前回の続き
間が空きましたが、上記の続きです。下記構成で作成したコンポーネントの動作検証をしていきます。
※Config説明は全てvqfx1の方でしていきます
10.10.1.10 10.10.2.10 10.10.1.20 10.10.2.20
========= ========= ========= =========
| srv11 | | srv12 | | srv21 | | srv22 |
========= ========= ========= =========
eth1 | | eth1 eth1 | | eth1
xe-0/0/1 | | xe-0/0/2 xe-0/0/1 | | xe-0/0/2
============= =============
| | ------------- | |
| vqfx1-re | xe-0/0/0 | vqfx2-re |
| | | |
============= =============
em1| em1|
============= =============
| vqfx1-pfe | | vqfx1-pfe |
============= =============
vqfx1-reとvqfx2-reはVXLAN(vni10000とvni20000)にて仮想ネットワークを実現しています。
vQFXの設定内容について
vagrant@vqfx1>
{master:0}
vagrant@vqfx1> show configuration | display set | no-more
set version 17.4R1.16
set system host-name vqfx1
set system root-authentication encrypted-password "$1$fv3Ke4LT$10nlsy3SEJy5ainm.kPTd."
set system root-authentication ssh-rsa "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA6NF8iallvQVp22WDkTkyrtvp9eWW6A8YVr+kz4TjGYe7gHzIw+niNltGEFHzD8+v1I2YJ6oXevct1YeS0o9HZyN1Q9qgCgzUFtdOKLv6IedplqoPkcmF0aYet2PkEDo3MlTBckFXPITAMzF8dJSIFo9D8HfdOV0IAdx4O7PtixWKn5y2hMNG0zQPyUecp4pzC6kivAIhyfHilFR61RGL+GPXQ2MWZWFYbAGjyiYJnAmCP3NOTd0jMZEnDkbUvxhMmBYSdETk1rRgm+R4LOzFUGaHqHDLKLX+FIPKcF96hrucXzcWyLbIbEgE98OHlnVYCzRdK8jlqm8tehUc9c9WhQ== vagrant insecure public key"
set system login user vagrant uid 2000
set system login user vagrant class super-user
set system login user vagrant authentication ssh-rsa "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA6NF8iallvQVp22WDkTkyrtvp9eWW6A8YVr+kz4TjGYe7gHzIw+niNltGEFHzD8+v1I2YJ6oXevct1YeS0o9HZyN1Q9qgCgzUFtdOKLv6IedplqoPkcmF0aYet2PkEDo3MlTBckFXPITAMzF8dJSIFo9D8HfdOV0IAdx4O7PtixWKn5y2hMNG0zQPyUecp4pzC6kivAIhyfHilFR61RGL+GPXQ2MWZWFYbAGjyiYJnAmCP3NOTd0jMZEnDkbUvxhMmBYSdETk1rRgm+R4LOzFUGaHqHDLKLX+FIPKcF96hrucXzcWyLbIbEgE98OHlnVYCzRdK8jlqm8tehUc9c9WhQ== vagrant insecure public key"
set system services ssh root-login allow
set system services netconf ssh
set system syslog user * any emergency
set system syslog file messages any notice
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands any
set system extensions providers juniper license-type juniper deployment-scope commercial
set system extensions providers chef license-type juniper deployment-scope commercial
set interfaces xe-0/0/0 description "connect 2 vqfx2"
set interfaces xe-0/0/0 unit 0 family inet address 10.0.0.1/30
set interfaces xe-0/0/1 description server11
set interfaces xe-0/0/1 unit 0 family ethernet-switching vlan members 100
set interfaces xe-0/0/2 description server12
set interfaces xe-0/0/2 unit 0 family ethernet-switching vlan members 200
set interfaces em0 unit 0 family inet dhcp
set interfaces em1 unit 0 family inet address 169.254.0.2/24
set interfaces irb unit 10000 proxy-macip-advertisement
set interfaces irb unit 10000 virtual-gateway-accept-data
set interfaces irb unit 10000 description irb_vxlan_10000
set interfaces irb unit 10000 family inet address 10.10.1.251/24 virtual-gateway-address 10.10.1.254
set interfaces irb unit 10000 virtual-gateway-v4-mac 00:01:94:00:01:01
set interfaces irb unit 20000 proxy-macip-advertisement
set interfaces irb unit 20000 virtual-gateway-accept-data
set interfaces irb unit 20000 description irb_vxlan_20000
set interfaces irb unit 20000 family inet address 10.10.2.251/24 virtual-gateway-address 10.10.2.254
set interfaces irb unit 20000 virtual-gateway-v4-mac 00:01:94:00:01:02
set interfaces lo0 description "vxlan source"
set interfaces lo0 unit 0 family inet address 9.9.9.1/32
set routing-options router-id 9.9.9.1
set routing-options autonomous-system 64500
set protocols bgp group evpn_overlay type internal
set protocols bgp group evpn_overlay local-address 9.9.9.1
set protocols bgp group evpn_overlay family evpn signaling
set protocols bgp group evpn_overlay neighbor 9.9.9.2
set protocols ospf area 0.0.0.0 interface lo0.0 passive
set protocols ospf area 0.0.0.0 interface xe-0/0/0.0
set protocols evpn encapsulation vxlan
set protocols evpn multicast-mode ingress-replication
set protocols evpn default-gateway no-gateway-community
set protocols evpn extended-vni-list all
set protocols lldp interface all
set switch-options vtep-source-interface lo0.0
set switch-options route-distinguisher 9991:1
set switch-options vrf-target target:64500:9991
set switch-options vrf-target auto
set vlans default vlan-id 1
set vlans servers100 vlan-id 100
set vlans servers100 l3-interface irb.10000
set vlans servers100 vxlan vni 10000
set vlans servers100 vxlan ingress-node-replication
set vlans servers200 vlan-id 200
set vlans servers200 l3-interface irb.20000
set vlans servers200 vxlan vni 20000
set vlans servers200 vxlan ingress-node-replication
{master:0}
vagrant@vqfx1>
vagrant@vqfx2> show configuration | display set | no-more
set version 17.4R1.16
set system host-name vqfx2
set system root-authentication encrypted-password "$1$fv3Ke4LT$10nlsy3SEJy5ainm.kPTd."
set system root-authentication ssh-rsa "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA6NF8iallvQVp22WDkTkyrtvp9eWW6A8YVr+kz4TjGYe7gHzIw+niNltGEFHzD8+v1I2YJ6oXevct1YeS0o9HZyN1Q9qgCgzUFtdOKLv6IedplqoPkcmF0aYet2PkEDo3MlTBckFXPITAMzF8dJSIFo9D8HfdOV0IAdx4O7PtixWKn5y2hMNG0zQPyUecp4pzC6kivAIhyfHilFR61RGL+GPXQ2MWZWFYbAGjyiYJnAmCP3NOTd0jMZEnDkbUvxhMmBYSdETk1rRgm+R4LOzFUGaHqHDLKLX+FIPKcF96hrucXzcWyLbIbEgE98OHlnVYCzRdK8jlqm8tehUc9c9WhQ== vagrant insecure public key"
set system login user vagrant uid 2000
set system login user vagrant class super-user
set system login user vagrant authentication ssh-rsa "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA6NF8iallvQVp22WDkTkyrtvp9eWW6A8YVr+kz4TjGYe7gHzIw+niNltGEFHzD8+v1I2YJ6oXevct1YeS0o9HZyN1Q9qgCgzUFtdOKLv6IedplqoPkcmF0aYet2PkEDo3MlTBckFXPITAMzF8dJSIFo9D8HfdOV0IAdx4O7PtixWKn5y2hMNG0zQPyUecp4pzC6kivAIhyfHilFR61RGL+GPXQ2MWZWFYbAGjyiYJnAmCP3NOTd0jMZEnDkbUvxhMmBYSdETk1rRgm+R4LOzFUGaHqHDLKLX+FIPKcF96hrucXzcWyLbIbEgE98OHlnVYCzRdK8jlqm8tehUc9c9WhQ== vagrant insecure public key"
set system services ssh root-login allow
set system services netconf ssh
set system syslog user * any emergency
set system syslog file messages any notice
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands any
set system extensions providers juniper license-type juniper deployment-scope commercial
set system extensions providers chef license-type juniper deployment-scope commercial
set interfaces xe-0/0/0 description "connect 2 vqfx1"
set interfaces xe-0/0/0 unit 0 family inet address 10.0.0.2/30
set interfaces xe-0/0/1 description server21
set interfaces xe-0/0/1 unit 0 family ethernet-switching vlan members 100
set interfaces xe-0/0/2 description server22
set interfaces xe-0/0/2 unit 0 family ethernet-switching vlan members 200
set interfaces em0 unit 0 family inet dhcp
set interfaces em1 unit 0 family inet address 169.254.0.2/24
set interfaces irb unit 10000 proxy-macip-advertisement
set interfaces irb unit 10000 virtual-gateway-accept-data
set interfaces irb unit 10000 description irb_vxlan_10000
set interfaces irb unit 10000 family inet address 10.10.1.252/24 virtual-gateway-address 10.10.1.254
set interfaces irb unit 10000 virtual-gateway-v4-mac 00:01:95:00:01:01
set interfaces irb unit 20000 proxy-macip-advertisement
set interfaces irb unit 20000 virtual-gateway-accept-data
set interfaces irb unit 20000 description irb_vxlan_20000
set interfaces irb unit 20000 family inet address 10.10.2.252/24 virtual-gateway-address 10.10.2.254
set interfaces irb unit 20000 virtual-gateway-v4-mac 00:01:95:00:01:02
set interfaces lo0 description "vxlan source"
set interfaces lo0 unit 0 family inet address 9.9.9.2/32
set routing-options router-id 9.9.9.2
set routing-options autonomous-system 64500
set protocols bgp group evpn_overlay type internal
set protocols bgp group evpn_overlay local-address 9.9.9.2
set protocols bgp group evpn_overlay family evpn signaling
set protocols bgp group evpn_overlay neighbor 9.9.9.1
set protocols ospf area 0.0.0.0 interface lo0.0 passive
set protocols ospf area 0.0.0.0 interface xe-0/0/0.0
set protocols evpn encapsulation vxlan
set protocols evpn multicast-mode ingress-replication
set protocols evpn default-gateway no-gateway-community
set protocols evpn extended-vni-list all
set protocols lldp interface all
set switch-options vtep-source-interface lo0.0
set switch-options route-distinguisher 9992:1
set switch-options vrf-target target:64500:9992
set switch-options vrf-target auto
set vlans default vlan-id 1
set vlans servers100 vlan-id 100
set vlans servers100 l3-interface irb.10000
set vlans servers100 vxlan vni 10000
set vlans servers100 vxlan ingress-node-replication
set vlans servers200 vlan-id 200
set vlans servers200 l3-interface irb.20000
set vlans servers200 vxlan vni 20000
set vlans servers200 vxlan ingress-node-replication
{master:0}
vagrant@vqfx2>
コンフィグ説明
まずアンダーレイから内容確認していきましょう。
アンダーレイ
xe-0/0/0は10.0.0.1/30を設定
xe-0/0/1はvlan 100の設定
xe-0/0/1はvlan 200の設定
set interfaces xe-0/0/0 description "connect 2 vqfx2"
set interfaces xe-0/0/0 unit 0 family inet address 10.0.0.1/30
set interfaces xe-0/0/1 description server11
set interfaces xe-0/0/1 unit 0 family ethernet-switching vlan members 100
set interfaces xe-0/0/2 description server12
set interfaces xe-0/0/2 unit 0 family ethernet-switching vlan members 200
vagrant@vqfx1> show vlans brief
Routing instance VLAN name Tag Interfaces
default-switch default 1
default-switch servers100 100
vtep.32769*
xe-0/0/1.0*
default-switch servers200 200
vtep.32769*
xe-0/0/2.0*
OSPF設定
set protocols ospf area 0.0.0.0 interface lo0.0 passive
set protocols ospf area 0.0.0.0 interface xe-0/0/0.0
vagrant@vqfx1> show ospf route
Topology default Route Table:
Prefix Path Route NH Metric NextHop Nexthop
Type Type Type Interface Address/LSP
9.9.9.2 Intra Router IP 1 xe-0/0/0.0 10.0.0.2
9.9.9.1/32 Intra Network IP 0 lo0.0
9.9.9.2/32 Intra Network IP 1 xe-0/0/0.0 10.0.0.2
10.0.0.0/30 Intra Network IP 1 xe-0/0/0.0
{master:0}
vagrant@vqfx1>
Overlay
EVPN
EVPNの設定。小規模すぎて意味はないですがmulticast-mode ingress-replication
にして入力ノードからBUMの通信複製など細かい制御ができます。
set protocols evpn encapsulation vxlan
set protocols evpn multicast-mode ingress-replication
set protocols evpn default-gateway no-gateway-community
set protocols evpn extended-vni-list all
VTEP
VTEPの定義。VXLANのカプセル化とその逆を行います。
ここではvqfx1側を9.9.9.1(lo0)、vqfx2側を9.9.9.2としてvtepを定義しています。
VNID10000と20000のVXLANカプセル化と解除を行います。
set interfaces lo0 description "vxlan source"
set interfaces lo0 unit 0 family inet address 9.9.9.1/32
set switch-options vtep-source-interface lo0.0
vagrant@vqfx1> show ethernet-switching vxlan-tunnel-end-point source
Logical System Name Id SVTEP-IP IFL L3-Idx
<default> 0 9.9.9.1 lo0.0 0
L2-RTT Bridge Domain VNID MC-Group-IP
default-switch servers100+100 10000 0.0.0.0
default-switch servers200+200 20000 0.0.0.0
{master:0}
vagrant@vqfx1> show ethernet-switching vxlan-tunnel-end-point remote
Logical System Name Id SVTEP-IP IFL L3-Idx
<default> 0 9.9.9.1 lo0.0 0
RVTEP-IP IFL-Idx NH-Id
9.9.9.2 557 1765
VNID MC-Group-IP
10000 0.0.0.0
20000 0.0.0.0
{master:0}
vagrant@vqfx1>
MP-BGP
EVPNには不可欠なRD(Route Distinguisher)とRT(Route Target)の定義。
RDはCEルータ(今回はsrv11などが相当)に対してどのvrfを使うのか決めるための識別子。
RTはPEルータ同士でMP-BGPの経路情報を交換する際にどのvrfの情報かを識別するためのもの。
set switch-options route-distinguisher 9991:1
set switch-options vrf-target target:64500:9991
set switch-options vrf-target auto
BGP
iBGPの設定。AS:64500内で経路の交換をします。
set routing-options router-id 9.9.9.1
set routing-options autonomous-system 64500
set protocols bgp group evpn_overlay type internal
set protocols bgp group evpn_overlay local-address 9.9.9.1
set protocols bgp group evpn_overlay family evpn signaling
set protocols bgp group evpn_overlay neighbor 9.9.9.2
irb
irbはL3SWを跨いでVLAN設定したい場合に使用します。
以下ではirb10000とvlan100(irb20000とvlan200)をマッピングさせてます。
set interfaces irb unit 10000 proxy-macip-advertisement
set interfaces irb unit 10000 virtual-gateway-accept-data
set interfaces irb unit 10000 description irb_vxlan_10000
set interfaces irb unit 10000 family inet address 10.10.1.252/24 virtual-gateway-address 10.10.1.254
set interfaces irb unit 10000 virtual-gateway-v4-mac 00:01:95:00:01:01
set interfaces irb unit 20000 proxy-macip-advertisement
set interfaces irb unit 20000 virtual-gateway-accept-data
set interfaces irb unit 20000 description irb_vxlan_20000
set interfaces irb unit 20000 family inet address 10.10.2.252/24 virtual-gateway-address 10.10.2.254
set interfaces irb unit 20000 virtual-gateway-v4-mac 00:01:95:00:01:02
set vlans servers100 vlan-id 100
set vlans servers100 l3-interface irb.10000
set vlans servers100 vxlan vni 10000
set vlans servers100 vxlan ingress-node-replication
set vlans servers200 vlan-id 200
set vlans servers200 l3-interface irb.20000
set vlans servers200 vxlan vni 20000
set vlans servers200 vxlan ingress-node-replication
EVPNの動作確認
irbを2つ設定しているためESIが★部分の通り2つ設定されてます。
vagrant@vqfx1> show evpn instance extensive
Instance: __default_evpn__
Route Distinguisher: 9.9.9.1:0
Number of bridge domains: 0
Number of neighbors: 0
Instance: default-switch
Route Distinguisher: 9991:1
Encapsulation type: VXLAN
Duplicate MAC detection threshold: 5
Duplicate MAC detection window: 180
MAC database status Local Remote
MAC advertisements: 2 4
MAC+IP advertisements: 6 4
Default gateway MAC advertisements: 4 0
Number of local interfaces: 2 (2 up)
Interface name ESI Mode Status AC-Role
xe-0/0/1.0 00:00:00:00:00:00:00:00:00:00 single-homed Up Root
xe-0/0/2.0 00:00:00:00:00:00:00:00:00:00 single-homed Up Root
Number of IRB interfaces: 2 (2 up)
Interface name VLAN VNI Status L3 context
irb.10000 10000 Up master
irb.20000 20000 Up master
Number of protect interfaces: 0
Number of bridge domains: 2
VLAN Domain ID Intfs / up IRB intf Mode MAC sync IM route label SG sync IM core nexthop
100 10000 1 1 irb.10000 Extended Enabled 10000 Disabled
200 20000 1 1 irb.20000 Extended Enabled 20000 Disabled
Number of neighbors: 1
Address MAC MAC+IP AD IM ES Leaf-label
9.9.9.2 4 4 0 2 0
Number of ethernet segments: 2
ESI: 05:00:00:fb:f4:00:00:27:10:00 ★
Local interface: irb.10000, Status: Up/Forwarding
Number of remote PEs connected: 1
Remote PE MAC label Aliasing label Mode
9.9.9.2 10000 0 single-homed
ESI: 05:00:00:fb:f4:00:00:4e:20:00 ★
Local interface: irb.20000, Status: Up/Forwarding
Number of remote PEs connected: 1
Remote PE MAC label Aliasing label Mode
9.9.9.2 20000 0 single-homed
Router-ID: 9.9.9.1
{master:0}
vagrant@vqfx1>
pingは別vlan含め全て疎通は通ります。tracerouteするとわかりますが、vQFXにvGW(10.10.1.251)を設定してVLAN間をルーティングしているためです。
vagrant@srv11:~$ traceroute 10.10.1.20
traceroute to 10.10.1.20 (10.10.1.20), 30 hops max, 60 byte packets
1 10.10.1.20 (10.10.1.20) 9.495 ms 9.409 ms 9.379 ms
vagrant@srv11:~$
vagrant@srv11:~$ traceroute 10.10.2.20
traceroute to 10.10.2.20 (10.10.2.20), 30 hops max, 60 byte packets
1 10.10.1.251 (10.10.1.251) 4.771 ms 4.732 ms 4.704 ms
2 10.10.2.20 (10.10.2.20) 105.552 ms 105.526 ms 105.498 ms
vagrant@srv11:~$
vagrant@srv11:~$ traceroute 10.10.2.10
traceroute to 10.10.2.10 (10.10.2.10), 30 hops max, 60 byte packets
1 10.10.1.251 (10.10.1.251) 4.901 ms 4.846 ms 5.236 ms
2 10.10.2.10 (10.10.2.10) 4.784 ms 4.747 ms 4.711 ms
vagrant@srv11:~$
ルーティングテーブル
EVPNの部分だけ確認したいと思います。
vagrant@vqfx1> show route
inet.0: 18 destinations, 20 routes (18 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
0.0.0.0/0 *[Access-internal/12] 03:20:49, metric 0
> to 10.0.2.2 via em0.0
9.9.9.1/32 *[Direct/0] 02:57:47
> via lo0.0
9.9.9.2/32 *[OSPF/10] 02:56:20, metric 1
> to 10.0.0.2 via xe-0/0/0.0
10.0.0.0/30 *[Direct/0] 02:57:47
> via xe-0/0/0.0
10.0.0.1/32 *[Local/0] 02:57:47
Local via xe-0/0/0.0
10.0.2.0/24 *[Direct/0] 03:20:49
> via em0.0
10.0.2.15/32 *[Local/0] 03:20:49
Local via em0.0
10.10.1.0/24 *[Direct/0] 02:57:47
> via irb.10000
[Direct/0] 02:57:47
> via irb.10000
10.10.1.10/32 *[EVPN/7] 00:36:04
> via irb.10000
10.10.1.251/32 *[Local/0] 02:57:47
Local via irb.10000
10.10.1.254/32 *[Local/0] 02:57:47
Local via irb.10000
10.10.2.0/24 *[Direct/0] 02:57:47
> via irb.20000
[Direct/0] 02:57:47
> via irb.20000
10.10.2.10/32 *[EVPN/7] 00:34:44
> via irb.20000
10.10.2.251/32 *[Local/0] 02:57:47
Local via irb.20000
10.10.2.254/32 *[Local/0] 02:57:47
Local via irb.20000
169.254.0.0/24 *[Direct/0] 03:21:05
> via em1.0
169.254.0.2/32 *[Local/0] 03:21:05
Local via em1.0
224.0.0.5/32 *[OSPF/10] 02:57:47, metric 1
MultiRecv
:vxlan.inet.0: 14 destinations, 16 routes (14 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
9.9.9.1/32 *[Direct/0] 02:57:47
> via lo0.0
9.9.9.2/32 *[Static/1] 02:56:17, metric2 1
> to 10.0.0.2 via xe-0/0/0.0
10.0.0.0/30 *[Direct/0] 02:57:47
> via xe-0/0/0.0
10.0.0.1/32 *[Local/0] 02:57:47
Local via xe-0/0/0.0
10.0.2.0/24 *[Direct/0] 02:57:47
> via em0.0
10.0.2.15/32 *[Local/0] 02:57:47
Local via em0.0
10.10.1.0/24 *[Direct/0] 02:57:47
> via irb.10000
[Direct/0] 02:57:47
> via irb.10000
10.10.1.251/32 *[Local/0] 02:57:47
Local via irb.10000
10.10.1.254/32 *[Local/0] 02:57:47
Local via irb.10000
10.10.2.0/24 *[Direct/0] 02:57:47
> via irb.20000
[Direct/0] 02:57:47
> via irb.20000
10.10.2.251/32 *[Local/0] 02:57:47
Local via irb.20000
10.10.2.254/32 *[Local/0] 02:57:47
Local via irb.20000
169.254.0.0/24 *[Direct/0] 02:57:47
> via em1.0
169.254.0.2/32 *[Local/0] 02:57:47
Local via em1.0
inet6.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
fe80::205:860f:fc71:6600/128
*[Direct/0] 03:20:54
> via lo0.0
ff02::2/128 *[INET6/0] 03:21:06
MultiRecv
EVPNは/304にて送信元を表示します。macの部分はARP解決すればIPになります。
bgp.evpn.0
はEVPNでの全般的な経路交換情報テーブルです。
bgp.evpn.0
からスイッチ転送に実際に使用する経路情報についてはdefault-switch.evpn.0
にインポートされます。
ルーティングを識別するために以下フォーマットで表示がされます。
2 : 送信元route-distinguisher :: VNI :: 送信元MacAddress /304
2:9992:1::10000::00:01:95:00:01:01/304
bgp.evpn.0: 14 destinations, 14 routes (14 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
2:9992:1::10000::00:01:95:00:01:01/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::10000::02:05:86:71:0c:00/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::10000::08:00:27:8f:89:68/304 MAC/IP
*[BGP/170] 00:36:09, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::00:01:95:00:01:02/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::02:05:86:71:0c:00/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::08:00:27:17:d5:73/304 MAC/IP
*[BGP/170] 00:35:05, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::10000::02:05:86:71:0c:00::10.10.1.252/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::10000::02:05:86:71:0c:00::10.10.1.254/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::10000::08:00:27:8f:89:68::10.10.1.20/304 MAC/IP
*[BGP/170] 00:36:04, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::02:05:86:71:0c:00::10.10.2.252/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::02:05:86:71:0c:00::10.10.2.254/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::08:00:27:17:d5:73::10.10.2.20/304 MAC/IP
*[BGP/170] 00:35:00, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
3:9992:1::10000::9.9.9.2/248 IM
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
3:9992:1::20000::9.9.9.2/248 IM
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
default-switch.evpn.0: 28 destinations, 28 routes (28 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
2:9991:1::10000::00:01:94:00:01:01/304 MAC/IP
*[EVPN/170] 02:57:46
Indirect
2:9991:1::10000::02:05:86:71:66:00/304 MAC/IP
*[EVPN/170] 02:57:46
Indirect
2:9991:1::10000::08:00:27:8a:30:b2/304 MAC/IP
*[EVPN/170] 00:36:09
Indirect
2:9991:1::20000::00:01:94:00:01:02/304 MAC/IP
*[EVPN/170] 02:57:46
Indirect
2:9991:1::20000::02:05:86:71:66:00/304 MAC/IP
*[EVPN/170] 02:57:46
Indirect
2:9991:1::20000::08:00:27:c7:c2:7c/304 MAC/IP
*[EVPN/170] 00:34:44
Indirect
2:9992:1::10000::00:01:95:00:01:01/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::10000::02:05:86:71:0c:00/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::10000::08:00:27:8f:89:68/304 MAC/IP
*[BGP/170] 00:36:09, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::00:01:95:00:01:02/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::02:05:86:71:0c:00/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::08:00:27:17:d5:73/304 MAC/IP
*[BGP/170] 00:35:05, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9991:1::10000::02:05:86:71:66:00::10.10.1.251/304 MAC/IP
*[EVPN/170] 02:57:46
Indirect
2:9991:1::10000::02:05:86:71:66:00::10.10.1.254/304 MAC/IP
*[EVPN/170] 02:57:46
Indirect
2:9991:1::10000::08:00:27:8a:30:b2::10.10.1.10/304 MAC/IP
*[EVPN/170] 00:36:04
Indirect
2:9991:1::20000::02:05:86:71:66:00::10.10.2.251/304 MAC/IP
*[EVPN/170] 02:57:46
Indirect
2:9991:1::20000::02:05:86:71:66:00::10.10.2.254/304 MAC/IP
*[EVPN/170] 02:57:46
Indirect
2:9991:1::20000::08:00:27:c7:c2:7c::10.10.2.10/304 MAC/IP
*[EVPN/170] 00:34:44
Indirect
2:9992:1::10000::02:05:86:71:0c:00::10.10.1.252/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::10000::02:05:86:71:0c:00::10.10.1.254/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::10000::08:00:27:8f:89:68::10.10.1.20/304 MAC/IP
*[BGP/170] 00:36:04, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::02:05:86:71:0c:00::10.10.2.252/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::02:05:86:71:0c:00::10.10.2.254/304 MAC/IP
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
2:9992:1::20000::08:00:27:17:d5:73::10.10.2.20/304 MAC/IP
*[BGP/170] 00:35:00, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
3:9991:1::10000::9.9.9.1/248 IM
*[EVPN/170] 02:57:45
Indirect
3:9991:1::20000::9.9.9.1/248 IM
*[EVPN/170] 02:57:45
Indirect
3:9992:1::10000::9.9.9.2/248 IM
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
3:9992:1::20000::9.9.9.2/248 IM
*[BGP/170] 02:56:18, localpref 100, from 9.9.9.2
AS path: I, validation-state: unverified
> to 10.0.0.2 via xe-0/0/0.0
__default_evpn__.evpn.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
1:9.9.9.1:0::050000fbf40000271000::FFFF:FFFF/192 AD/ESI
*[EVPN/170] 02:57:46
Indirect
1:9.9.9.1:0::050000fbf400004e2000::FFFF:FFFF/192 AD/ESI
*[EVPN/170] 02:57:46
Indirect
{master:0}
vagrant@vqfx1>
以上、
次回はansible等を駆使してMultihoming可能なEVPNを自動構築できるようにしたいと思います。