White Box switch interoperability test ~Edgecore SONiC×Catalyst (L2 VxLAN_EVPN edition)~

Introduction

We conducted an interconnection test between a white Box switch (WBS) and a Cisco switch product, and in this article we will introduce the settings and test results.
By interconnecting with major Cisco products as network switches, you will be able to understand the quality of WBS.
In this interconnection verification, we imagined a data center network and built a small Leaf-Spine configuration using L2 VxLAN/EVPN.

[Points of this article]

          I was able to build an L2 VxLAN/EVPN configuration between WBS (ecSONiC) and Cisco switch products.

          Understand L2 VxLAN/EVPN connection settings between WBS and Cisco switches.

          It can be seen that the quality of WBS has improved to the level that it can be interconnected with Cisco switches.

Simple design information

We will summarize simple design information for interconnection verification.

Used equipment

The equipment used is as follows.

  SpineSW LeafSW-1 LeafSW-2

Vendor

Edegecore

Edgecore

Cisco

Platform

AS7726-32X

AS7326-56X

C9300-48T

ASIC

Trident III
(BCM56870)

Trident III
(BCM56873)

(not clear)

NOS (Ver)

ecSONiC
(ec202111.4)

ecSONiC
(ec202111.4)

IOS
(XE 17.3.4)

Configuration information

The configuration information is as follows.

Settings

The settings are summarized below.

  SpineSW LeafSW-1 LeafSW-2

VLAN

No setting (single NW)

×2 (vlan10、vlan20)

×3 (vlan10、vlan20、vlan100)

LACP

Connection with LeafSW-1 and LeafSW-2

Connection with SpineSW

Connection with SpineSW

BGP (iBGP) / EVPN

     

 AS

 

65100

65100

 Router ID

 

2.2.2.2 /32

3.3.3.3 /32

neighbor

 

10.0.0.3

10.0.0.2

IPv4 unicast notification

     

notification address

 

2.2.2.2 /32

3.3.3.3 /32

 EVPN

     

neighbor

 

10.0.0.3

10.0.0.2

VNI notification

 

All VNIs

All VNIs

VxLAN settings

     

 VTEP

 

2.2.2.2

3.3.3.3

VLAN-ID / VNI linking

 

vlan10 / VNI 10100
vlan20 / VNI 10200

vlan10 / VNI 10100
vlan20 / VNI 10200

SpineSW operates as a simple layer 2 switch.
LeafSW-1 and LeafSW-2 set vlan10 and vlan20 in the overlay.
Set up L2VxLAN/EVPN on the underlay and tunnel communication for vlan10 and vlan20.
In addition, in the physical layer, by setting LACP, the communication route with SpineSW is duplicated and the bandwidth is expanded.

Setting command

This is a summary of the commands actually set on the switch.
*It is assumed that the management functions and interface speed settings have been completed and will be omitted.
(Host name, management account, management IP, SSH/Telnet, speed settings, Breakout settings, etc.)

You can download the configuration commands below.

SpineSW settings

As a premise, the interface names and physical ports of AS7726-32X correspond as shown below.

interface name physical port number

Ethernet112

Port29

Ethernet116

Port30

Ethernet124

Port32 (Breakout lane 1)

Ethernet125

Port32 (Breakout lane 2)


Configure the following settings for SpineSW.

           Interface related: LACP

Configuring LACP

           Creating LACP interfaces “PortChannel1” and “PortChannel2”
           LACP interface is set to Fast Rate
           Add Ethernet112 and Ethernet116 to PortChannel1 member ports
           Add Ethernet124 and Ethernet125 to PortChannel2 member ports

LeafSW-1 settings

As a premise, the interface names and physical ports of AS7326-56X correspond as shown below.

interface name physical port number

Ethernet0

Port1

Ethernet11

Port2

Ethernet124

Port49

Ethernet125

Port50

Configure the following settings for LeafSW-1.

           Interface related: VLAN (vlan10, vlan20), LACP
           IP address: loopback address, connection interface to SpineSW
           VxLAN settings: VTEP settings, VLAN/VNI mapping settings
           BGP (iBGP)/EVPN settings: AS settings, VTEP by BGP, VNI advertisement

 The details of each setting are summarized below.

VLAN settings

           Create vlan10 and vlan20
           Set Ethernet0 to vlan10 as access port (untagged)
           Set Ethernet1 to vlan20 with access port (untagged)

Configuring LACP

           Create LACP interface "PortChannel1"
           LACP interface is set to Fast Rate
           Add member ports Ethernet48 and Ethernet52 to PortChannel1

IP address settings

           Loopback0 (loopback interface): 2.2.2/32
(Used as VTEP, BGP router ID)
           PortChannel1: 0.0.2/29 (Connected to LeafSW-2 via L2)

Configuring VxLAN

           Configuring VTEP 2.2.2.2
           Creating and setting NVO (VTEP and VLAN/VNI mapping policy)
           VLAN/VNI mapping (vlan10-VNI 10100 / vlan20-VNI 10200)

### VTEP configuration
admin@LeafSW-1:~$ sudo config vxlan add vtep 2.2.2.2

### NVO creation, linking with vtep (2.2.2.2)
admin@LeafSW-1:~$ sudo config vxlan evpn_nvo add nvo vtep

### VLAN-VNI mapping in NVO
admin@LeafSW-1:~$ sudo config vxlan map add vtep 10 10100
admin@LeafSW-1:~$ sudo config vxlan map add vtep 20 10200

BGP/EVPN settings

           Configure BGP (AS 65100)
           Set 0.0.3 (AS65100 / LeafSW-2) to neighbor
           Advertise segment 2.2.2/32 to neighbors
           Advertise all your VNIs to neighbors
*In ecSONiC, configure BGP settings using FRRouting.

### FRRouting Configuration mode > Transition to Config mode
admin@LeafSW-1:~$ vtysh
LeafSW-1# configure terminal

### Create BGP (AS 65100) and go to configuration mode
LeafSW-1(config)# router bgp 65100

### Set Router ID to 2.2.2.2
LeafSW-1(config-router)# bgp router-id 2.2.2.2

### Set 10.0.0.3 / AS 65100 [LeafSW-2 information] as BGP neighbor
LeafSW-1(config-router)# neighbor 10.0.0.3 remote-as 65100

### Set address information to notify BGP neighbors
LeafSW-1(config-router)# address-family ipv4 unicast

### Advertise 2.2.2.2 (your VTEP)
LeafSW-1(config-router-af)# network 2.2.2.2/32

### Transition from address family mode
LeafSW-1(config-router-af)# exit-address-family

### Go to EVPN configuration mode
LeafSW-1(config-router)# address-family l2vpn evpn
LeafSW-1(config-router-af)# neighbor 10.0.0.3 activate

### Advertise all VNIs
LeafSW-1(config-router-af)# advertise-all-vni

### Transition from address family mode
LeafSW-1(config-router-af)# exit-address-family
LeafSW-1(config-router)# exit

LeafSW-2 settings

Configure the following settings for LeafSW-2.

           Interface related: VLAN (vlan10, vlan20, vlan100), LACP
           IP address: loopback address, connection interface to SpineSW
           VxLAN settings: VTEP settings, VLAN/VNI mapping settings
           BGP (iBGP)/EVPN settings: AS settings, VTEP by BGP, VNI advertisement

 The details of each setting are summarized below. 

Interface settings

           Creating vlan10, 20, 100
           Set Te1/1/1 to vlan10 and Te1/1/2 to vlan20 with access port (untagged)
           Set Te1/1/7 and 1/1/8 to LACP (ChannelGroup1) (Fast Rate setting)
           Set ChannelGroup1 to vlan100 with access port (untagged)
*vlan100 is the VLAN for connecting to SpineSW and LeafSW-1 

IP address setting 

           Loopback0 (loopback interface): 3.3.3/32
(Used as router ID for VTEP and EVPN/BGP)
           Vlan100: 0.0.3/29 (connected to LeafSW-1 via L2)

Configuring EVPN

           Creating an EVPN
▶Set to Ingress replication
▶Specify router ID to Loopback0
▶VNI notification settings
           Creating VLAN-based EVPN instances 1 and 2
▶VxLAN usage settings, Ingress replication settings
Associate EVPN instance with VLAN and configure VNI

Configuring the NVE interface

           Settings for NVE interface “NVE1”
▶Specifying settings for BGP use
▶Linking Loopback0, VNI 10100, 10200, Ingress-Replication usage settings

Configuring BGP

           Creating BGP (AS65100)
           Settings for using router ID 3.3.3.3 in BGP
           Specify LeafSW-2 (10.0.0.2 / AS 65100) as neighbor
           Setting to advertise 3.3.3 to neighbor 10.0.0.2
           Configure EVPN connection with neighbor 0.0.2


Top 3 popular articles

[11th] How to create a network visualization dashboard using Grafana for beginners
[10th] How to visualize SNMP data using OSS ~Grafana x OcNOS~
[Part 8] Implementation example using P4 language and FPGA Smart NIC -NAT version-

Communication test/status confirmation

Test results

As a result of flowing traffic between each terminal, we were able to confirm that the terminals in the same VLAN​ ​(terminals A to C and terminals B to D) were able to communicate with each other as shown below.

address

sender

Terminal A (vlan10) Terminal B (vlan20) Terminal C (vlan10) Terminal D (vlan20)

Terminal A (vlan10)

- (separate VLAN)

- (separate VLAN)

Terminal B (vlan20)

- (separate VLAN)

- (separate VLAN)

Terminal C (vlan10)

- (separate VLAN)

- (separate VLAN)

Terminal D (vlan20)

- (separate VLAN)

- (separate VLAN)

Check status

Check the status of each configured item.

Interface information

You can check the interface information using the following command.

ecSONiC/IOS common: show interfaces status

# SpineSW (AS7726)
# LeafSW-1 (AS7326)
# LeafSW-2 (C9300)

LACP information

LACP information can be checked using the following command.

           ecSONiC:               show interfaces portchannel
           IOS:       show etherchannel summary

# SpineSW (AS7726)
# LeafSW-1 (AS7326)
# LeafSW-2 (C9300)

VLAN information

VLAN information can be checked using the following command.

ecSONiC: show vlan brief or show vlan config
           
IOS: show vlan

# LeafSW-1 (AS7326)
# LeafSW-2 (C9300)

BGP

BGP information can be checked using the following command.

           ecSONiC / IOS common: show ip bgp

# LeafSW-1 (AS7326 / FRRouting)
# LeafSW-2 (C9300)

Route information

You can check the route information using the following command.

           ecSONiC / IOS common: show ip route

# LeafSW-1 (AS7326)
# LeafSW-2 (C9300)

VLAN-VNI mapping

You can check the VLAN-VNI mapping status using the following command.

           ecSONiC show vxlan vlanvnimap
           
IOS show nve vni

# LeafSW-1 (AS7326)
# LeafSW-2 (C9300)

Peer VNI information

You can check the peer's VNI information using the following command.

           ecSONiC show vxlan remotevni <peer-IP>
           
IOS show l2vpn evpn peers vxlan

# LeafSW-1 (AS7326)
# LeafSW-2 (C9300)

Other notes

Unable to send BUM traffic over VxLAN with Ingress Replication from Catalyst switch
There are two types of VxLAN BUM transfer methods: Underlay IP Multicast and Ingress Replication (EVPN).
For the following reasons, the VxLAN BUM transfer method must be ingress replication, and BUM cannot be transferred from a Catalyst switch.

● BUM cannot be transferred from Catalyst switches using Ingress Replication.
● ecSONiC (as of ec202111.4) does not support Underlay IP Multicast.

*BUM: B roadcast, Unknown Unicast, Multicast
*With Cisco's Nexus series (data center switches), BUM transfer is also possible with Ingress Replication.

In the case of Unknown Unicast, it can be avoided by sending the packet from under the Remote VTEP (=LeafSW-1 in the test configuration) as seen from the C9300.
This is because by starting communication from the opposite side, it will be added to the C9300's VxLAN MAC address table.

We assume that there is currently no workaround for Broadcast and Multicast.

Summary

This time, we were able to build an L2 VxLAN/EVPN configuration between WBS (ecSONiC) and Cisco switch products.
We now know the settings required for WBS and Cisco switches for interconnection.
Additionally, by being able to interconnect the WBS and Cisco switches using L2 VxLAN/EVPN, I was able to understand once again the high quality of the WBS.

Next, we will try interconnection using L3 VxLAN/EVPN.

Settings file download

The configuration file used in this article can be downloaded from the URL provided in the information email by clicking "Apply here" below.
Please try.

At the end

Macnica offers a service that provides a remote environment where you can actually experience open networking and conduct testing and verification.
This service allows us to verify the operability of the network OS and perform tests that combine network OSs, white Box switches, and optical transceivers from various manufacturers.

Remote verification service image diagram

Remote verification service image diagram

It is a service that allows you to easily test open networking, and the basic configuration is free of charge.
You can check the downloadable materials for available network OS and white Box switches, specific use cases, and how to apply. The materials can be downloaded from the URL listed in the information email by answering the questionnaire from the "Macnica Network OS Remote Verification Service" below.

These people are using the remote verification service.

Here are some testimonials from people who have actually used the service.

 

Furukawa Network Solution Co., Ltd.

“Recently, the number of remote service environments is increasing, but I was impressed with the ease of access to the evaluation equipment.

The materials you provided were easy to understand, and we were able to proceed smoothly with the intended verification. ”


Click here for list of materials

Document list

In addition to introducing products handled by Macnica,
We publish materials related to open networking, such as BGP cross network automatic construction files and network operation test evaluation reports.

Click here for details

Product Page Top

Edgecore Networks

We continue to be a pioneer in open networking by developing and selling products related to OpenNetworking/white Box switches.

DELTA ELECTRONICS

We have many achievements in various fields such as networks, IoT, and electronic components.

CGS Tower Networks

We provide a network packet broker (NPB) that utilizes state-of-the-art general-purpose hardware.

Inquiry

If you have any questions regarding this article, please contact us below.

Macnica
In charge of OpenNetwork

Contact us by phone:
045-470-9831