Enterprise products and services are set forth in the express warranty statements acco mpanying such
products and services. Nothing herein should be construe d as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions co ntained herein.
Confidential computer software. V alid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and T e chnical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsoft® and Windows® are trademarks of the Microsoft group of companies.
Adobe® and Acrobat® are trademarks of Adobe Systems In corporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
Contents
Configuring EVI ······························································································· 1
Path MTU ················································································································································· 11
Licensing requirements ···································································································································· 11
EVI configuration task list ································································································································· 11
Configuring EVI basic features ························································································································ 11
Configuring a site ID ································································································································· 12
Configuring an EVI tunnel ························································································································ 12
Assigning a network ID to the EVI tunnel ································································································· 13
Specifying extended VLANs on the EVI tunnel ························································································ 14
Configuring ENDP ···································································································································· 14
Tuning EVI IS-IS parameters ··························································································································· 15
EVI IS-IS configuration task list ················································································································ 16
Creating an EVI IS-IS process ················································································································· 16
Changing the designated site VLAN ········································································································ 17
Optimizing an EVI IS-IS network ·············································································································· 17
Specifying a routing policy for an EVI IS-IS process ················································································ 21
Configuring SNMP notifications and context for EVI IS-IS ······································································· 22
Configuring Graceful Restart for an EVI IS-IS process ············································································ 23
Increasing the maximum number of MAC entries in an LSP for an EVI IS-IS process ···························· 23
Configuring VLAN mappings ···························································································································· 24
Enabling EVI ARP flood suppression ··············································································································· 24
Enabling EVI flooding for all destination-unknown frames ··············································································· 25
Enabling selective flood for a MAC address ···································································································· 25
Displaying and maintaining EVI ······················································································································· 26
EVI configuration examples ····························································································································· 27
Single-homed EVI network configuration example ·················································································· 27
Multiple-EVI-networks configuration example ·························································································· 35
Document conventions and icons ································································· 39
Remote support ········································································································································ 42
Index ············································································································· 44
i
Configuring EVI
Overview
Ethernet Virtual Interconnect (EVI) is a MAC-in-IP technology that provides Layer 2 connectivity
between distant Layer 2 network sites across an IP routed network. It is used for connecting
geographically dispersed sites of a virtualized large-scale data center that requires Layer 2
adjacency (see Figure 1).
EVI enable
and business continuity. For example, virtual machines can move between data center sites without
changing their IP addresses, so their movements are transpare nt to use rs and do not disrupt traffic.
Figure 1 Virtual machine migration
s long-distance virtual machine workload mobility and data mobility, disaster recovery,
Layer 2 connectivity extension issues
EVI resolves the following Layer 2 connectivity extension issues:
• Site independence—EVI keeps protocol failures, such as broadcast sto rms, from propagating
across sites.
• Transport independence—EVI has no special requirements for site location or transport
network type, except that the transport network can forward IP packets.
• High availability—EVI supports redundant edge devices and has a loop-free mechanism to
prevent loops for a multihomed network site.
• Link efficiency—EVI optimizes the inter-site multicast and broadcast transmission mecha nism
and implements load-sharing on redundant links.
•Site and transport transparency—EVI is both site and transport network transparent. It has
no special site or transport network topology requirements.
1
•Easy management and maintenance—EVI requires deployment only on edge devices and
does not introduce any topology change or configuration within sites or the transport network.
Network topologies
As shown in Figure 2, an EVI network has one or multiple edge devices at each site. These sites are
connected through virtual links and run the EVI IS-IS protocol to advertise their MAC address entries
to each other. EVI maintains MAC routing information on the edge devices without changing the
forwarding or routing information within the sites or the transport network.
Figure 2 EVI network
Site network
VLAN 10
Site 1
Edge
device
EVI link
Transport network
EVI
Site
network
Edge
VLAN 10
Site 2
device
EVI link
EVI link
Site network
Edge
device
Site 3
VLAN 10
EVI supports multiple EVI networks on an edge device for extending different VLANs across the
Layer 3 network. One EVI network can convey multiple VLANs, but one VLAN can map to only one
EVI network. Each EVI network has separate network parameters and independently forwards
traffic.
As shown in Figure 3, EVI
network 1 extends VLAN 100 and VLAN 101 to Site 2, Site 3, and Site 4
for Web access traffic. EVI network 2 extends VLAN 4000 (the management VLAN) to all sites, and
EVI network 3 extends VLANs 50 to 80 between Site 1 and Site 4 for database traffic.
2
Figure 3 Multiple EVI networks
Site 1
VLAN 4000
EVI 3
VLANs 50-80
Site 2
EVI 2
EVI 1
VLANs 100-101
Site 3
Terminology
Edge device
An edge device performs typical Layer 2 learning and forwarding on the site-facing interfaces
(internal interfaces) and performs tunneling and routing on the transport-facing interfaces.
EVI network ID
An edge device can belong to multiple EVI networks. Each EVI network is uniquely identified by a
network ID.
EVI link
An EVI link is a bidirectional virtual Ethernet channel between a pair of edge devices in an EVI
network. EVI links are conveyed on EVI tunnels. Each EVI link is uniquely identified by a pair of
source and destination EVI tunnel IP addresses.
EVI tunnel
An EVI tunnel is a point-to-many automatic GRE tunnel that conveys EVI links for an EVI network.
One EVI tunnel can provide services only for one EVI network.
EVI neighbor
Site 5
Site 4
ENDP
ENDS
All edge devices in an EVI network are EVI neighbors to one other.
EVI Neighbor Discovery Protocol uses the client/server model to dynamically discover sites and
edge devices, establish and maintain EVI links, and exchange network membership information in
an EVI network.
An EVI neighbor discovery server maintains all neighbor information in an EVI network. An EVI
network can have up to two ENDSs.
3
ENDC
An EVI neighbor discovery client works with an ENDS to learn neighbor information and triggers EVI
link setup between neighbors.
EVI IS-IS
EVI IS-IS establishes adjacencies and advertises MAC reachability information among edge devices
at different sites in an EVI network. It also m aps VLA Ns to re dun dant edg e d evices at a multi homed
site to avoid loops and balance traffic.
EVI IS-IS runs independently of the Layer 3 routing protocols on the transport network and sites.
DED
Designated edge devices (DEDs) include inter-site DEDs and site DED.
An inter-site DED is elected from between the edge devices on each EVI link to send CS NP pa ckets
for LSDB synchronization.
A site DED is elected from among the redundant edge devices at a multihomed site to distribute
extended VLANs among them so the traffic of a VLAN always enters or leave s the site from the same
edge device.
Appointed edge forwarder
If an edge device is assigned by DED to forward and receive traffic for an extend ed VLAN, this edge
device is the appointed edge forwarder for the extended VLAN. This extended VLAN is an active
VLAN on the edge device.
Internal interface
Internal interfaces are site-facing Layer 2 interfaces that connect an edge device to switches or
routers in the site.
Working mechanism
An edge device uses the following process to set up an EVI network and forward traf fic at Layer 2 to
remote sites:
1. Runs ENDP to discover EVI neighbors and set up EVI links between neighbors.
2. Runs EVI IS-IS to advertise MAC reachability information over EVI links in the EVI network.
3. Forwards traffic based on MAC reachability information that has been received from other sites.
This section describes this process in detail.
Neighbor discovery
An EVI network runs ENDP to discover all its edge devices and establishes adjacencies among the
edge devices in the following process:
1. ENDS is enabled on one edge device, and ENDC is enabled on all other edge devices.
2. The ENDCs register their IP addresses and other data with the ENDS.
3. The ENDS updates its ENDC database with received data and sends the updated database to
each ENDC.
4. After receiving the register reply, the ENDCs establish an EVI link with each other.
For high availability, you can configure up to two ENDSs for an EVI network.
MAC address learning
MAC reachability information on an EVI edge device comes from the following sources:
•MAC entries configured or learned in the data plane—The edge devices use the typical
source-MAC-based learning mechanism to learn unicast MAC addresses in their local sites
(called local MAC addresses).
4
•MAC entries learned through EVI IS-IS—After completing neighbor discovery, the edge
NOTE:
The mac-address max-mac-count command and the mac-address mac-learning enable
command take effect only on local MAC addresses, which are learned in the data plane. They do
not take effect on remote MAC addresses, which are learned in the control plane.
Unicast flow
For intra-site unicast flows, an edge device performs the typical MAC address table lookup, as
shown in Figure 4.
devices run EVI IS-IS in the control plane to establish adjacencies and advertise MAC
reachability information that has been learned or configured in the data plane to each other over
EVI links.
Figure 4
VLANMACInterface
Layer 2 forwarding in a site
MAC Table
200MAC1 GE1/0/1
200MAC2 GE1/0/2
GE1/0/1
Host AHost B
MAC1MAC2
Site 1Site 2
EVI
Transport network
EVI
EVI
GE1/0/2
The following forwarding process (see Figure 5) takes place for unicast flows betwee n sites:
1. The source edge device learns the source MAC address of the incoming Ethernet frame, and
looks up the destination MAC address in its MAC table for the outgoing interface .
2. If the outgoing interface is an EVI-Link interface instead of a physical port, the source edge
device encapsulates the frame in a GRE header, and then adds an IP header and a link layer
protocol header.
In the outer IP header, the source IP address is the source edge device's tunnel source IP
address, and the destination IP address is the destination edge device's tunnel source IP
address.
3. The source edge device forwards the encapsulated packet out of the EVI link to the destination
edge device across the IP transport network.
4. The destination edge device removes the headers of the original Ethernet fra me, looks up the
destination MAC address in the MAC address table, and sends the frame out of the matching
outgoing interface.
5
Figure 5 Layer 2 forwarding between sites
Transport network
VLANMACInterface
200MAC1GE1/0/1
200MAC2GE1/0/2
200MAC3 EVI-Link0
Multicast flow
Edge devices run IPv4 IGMP snooping on each extended VLAN and learn multicast router port and
multicast member port information on EVI-Link interfaces for Layer 2 multicast forwarding as if they
were Ethernet interfaces. In an extended VLAN, each edge device tunnels IGMP, MLD, and PIM
protocol packets to all its remote edge devices, and the remote edge devices flood the packets in the
VLAN.
MAC Table
Host A
MAC1
EVI
c
EVI
a
Site 1Site 2
b
Device ADevice B
Host B
MAC2
EVI
d
GE1/0/1
MAC Table
VLANMACInterface
200MAC1
200MAC2
200MAC3
e
Host C
MAC3
EVI-Link0
EVI-Link0
GE1/0/1
For a site-to-site multicast data frame in an extended VLAN, the following process (see Figure 6)
akes place:
t
1. The DR in a site sends out a multicast frame.
2. The source edge device copies the frame and encapsulates one copy on each multicast
member EVI-Link interface.
3. The source edge device unicasts the encapsulated frames to the de stination edge devices over
the EVI links.
4. Each destination edge device removes the headers of the multicast frame and copies the
multicast frame on each multicast member interface.
5. Each destination edge device sends the multicast frame out of all member interfaces to the
destination hosts.
6
Figure 6 Multicast data frame forwarding process
(1) Multicast stream
DR
Site 1
Flooding flow
An edge device handles flooding by frame type, as follows:
• Broadcast frame—Floods the frame to all interfaces in the VLAN where the frame has been
received, including internal interfaces and EVI-Link interfaces. For ARP packets, you can use
the ARP flood suppression feature (see "ARP flood suppression"
•Destination-unknown unicast or multicast frame—Floods the frame to all internal interfaces
in the VLAN where the frame has been received. The edge device typically does not forward
destination-unknown frames to other sites. If a site-to-site flooding is desirable for a sp ecial
MAC address, use the selective flood feature (see "Selective flood").
(2) Replicate & encapsulate
EVI-Link1
EVI
GE1/0/1
VLANR-portH-port
100GE1/0/1 EVI-Link1
Source
EVI-Link2
EVI-Link2
VLANR-portH-port
100EVI-Link1 GE1/0/1
(3) Unicast
EVI-Link1
Site 2
(3) Unicast
EVI
EVI
GE1/0/1
(4) Decapsulate
& replicate
(5) Multicast
stream
Receiver
(4) Decapsulate & replicate
EVI-Link1
VLANR-portH-port
100EVI-Link1 GE1/0/1
Site 3
(5) Multicast stream
EVI
GE1/0/1
Receiver
) to reduce ARP broadcasts.
o flood a frame to remote sites, an EVI edge device must replicate the frame, encapsulate each
T
replica in one unicast frame for each destination site, and send the unicast frames to the remote
edge devices.
Placement of Layer 3 gateways
For the hosts in an extended VLAN at a site, their Layer 3 gateway must be on the edge device at the
local site rather than a remote site.
ARP flood suppression
ARP flood suppression reduces ARP request broadcasts on the EVI network by enabling edge
devices to reply to ARP requests on behalf of remote-site hosts.
As shown in Figure 7, this feature sn
ARP flood suppression table with remote MAC addresses. If an ARP request has a matching entry,
the local edge device replies to the request on behalf of the remote-site host. If no match is found, the
edge device floods the request to the EVI network.
ARP flood suppression uses the following workflow:
1. Host IP1 in site A sends an ARP request to obtain the MAC address of IP2.
2. Site A's edge device floods the ARP requests out of all interfaces, including the EVI tunnel
interfaces.
oops ARP replies on an EVI tunnel interface to populate the
7
3. Site B's edge device de-encapsulates the ARP request and broadcasts the request.
4. IP2 sends an ARP reply back to site A's edge device over the EVI link.
5. Site A's edge device creates an ARP cache entry for the remote MAC address and forwa rds the
reply to the requesting host.
6. Site A's edge device replies to all subsequent requests for the MAC address of IP2.
Figure 7 ARP flood suppression
Selective flood
Selective flood enables an edge device to send an unknown unicast or multicast frame out of an EVI
tunnel interface.
This feature is designed for special multicast addresses that require flooding across sites but cannot
be added to a multicast forwarding table by IGMP snooping.
For example, you must configure selective flood for PIM hellos, IGMP general query packets, and
Microsoft NLBS cluster traffic to be sent out of an EVI tunnel interface.
Multihoming
EVI supports deploying two or more EVI edge devices to provide Layer 2 connectivity extension for a
site. Deployment of redundant edge devices creates the risk of loops because EVI edge devices do
not transmit spanning tree BPDUs across the transport network.
To remove loops in a multihomed network (see Figure 8), you
devices into one device, as shown in Figure 9. If
redundant edge devices to automatically designate each edge device as the traffic forwarder for a
particular set of extended VLANs, as shown in Figure 10.
The redun
DED for exchanging extended VLAN information and assigning active VLA Ns among them. All edge
dant edge devices exchange EVI IS-IS hello packets in a designated site VLAN to elect a
can use IRF to virtualize multiple edge
IRF is not used, EVI IS-IS runs among the
8
devices have a user-configurable DED priority. The one with the highest DED priority is elected as
the DED. The DED uses the following rules to assign active VLANs:
1. If an extended VLAN is configured only on one edge device, the edge device is the appointed
edge forwarder for the VLAN.
2. If a set of extended VLANs is configured on at least two edge devices, the DED distributes the
extended VLANs equally among the edge devices.
3. When reassigning VLANs, the DED preferably assigns an edge device the active VLANs that
were assigned to it in the previous assignment.
The traffic forwarder designation mechanism of EVI IS-IS makes sure an extended VLAN is active
only on one edge device. For example, VLAN 1000 in Figure 10 is active only on site 1'
s Device B
and site 2's Device D. Only these two edge devices can receive or forward VLAN 1000 traffic
between the two sites.
Figure 8 Looped dual-homed EVI network
9
Figure 9 Edge devices in an IRF fabric
Transport
network
EVI
EVI
Site 1Site 2
Figure 10 Active VLAN on an edge device
IRFIRF
EVI
10
Path MTU
When encapsulating an Ethernet frame in EVI, the edge device does not modify the Ethernet frame,
but it sets the DF bit in the IP header. For an Ethernet transport network, the total size of an EVI
protocol packet increases by 46 bytes, and the total size of a data packet increases by 38 bytes.
Because EVI does not support path MTU discovery, your EVI deployment must make sure the path
MTU of the transport network is higher than the maximum size of EVI tunneled frames.
Licensing requirements
EVI requires a license. For information about feature licensing, see Fundamentals Configuration Guide.
EVI configuration task list
Perform the following tasks on all edge devices of an EVI network:
Tasks at a glance Remarks
Configuring EVI basic features:
• (Required.) Configuring a site ID
• (Req
uired.) Configuring an EVI tunnel:
{ (Required.) Assigning a network ID to the EVI tunnel
{ (Required.) Specifying extended VLANs on the EVI tunnel
{ (Required.) Configuring ENDP
An EVI tunnel can provide services
for only one EVI network.
All edge devices in an EVI network
must have the same network ID.
The edge devices at the same site
must have the same site ID, and
the edge devices at different sites
must have different site IDs.
An extended VLAN can be
assigned only to one EVI network.
(Optional.) Tuning EVI IS-IS parameters
(Optional.) Configuring VLAN mappings N/A
(Optional.) Enabling EVI ARP flood suppression
(Optional.) Enabling EVI flooding for all destination-unknown frames
(Optional.) Enabling selective flood for a MAC address
Configuring EVI basic features
All tasks in this section are required for setting up an EVI network.
EVI IS-IS automatically runs on an
EVI tunnel interface immediately
after the interface is created.
You can tune EVI IS-IS
parameters for optimizing network
performance.
Perform this task to reduce ARP
request broadcasts on an EVI
network.
Perform this task to flood frames
with unknown MAC addresses to
the EVI tunnel interface.
Perform this task for special
multicast MAC addresses that
require Layer 2 inter-site
forwarding but cannot be learned
into the MAC address table.
11
Configuring a site ID
A site ID uniquely identifies a site in an EVI network. Edge devices at the same site must use the
same site ID, and edge devices at different sites must use different site IDs.
A site ID conflict occurs in the following situations:
• The devices at the same site are assigned different site IDs.
• The devices at two different sites are assigned the same site ID.
When the site IDs of two devices conflict, EVI IS-IS isolates the device with the lower MAC address.
The isolated device can only receive EVI IS-IS hello packets. It cannot exchange EVI IS-IS packets
with other neighbors. To identify isolated devices, use the display evi isis brief command or the
display evi isis peer command.
To assign a site ID to the device:
Step Command Remarks
1. Enter system view.
2. Assign a site ID to the
device.
system-view
evi site-id
Configuring an EVI tunnel
Step Command Remarks
1. Enter system view.
2. Create an EVI tunnel
interface and enter tunnel
interface view.
system-view
interface tunnel
evi
N/A
site-idThe default site ID is 0.
N/A
By default, no tunnel interface
exists.
The endpoints of a tunnel must use
number
mode
the same tunnel mode.
For more information about this
command, see tunneling
commands in Layer 3—IP Services Command Reference.
12
Step Command Remarks
By default, no source IP address or
source interface is specified for any
tunnel.
The source interface can be a Layer
3 Ethernet interface, Layer 3
aggregate interface, VLAN
interface, or Layer 3 loopback
interface. For more information
source
IMPORTANT:
command, see
3. Specify a source IP
address or interface for the
tunnel.
4. Configure the EVI link
keepalive interval and the
maximum number of
keepalive transmissions.
source
{ ipv4-address |
interface-type interface-number }
keepalive
[ seconds [ times ] ]
about the
tunneling commands in Layer 3—IP Services Command Reference.
EVI uses the specified address or
the primary IP address of the
specified source interface as the
source IP address of tunneled
packets on the transport network.
EVI networks can share a tunnel
source IP address or interface.
To avoid forwarding failure, do not
use a GRE tunnel interface or its IP
address (configure with the ip address command in tunnel
interface view) as the source
interface or IP address of an EVI
tunnel. For more information about
GRE, see Layer 3—IP Services Configuration Guide.
By default, a keepalive packet is
sent every five seconds and the
maximum number of transmissions
is two.
If no reply is received from the
remote end on an EVI link after the
maximum number of keepalive
transmissions is reached, the local
end considers the EVI link as having
failed.
5. (Optional.) Generate a
GRE key for tunneled
packets based on their
VLAN IDs.
NOTE:
gre key vlan-id
In addition to the EVI-specific commands described in this section, you can config ure generic tunnel
interface commands on an EVI tunnel interface. These tunnel commands and tunneling b asics are
described in the tunneling configuration in Layer 3—IP Services Configuration Guide.
Assigning a network ID to the EVI tunnel
Assign the same network ID to the EVI tunnels of all edge devices in an EVI network.
13
By default, EVI tunneled packets do
not contain a GRE key.
The GRE key setting must be the
same across an EVI network.
Perform this step if any remote edge
devices generate VLAN ID-based
GRE keys for EVI tunneled packets.
On an edge device, the network ID assigned to an EVI tunnel must be unique.
To assign a network ID to an EVI tunnel:
Step Command Remarks
1. Enter system view.
2. Enter tunnel interface view.
3. Specify a network ID.
system-view
interface tunnel
mode evi
[
evi network-id
]
N/A
number
numberBy default, no network ID is specified.
N/A
Specifying extended VLANs on the EVI tunnel
When configuring extended VLANs, follow these guidelines:
• You can specify an extended VLAN on only one EVI tunnel.
• To avoid loops, do not assign transport-facing ports to extended VLANs.
• To avoid data breach, make sure all edge devices in an EVI network maintain the same list of
extended VLANs.
To assign extended VLANs to an EVI tunnel:
Step Command Remarks
1. Enter system view.
2. Enter EVI tunnel interface
view.
3. Specify extended VLANs.
system-view
interface tunnel
mode evi
[
evi extend-vlan
]
number
vlan-list
N/A
N/A
By default, no VLANs are specified as
extended VLANs on any EVI tunnel.
To specify more extended VLANs, repeat
this step.
Configuring ENDP
ENDP enables the edge devices in an EVI network to discovery each other.
Configure an edge device as an ENDS to provide registration services or as an ENDC to register
with an ENDS.
Configuration guidelines
•For redundancy, you can configure up to two ENDSs on an EVI tunnel interface. These two
ENDSs work independently. The failure of one ENDS does not affect the neighbor discovery
and EVI link maintenance in the EVI network.
•When you enable ENDS on an EVI tunnel interface, an ENDC is automatically enabled. This
ENDC uses the source address of the EVI tunnel as the ENDS address. As a result, you can
use the evi neighbor-discovery client enable command to add only one ENDS address on an
ENDS-enabled EVI tunnel interface.
•To guarantee that each edge device can obtain the addresses of all its EVI neighbors, make
sure the ENDSs are the same across the EVI network.
•To improve security, enable ENDP authentication.
{Make sure all authentication-enabled ENDCs and ENDSs in an EVI network u se the same
authentication key.
14
{If authentication is disabled on an ENDS, all ENDCs, including auth entication-enabled
ENDCs, can register with the ENDS without authentication.
{If authentication is enabled on an ENDS, only authentication-enabled ENDCs that use the
same authentication key as the ENDS can register with the ENDS.
Configuring the edge device as an ENDS on the EVI tunnel
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Enter EVI tunnel
interface view.
3. Enable ENDS.
4. (Optional.) Enable
ENDP authentication.
interface tunnel
mode evi ]
[
evi neighbor-discovery
server enable
evi neighbor-discovery
authentication { cipher
simple
} password
number
|
Configuring the edge device as an ENDC on the EVI tunnel
Step Command Remarks
1. Enter system view.
2. Enter EVI tunnel interface
view.
3. Configure the edge device
as the ENDC of an ENDS.
system-view
interface tunnel
mode evi ]
[
evi neighbor-discovery client
enable
server-ip
number
N/A
By default, ENDS is disabled.
On an ENDS-enabled tunnel interface,
you can use the
client enable
ENDS, and use the
neighbor-discovery client
register-interval
ENDC registration interval.
By default, ENDP authentication is
disabled.
N/A
N/A
By default, ENDC is disabled.
If ENDS is enabled on the EVI tunnel
interface, you can use this command
to specify only one more ENDS.
If ENDS is disabled, you can repeat
this command to specify up to two
ENDSs.
ENDS address is the tunnel source
address configured on an
ENDS-enabled EVI tunnel interface.
evi neighbor-discovery
command to add one more
evi
command to modify the
4. (Optional.) Enable ENDP
authentication.
5. Configure the interval at
which the ENDC updates
its registration with ENDSs.
evi neighbor-discovery
authentication { cipher
simple
} password
evi neighbor-discovery client
register-interval
time-value
Tuning EVI IS-IS parameters
EVI IS-IS automatically runs on an EVI link immediately after the link is set up. You can tune EVI
IS-IS parameters to optimize the protocol performance.
15
By default, ENDP authentication is
disabled.
|
All ENDSs and ENDCs in an EVI
network must use the same
authentication key.
By default, an ENDC update its
registration with an ENDS every 15
seconds.
EVI IS-IS configuration task list
All EVI IS-IS configuration tasks are optional.
Tasks at a glance Remarks
Creating an EVI IS-IS process N/A
Changing the designated site VLAN
Optimizing an EVI IS-IS network:
• Configuring the EVI IS-IS hello interval
• Configuring the hello multiplier for calculating the
adjacency hold time
• Configuring the DED priority
• Configuring the CSNP packet transmit interval
• Configuring the minimum LSP transmit interval and
ximum number of LSPs sent at each interval
the ma
• Configuring the maximum LSP lifetime
• Configuring the LSP refresh interval
• Associating an EVI tunnel interface with a track entry
• Configuring preferred VLANs
The redundant edge devices at a site use the
designated site VLAN to exchange EVI IS-IS
hello packets for DED election and
extended-VLAN assignment.
Perform the EVI IS-IS
tasks to enable fast EVI link failure detection,
set appropriate MAC reachability information
update interval, and control the volume of LSP
and CSNP traffic on an EVI network.
network optimization
Specifying a routing policy for an EVI IS-IS process
Enabling adjacency change logging N/A
Configuring SNMP notifications and context for EVI IS-ISN/A
Configuring Graceful Restart for an EVI IS-IS process
Increasing the maximum number of MAC entries in an
LSP for an EVI IS-IS process
Creating an EVI IS-IS process
Each EVI network has one EVI IS-IS process. Before you can configure settings in EVI IS-IS process
view, you must create the pro ce ss.
An EVI IS-IS process is created automatically when you perform any one of the following tasks on a
tunnel interface:
• Specify extended VLANs.
• Perform network optimization tasks (see "Optimizing an EVI IS-IS network"
the LSP refresh interval and the maximum LSP lifetime.
•Configure VLAN mappings.
Perform this task to advertise a subset of MAC
addresses instead of all local MAC addresses
to remote sites.
Perform this task for providing nonstop
services.
Perform this task depending on the MAC
address table size on the edge device.
) except configuring
The ID of an automatically created process is the same as the EVI tunnel interface number.
Alternatively, you can use the evi-isis command to create an EVI IS-IS process manually.
To delete a manually created EVI IS-IS process, you must use the undo evi-isis command.
•If EVI IS-IS settings exist on the EVI tunnel interface, the undo evi-isis command only deletes
settings configured in EVI IS-IS process view.
16
•If no EVI IS-IS settings exist on the EVI tunnel interface, the undo evi-isis command deletes
both the EVI IS-IS process and all settings configured in EVI IS-IS process view.
An automatically created EVI IS-IS process is automatically deleted when you delete all EVI IS-IS
settings from the EVI tunnel interface.
To create an EVI IS-IS process or enter its view:
Step Command Remarks
1. Enter system view.
2. Create an EVI IS-IS process
or enter EVI IS-IS process
view.
system-view
evi-isis
process-id
Changing the designated site VLAN
EVI IS-IS uses the designated site VLAN to exchange hello packets within a site to discover
redundant edge devices and map extended VLANs to edge devices.
This designated site VLAN must not be extended across any EVI network.
N/A
By default, no EVI IS-IS process is
configured.
The process ID you specify must be the
same as the EVI tunnel interface number.
The EVI IS-IS process takes effect after you
configure extended VLANs on the tunnel
interface.
To change the designated site VLAN for EVI IS-IS:
Step Command Remarks
1. Enter system view.
2. Specify a designated site
VLAN.
system-view
evi designated-vlan
Optimizing an EVI IS-IS network
Perform the tasks in this section to optimize an EVI IS-IS network for bandwidth efficiency and high
performance.
Configuring the EVI IS-IS hello interval
EVI edge devices send EVI IS-IS hellos over EVI links to establish and maintain adjacencies and
elect the inter-site DED on each EVI link.
EVI edge devices at a multihomed site also exchange EVI IS-IS hellos to elect the site DED for
distributing extended VLANs among them.
Set the hello interval depending on the network convergence requirement and system resources.
• To increase the speed of network convergence, decrease the hello interval.
• To conserve resources, increase the hello interval.
vlan-id
N/A
The default designated site
VLAN is VLAN 1.
NOTE:
The hello interval of a DED is one-third of the hello interval set with the evi isis timer hello
command.
To configure the EVI IS-IS hello interval on an EVI tunnel interface:
17
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Enter EVI tunnel interface
view.
3. Configure the EVI IS-IS
hello interval.
interface tunnel
evi ]
evi isis timer hello
number [
seconds
mode
N/A
The default hello interval is 10
seconds.
If the edge device is a DED, its hello
interval is one-third of the hello
interval set with this command.
Configuring the hello multiplier for calculating the adjacency hold time
Adjacency hold time sets the amount of time that the remote edge devices can retain the adjac ency
with the local edge device before an adjacency update.
•If Graceful Restart is disabled, the adjacency hold time equals the EVI IS-IS hello interval
multiplied by the hello multiplier.
•If Graceful Restart is enabled, the adjacency hold time equals the greater value between the
following settings:
{ The restart interval.
{ The EVI IS-IS hello interval multiplied by the hello multiplier.
Edge devices send their adjacency hold time in hello packets to update the adjacencies with their
neighbors. An edge device removes the adjacency with a neighbor if it does not receive a hello
packet from the neighbor before the timer expires.
To configure the multiplier for calculating the adjacency hold time on an EVI tunnel interface:
Step Command Remarks
1. Enter system view.
2. Enter EVI tunnel interface
view.
3. Configure the multiplier
for calculating the
adjacency hold time.
Configuring the DED priority
The edge devices on an EVI link exchange their DED priority in EVI IS-IS hello packets to elect the
inter-site DED for periodic LSDB synchronization. You can use the evi isis timer csnp command to
change the synchronization interval.
The edge devices at a multihomed site exchange their DED priority in EVI IS-IS hello packets to elect
the site DED for distributing extended VLANs among them.
The edge device with higher DED priority is more likely to be elected as a site DED or inter-site DED.
If two edge devices have the same DED priority, the device with the highest MAC address is elected.
To configure the DED priority of the edge device on an EVI tunnel interface:
Step Command Remarks
1. Enter system view.
system-view
interface tunnel
evi ]
evi isis timer
holding-multiplier
system-view
number [
value
mode
N/A
N/A
The default multiplier is 3.
The maximum adjacency hold time is
65535 seconds. If this value is
exceeded, the actual adjacency hold
time is set to 65535 seconds.
N/A
18
Step Command Remarks
2. Enter EVI tunnel interface view.
interface tunnel
mode evi ]
[
number
N/A
3. Configure the DED priority.
evi isis ded-priority
value The default DED priority is 64.
Configuring the CSNP packet transmit interval
This configuration takes effect only on DEDs.
The DEDs in an EVI network regularly send CSNP packets to advertise LSP summaries for LSDB
synchronization.
To configure the CSNP packet transmit interval on a DED:
Step Command Remarks
1. Enter system view.
2. Enter tunnel interface view.
3. Configure the CSNP packet
transmit interval.
system-view
interface tunnel
mode evi ]
[
evi isis timer csnp
number
seconds
N/A
N/A
By default, a DED sends CSNP
packets every 10 seconds.
Configuring the minimum LSP transmit interval and the maximum number of LSPs sent at
each interval
The edge device generates an LSP update when any LSDB content changes. For example, a MAC
address is removed or added.
To control EVI IS-IS LSP traffic on the EVI network:
Step Command Remarks
1. Enter system view.
2. Enter EVI tunnel interface view.
3. Configure the minimum LSP
transmit interval and the
maximum number of LSP
segments sent at each interval.
Configuring the maximum LSP lifetime
EVI edge devices add a lifetime in each LSP they have advertised, and update LSPs regularly or
when MAC reachability information changes. If an edge device does not receive an update for an
LSP before the lifetime expires, the edge device removes the LSP from the LSDB and removes the
MAC addresses advertised through the LSP from the data plane.
To specify the maximum lifetime of the LSPs generated by an EVI IS-IS process:
Step Command Remarks
1. Enter system view.
system-view
interface tunnel
mode evi ]
[
evi isis timer lsp
count ]
system-view
number
time [
count
N/A
N/A
By default, the minimum LSP
transmit interval is 100
milliseconds, and a maximum of
five LSP segments can be sent at
each interval.
Before the minimum transmit
interval is reached, the EVI
tunnel interface cannot send LSP
segments.
N/A
19
Step Command Remarks
2. Enter EVI IS-IS process view.
evi-isis
process-id
N/A
3. Configure the maximum LSP
lifetime.
timer lsp-max-age
seconds
Configuring the LSP refresh interval
The edge device sends LSP updates at the refresh interval to update MAC reachability information.
To change the LSP refresh interval:
Step Command Remarks
1. Enter system view.
2. Enter EVI IS-IS process view.
3. Configure the LSP refresh
interval.
system-view
evi-isis
timer lsp-refresh
process-id
seconds
Associating an EVI tunnel interface with a track entry
The default maximum LSP
lifetime is 1200 seconds.
N/A
N/A
The default LSP refresh interval is 900
seconds.
The minimum LSP transmit interval and
the maximum number of LSPs sent at
each interval can affect the actual LSP
refresh interval.
To avoid unnecessary age-outs,
appropriately set the LSP refresh
interval and the LSP lifetime.
EVI IS-IS uses a hello mechanism to monitor the connectivity of each EVI link on an EVI tunnel. To
detect the connectivity of a particular EVI link more quickly, you can associate its tunnel interface
with a track entry. The monitoring protocol used in this entry can only be BFD.
EVI IS-IS changes the state of an EVI-Link interface in response to the track entry state, as shown
in Table 1.
Table 1
Action on the monitored EVI-Link in response to the track entry state change
Track entry state State of the monitored EVI link
Positive The EVI link is operating correctly.
Negative The EVI link has failed.
The EVI link is not monitored.
This situation occurs when the Track
module or the monitoring module is not
NotReady
ready (for example, the Track module is
restarting or the monitoring settings are
incomplete). In this situation, EVI cannot
obtain information about the EVI link from
the Track module.
Action on the EVI-Link
interface
Places the EVI-Link interface in up
state.
Places the EVI-Link interface in
down state.
N/A
For more information about configuring a track entry, see Track configuration in High Availability Configuration Guide.
To associate an EVI tunnel interface with a track entry:
20
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Enter EVI tunnel interface
view.
3. Associate a track entry with
the tunnel interface.
Configuring preferred VLANs
At a dual-homed site, specify an extended VLAN as a preferred VLAN on the edge device you prefer
to use as the appointed forwarder for the VLAN. The DED assigns an edge device its preferred
VLANs as long as possible. If an extended VLAN is configured as a preferred VLAN on both edge
devices, the DED uses the typical VLAN distribution rules to distribute the VLAN. For information
about typical extended VLAN distribution, see "Multihoming."
After you remove the preferred VLAN configuration on an edge device, the DED continues to assign
the VLAN to the edge device if the following requirements are met:
• The EVI tunnel interface on the edge device is up.
• The VLAN has not been configured as a preferred VLAN on another edge device.
IMPORTANT:
For a preferred VLAN to take effect, you must make sure it has been specified as an extended
VLAN.
To configure preferred VLANs:
interface tunnel
evi ]
evi isis track
track-entry-number
number [
mode
N/A
By default, an EVI tunnel interface
is not associated with any track
entry.
You can associate an EVI tunnel
interface with only one track entry.
Step Command Remarks
1. Enter system view.
2. Enter EVI tunnel interface
view.
3. Specify preferred VLANs.
system-view
interface tunnel
evi ]
evi isis preferred-vlan
number [
mode
vlan-list
N/A
N/A
By default, no preferred VLANs
are configured.
Repeat this command to add
additional preferred VLANs.
Specifying a routing policy for an EVI IS-IS process
You can configure a routing policy to match MAC reachability information that can be advertised to
the remote EVI sites. The routing policy is also called a reachability information filtering policy.
The routing policy for EVI IS-IS can only contain the following filters:
• MAC list.
• VLAN list.
For more information about configuring routing policies, see Layer 3—IP Routing Configuration
Guide.
To specify a routing policy for an EVI IS-IS process:
21
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Enter EVI IS-IS process view.
3. Specify a routing policy for the EVI
IS-IS process.
evi-isis
filter-policy
process-id
policy-name
Enabling adjacency change logging
Adjacency change logging enables an EVI IS-IS process to send a log message to the information
center when an adjacency change occurs. With the information center, you can set log message
filtering and output rules, including output destinations. For more information about using the
information center, see Network Management and Monitoring Configuration Guide.
To enable adjacency change logging:
Step Command Remarks
1. Enter system view.
2. Enter EVI IS-IS process view.
3. Enable adjacency change logging.
system-view
evi-isis
log-peer-change enable
process-id
N/A
By default, an EVI IS-IS process is
not associated with any routing
policy.
N/A
N/A
By default, adjacency change
logging is enabled.
Configuring SNMP notifications and context for EVI IS-IS
To report critical EVI IS-IS events to an NMS, enable SNMP notifications for EVI IS-IS. For EVI IS-IS
event notifications to be sent correctly, you must also configure SNMP as described in Network Management and Monitoring Configuration Guide.
In addition to the private EVI IS-IS MIB, EVI IS-IS shares the standard IS-IS MIB with IS-IS and other
protocols that use IS-IS in the control plane. For SNMP to correctly identify a protocol's management
information in the standard IS-IS MIB, you must configure a unique context for each of these
protocols. If a protocol supports multiple processes, you must assign a unique context to each
process.
The context names must be unique among all the protocols and their processes.
Context is a method introduced to SNMPv3 for multiple-instance management. For SNMPv1/v2c,
you must specify a context name as a community name for protocol identification.
To configure SNMP notifications and context for an EVI IS-IS process:
Configuring Graceful Restart for an EVI IS-IS process
Enable Graceful Restart for the peer EVI IS-IS processes at two ends of an EVI tunnel to guarantee
nonstop forwarding while the peer EVI IS-IS processes are re-establishing their adjacency after a
process restart or active/standby switchover occurs.
If Graceful Restart is enabled, the adjacency hold time equals the greater value between the
following settings:
• The restart interval.
• The EVI IS-IS hello interval multiplied by the hello multiplier .
If the edge device is a DED, its hello interval is one-third of the hello interval set by using the evi isis
timer hello command.
To configure Graceful Restart for an EVI IS-IS process:
Step Command Remarks
1. Enter system view.
2. Enter EVI IS-IS process view.
3. Enable Graceful Restart.
4. Configure the restart interval.
system-view
evi-isis
graceful-restart
graceful-restart interval
interval-value
process-id
N/A
N/A
By default, EVI IS-IS Graceful Restart
is disabled.
The default restart interval is 300
seconds.
If the restarting EVI process fails to
complete re-establishing the
adjacency with the peer EVI process,
the EVI link goes down.
Increasing the maximum number of MAC entries in an LSP
for an EVI IS-IS process
An EVI IS-IS process advertises all local MAC reachability information in one LSP. By default, an
LSP can convey up to 55 x 2
10
MAC address entries.
23
T o increase this num ber to accommodate all local MAC address entries, create virtual systems. Each
virtual system represents an increase of 55 x 2
10
MAC address entries. If n virtual systems are
created, the maximum number of MAC address entries in an LSP is (n+1) x 55 x 2
To configure EVI IS-IS virtual system:
Step Command Remarks
1. Enter system view.
2. Enter EVI IS-IS process
view.
3. Create an EVI IS-IS virtual
system.
system-view
evi-isis
virtual-system
systemid
process-id
Configuring VLAN mappings
If two sites use different VLANs to convey the same service, you can configure a mapping between
the VLANs at the two sites.
For example, site 1 uses VLAN 100 and site 2 uses VLAN 200 to transmit data service. At site 1, map
VLAN 100 to VLAN 200. At site 2, map VLAN 200 to VLAN 100. When the edge device at site 1
receives MAC addresses from site 2 in VLAN 200, it adds the MAC addresses to VLAN 100
automatically . Likewise, when the edge device at site 2 receives MAC addresses from site 1 in VLAN
100, it adds the MAC addresses to VLAN 200 automatically.
10
.
N/A
N/A
By default, no EVI IS-IS virtual systems are
created.
IMPORTANT:
The virtual system ID must be unique in the
EVI network.
In the mapping at site 1, VLAN 100 is the local VLAN, and VLAN 200 is the remote VLAN.
At a site, a VLAN can have only one mapping for a remote site. The local site considers a remote
VLAN invalid if the remote VLAN has the same VLAN ID as the local VLAN in a mapping. The local
site drops the MAC addresses received from the remote site in the VLAN. In the previous example,
site 1 will drop a MAC address received from site 2 if the address is in VLAN 100.
To map a local VLAN to a remote VLAN:
Step Command Remarks
1. Enter system view.
2. Enter EVI tunnel interface
view.
3. Map a local VLAN to a
remote VLAN.
system-view
interface tunnel
number [
evi vlan-mapping
local-vlan-id
remote-vlan-id [
site-id ]
mode evi
translated
site
]
N/A
N/A
By default, no VLAN mappings are
configured.
Enabling EVI ARP flood suppression
Step Command Remarks
1. Enter system view.
system-view
N/A
24
Step Command Remarks
To avoid traffic blackholes,
2. Verify that the MAC aging
timer is longer than the EVI
ARP entry aging timer.
3. (Optional.) Set the MAC aging
timer.
4. Enter EVI tunnel interface
view.
5. Enable EVI ARP flood
suppression.
6. (Optional.) Display EVI ARP
flood suppression entries.
make sure the MAC aging
timer is longer than the EVI
ARP entry aging timer (fixed
at 15 minutes) on all edge
devices.
The default MAC aging timer
is 300 seconds.
Perform this step if the MAC
aging timer is shorter than the
EVI ARP entry aging timer.
N/A
By default, EVI ARP flood
suppression is disabled.
display
The
available in any view.
commands are
Enabling EVI flooding for all destination-unknown
frames
By default, the device floods unknown unicast and multicast frames only to internal interfaces. EVI
flooding enables the device to flood all destination-unknown frames to an EVI tunnel interface.
To enable EVI flooding for all destination-unknown frames:
Step Command Remarks
1. Enter system view.
2. Enter EVI tunnel
interface view.
3. Enable EVI flooding.
system-view
interface tunnel
mode evi ]
[
evi flooding enable
number
N/A
N/A
By default, EVI flooding is disabled.
Enabling selective flood for a MAC address
CAUTION:
Do not configure selective flood for local unicast MAC addresses. The setting might cause remote
devices to drop packets destined for the MAC address.
By default, the device floods unknown unicast and multicast frames only to internal interfaces.
25
If an application uses a special multicast address that requires flooding across sites and cannot be
added to a multicast forwarding table by IGMP snooping, enable selective flood for the multicast
address.
To enable selective flood for a MAC address:
Step Command Remarks
1. Enter system view.
2. Enter EVI tunnel interface
view.
3. Enable selective flood for the
MAC address in a set of
VLANs.
system-view
interface tunnel
evi ]
evi selective-flooding
mac-address
vlan-id-list
N/A
number [
mac-address
Displaying and maintaining EVI
Execute display commands in any view and reset commands in user view.
Task Command
On an ENDS, display ENDS
information.
display evi neighbor-discovery server summary
mode
vlan
N/A
By default, selective flood is
disabled for all MAC addresses.
On an ENDS, display neighbors that
have registered with the ENDS.
On an ENDS, display ENDS statistics.
Display ENDC information.
Display neighbors that an ENDC has
learned.
Display ENDC statistics.
Display EVI-Link interface information
for an EVI tunnel.
Display information about EVI-Link
interfaces.
Display brief EVI IS-IS process
information.
Display local MAC addresses.
display evi neighbor-discovery server member
tunnel
interface-number | [
vpn-instance
[
display evi neighbor-discovery server statistics interface
tunnel
interface-number
display evi neighbor-discovery client summary
display evi neighbor-discovery client member
tunnel
interface-number | [
server
server-ip ] [
display evi neighbor-discovery client statistics interface
tunnel
interface-number
display evi link interface tunnel
display interface
description
[
display evi isis brief
display evi isis local-mac
tunnel
interface-number [
count
[
] ]
display evi isis local-mac nonadvertised
interface-number [
vpn-instance-name ] ]
vpn-instance
evi-link
[
down
|
vlan
local
local-ip |
local
local-ip |
vpn-instance-name ] ]
interface-number
[ interface-number ] ] [
] ]
[ process-id ]
{
vlan
vlan-id ] [
dynamic
vlan-id ] [
count
|
remote
remote
static
filtered
[
] ]
interface
[
client-ip ]
interface
[
client-ip |
brief
interface
} [
passed
|
interface tunnel
]
Display remote MAC addresses.
Display EVI IS-IS link state database.
Display EVI IS-IS neighbors.
display evi isis remote-mac
interface-number [
display evi isis lsdb
[ process-id ]
display evi isis peer
26
vlan
vlan-id ] [
local | lsp-id
[
[ process-id ]
interface tunnel
[
count
] ]
lspid |
verbose
] *
Task Command
Display EVI IS-IS information for a
tunnel interface.
display evi isis tunnel
[ tunnel-number ]
Display EVI IS-IS GR state.
Display remote MAC addresses (in
standalone mode).
Display remote MAC addresses (in IRF
mode).
Display EVI ARP flood suppression
entries (in standalone mode).
Display EVI ARP flood suppression
entries (in IRF mode).
Display VLAN mappings for EVI.
Clear data for EVI IS-IS processes.
Clear EVI ARP flood suppression
entries.
display evi isis graceful-restart status
display evi mac-address interface tunnel
vlan
[
vlan-id ] [
display evi mac-address interface tunnel
mac-address
display evi mac-address interface tunnel
vlan
[
vlan-id ] [
display evi mac-address interface tunnel
mac-address
display evi arp-suppression interface tunnel
interface-number [
display evi arp-suppression interface tunnel
interface-number [
display evi vlan-mapping
reset evi isis all
reset evi arp-suppression interface tunnel
vlan
[
vlan-id ]
EVI configuration examples
count
]
mac-address
slot
slot-number ] [
mac-address
vlan
vlan-id ] [
vlan
vlan-id ] [
[ process-id ]
vlan
vlan-id
count ]
vlan
vlan-id [
count
slot
slot-number ] [
[ process-id [
[ process-id ]
interface-number
interface-number
interface-number
interface-number
slot
slot-number ]
]
vlan
vlan-id ] ]
interface-number
count ]
Single-homed EVI network configuration example
Network requirements
As shown in Figure 11.
• Use EVI to extend VLANs 21 through 100 across site 1, site 2, and site 3 over an IPv4 network.
• Use network ID 1 to identify the EVI network.
• Use Device A as an ENDS and all other edge devices as ENDCs for neighbor discovery.
• Map site 1's VLAN 80 to site 2's VLAN 21 to convey the same service across the two sites.
• Configure a routing policy on Device A to advertise MAC addresses in VLANs 21 to 90 to the
remote sites.
27
Figure 11 Network diagram
Device ADevice B
Tunnel0
Configuration procedure
1. Configure routes for the sites to reach each other. (Details not shown.)
2. Configure Device A:
# Configure the site ID.
<DeviceA> system-view
[DeviceA] evi site-id 1
# Assign an IP address to the transport-facing interface GigabitEthernet 1/0/1.
# Set the network ID to 1 for the EVI tunnel interface.
[DeviceC-Tunnel0] evi network-id 1
# Specify the IP address of GigabitEthernet 1/0/1 as the source IP of the EVI tunnel.
[DeviceC-Tunnel0] source 1.1.3.1
# Set the tunnel keepalive interval to 20 seconds and the maximum number of tra nsmissions to
2.
[DeviceC-Tunnel0] keepalive 20 2
# Specify extended VLANs on the EVI tunnel interface.
29
[DeviceC-Tunnel0] evi extend-vlan 21 to 100
# Configure Device C as an ENDC of Device A.
[DeviceC-Tunnel0] evi neighbor-discovery client enable 1.1.1.1
[DeviceC-Tunnel0] quit
Verifying the configuration
1. Verify the configuration on Device A:
# Display information about the EVI tunnel interface.
[DeviceA] display interface tunnel 0
Tunnel0
Current state: UP
Line protocol state: UP
Description: Tunnel0 Interface
Bandwidth: 64kbps
Maximum Transmit Unit: 64000
Internet protocol processing: disabled
Tunnel source 1.1.1.1
Tunnel keepalive enabled, Period(20 s), Retries(2)
Network ID 1
Tunnel protocol/transport GRE_EVI/IP
Output queue - Urgent queuing: Size/Length/Discards 0/100/0
Output queue - Protocol queuing: Size/Length/Discards 0/500/0
Output queue - FIFO queuing: Size/Length/Discards 0/75/0
Last clearing of counters: Never
Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec
Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec
Input: 0 packets, 0 bytes, 0 drops
Output: 0 packets, 0 bytes, 0 drops
# Display information about EVI-Link interfaces.
[DeviceA] display evi link interface tunnel 0
Interface Status Source Destination
EVI-Link0 UP 1.1.1.1 1.1.2.1
EVI-Link1 UP 1.1.1.1 1.1.3.1
# Display ENDS information.
[DeviceA] display evi neighbor-discovery server summary
Interface Local Address Network ID Auth Members Vpn-instance
Tunnel0 1.1.1.1 1 disabled 3 [No Vrf]
# Display ENDC information.
[DeviceA] display evi neighbor-discovery client summary
Status: I-Init E-Establish P-Probe
Interface Local Address Server Address Network ID Reg Auth Status Vpn-instance
Tunnel0 1.1.1.1 1.1.1.1 1 15 disabled E [No Vrf]
# Display EVI neighbors registered with the ENDS.
[DeviceA] display evi neighbor-discovery server member
Interface: Tunnel0 Network ID: 1 Vpn-instance: [No Vrf]
IP Address: 1.1.1.1
Client Address System ID Expire Created Time
1.1.1.1 000F-0001-0001 25 2013/01/01 00:00:43
30
1.1.2.1 000F-0001-0002 15 2013/01/01 01:00:46
1.1.3.1 000F-0001-0003 20 2013/01/01 01:02:13
# Display neighbor entries that Device A has learned.
[DeviceA] display evi neighbor-discovery client member
Interface: Tunnel0 Network ID: 1 Vpn-instance: [No Vrf]
Local Address: 1.1.1.1
Server Address: 1.1.1.1
Neighbor System ID Created Time Expire Status
1.1.2.1 000F-0001-0002 2013/01/01 12:12:12 13 Up
1.1.3.1 000F-0001-0003 2013/01/01 12:12:12 12 Up
# Display VLAN mappings for EVI.
[DeviceA] display evi vlan-mapping
VLAN mappings for EVI IS-IS(0)
Local-VID Peer-ID Remote-VID Interface Remote-site
80 000F.0001.0002 21 EVI-Link0 2
# Verify that MAC addresses in VLAN 100 have been filtered by the routing policy on Device A.
[DeviceA] display evi isis local-mac dynamic
Process ID: 0
Tunnel interface: Tunnel0
VLAN ID: 100
MAC address: 0001-0100-0001 (Filtered)
MAC address: 0001-0100-0002 (Filtered)
MAC address: 0001-0100-0003 (Filtered)
VLAN ID: 80
MAC address: 0001-0080-0001
MAC address: 0001-0080-0002
MAC address: 0001-0080-0003
# Verify that the routing policy on Device B and the VLAN mapping on Device A are working
correctly.
[DeviceA] display evi isis remote-mac
Process ID: 0
Tunnel interface: Tunnel0
VLAN ID: 80
MAC address: 0002-0021-0001
Interface: EVI-Link0
Flags: 0x2
MAC address: 0002-0021-0002
Interface: EVI-Link0
Flags: 0x2
MAC address: 0002-0021-0003
Interface: EVI-Link0
Flags: 0x2
VLAN ID: 100
MAC address: 0002-0100-0001
Interface: EVI-Link0
Flags: 0x2
MAC address: 0002-0100-0002
Interface: EVI-Link0
31
Flags: 0x2
MAC address: 0002-0100-0003
Interface: EVI-Link0
Flags: 0x2
The output shows that Device A has received MAC addresses in VLAN 100 from Device B
because Device B does not filter VLAN 100. The MAC addresses received from Device B in
VLAN 21 have been added to VLAN 80.
2. Verify the configuration on Device B:
# Display information about the EVI tunnel interface.
[DeviceB] display interface tunnel 0
Tunnel0
Current state: UP
Line protocol state: UP
Description: Tunnel0 Interface
Bandwidth: 64kbps
Maximum Transmit Unit: 64000
Internet protocol processing: disabled
Tunnel source 1.1.2.1
Tunnel keepalive enabled, Period(20 s), Retries(2)
Network ID 1
Tunnel protocol/transport GRE_EVI/IP
Output queue - Urgent queuing: Size/Length/Discards 0/100/0
Output queue - Protocol queuing: Size/Length/Discards 0/500/0
Output queue - FIFO queuing: Size/Length/Discards 0/75/0
Last clearing of counters: Never
Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec
Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec
Input: 0 packets, 0 bytes, 0 drops
Output: 0 packets, 0 bytes, 0 drops
# Display information about EVI-Link interfaces.
[DeviceB] display evi link interface tunnel 0
Interface Status Source Destination
EVI-Link0 UP 1.1.2.1 1.1.1.1
EVI-Link1 UP 1.1.2.1 1.1.3.1
# Display ENDC information.
[DeviceB] display evi neighbor-discovery client summary
Status: I-Init E-Establish P-Probe
Interface Local Address Server Address Network ID Reg Auth Status Vpn-instance
Tunnel0 1.1.2.1 1.1.1.1 1 15 disabled E [No Vrf]
# Display neighbor entries that Device B has learned.
[DeviceB] display evi neighbor-discovery client member
Interface: Tunnel0 Network ID: 1 Vpn-instance: [No Vrf]
Local Address: 1.1.3.1
Server Address: 1.1.1.1
Neighbor System ID Created Time Expire Status
1.1.1.1 000F-0001-0001 2013/01/01 12:12:12 13 Up
1.1.3.1 000F-0001-0003 2013/01/01 12:12:12 13 Up
# Display VLAN mappings for EVI.
32
[DeviceB] display evi vlan-mapping
VLAN mappings for EVI IS-IS(0)
Local-VID Peer-ID Remote-VID Interface Remote-site
21 000F.0001.0001 80 EVI-Link0 1
# Verify that MAC addresses in VLAN 100 are not filtered.
[DeviceB] display evi isis local-mac dynamic
Process ID: 0
Tunnel interface: Tunnel0
VLAN ID: 100
MAC address: 0002-0100-0001
MAC address: 0002-0100-0002
MAC address: 0002-0100-0003
VLAN ID: 21
MAC address: 0002-0021-0001
MAC address: 0002-0021-0002
MAC address: 0002-0021-0003
# Verify that the routing policy on Device A and the VLAN mapping on Device B are working
correctly.
[DeviceB] display evi isis remote-mac
Process ID: 0
Tunnel interface: Tunnel0
VLAN ID: 21
MAC address: 0001-0080-0001
Interface: EVI-Link0
Flags: 0x2
MAC address: 0001-0080-0002
Interface: EVI-Link0
Flags: 0x2
MAC address: 0001-0080-0003
Interface: EVI-Link0
Flags: 0x2
The output shows that Device B does not have remote addresses in VLAN 100 because VLAN
100 does not match the routing policy on Device A. The MAC addresses received from Device
A in VLAN 80 have been added to VLAN 21.
3. Verify the configuration on Device C:
# Display information about the EVI tunnel interface.
[DeviceC] display interface tunnel 0
Tunnel0
Current state: UP
Line protocol state: UP
Description: Tunnel0 Interface
Bandwidth: 64kbps
Maximum Transmit Unit: 64000
Internet protocol processing: disabled
Tunnel source 1.1.3.1
Tunnel keepalive enabled, Period(20 s), Retries(2)
Network ID 1
Tunnel protocol/transport GRE_EVI/IP
# Display information about EVI-Link interfaces on Device C.
[DeviceC] display evi link interface tunnel 0
Interface Status Source Destination
EVI-Link0 UP 1.1.3.1 1.1.1.1
EVI-Link1 UP 1.1.3.1 1.1.2.1
# Display ENDC information.
[DeviceC] display evi neighbor-discovery client summary
Status: I-Init E-Establish P-Probe
Interface Local Address Server Address Network ID Reg Auth Status Vpn-instance
Tunnel0 1.1.3.1 1.1.1.1 1 15 disabled E [No Vrf]
# Display neighbor entries that Device C has learned.
[DeviceC] display evi neighbor-discovery client member
Interface: Tunnel0 Network ID: 1 Vpn-instance: [No Vrf]
Local Address: 1.1.3.1
Server Address: 1.1.1.1
Neighbor System ID Created Time Expire Status
1.1.1.1 000F-0001-0001 2013/01/01 12:12:12 13 Up
1.1.2.1 000F-0000-0002 2013/01/01 12:12:12 13 Up
# Verify the routing policy and VLAN mapping settings on Device A and Device B are working
correctly.
[DeviceC] display evi isis remote-mac
Process ID: 0
Tunnel interface: Tunnel0
VLAN ID: 21
MAC address: 0002-0021-0001
Interface: EVI-Link1
Flags: 0x0
MAC address: 0002-0021-0002
Interface: EVI-Link1
Flags: 0x0
MAC address: 0002-0021-0003
Interface: EVI-Link1
Flags: 0x0
VLAN ID: 80
MAC address: 0001-0080-0001
Interface: EVI-Link0
Flags: 0x0
MAC address: 0001-0080-0002
Interface: EVI-Link0
Flags: 0x0
34
MAC address: 0001-0080-0003
Interface: EVI-Link0
Flags: 0x0
VLAN ID: 100
MAC address: 0002-0100-0001
Interface: EVI-Link1
Flags: 0x2
MAC address: 0002-0100-0002
Interface: EVI-Link1
Flags: 0x2
MAC address: 0002-0100-0003
Interface: EVI-Link1
Flags: 0x2
The output shows that Device C can receive MAC addresses in VLAN 100 from Device B but
not from Device A, because only Device A filters VLAN 100. No VLAN mapping has been
performed for MAC addresses received in VLAN 80 and VLAN 21 because Device C does not
have VLAN mappings for the two VLANs.
4. Verify that hosts in different sites can ping one another in the same extended VLAN.
Multiple-EVI-networks configuration example
Network requirements
Use EVI to connect the sites of the data center in Figure 12. To isolate different types of traffic and
extend their VLANs to different sites, set up EVI networks as shown in Table 2.
Table 2
In each EVI network, use the edge device at site 4 as an ENDS and all other edge devices as its
ENDCs.
EVI networks
Traffic type Network ID Extended VLANs Sites
Database 1 100, 101 2, 3, 4
Network management 2 4000 All sites
Web 3 50, 80 1, 4
35
Figure 12 Network diagram
Site 1
GE1/0/1
172.16.1.1/24
Tunnel102
Tunnel103
Configuration procedure
1. Configure routes for the sites to reach each other. (Details not shown.)
2. Configure site 4:
# Configure the site ID.
<Site4> system-view
[Site4] evi site-id 4
# Assign an IP address to the transport-facing interface GigabitEthernet 1/0/1.
[Site4] interface tunnel 101 mode evi
[Site4-Tunnel101] source 172.16.4.1
[Site4-Tunnel101] evi network-id 1
[Site4-Tunnel101] evi extend-vlan 100 101
[Site4-Tunnel101] evi neighbor-discovery server enable
[Site4-Tunnel101] quit
# Configure the network management EVI network.
[Site4] interface tunnel 102 mode evi
[Site4-Tunnel102] source 172.16.4.1
[Site4-Tunnel102] evi network-id 2
[Site4-Tunnel102] evi extend-vlan 4000
[Site4-Tunnel102] evi neighbor-discovery server enable
[Site4-Tunnel102] quit
# Configure the Web service EVI network.
[Site4] interface tunnel 103 mode evi
[Site4-Tunnel103] source 172.16.4.1
[Site4-Tunnel103] evi network-id 3
[Site4-Tunnel103] evi extend-vlan 50 to 80
Site 2
EVI 3
VLANs 50-80
Tunnel102
GE1/0/1
172.16.5.1/24
VLANs 100-101
EVI 2
VLAN 4000
Site 5
GE1/0/1
172.16.2.1/24
Tunnel101Tunnel102
EVI 1
Tunnel102
Tunnel103
Site 4
Tunnel101
Tunnel102
Tunnel101
GE1/0/1
172.16.4.1/24
Site 3
GE1/0/1
172.16.3.1/24
36
[Site4-Tunnel103] evi neighbor-discovery server enable
[Site4-Tunnel103] quit
3. Configure site 1:
# Configure the site ID.
<Site1> system-view
[Site1] evi site-id 1
# Assign an IP address to the transport-facing interface GigabitEthernet 1/0/1.
[Site1] interface tunnel 102 mode evi
[Site1-Tunnel102] source 172.16.1.1
[Site1-Tunnel102] evi network-id 2
[Site1-Tunnel102] evi extend-vlan 4000
[Site1-Tunnel102] evi neighbor-discovery client enable 172.16.4.1
[Site1-Tunnel102] quit
# Configure the Web service EVI network.
[Site1] interface tunnel 103 mode evi
[Site1-Tunnel103] source 172.16.1.1
[Site1-Tunnel103] evi network-id 3
[Site1-Tunnel103] evi extend-vlan 50 to 80
[Site1-Tunnel103] evi neighbor-discovery client enable 172.16.4.1
[Site1-Tunnel103] quit
4. Configure all the other sites in the same way that site 1 is configured. Make sure extended
VLANs are correctly configured at each site.
Verifying the configuration
# Display neighbors registered with the ENDS in each EVI network.
[Site4] display evi neighbor-discovery server member
Interface: Tunnel101 Network ID: 1 Vpn-instance: [No Vrf]
IP Address: 172.16.4.1
Client Address System ID Expire Created Time
172.16.2.1 000F-0001-0002 25 2013/01/01 00:00:43
172.16.3.1 000F-0001-0003 15 2013/01/01 01:00:46
172.16.4.1 000F-0001-0004 20 2013/01/01 01:02:13
Interface: Tunnel102 Network ID: 2 Vpn-instance: [No Vrf]
IP Address: 172.16.4.1
Client Address System ID Expire Created Time
This section describes the conventions used in the documentation.
Port numbering in examples
The port numbers in this document are for illustration only and might be unavailable on your device.
Command conventions
Convention Description
Boldface Bold
text represents commands and keywords that you enter literally as shown.
Italic
[ ] Square brackets enclose syntax choices (keywords or arguments) that are optional.
{ x | y | ... }
[ x | y | ... ]
{ x | y | ... } *
[ x | y | ... ] *
&<1-n>
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Description
Boldface
>
Italic text represents arguments that you replace with actual values.
Braces enclose a set of required syntax choices separated by vertical bars, from which
you select one.
Square brackets enclose a set of optional syntax choices separated by vertical bars,
from which you select one or none.
Asterisk marked braces enclose a set of required syntax choices separated by vertical
bars, from which you select at least one.
Asterisk marked square brackets enclose optional syntax choices separated by vertical
bars, from which you select one choice, multiple choices, or none.
The argument or keyword and argument combination before the ampersand (&) sign
can be entered 1 to n times.
Window names, button names, field names, and menu items are in Boldface. For
.
New User
window appears; click OK.
File
>
Create
>
example, the
Multi-level menus are separated by angle brackets. For example,
Folder
Symbols
Convention Description
WARNING!
CAUTION:
IMPORTANT:
NOTE:
TIP:
An alert that calls attention to important information that if not understood or followed
can result in personal injury.
An alert that calls attention to important information that if not understood or followed
can result in data loss, data corruption, or damage to hardware or software.
An alert that calls attention to essential information.
An alert that contains additional or supplementary information.
An alert that provides helpful information.
39
Network topology icons
Convention Description
T
T
T
T
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that
supports Layer 2 forwarding and other Layer 2 features.
Represents an access controller, a unified wired-WLAN module, or the access
controller engine on a unified wired-WLAN switch.
Represents an access point.
Represents a wireless terminator unit.
Represents a wireless terminator.
Represents a mesh access point.
Represents omnidirectional signals.
Represents directional signals.
Represents a security product, such as a firewall, UTM, multiservice security
gateway, or load balancing device.
Represents a security card, such as a firewall, load balancing, NetStream, SSL VPN,
IPS, or ACG card.
40
Support and other resources
Accessing Hewlett Packard Enterprise Support
•For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website:
www.hpe.com/assistance
•To access documentation and support services, go to the Hewlett Packard Enterprise Support
Center website:
www.hpe.com/support/hpesc
Information to collect
• Technical support registration number (if applicable)
• Product name, model or version, and serial number
• Operating system name and version
• Firmware version
• Error messages
• Product-specific reports and logs
• Add-on products or components
• Third-party products or components
Accessing updates
•Some software products provide a mechanism for accessing software updates through the
product interface. Review your product documentation to identify the recommended software
update method.
•To download product updates, go to either of the following:
{Hewlett Packard Enterprise Support Center Get connected with updates page:
www.hpe.com/support/e-updates
{Software Depot website:
www.hpe.com/support/softwaredepot
•To view and update your entitlements, and to link your contracts, Care Packs, and warranties
with your profile, go to the Hewlett Packard Enterprise Support Center More Information on Access to Support Materials page:
www.hpe.com/support/AccessToSupportMaterials
IMPORTANT:
Access to some updates might require product entitlement when acce ssed through the Hewlett
Packard Enterprise Support Center. You must have an HP Passport set up with relevant
entitlements.
41
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.