Uploaded by wang eo

deploying-l2-vxlan-evpn-network-with-palo-alto-networks-firewalls

advertisement
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN
Network with Palo Alto Networks
Firewalls
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Contents
Introduction ....................................................................................................................................................... 3
Architecture and Use Case ............................................................................................................................... 3
AOS-CX INITIAL SETUP (OOB, INITIAL CONFIGS) ........................................................................................ 5
Sample Initial Configuration ............................................................................................................ 5
Modify Change Validation Settings In NetEdit ................................................................................................... 6
Spine/Leaf Configuration And Verification ......................................................................................................... 7
NetEdit Plan For “Spine” Switches ................................................................................................... 7
Verify Change Validation ............................................................................................................... 13
NetEdit Plan For “Leaf” Switches ................................................................................................... 14
Verify Change Validation ............................................................................................................... 25
Palo Alto Networks Configuration and Verification .......................................................................................... 28
Appendix......................................................................................................................................................... 31
Sample AOS-CX Spine Configuration ............................................................................................ 31
Sample AOS-CX 8325 Leaf Configuration ...................................................................................... 32
Sample AOS-CX 6300 Leaf Configuration (With Colorless Ports) .................................................... 34
2
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Introduction
This document provides guidance on deploying an AOS-CX powered L2 EVPN VXLAN network with Palo Alto Networks
Firewalls.
The AOS-CX switches to be deployed will depend on interfaces, scale and features required. Aruba networks provides a
diverse product portfolio to meet different customer requirements.
The L2 EVPN VXLAN deployment shown in this guide utilizes NetEdit. NetEdit empowers IT teams to orchestrate multiple
AOS-CX switch configurations with intelligent capabilities including search, edit, validation (including conformance checking),
deployment and audit. Using NetEdit, the network admin can configure and validate multiple switches simultaneously, while
specifying unique settings for each switch.
Palo Alto Networks Next-Generation Firewalls inspect all traffic, including all applications, threats, and content, and ties that
traffic to the user, regardless of location or device type.
Architecture and Use Case
The use case shown in Figure 1 is focused on mid-sized Campus deployments with an on-premise Data Center.
As shown, the solution consists of a pair of independent spines switches which provide Layer 3 connectivity between the
various buildings, aggregations switches, as well as the attached pair of CX 8325 switches which provide access to local
servers and Palo Alto firewalls.
This use case assumes all inter-VLAN traffic needs inspection. To that end, the Palo Alto NGFWs will act as gateways for all
inter-VLAN traffic so the traffic can be inspected in detail.
Figure 1. Campus Leaf & Spine architecture with Palo Alto Networks Firewall
The L3 Spine/Leaf IBGP EVPN/VXLAN fabric with L2 overlay network and Palo Alto Networks Firewalls architecture provides
the following benefits:
•
Provides a loop free L3 underlay network fabric and overlay network for East-West L2/L3 connectivity between buildings
with all links active
3
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
•
Supports colorless ports on AOS-CX 6300/6400, it doesn’t matter what connects to the port as roles and policies are
assigned per device, authentication takes place at the access port level and successful authentication enforces VLAN
and ACL assignments as configured in ClearPass
•
With dynamic VLAN assignments on colorless ports, devices can be placed into VXLAN tunnels
•
Non VXLAN access switches can be attached to AOS-CX 8325 aggregate leaf switches if AOS-CX 6300/6400 access
switches cannot be deployed, however this will not support colorless ports
•
Provides the capability to add more spine switches in future to provide additional fabric bandwidth
•
Distributed scale out control plane using MP-BGP EVPN
•
Virtual Switching Extension (VSX) and VSX live upgrade is recommended for multi chassis link aggregation deployments
that require high availability, e.g. Data Center
•
Network Analytics Engine is available natively on each AOS-CX switch
•
Supports multi-tenancy and traffic isolation via VXLAN
•
Provides a centralized firewall inspection point for traffic between subnets or leaving a subnet
•
The Palo Alto Networks NGFW will provide L3 default gateway functionality for all VLANs/subnets
•
Redundant Palo Alto Firewalls can be located in different buildings if desired for high availability
•
Palo Alto Networks NGFW will provide Threat Prevention capabilities for all transit traffic. Threat Prevention automatically
stops vulnerability exploits with IPS capabilities, offers in-line malware protection, and blocks outbound command-and
control-traffic. When combined with WildFire and URL Filtering, organizations are protected at every stage of the attack
lifecycle, including both known and zero-day threats.
In the EVPN/VXLAN fabric:
•
OSPF is enabled within the fabric on the leaf and spine switches for underlay routing, all loopbacks and /31 links are
advertised via OSPF
•
IBGP EVPN using AS#65001 is enabled between leaf and spine switches
o IBGP EVPN peering uses Lo0
o
Each leaf would only peer to both spines
o
Spine switches function as EVPN route reflectors (RRs)
o
Leaf switches do not peer to other leaf switches
•
Leaf switches only function only as L2 VTEPs
•
L2 connectivity between buildings is achieved via direct VXLAN tunnels
•
VSX switches should utilize redundant VSX ISL links in a LAG for maximum VSX high availability
•
A dedicated VSX Keepalive link is recommended between VSX switches in a rack
•
VSX system-mac is enabled so that LACP peers think they are connected to the same remote switch
•
VSX VTEPs share an anycast Lo1 IP address to create a logical VTEP
•
Split-recovery is disabled for VSX to ensure only the primary VSX switch will keep the logical VTEP up during a VSX split
•
Single homed servers should only be connected to the primary VSX switch
•
Should uplinks fail on a VSX leaf switch, VLAN4000 and OSPF will be used as the transit link to reroute traffic to the
redundant leaf switch
•
Large MTU is enabled to support applications that require it
•
In the Data Center, the server/firewall facing ports should be set to maximum MTU supported by the server (e.g. 9000) if
large MTU applications need to be transported across the VSX switches
4
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
In the Palo Alto Networks solution:
•
Palo Alto Networks NGFW will act as the L3 Gateway where Inter-VLAN routing would happen
•
An aggregate interface group can be created on the NGFW to aggregate multiple ethernet interfaces into a single entity
with corresponding settings on the switch side as well
•
These interfaces are added to a virtual router for appropriate inter-vlan/subnet routing
•
Appropriate Zones are defined for the incoming and outgoing interfaces which are used to define relevant security
•
Threat Prevention is applied for preventing advanced threats traversing the NGFW
policies
AOS-CX INITIAL SETUP (OOB, INITIAL CONFIGS)
We recommend the DC and spine switches connect their management ports to a separate Out Of Band (OOB) management
network as shown in Figure 2, this allows the switches to be manageable if there is an issue with in-band network
connectivity. The building switches can be managed by NetEdit via the in-band network since these are less critical.
Figure 2. OOB connectivity
In order for NetEdit to manage each switch, initial configs should be added via one of these options:
•
Aruba CX mobile app
•
Console cable
•
Zero Touch Provisioning (ZTP)
Sample Initial Configuration
hostname 8325-1
user admin group administrators password ciphertext AQBapUz+
!
!
ssh server vrf mgmt
!
!
!
!
interface mgmt.
no shutdown
ip static 10.5.6.5/24
default-gateway 10.5.6.1
!
! Only required for 8325 to change ports from 25G to 10G
! interface group 1 contains ports 1/1/1-1/1/12
5
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
system interface-group 1 speed 10g
! interface group 4 contains ports 1/1/37-1/1/48
system interface-group 4 speed 10g
!
https-server rest access-mode read-write
https-server vrf mgmt
Once the switches are configured and physically connected, ensure NetEdit has IP connectivity to switch management IPs
and add all devices into NetEdit [Devices -> Action -> Discover Devices]
Figure 3. Devices -> Action -> Discover Devices
Modify Change Validation Settings In NetEdit
To help with change validation, you can add or modify the change validation commands used by NetEdit.
This is done in NetEdit [Settings -> Validation -> Change Validation -> Command Scripts]
The screenshots below showcase the verification commands used in this guide.
Figure 4. Settings -> Validation -> Change Validation -> Command Scripts
6
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Figure 5. Settings -> Validation -> Change Validation -> Command Scripts (cont)
Spine/Leaf Configuration And Verification
NetEdit Plan For “Spine” Switches
Create a plan for the “Spine” switches in NetEdit [Devices -> select “desired switches” -> Action -> Edit Config]
Figure 6. Selecting Spine switches for Plan
7
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Give the plan a name and “Create”.
Figure 7. Naming the plan
You should see the initial configs for your “Spine” switches in NetEdit.
The common configs across the switches are shown as “white” while the “blue” variables such as “HOSTNAME” and
“A.B.C.D/M” have unique settings/values.
Figure 8. NetEdit view of Spines
8
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
If you hover over “HOSTNAME” or “A.B.C.D/M” config (in blue), you can view the unique settings assigned to each switch.
Figure 9. Hover over areas for more information
If you right click “HOSTNAME” or “A.B.C.D/M” (in blue), you will be able to modify the settings.
Figure 10. Right Click variables
9
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Start by adding OSPF and loopbacks
router ospf 1
router-id 192.168.1.11
area 0.0.0.0
interface loopback 0
ip address 192.168.1.11/32
ip ospf 1 area 0.0.0.0
And right click to modify loopbacks and router-ids assigned to each switch
Figure 11. Adding loopbacks and router-ids assigned to each switch
Figure 12. When ready click apply
10
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Configure downlinks towards leaf switches
interface 1/1/50
no shutdown
mtu 9198
description 8325-3A
ip mtu 9198
ip address 192.168.2.1/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
interface 1/1/51
no shutdown
mtu 9198
description 8325-3B
ip mtu 9198
ip address 192.168.2.3/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
interface 1/1/3
no shutdown
mtu 9198
description 6300-4
ip mtu 9198
ip address 192.168.2.5/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
interface 1/1/49
no shutdown
mtu 9198
description 8325-5
ip mtu 9198
ip address 192.168.2.7/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
And right click to modify IPs assigned to each switch
Figure 13. Modifying IP addresses
11
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Configure IBGP EVPN towards leaf switches
router bgp 65001
bgp router-id 192.168.1.11
neighbor 192.168.1.31 remote-as 65001
neighbor 192.168.1.31 update-source loopback 0
neighbor 192.168.1.32 remote-as 65001
neighbor 192.168.1.32 update-source loopback 0
neighbor 192.168.1.4 remote-as 65001
neighbor 192.168.1.4 update-source loopback 0
neighbor 192.168.1.5 remote-as 65001
neighbor 192.168.1.5 update-source loopback 0
address-family l2vpn evpn
neighbor 192.168.1.31 activate
neighbor 192.168.1.31 route-reflector-client
neighbor 192.168.1.31 send-community extended
neighbor 192.168.1.32 activate
neighbor 192.168.1.32 route-reflector-client
neighbor 192.168.1.32 send-community extended
neighbor 192.168.1.4 activate
neighbor 192.168.1.4 route-reflector-client
neighbor 192.168.1.4 send-community extended
neighbor 192.168.1.5 activate
neighbor 192.168.1.5 route-reflector-client
neighbor 192.168.1.5 send-community extended
And right click to modify router-ids assigned to each switch
Figure 14. Modifying router-ids
12
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Select “RETURN TO PLAN” -> “DEPLOY” to push down configs.
Figure 15. Deploy to complete
Verify Change Validation
You can click on “Change Validation” to compare configs.
As the leaf switches are not connected, you will not be able to validate OSPF or BGP neighbor adjacency.
Figure 16. Change Validation view
13
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
After validation, you can choose to “COMMIT” to save the desired configs or “ROLLBACK” to revert configs before the configs
were deployed to make further desired changes.
NetEdit Plan For “Leaf” Switches
Create a plan for the “Leaf” switches in NetEdit [Devices -> select “desired switches” -> Action -> Edit Config]
Figure 17. NetEdit Plan For “Leaf” Switches
Give the plan a name and “Create”.
Figure 18. Plan name
Start by adding VSX KeepAlive (KA) for the Leaf switches that require VSX, select only the desired switches on the left
interface 1/1/55
no shutdown
description VSX KA
ip address 10.1.2.0/31
14
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Figure 19. Adding KA
And right click to modify IPs assigned to each switch
Add VSX ISL
interface lag 1
no shutdown
description VSX ISL LAG
no routing
vlan trunk native 1 tag
vlan trunk allowed all
lacp mode active
interface 1/1/56
no shutdown
mtu 9198
description VSX ISL
lag 1
15
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Figure 20. Adding VSX ISL
Add VSX (select 1 pair at a time if there is more than 1 VSX pair)
vsx
system-mac 00:00:00:00:02:12
inter-switch-link lag 1
role primary
keepalive peer 10.1.2.1 source 10.1.2.0
no split-recovery
Figure 21. Adding VSX Config
16
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
And right click to modify roles and IPs assigned to each switch
Figure 22. Modifying IPs
After the specific values are modified, these should be updated
Figure 23. Reviewing new settings for variables
Add OSPF and loopbacks (select all desired leaf switches)
router ospf 1
router-id 192.168.1.31
area 0.0.0.0
interface loopback 0
ip address 192.168.1.31/32
ip ospf 1 area 0.0.0.0
interface loopback 1
description Logical VTEP
ip address 192.168.1.33/32
ip ospf 1 area 0.0.0.0
17
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
And right click to modify loopbacks and router-ids assigned to each switch, non VSX switches do not require “interface
loopback 1”
Figure 24. Modifying loopbacks and router-ids
Configure uplinks towards spine switches (it will be easier if you select switches with similar uplinks together)
interface 1/1/49
no shutdown
routing
mtu 9198
description 8325-1
ip mtu 9198
ip address 192.168.2.0/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
interface 1/1/50
no shutdown
routing
mtu 9198
description 8325-2
ip mtu 9198
ip address 192.168.2.8/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
18
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
And right click to modify IPs assigned to each switch
Figure 25. Modifying IPs
Add desired VLANs to all Leaf switches and configure transit VLAN (4000) between VSX Leaf switches
vlan 101-103,4000
!
interface vlan4000
description Transit VLAN
ip mtu 9198
ip address 192.168.3.0/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
19
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
And right click to modify IPs assigned to each switch
Figure 26. Modifying IPs
If you hover over the value shown on the right, it will display which switches only have that specific config
Figure 27. Hover for more details
20
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Configure IBGP EVPN towards Spine RRs
router bgp 65001
bgp router-id 192.168.1.31
neighbor 192.168.1.11 remote-as 65001
neighbor 192.168.1.11 update-source loopback 0
neighbor 192.168.1.12 remote-as 65001
neighbor 192.168.1.12 update-source loopback 0
address-family l2vpn evpn
neighbor 192.168.1.11 activate
neighbor 192.168.1.11 send-community extended
neighbor 192.168.1.12 activate
neighbor 192.168.1.12 send-community extended
And right click to modify router-id assigned to each switch
Figure 28. Modifying router-ids
Configure EVPN VLANs with RD/RT auto towards Spine RRs
evpn
vlan 101
rd auto
route-target
route-target
vlan 102
rd auto
route-target
route-target
vlan 103
rd auto
route-target
route-target
export auto
import auto
export auto
import auto
export auto
import auto
21
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Figure 29. Configuring EVPN VLANs
Configure VXLAN and VNI to VLAN mapping
interface vxlan 1
source ip 192.168.1.33
no shutdown
vni 101
vlan 101
vni 102
vlan 102
vni 103
vlan 103
And right click to modify tunnel source IP assigned to each Leaf switch.
For the VSX pair, this should be the Lo1 anycast IP. For a standalone switch, Lo0 can be used.
22
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Figure 30. Modify tunnel source IP
Configure links and LAGs towards the Firewall
interface lag 10 multi-chassis
no shutdown
description Firewall
no routing
vlan trunk native 1
vlan trunk allowed 101-103
lacp mode active
!
interface 1/1/1
no shutdown
description Firewall
lag 10
23
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Figure 31. Configuring links and LAGs towards the Firewall
On the building leaf switches, configure links towards clients
interface 1/1/10
no shutdown
no routing
vlan access 101
Finally, select “RETURN TO PLAN” -> “DEPLOY” to push down configs.
Figure 32. Deploy when ready
24
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Verify Change Validation
You can click on “Change Validation” to verify if VSX works as expected.
Figure 33. Verifying Configuration via Change Validation
Check if OSPF adjacency works as expected
Figure 34. Verifying Configuration via Change Validation - OSPF adjacency
Check if BGP peers are up as expected
25
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Figure 35. Verifying Configuration via Change Validation - BGP peers
Check if routing works as expected, there should be ECMP paths to the other Leaf switches
Figure 36. Verifying Configuration via Change Validation - ECMP
If you have traffic flowing through the fabric, you can check that EVPN MAC learning works as expected from the “show bgp
l2vpn evpn” and “show mac-address” output.
26
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Check VSX LAG
Figure 37. Verifying Configuration via Change Validation - VSX LAG
And to validate config changes.
Figure 38. Verifying Configuration via Change Validation - differences
27
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
After validation, you can choose to “COMMIT” to save the desired configs or “ROLLBACK” to revert configs before the configs
were deployed to make further desired changes.
Figure 39. Commit to write to startup config
Palo Alto Networks Configuration and Verification
Create Aggregate Interfaces:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/configure-interfaces/configure-an-aggregateinterface-group.html
Figure 40. Agg interfaces config
28
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Figure 41. Agg interfaces LACP
Figure 42. Agg interfaces - link speed
Create L3 Sub-Interfaces of the Aggregate Interfaces to Map Specific VLAN Traffic
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/network/network-interfaces/layer-3-subinterface.html
Figure 43. Agg interfaces - sub interfaces
29
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Create a Virtual Router for routing all transit traffic appropriately
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/virtual-routers.html
Figure 44. Palo Alto config – virtual router
Create Security Policies to Inspect all Transit Traffic
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/policy/security-policy.html
Figure 45. Palo Alto FW - security policies
30
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
Appendix
Sample AOS-CX Spine Configuration
8325-1# sh run
Current configuration:
!
!Version ArubaOS-CX GL.10.04.0020
!export-password: default
hostname 8325-1
user admin group administrators password ciphertext AQBap!snip
!
!
!
ssh server vrf mgmt
!
!
!
!
!
router ospf 1
router-id 192.168.1.11
area 0.0.0.0
vlan 1
interface mgmt
no shutdown
ip static 10.5.6.5/24
default-gateway 10.5.6.1
system interface-group 1 speed 10g
!interface group 1 contains ports 1/1/1-1/1/12
system interface-group 2 speed 10g
!interface group 2 contains ports 1/1/13-1/1/24
system interface-group 3 speed 10g
!interface group 3 contains ports 1/1/25-1/1/36
system interface-group 4 speed 10g
!interface group 4 contains ports 1/1/37-1/1/48
interface 1/1/3
no shutdown
mtu 9198
description 6300-4
ip mtu 9198
ip address 192.168.2.5/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
interface 1/1/49
no shutdown
mtu 9198
description 8325-5
ip mtu 9198
ip address 192.168.2.7/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
interface 1/1/50
no shutdown
mtu 9198
description 8325-3A
ip mtu 9198
ip address 192.168.2.1/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
31
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
interface 1/1/51
no shutdown
mtu 9198
description 8325-3B
ip mtu 9198
ip address 192.168.2.3/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
interface loopback 0
ip address 192.168.1.11/32
ip ospf 1 area 0.0.0.0
router bgp 65001
bgp router-id 192.168.1.11
neighbor 192.168.1.4 remote-as 65001
neighbor 192.168.1.4 update-source loopback 0
neighbor 192.168.1.5 remote-as 65001
neighbor 192.168.1.5 update-source loopback 0
neighbor 192.168.1.31 remote-as 65001
neighbor 192.168.1.31 update-source loopback 0
neighbor 192.168.1.32 remote-as 65001
neighbor 192.168.1.32 update-source loopback 0
address-family l2vpn evpn
neighbor 192.168.1.4 activate
neighbor 192.168.1.4 route-reflector-client
neighbor 192.168.1.4 send-community extended
neighbor 192.168.1.5 activate
neighbor 192.168.1.5 route-reflector-client
neighbor 192.168.1.5 send-community extended
neighbor 192.168.1.31 activate
neighbor 192.168.1.31 route-reflector-client
neighbor 192.168.1.31 send-community extended
neighbor 192.168.1.32 activate
neighbor 192.168.1.32 route-reflector-client
neighbor 192.168.1.32 send-community extended
exit-address-family
!
https-server rest access-mode read-write
https-server vrf mgmt
Sample AOS-CX 8325 Leaf Configuration
8325-3A# sh run
Current configuration:
!
!Version ArubaOS-CX GL.10.04.0030
!export-password: default
hostname 8325-3A
user admin group administrators password ciphertext AQBap!snip
!
!
!
ssh server vrf mgmt
!
!
!
!
!
32
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
router ospf 1
router-id 192.168.1.31
area 0.0.0.0
vlan 1,101-103,4000
evpn
vlan 101
rd auto
route-target export auto
route-target import auto
vlan 102
rd auto
route-target export auto
route-target import auto
vlan 103
rd auto
route-target export auto
route-target import auto
interface mgmt
no shutdown
ip static 10.5.6.11/24
default-gateway 10.5.6.1
system interface-group 1 speed 10g
!interface group 1 contains ports 1/1/1-1/1/12
system interface-group 4 speed 10g
!interface group 4 contains ports 1/1/37-1/1/48
interface lag 1
no shutdown
description VSX ISL LAG
no routing
vlan trunk native 1 tag
vlan trunk allowed all
lacp mode active
interface lag 10 multi-chassis
no shutdown
description Firewall
no routing
vlan trunk native 1
vlan trunk allowed 101-103
lacp mode active
interface 1/1/1
no shutdown
description Firewall
lag 10
interface 1/1/49
no shutdown
mtu 9198
description 8325-1
ip mtu 9198
ip address 192.168.2.0/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
interface 1/1/50
no shutdown
mtu 9198
description 8325-2
ip mtu 9198
ip address 192.168.2.8/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
interface 1/1/55
33
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
no shutdown
description VSX KA
ip address 10.1.2.0/31
interface 1/1/56
no shutdown
mtu 9198
description VSX ISL
lag 1
interface loopback 0
ip address 192.168.1.31/32
ip ospf 1 area 0.0.0.0
interface loopback 1
description Logical VTEP
ip address 192.168.1.33/32
ip ospf 1 area 0.0.0.0
interface vlan4000
description Transit VLAN
ip mtu 9198
ip address 192.168.3.0/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
interface vxlan 1
source ip 192.168.1.33
no shutdown
vni 101
vlan 101
vni 102
vlan 102
vni 103
vlan 103
vsx
system-mac 00:00:00:00:02:12
inter-switch-link lag 1
role primary
keepalive peer 10.1.2.1 source 10.1.2.0
no split-recovery
router bgp 65001
bgp router-id 192.168.1.31
neighbor 192.168.1.11 remote-as 65001
neighbor 192.168.1.11 update-source loopback 0
neighbor 192.168.1.12 remote-as 65001
neighbor 192.168.1.12 update-source loopback 0
address-family l2vpn evpn
neighbor 192.168.1.11 activate
neighbor 192.168.1.11 send-community extended
neighbor 192.168.1.12 activate
neighbor 192.168.1.12 send-community extended
exit-address-family
!
https-server rest access-mode read-write
https-server vrf mgmt
Sample AOS-CX 6300 Leaf Configuration (With Colorless Ports)
6300-4# sh run
Current configuration:
!
!Version ArubaOS-CX FL.10.04.0040
34
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
!export-password: default
hostname 6300-4
user admin group administrators password ciphertext AQBap!snip
crypto pki ta-profile cppm
ta-certificate
-----BEGIN CERTIFICATE----MIIDYz!snip
-----END CERTIFICATE----END_OF_CERTIFICATE
!
!
!
!
radius-server host cec-cp.cectme.net key ciphertext AQBap!snip clearpass-username dur
clearpass-password ciphertext AQBap!snip
!
ssh server vrf default
ssh server vrf mgmt
!
!
!
!
!
router ospf 1
router-id 192.168.1.4
area 0.0.0.0
vlan 1,101-103
evpn
vlan 101
rd auto
route-target export auto
route-target import auto
vlan 102
rd auto
route-target export auto
route-target import auto
vlan 103
rd auto
route-target export auto
route-target import auto
spanning-tree
interface mgmt
no shutdown
ip static 10.5.6.13/24
default-gateway 10.5.6.1
port-access role role101
vlan access 101
port-access role role102
vlan access 102
port-access role role103
vlan access 103
aaa authentication port-access mac-auth
enable
interface 1/1/1
no shutdown
no routing
vlan access 1
aaa authentication port-access client-limit 10
aaa authentication port-access mac-auth
enable
35
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
interface 1/1/2
no shutdown
no routing
vlan access 1
aaa authentication port-access
aaa authentication port-access
enable
interface 1/1/3
no shutdown
no routing
vlan access 1
interface 1/1/4
no shutdown
no routing
vlan access 1
aaa authentication port-access
aaa authentication port-access
enable
interface 1/1/27
no shutdown
mtu 9198
routing
description 8325-1
ip mtu 9198
ip address 192.168.2.4/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
interface 1/1/28
no shutdown
mtu 9198
routing
description 8325-2
ip mtu 9198
ip address 192.168.2.12/31
ip ospf 1 area 0.0.0.0
ip ospf network point-to-point
! snip
interface 2/1/1
no shutdown
no routing
vlan access 1
aaa authentication port-access
aaa authentication port-access
enable
interface 2/1/2
no shutdown
no routing
vlan access 1
interface 2/1/3
no shutdown
no routing
vlan access 50
! snip
interface 3/1/1
no shutdown
no routing
vlan access 1
interface 3/1/2
no shutdown
no routing
client-limit 10
mac-auth
client-limit 5
mac-auth
client-limit 5
mac-auth
36
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
vlan access 1
interface 3/1/3
no shutdown
no routing
vlan access 1
! snip
interface loopback 0
ip address 192.168.1.4/32
ip ospf 1 area 0.0.0.0
interface vxlan 1
source ip 192.168.1.4
no shutdown
vni 101
vlan 101
vni 102
vlan 102
vni 103
vlan 103
ip dns server-address 192.168.8.100
ip dns server-address 10.80.2.219 vrf mgmt
router bgp 65001
bgp router-id 192.168.1.4
neighbor 192.168.1.11 remote-as 65001
neighbor 192.168.1.11 update-source loopback 0
neighbor 192.168.1.12 remote-as 65001
neighbor 192.168.1.12 update-source loopback 0
address-family l2vpn evpn
neighbor 192.168.1.11 activate
neighbor 192.168.1.11 send-community extended
neighbor 192.168.1.12 activate
neighbor 192.168.1.12 send-community extended
exit-address-family
!
ip source-interface radius 192.168.2.4
ip source-interface dns 192.168.2.4
https-server vrf default
https-server vrf mgmt
vsf secondary-member 2
vsf member 1
type jl668a
link 1 1/1/25
link 2 1/1/26
vsf member 2
type jl660a
link 1 2/1/25
link 2 2/1/26
vsf member 3
type jl668a
link 1 3/1/25
link 2 3/1/26
37
Validated Reference Design Guide
Deploying a L2 VXLAN EVPN Network with Palo Alto Networks Firewalls
www.arubanetworks.com
3333 Scott Blvd. Santa Clara, CA 95054
1.844.472.2782 | T: 1.408.227.4500 | FAX: 1.408.227.4550 | info@arubanetworks.com
Download