
Site-External DCI
Multi-Site VIP
10.100.1.1
Border
Gateway
PIP PIP PIP PIP
10.10.10.1 10.10.10.2 10.10.10.3 10.10.10.4
Site-Internal Fabric
Spine
Leaf
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Failure Detection on BGWs
DCI Isolation • The Site-External interfaces on BGW nodes are constantly
tracked to determine their status (‘evpn multisite dci-tracking’
command)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Cool! But What’s the Catch?
There is always a catch ☺
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
The DC Needs to Go Anywhere the Data Is
IoT Edge
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
And your world is constantly changing…
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
What is Nexus
Dashboard
Fabric
Controller?
Cisco Nexus Dashboard Powering automation
Unified agile platform
Simple to automate, simple to consume
Insights
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Cisco Nexus Dashboard Fabric Controller
App accessed through Cisco Nexus Dashboard
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Cisco Nexus Dashboard Fabric Controller
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Benefits of NDFC 12 over DCNM 11
Plan your migration today!
Single Experience with a common Web GUI which simplifies adoption across
the entire Data Center Networking Product Portfolio
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Run migration
Y DCNM IPs N
re-used for
ND nodes
Shutdown Deploy ND
DCNM cluster
Restore Shutdown
Backup file DCNM
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Automation
Accelerate provisioning from days to minutes
DevOps friendly
Benefits
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Management Single point for management
for data center operations
Optimized for both large deployments
and traditional deployment models
Granular RBAC
Image management
RMA
Benefits
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Visibility &
Monitoring Get comprehensive monitoring
Benefits
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Cisco NDFC Modes
Make decision at run-time!
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Fabric Discovery
Benefit
Benefit
Benefit
Physical ND Cluster
VM VM
Data Broker SAN Controller
Virtual ND Cluster
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Cisco Nexus Dashboard Formats - NDFC
Each node is a UCS Server with: For NDFC each vND VM must
satisfy the following requirements:
2.8GHz AMD CPU Specs APP
256G RAM
4x2.4TB HDD vCPU 16
960 GB SSD
1.6 TB NVMe drive RAM (GB) 64
For the latest information check the specific SSD (GB) 550
scalability guide. 12.1.3b Verified Scalability
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Cisco Nexus Dashboard Scaling - NDFC Cisco NDFC 12.1(3)
Full scale for NDFC can Full scale for NDFC can Switches per Fabric: Switches per Fabric:
be achieved with 3 be achieved with 5 200 200
nodes nodes
Overlays: 500 VRF and Overlays: 400 VRF and
Managed mode (VXLAN Managed mode (VXLAN 2000 Layer-3 Networks 1050 Layer-3/Layer-2
and BGP fabrics): 500 and BGP fabrics): 400 OR 2500 Layer-2 Networks
switches switches Networks
Multi-Site Domain: 30
Managed/Monitor mode Managed/Monitor mode Multi-Site Domain: 30 fabrics
(External fabrics): 1000 (External fabrics): 1000 fabrics
switches switches
ToR/Leaf: 40 Leaf
Overall fabric count: 50 Overall fabric count: 50 (VTEP) and 320 ToRs in
DC VXLAN EVPN fabric
Recommended 3x vND can support 100
switches in managed
mode
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Cisco Nexus Dashboard Connectivity - NDFC
Data/Fabric Network The two interfaces cannot share the
L2
bond0br same subnet
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
NDFC Persistent IPs
Persistent IPs are tied to a
service, like the SNMP trap
receiver
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
NDFC Persistent IPs – Normal conditions
Data/Fabric Network
bond0br
Management Network
bond1br
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
NDFC Persistent IPs - Failover
Data/Fabric Network
bond0br
Management Network
bond1br
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Cisco Nexus Dashboard Connectivity - NDFC
Data/Fabric Network bond0br
L3
This L3 options is valid since
MAX RTT 50msec
12.1.1e
172.17.20.127/24 172.17.20.128/24
10.1.1.101/24 10.1.2.101/24 10.1.3.101/24
172.17.20.128/24
10.1.1.101/24 10.1.2.101/24 10.1.3.101/24
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Cisco NDFC Connectivity to the Switches Use case #2
MAX RTT
50msec
ND Mgmt ND Data Subnet Fabric Mgmt 0 Fabric Inband LAN Device Management
Subnet Subnet Subnet Connectivity must be set to
Data
10.2.2.0/24 10.1.1.0/24 10.1.1.0/24 10.3.3.0/24
(see next slide)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Cisco NDFC Connectivity to the Switches Use case #2
continues
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Cisco NDFC Connectivity to the Switches Use case #3
MAX RTT
50msec
ND Mgmt ND Data Subnet Fabric Mgmt 0 Fabric Inband A static route to 10.4.4.0/24
Subnet Subnet Subnet must be added in ND
Management Interface
10.2.2.0/24 10.1.1.0/24 10.4.4.0/24 10.3.3.0/24
(see next slide)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Cisco NDFC Connectivity to the Switches Use case #3
continues
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Cisco NDFC Connectivity to the Switches Use case #4
BRKDCN-2988 94
Why NDFC?
Multi-Architecture
Layer-3 MSDC Fabric
Campus VXLAN EVPN
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Why NDFC?
Multi-Topology, Multi-Protocol
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Why NDFC?
Multi-Domain, Multi-Platform
NX-OS Nexus 9000 and 3000 IOS-XE Catalyst 9000 IOS-XR ASR 9000
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Why NDFC?
In a nutshell…
Step into SDN via VXLAN BGP EVPN Multi-OS management and support
Config and Compliance across Cisco Products Simplify Complex Network Operations
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Automate VXLAN EVPN deployments
Provision a new fabric in minutes
VXLAN Fabric
Accelerate fabric deployments Automated consistency Minimize risk Support for both Greenfield and Brownfield deployment
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Manage and
Deploy
VXLAN EVPN
Multi-Site with
NDFC
VXLAN EVPN Multi-Site deployment with NDFC
Deploy in a few minutes!
Deploy a fabric for the Multi-Site (VXLAN EVPN Multi-Site) & import all the
previous fabrics into this one
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
VXLAN BGP EVPN Greenfield
Not on VXLAN EVPN Today?
NDFC Fabric Controller Build VXLAN fabric Templates already IP addresses, overlay pool,
Mode in few minutes embed best practices routing profiles, replication
attributes –all taken
care by NDFC
Step 1 Step 3
Create Recalculate and Deploy Fast, automated process
Define fabric settings (Underlay, Overlay) - Generates config based on intent
AS#, Replication Mode, IGP, IP Pools, etc. Preview side by side diffs
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Step 1 -> Create a Fabric
Create Fabric
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Step 1 -> Create a Fabric
(continued)
BGP ASN
VXLANv4
or
VXLANv6
RR > 2 or 4
PM Metrics
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Step 1 -> Create a Fabric
(continued)
BUM >
Multicast or
Ingress
Replication
L2VNI
Multicast
Group
RP > 2 or 4
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Step 1 -> Create a Fabric
(continued)
Cisco’s Best
Practice
Configuration
Templates
VXLAN Overlay
Mode > CLI or
Config-Profile
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Step 1 -> Create a Fabric
(continued)
L2VNI Label
L3VNI Label
Router ID
VRF_LITE
VTEP IP Handoff
RP IP
P2P Underlay IP
VRF_LITE IP
Range
L4-L7 Service
Network
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Step 1 -> Create a Fabric
(continued)
NDFC Built-In
Bootstrap POAP
Services. Supports
OOB and In band
POAP
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Step 2 -> Add Switches
Add Switches
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
Step 2 -> Add Switches
(continued)
Switch Mgmt0 IP
Switch Discovery
Credentials
Switch Hops
based on CDP
Discover
Switches
VXLAN Greenfield or Brownfield
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Step 2 -> Add Switches
(continued)
Switch Inventory
Management
Add Switches
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Step 3 -> Set Role
Topology View
Switch Roles
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Step 4 -> VPC Pairing
(optional)
Hierarchical Topology
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Step 4 -> VPC Pairing
(optional)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Step 5 -> Recalculate and Deploy
Fabric
Recalculate and
Deploy
Pending
Configuration
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Step 5 -> Recalculate and Deploy
(continued)
Fabric
Configuration
status
Pending
Configuration
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Step 5 -> Recalculate and Deploy
(continued)
Spine related
features
Spine EVPN
RR Client
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Step 5 -> Recalculate and Deploy
(continued)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
NDFC VXLAN EVPN Topology View
Link Status
Fabric Fabric
Operational Configuration
View View
Fabric
Configuration
Status
Fabric Minor
Alarms
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
Step 1 & 2 -> Create Individual Fabrics
Set appropriate roles
BGP EVPN
DC1-VXLAN ROUTER-SERVER DC2-VXLAN
BORDER
GATEWAY-
BORDER SPINE
GATEWAY BACKBONE-WAN
SPINE
LEAF
LEAF
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
Step 3 -> Create VXLAN EVPN Multi-Site Fabric
Create Fabric
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Step 3 -> Create VXLAN EVPN Multi-Site Fabric
(continued)
L2VNI Label
(for stretched
overlays)
Distributed Anycast Gateway
(for EP Mobility)
L3VNI Label
(for stretched
overlays) Multi-Site BGP NH for
VXLAN EVPN on BGWs
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
Step 3 -> Create VXLAN EVPN Multi-Site Fabric
(continued)
VXLAN Multi-Site
BGW Design Model
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
Step 3 -> Create VXLAN EVPN Multi-Site Fabric
(continued)
Multi-Site Loopback IP
range allocation on BGWs
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
Step 3 -> Create VXLAN EVPN Multi-Site Fabric
(continued)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Step 4 -> Recalculate & Deploy
In VXLAN EVPN Multi-Site Fabric
EVPN
Overlay
Feature eBGP IPv4 Unicast
(default) DCI Underlay
DCI Underlay peering towards BGW
Routed Port
towards BGW
Retain RT coming eBGP EVPN DCI Overlay
from BGW EVPN NLRI peering towards BGW
Rewrite ASN
portion of Auto RT
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
Step 4 -> Recalculate & Deploy
In VXLAN EVPN Multi-Site Fabric
BGW Site ID
eBGP EVPN DCI Overlay
peering towards RS
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
NDFC VXLAN EVPN Multi-Site Topology View
Site-External DCI
Site-Internal Fabric
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Deploy VXLAN EVPN Overlays
in Multi-Site Architecture
Have VXLAN EVPN Multi-Site ready
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Step 1 -> Navigate to VXLAN Multi-Site Fabric
*UI Navigation: LAN Fabrics > Select Fabric > Fabric Overview > Networks > Create
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Step 2 -> Create VRF and Network
Auto
Generated
Name
L2 or L3
Network
VXLAN
Overlay VRF
Auto
Generated
L2VNI Label
Network SVI
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Step 3 -> Attach VRF and Network
Select Network
Selective
Edit for selecting
Network
port attachments
Attachments One-Click attachment
for all fabrics
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
Step 3 -> Attach VRF and Network
(continued)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
Step 4 -> Preview and Deploy VRF and Network
Deploy pending
network
attachment config
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
VRF and Network Configs
L3VNI VRF
Configs
VXLAN Tenant
L2VNI
Network
Configs
NVE Tunnel
Configs
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
VRF and Network Configs
L3VNI VRF
Configs
L3 SVI
VXLAN Tenant Configs
L2VNI
Network
Configs
NVE Tunnel
Configs
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
VRF and Network Deployment Status
In VXLAN EVPN Multi-Site Fabric
VXLAN Overlay
Deployment Status
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
VXLAN EVPN Brownfield Migration
Already using VXLAN?
Want to use NDFC for managing your fabric?
NDFC fully supports Non-disruptive import Learns topology, all Start Managing fabric
Brownfield of existing VXLAN configuration, as if provisioned from
EVPN deployments associated resources, NDFC
IP subnets, VNIs,
VLANs, etc.
Step 2
Discover
Import switches with Preserve Config
Define switch Roles (Border, Leaf, Spine, etc)
Step 1 Step 3
Create Recalculate and Deploy
Define fabric settings (Underlay, Overlay) -
Sanity checks for mis-config and Normalizes configuration
Match AS#, Replication Mode, IGP, etc.
to best practices
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Manage and Deploy
External IP Handoff
with NDFC
External Handoff Placement
Border Role compared to Leaf Role
North-South
Fabric to outside or vice versa L2VPN EVPN
• Optionally it can have directly attached endpoints R R
Spine
• Separating Roles simplifies operations
V V V V
Leaf
V V = VTEP
VXLAN EVPN
R = RR/RP East-West
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Border Node Design
VXLAN EVPN Fabric
Border Node Placement Option
Flexible Design option-1
External Network
Border as Leaf nodes (Border Leaf)
North-South
Border Leaf hosts: L2VPN EVPN
R R
VTEP Mainly for Spine
• North-South V V V V
Leaf
VXLAN EVPN
East-West
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
Border Node Placement Option
Flexible Design option-2
Border as Spine nodes (Border Spine) External Network
Leaf endpoints are one-hop away from External Networks
Allowance for a scale-out approach to add spines and provide Edge Router
more bandwidth and resiliency
North-South
L2VPN EVPN
Capacity planning needs to accommodate all flows
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
Border Node Placement Option
Flexible Design option-3
Border on top of Super-Spine nodes (Border Leaf) External Network
Scale-out Multi-Clos Fabric to Interconnect the PODs using
Super-Spine
Edge Router
Architecture beyond a single server room. Simpler capacity
planning IPv4/IPv6/L3VPN
V V
Capacity planning only for north-south traffic flows Border Leaf Handoff
North-South
Clean role separation and uniform reachability from the entire R R L2VPN EVPN
Super-Spine
fabric are the major advantages
North-South
L2VPN EVPN
Capacity planning needs to accommodate all flows
North-South
Support for Inter-AS option A (VRF-LITE) Border Gateway Border Gateway
V V V V
Seamless VXLAN-MPLS gateway (Border-PE) not supported
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
Border Node Placement Option
External Network
Edge Router
Flexible Design option-2
IPv4/IPv6/L3VPN
Border as Shared Border nodes (Border Leaf)
V V
Flexible scale-out approach with separate External IP handoff and DCI Shared Border
connectivity
L2VPN EVPN
Shared Border acts as a regular Border Leaf in Site-External fabric
North-South
Deterministic traffic flows and failure scenarios (N-S and E-W)
L2VPN EVPN
Support for Inter-AS option A (VRF-LITE) and seamless VXLAN-MPLS Border Gateway
Border Gateway
gateway (Border-PE)
V V V V
Capacity planning only for north-south traffic flows
Easily connect shared services (such as L4-L7) for symmetric Layer- R R R R Spine
Spine
2/Layer-3 traffic flows
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Border Node Placement Option
External Network
Flexible Design option-3
Border as dedicated Leaf nodes (Border Leaf)
Edge Router
Clear separation between Border Leaf and BGW
roles
IPv4/IPv6/L3VPN
Dedicated bandwidth and resiliency for External
and DCI traffic Multi-Site DCI
North-South
DCI)
Border Leaf Border Gateway Border Gateway Border Leaf
Support for Inter-AS option A (VRF-LITE) and
seamless VXLAN-MPLS gateway (Border-PE) V V V V V V V V
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Border Node Placement Option
Flexible Design option-4 External Network
North-South
Extra functional dependency (BGW + Spine) Border Gateway Spine Border Gateway Spine
V R V R V R V R
Seamless VXLAN-MPLS gateway (Border-PE) not supported
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Who can be the
External Edge
Router?
Edge Router Placement Option
Supported Hardware and Software
might vary depending on NDFC version
Check compatibility matrix 12.1.3b
Data Center VXLAN EVPN Data Center VXLAN EVPN Data Center VXLAN EVPN
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
Border to External
Peering Type
External Layer-3 connectivity options
Inter-AS Option A
Clear separation of Autonomous Systems Separated Border + PE
Simple, Straight forward, and Commonly used (Inter-AS Option A)
MPLS-LDP or SR-MPLS
Easy and Flexible BGP route-filtering mechanisms
Edge Router BGP 65099
BGP natural loop avoidance
Structured handoff between the VXLAN BGP EVPN fabric and the IPv4/IPv6
external routing domain (Backbone, WAN, Campus, etc.)
V V
Not ideal for High scale VRF handoff deployment Border Leaf BGP 65001
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
External Layer-3 connectivity options
VRF-LITE using L3 VLAN Interfaces (SVI)
Clear separation of Autonomous Systems
External Network
No need for redistribution
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
External Layer-3 connectivity options
Seamless Protocol Gateway Model (Border-PE)
Combines two different encapsulations and
Address Family, using a “single-box (Border- Seamless Stitching between
PE)” instead of a “two-box (CE-PE)” model
VXLAN, MPLS, and SR
VXLAN VTEP Border nodes also becomes a
External Network
MPLS L3VPN Provider Edge (PE), resulting in
a role called Border-PE
Remote PE BGP 65099
Best suited for high scale VRF deployment
VPNv4/VPNv6
Saves CAPEX and OPEX MPLS-LDP or SR-MPLS
Seamless stitching between L2VPN EVPN
and VPNv4/v6 Address Family Reoriginate EVPN Prefix in L3VPN V V
Border-PE
Reoriginate L3VPN Prefix in EVPN BGP 65001
BGP route-filtering mechanisms available
VXLAN EVPN
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
External Layer-3 connectivity options
IGP (OSPF)
IGP (OSPF) External IP
Complex and Operationally difficult Handoff
IGP not recommend for Inter-Domain routing
VPNv4/VPNv6 External Network
Complex and cumbersome Route Redistribution (IGP <-> BGP MPLS-LDP or SR-MPLS
EVPN)
Edge Router BGP 65099
IGP (OSPF) External routes are preferred over EVPN Internal
routes due to Protocol Administrative Distance
IPv4/IPv6 (OSPF)
No natural protection from Routing Loops
V V
Limited IGP route filtering capabilities Border Leaf BGP 65001
VXLAN EVPN
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
Provision External IP
Handoff with NDFC
VXLAN EVPN External L3 connectivity
Prerequisites and Guidelines
Data Center VXLAN EVPN
Extend Layer-3 services to Nexus 9000, Nexus 7000, Catalyst
9000, ASR 1000, ASR 9000, ASR 8000, NCS S500 Spine
Edge Router
Layer-3 Ethernet and Port-channel supported
External Network
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
VXLAN EVPN External L3 connectivity
Inter-Fabric Connections (IFC) considerations
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
VXLAN EVPN External L3 connectivity
Route Advertisement considerations
A per VRF per peer eBGP peering session between Border-Edge Router is established
for each VRF-Lite IFC. Three options are natively supported for this peering:
• Advertise Host (disabled by default in NDFC)
• If host routes (/32 or /128) need to be enabled and advertised from Border leaf to Edge router
• Route-map does outbound filtering
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 162
VXLAN EVPN External L3 connectivity
Route Advertisement considerations
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
VXLAN EVPN External L3 connectivity
Route Advertisement considerations
• Advertise Default-Route (disabled)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
VXLAN EVPN External L3 connectivity
Route Advertisement considerations
• Config Static 0/0 Route (disabled) • Config Static 0/0 Route (enabled)
vrf context corp vrf context corp
description CORP description CORP
vni 9999 vni 9999
rd auto rd auto
address family ipv4 unicast address family ipv4 unicast
route-target both auto route-target both auto
route-target both auto evpn route-target both auto evpn
ip route 0.0.0.0/0 10.33.0.1
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
Enabling VRF-LITE Automated
Border Leaf to Nexus Edge Router
Step 2
IFC prototypes
Define IFC Type: “Back2Back&ToExternal”
Check: Auto-Deploy both
(Optional) Auto Allocation of Unique IP on VRF Extension over VRF LITE IFC
Recalculate config and deploy
Step 1 Step 3
Create and Import Deploy Symmetric VRF-Lite Extension
Define VXLAN EVPN and External Fabric. Set Define Individual VRF extension on the Border leaf
respective roles (e.g., Border, BGW, Edge)
NDFC will add Sub-int and eBGP peering on Border leaf and neighbor
Uncheck Fabric monitor mode in External Edge router
Fabric if the Edge router is in managed mode
Deploy on Data Center VXLAN EVPN Fabric and External Network Fabric
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 166
VRF-LITE: Border to Nexus Edge
Topology and IFC considerations
External Network
ASN 65100
VRF
“CORP”
• IFC Automated
Border Leaf
VRF
“CORP”
ASN 65001
VXLAN EVPN
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Managing Edge Devices
part of “External Connectivity Network” Fabric
• Create Fabric, Discover Switches, Set Role, and Recalculate & Deploy
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
VRF-LITE: Border to Nexus Edge
Defining IFC deployment type
• Review Fabric Settings for VRF-Lite IFC deployment type:
LAN > Fabrics > Select (your DC VXLAN Fabric) > Actions > Edit Fabric > Resources Tab
Per VRF Per Dotq1
association
Select
Deployment Type
Deploy VRF-LITE if
Edge device is
Nexus and
managed by NDFC
eBGP peering
subnet details
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
VRF-LITE: Border to Nexus Edge
Defining IFC Link on physical interface
• IFC link has been defined
• Policy should be ext_fabric_setup
o IPs auto selected from VRF-Lite Subnet IP Range
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
VRF-LITE: Border to Nexus Edge
Defining VRF extensions on Border
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
VRF-LITE: Border to Nexus Edge
Defining VRF extensions on Border
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
VRF-LITE: Border to Nexus Edge
Defining VRF extensions on Border
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
VRF-LITE: Border to Nexus Edge
Defining VRF extensions on Border
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 174
VRF-LITE: Border to Nexus Edge
Defining VRF extensions on Border
Physical Interface
MTU
Provide Route-MAP
if different from
NDFC default
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 175
VRF-LITE: Border to Nexus Edge
Preview and Deploy VRF extensions on Border
L3 Tenant
CORP Advertisement of Default route
towards site internal VTEP
L3VNI VRF
Configs
eBGP External
Edge neighbor
Default route static
towards External Edge
Border Physical
Interface Config
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 176
VRF-LITE: Border to Nexus Edge
Preview and Deploy VRF extensions on External Edge
• Once configurations are deployed on Border Leaf (DC VXLAN EVPN), navigate to
External Network Fabric and perform Recalculate and Deploy
VRF Configs
eBGP Border
Leaf neighbor
Edge Physical
Interface Config
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 177
Enabling VRF-Lite: Manual
Border Leaf to Non-Nexus Edge Router
Step 2 Step 4
IFC prototypes
External Network Fabric VRF-Lite Extension
Define IFC Type: “Manual” Define sub-interfaces, invoke BGP policies
Define IFC link on physical interface NDFC will generate Sub-int and eBGP peering on Edge router
Recalculate config and deploy Deploy on External Network Fabric
Step 1 Step 3
Create and Import DC VXLAN EVPN Fabric VRF-Lite Extension
Define VXLAN EVPN and External Fabric. Set Define Individual VRF extension on the Border leaf
respective roles (e.g. Border, BGW, Edge)
NDFC will generate Sub-int and eBGP peering on Border leaf
Uncheck Fabric monitor mode in External
Deploy on Data Center VXLAN EVPN Fabric
Fabric if the Edge router is in managed mode
For Non-Nexus ensure SNMP configs for
discovery
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 178
VRF-LITE: Border to Non-Nexus Edge
Topology and IFC considerations
External Network
ASN 65099
VRF
“CORP”
• IFC Manual
Border Leaf
VRF
“CORP”
ASN 10
VXLAN EVPN
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
VRF-LITE: Border to Non-Nexus Edge
Defining IFC deployment type
• Review Fabric Settings for VRF-Lite IFC deployment type:
LAN > Fabrics > Select (your DC VXLAN Fabric) > Actions > Edit Fabric > Resources Tab
Select
Deployment Type
eBGP peering
subnet details
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 180
VRF-LITE: Border to Non-Nexus Edge
Defining IFC Link on physical interface
• Verify link from DC VXLAN Fabric to External Fabric was discovered
LAN > Fabrics > Double Click (your DC VXLAN Fabric) > Links
If no policy exists, or
neighbor not found. A link
can be created manually
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 181
VRF-LITE: Border to Non-Nexus Edge
Defining IFC Link on physical interface
External Fabric
“WAN-EXT”
ASN 65099
Edge Router
Gig0/0/0/0.2 – 10.10.10.1/31
E1/1.2 – 10.10.10.0/31
Border Leaf
ASN 10
DC Fabric
“VXLAN”
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 182
VRF-LITE: Border to Non-Nexus Edge
Defining VRF extensions on Border
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 183
VRF-LITE: Border to Non-Nexus Edge
Defining VRF extensions on Border
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 184
VRF-LITE: Border to Non-Nexus Edge
Defining VRF extensions on Border
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 185
VRF-LITE: Border to Non-Nexus Edge
Defining VRF extensions on Border
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 186
VRF-LITE: Border to Non-Nexus Edge
Preview and Deploy VRF extensions on Border
Advertisement Default
route towards site internal
eBGP External
Edge neighbor
Border Physical
Interface Config
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 187
VRF-LITE: Border to Non-Nexus Edge
Defining the policies on the Edge Router
• After completing the configurations on the VXLAN Fabric (Border Leaf), Navigate to
External Fabric (Edge Router) and apply the following policies
• ios_xr_base_bgp
Policy = Ios_xr_base_bgp
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 188
VRF-LITE: Border to Non-Nexus Edge
Defining the policies on the Edge Router
• After completing the configurations on the VXLAN Fabric (Border
Leaf), Navigate to External Fabric (Edge Router) and apply the
following policies
• ios_xr_base_bgp
• ios_xr_Ext_VRF_Lite_Jython
Policy =
External Fabric Ios_xr_Ext_VRF_Lite_Jython
“WAN-EXT”
Edge Router
Gig0/0/0/0.2 – 10.10.10.1/31
E1/1.2 – 10.10.10.0/31
Border Leaf
ASN 10
DC Fabric
“VXLAN”
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 189
VRF-LITE: Border to Non-Nexus Edge
Deploy configs on the Edge Router
eBGP Border
Leaf neighbor
IOS-XR Physical
Interface Config
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 190
Verification and
Validation with
NDFC
Verification through NDFC
Keeping you away from CLI
Step 2
Deployment History
Configuration Execution Status:
Verify Deployment History Status Success for
Underlay, Overlay, Interfaces, and more
Step 1 Step 3
Verify Network and VRF Show commands
attachments Service / features status
Job Execution Status: (CLI through NDFC)
Network Status Deployed
VRF Status Deployed
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 192
Attachment deployment status
Job execution perspective
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 193
Deployment History Tool
Commands execution perspective
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 194
Show Commands Tool
Switch Config perspective
NDFC pre-built
commands, user
commands, or custom-
built show templates
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 195
Key NDFC Template Terminology
• Template: CLI code-chunks of CLI features, with variables and default values, that go
from VXLAN EVPN fabrics up to the Overlay networks, VRFs, and much more, like PBR,
vPC pairing, BGP, MPLS, etc.
• NOTE: Do Not edit/modify shipping templates. Instead, duplicate the existing template to
change the contents and provide a unique name.
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 196
Template Types
• Broadly used to configure devices features (hence, the Policy Template reference
Policy: everywhere in NDFC)
• Overlay Mode, config-profile mode for VRFs and Networks. where the overlay
Profile: dependencies are managed in the same place (BGP, vlan, vni, intfs, vrf, etc)
• The “heavy-lifter” special python template, manages the fabric global parameters
Fabric: and the Policy and Profile/CLI Template Intents for each fabric device.
• Used to support the Programable Reports feature, a python SDK bundled with
Report: NDFC, provided to simplify report generaton.
• To use commands available in EXEC mode, includes show commands, clear commands,
Exec and other commands that perform actions that you do not save in the device configuration.
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 197
Policy Template Instance (PTI)
• When a Policy Template is attached to a device, a unique Policy ID is generated, contains details,
variable values and the expected generated configuration of that template that will be applied to
the device.
Policy
Manager
Policy
Templates
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 198
Day-2 with
NDFC
Deployment History Tool
Who deployed what, when, where?
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 200
Streamlined Image and Patch Mgmt. for NX-OS
Simplify, Speed up, and Mitigate Risks of Errors
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 201
Image Management Workflow with NDFC
1 2
CCO
End-user Image Policy
Intent 3
Workstation
NDFC Mgmt OOB Mgmt
6
4
NDFC
1 2 3 4 5 6
Validate non-
Upload Create the Attach the Stage the Upgrade the
disruptive
Images Image Policy Image Policy Images switches
upgrade
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 202
Return Material Authorization (RMA)
End-user 4
Workstation
3 NDFC Mgmt OOB Mgmt
1 2
NDFC
Restore Config
1 From the Fabric Overview, select the concerned switch and Change its Mode to Maintenance
3 Provision RMA and Set the Admin Password (for POAP). Manual RMA is also supported
5 Move the device back to Normal Mode (~5 mins for full configuration)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 203
Granular Role-Based Access Control (RBAC)
Orchestrated from ND
Network Access Administrator
Administrator (Full (rights for interfaces
admin rights) management only)
Enhanced RBAC &
Security Domains
Network
Device Upgrade Login Authentication (Local &
Administrator (rights
Operator (read
only/preview)
for image Remote)
management only)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 204
Programmable Reports
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 205
NDFC Dashboard
Overall
Fabric Switches
health Overall configuration
existing status
Alarms and
Events
Switches
inventory by
Switches number of
operational roles
status
Programmable
reports for Image Switch inventory
management and based on different
Performance hardware and
monitoring software versions
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 206
NDFC Dashboard
Allow network administrators to focus on daily operation around the health, sync
configuration, and performance of data center switching.
Multiple additional Tabs based on the Features enabled (EPL, VMM, K8s)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 207
Visualize multiple fabrics with topology views
Underlay
and
Overlay
links
VXLAN Switch
Overlays specific
Oper vs information
Config view
Color coded
Compliance
status
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 208
NDFC Topology
Operational Color Coding
Operation Configuration
The element is in warning state and requires attention to prevent any further problems
The element has major issues and requires attention to prevent any further problems
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 209
NDFC Topology
Configuration Color Coding
Operation Configuration
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 210
NDFC Topology
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 211
NDFC Topology
ngOAM Source & Destination Physical Path of a particular flow Host to Host path
Topology Menu ☞ Actions ☞ VXLAN
OAM Switch to Switch path
Live path
visualization
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 212
Monitoring Alarm
Viewing Alarms and Events
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 213
Monitoring Alarm
Viewing Alarms and Events
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 214
Monitoring Alarm
Viewing Alarms and Events
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 215
Monitoring Alarm
Viewing Alarms and Events
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 216
Monitoring Alarm
Viewing Alarms and Events
Display Information
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 217
Monitoring Alarm
Viewing Alarms and Events
Accounting Information
Delete Events
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 218
NDFC Compute Visibility
Virtual Machines Manager Integration (Read Only) and Visibility
Expand the view to compute hosts, virtual switches and Virtual Machines.
Select any VM and get Networks details up to the Leaf node
From the topology view, enter into the VMM instance to view the Hosts,
Virtual Switches, and Virtual Machines
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 219
Compute Visibility
Display
connected
Physical Hosts
Display
DVS/vSwitch
Display
VMs
Benefit
Single point of management providing in depth visibility and
VMM, Kubernetes, and OpenStack VM level visibility
information
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 220
VMM Visibility vCenter Instance
Leaf nodes
Physical Host
DVS
Virtual Machines
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 221
K8s Visibility K8s Instance
Leaf nodes
Physical Host
DVS
K8s Node
Namespace
POD
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 222
Endpoint Locator and Visualizer
NDFC 12 RR RR
Mgmt Interface
ND cluster
EndPoint Locator relies on Fabric Inband Mgmt to collect EP information, using the ND Data Interface
An endpoint is typically anything with one IP address (IPv4 and\or IPv6) and/or MAC address
NDFC pre-provisions the switches that host the MP-BGP Route Reflector function to peer with them
NDFC contacts the selected RRs and add the appropriate BGP neighbor statements on the RR (Spine)
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 223
Endpoint Locator and Visualizer
NDFC 12 RR RR
Mgmt Interface
ND cluster
The Endpoint Locator (EPL) feature allows Real-time Tracking of Endpoints within a Data Center
Analyze trends associated with endpoint such as additions, removals, moves, and so on
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 224
Endpoint Locator and Visualizer
Overlay
count
EPs per
switches
EPs detailed
information
Benefit
Almost real-time data on active Single pane of glass for all EP Endpoint life and history Active VRFs and Networks
endpoints visualization
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 225
NDFC Service Backup & Restore
NDFC Service Backup VXLAN Fabric
LAN Fabric
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 226
NDFC Service Backup & Restore
Config Only Config Only
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 227
NDFC with Day 2 operations
Seamless integration with Day 2 operations app NDI for in depth
telemetry analytics
Benefit
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 228
Cisco Nexus Dashboard Insights
360-degree visibility Analytics Integrate with NDFC
Security
On-prem
resources
Cloud
Other services
Networking
apps
NDI NDFC
ITSM
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 229
Nexus Dashboard Insights
Identify, Locate, Upgrade impact
Use Cases Root cause, Remediate Advisories
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 230
Easily license your NDFC
Software included with switch subscription licenses
Tier-based
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 232
Conclusion
Key points to remember
AZ-1 AZ-4
AZ-2 AZ-5
AZ-3 AZ-6
BRKDCN-2988 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 233
Thank you