четверг, 10 августа 2017 г.

Cisco Nexus 3064 and Juniper MX 960 simple L2VPN on PE (based on bridge-domains)

We have topology with Q-in-Q VLAN-s on L2 network layer.

Access Switch - Huawei S2326 (adding a single VLAN tag to Ethernet frame).
Aggregation Swicth - Cisco Nexus 3064 (adding a second VLAN tag to Ethernet frame).
PE - Juniper MX 960 (recive double tag Ethernet frame from Nexus).

The task to make L2VPN for customers on the L2 ring. Cisco Nexus 3064 does not know selective Q-in-Q...  So it's decided to send all L2VPN traffic to the PE router.

Clients VLAN-s:
Eth1/46, C-VLAN - 203, S-VLAN - 306
Eth1/48, C-VLAN - 200, S-VLAN - 303

Frames from C-VLAN 203 must switch to C-VLAN 200.

Cisco Nexus config:

vlan 303
  name Access-HuaweiSw-Port-48

vlan 306
  name Access-HuaweiSw-Port-46

interface Ethernet1/46
  description access-switch-S2326-46
  switchport mode dot1q-tunnel
  switchport access vlan 306
  speed 1000
  switchport autostate exclude

interface Ethernet1/48
  description access-switch-S2326-48
  switchport mode dot1q-tunnel
  switchport access vlan 303
  speed 1000
  switchport autostate exclude

interface port-channel1
  description -=MX-960=-
  switchport mode trunk
  switchport trunk allowed vlan 40,303,306,707
  speed 1000

Juniper MX config:
set interfaces ae1 description -=Cisco=-
set interfaces ae1 flexible-vlan-tagging
set interfaces ae1 mtu 9192
set interfaces ae1 encapsulation flexible-ethernet-services
set interfaces ae1 aggregated-ether-options minimum-links 1
set interfaces ae1 aggregated-ether-options link-speed 1g
set interfaces ae1 unit 3032 description L2VPN-Client1
set interfaces ae1 unit 3032 encapsulation vlan-bridge
set interfaces ae1 unit 3032 vlan-tags outer 303
set interfaces ae1 unit 3032 vlan-tags inner 200
set interfaces ae1 unit 3062 description L2VPN-Client1
set interfaces ae1 unit 3062 encapsulation vlan-bridge
set interfaces ae1 unit 3062 vlan-tags outer 306
set interfaces ae1 unit 3062 vlan-tags inner 203

set bridge-domains L2VPN-Client1 domain-type bridge
set bridge-domains L2VPN-Client1 vlan-id none
set bridge-domains L2VPN-Client1 interface ae1.3032
set bridge-domains L2VPN-Client1 interface ae1.3062

Check all:
root@MX960_RE0> show bridge domain extensive

Routing instance: default-switch
Bridge domain: L2VPN-Client1                  State: Active
Bridge VLAN ID: none
Interfaces:
    ae1.3032
    ae1.3062
Total MAC count: 2

Nexus-MX-1# show mac address-table vlan 303
Legend:
        * - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
        age - seconds since first seen,+ - primary entry using vPC Peer-Link
   VLAN     MAC Address      Type      age     Secure NTFY   Ports/SWID.SSID.LID
---------+-----------------+--------+---------+------+----+------------------
* 303      00e0.fc09.bcf9    dynamic   9840       F    F  Eth1/48
* 303      84ad.58b3.39ff    dynamic   9840       F    F  Eth1/48
* 303      d4ca.6d8a.b56e    dynamic   9840       F    F  Eth1/48
* 303      d4ca.6db1.be02    dynamic   9840       F    F  Po1

Nexus-MX-1# show mac address-table vlan 306
Legend:
        * - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
        age - seconds since first seen,+ - primary entry using vPC Peer-Link
   VLAN     MAC Address      Type      age     Secure NTFY   Ports/SWID.SSID.LID
---------+-----------------+--------+---------+------+----+------------------
* 306      00e0.fc09.bcf9    dynamic   11830      F    F  Eth1/46
* 306      d4ca.6d8a.b56e    dynamic   10310      F    F  Po1
* 306      d4ca.6db1.be02    dynamic   10120      F    F  Eth1/46
* 306      dcd2.fc6b.ca19    dynamic   11800      F    F  Eth1/46

Комментариев нет:

Отправить комментарий