Layer-3 WAN Handoff (L3Out) in VXLAN/EVPN Fabrics

I got a question from a few of my students regarding the best way to implement end-to-end EVPN across multiple locations. Obviously there’s the multi-pod and multi-site architecture for people believing in the magic powers of stretching VLANs across the globe, but I was looking for something that I could recommend to people who understand that you have to have a L3 boundary if you want to have multiple independent failure domains (or availability zones).

The theory seems to be simple: WAN edge devices advertise LAN prefixes (or even host routes turned into type-5 prefixes) with themselves as the next hop and the WAN transit VNI as the encapsulation. Dataplane-wise the solution would do VXLAN-to-VXLAN routing on the WAN edge devices, which should be supported on a decent range of recent ASICs.

I could have started digging through vendor documentation to figure out what’s supported, but I decided to take the easy way out: I asked Lukas Krattiger (Cisco Systems) and Massimo Magnani (Arista) what their platforms could do. The material for the rest of this blog post was supplied by Lukas and describes what Cisco is doing in this space; we’ll cover what Arista can do in a follow-up blog post.


Multi-Pod or Super-Spine is just an extended underlay with no controller in the overlay. You just do L2/L3 everywhere, which we learned doesn’t work that well at scale. The part you mention in regards to L3 WAN handoff can be done in 3 different ways:

  1. VXLAN to IP
  2. VXLAN to VXLAN
  3. VXLAN to MPLS, SR, SRv6

In the first option, you do Inter-AS Option A. You bring the IP prefixes into individual VRFs on the Border node. From there, you use, preferably, sub-interfaces and per-VRF eBGP peering to get these prefixes to the “outside world”. In that operation, you have all the goodies of classic BGP filtering on the per-VRF eBGP session – simple and straightforward.

You can, of course, do this also with IGPs and/or SVIs but then mutual redistribution comes into the game. You might want to watch this Cisco Live session for the RIGHT way and all the convoluted ways of implementing this design.

For the second option, you use the Multi-Site Border Gateway (BGW), which is able to do just the routing part (you can also do the bridging but that is more of a add-on). The reason why you need to have some function of EVPN re-origination at BGW is that EVPN uses an RMAC extended community – the inner destination MAC address for the VXLAN encapsulation that is part of the route. When you receive such a route from a Leaf, that community has to be changed to the Border node that re-originates the route towards the remote domain.

Having just VXLAN routing (RIOT – Routing In and Out of Tunnels) on the data plane is not enough and changing the BGP next hop is not enough; you need to change the next-hop with the correct RMAC. Our BGW does that and it works fine in L3-only deployments.

The third option is pretty much the same as the second one with the difference that we use other encapsulations and predominantly L3VPN (VPNv4, VPNv6). You can use whatever you like to build the underlay: LDP, SR, or labeled unicast (BGP-LU) are all possible.

EVPN to EVPN or EVPN to L3VPN re-origination allows the filtering of routes as you would do with BGP anyway – on the sessions or at the redistribution point. Also, there are table-maps for intra-VRF filtering.

Next: VXLAN/EVPN Layer-3 Handoff (L3Out) on Arista EOS Continue

Revision History

2023-09-06
A draft version of this blog post escaped into the wild, was caught after a few hours, tamed and republished.

2 comments:

  1. For #3 is MPLS with BGP-EVPN also supported?

    Replies
    1. Apparently yes - https: //www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k-r6-4/lxvpn/configuration/guide/b-l3vpn-cg-asr9000-64x/m-implement-dci-vxlan-layer-3-gateway.html.

      We tried this setup in lab using XRv9000 and control plane works like a charm. Unfortunately, data plane does not work on this virtual platform. Cisco support admitted that this functionality is supported only on ASR9000. No virtual platform support. However, NCS5500 is on the roadmap.

  2. Is it feasible to implement a VXLAN-to-VXLAN scenario in an Arista environment, where an L2VPN from one site is advertised as an L3VPN at a remote site using an integrated border gateway device? I assume a decoupled solution is always possible, but I'm open to correction if this assumption is incorrect.

    Replies
    1. Short answer: YES

      I have the long answer sitting in my email for months, have to publish it.

    2. Thank you, Ivan, for confirming the feasibility of implementing a gateway between an L2 VXLAN EVPN domain and an L3 VXLAN EVPN domain in an Arista environment.

      I'm eagerly awaiting your detailed explanation in the upcoming long response, as it will greatly enhance my understanding of the background of this specific setup.

      Regards,

Add comment
Sidebar