## Summary This PR merges all fixes and improvements from the troubleshooting journey to make the Arista EVPN-VXLAN lab fully operational with both L2 and L3 VXLAN connectivity. ## What's Changed ### 🎯 Major Achievements - ✅ **L2 VXLAN fully operational** - host1 ↔ host3 connectivity verified - ✅ **L3 VXLAN fully operational** - host2 ↔ host4 connectivity verified (VRF gold) - ✅ **LACP bonding working** - dual-homed hosts with proper Port-Channel negotiation - ✅ **All BGP/EVPN sessions established** - complete underlay and overlay working ### 🔧 Infrastructure Fixes #### BGP & Routing - Added `ip routing` command to all spine and leaf switches - Fixed duplicate BGP network statements on leaf3, leaf4, leaf7, leaf8 - Activated EVPN neighbors on spine switches - Added loopback network advertisements to BGP #### MLAG Configuration - Configured MLAG peer-link in trunk mode (not access) for VLAN 4090/4091 - Added dual-active detection via management interface - Configured virtual router MAC for MLAG pairs #### Switch Port Configuration - Port-Channel1 configured in **trunk mode** on all leaf switches - Added `switchport trunk allowed vlan` for host VLANs (34, 40, 78) - Removed `no shutdown` from Port-Channel interfaces ### 🖥️ Host Networking - Complete Redesign #### Image Change - **Old:** `alpine:latest` (had bonding syntax issues) - **New:** `ghcr.io/hellt/network-multitool` (networking tools pre-installed) #### LACP Bonding Configuration Proper LACP setup following network-multitool best practices: ```yaml - ip link add bond0 type bond mode 802.3ad - ip link set dev bond0 type bond xmit_hash_policy layer3+4 - ip link set dev eth1 down - ip link set dev eth2 down - ip link set eth1 master bond0 - ip link set eth2 master bond0 - ip link set dev eth1 up - ip link set dev eth2 up - ip link set dev bond0 type bond lacp_rate fast - ip link set dev bond0 up ``` #### VLAN Configuration - **L2 VXLAN hosts (host1, host3):** VLAN 40 tagged on bond0 - **L3 VXLAN hosts (host2, host4):** VLANs 34 and 78 tagged on bond0 #### Routing Strategy - Kept management default route (172.16.0.254 via eth0) - Added **specific routes** for L3 VXLAN networks instead of default routes: - host2: `ip route add 10.78.78.0/24 via 10.34.34.1` - host4: `ip route add 10.34.34.0/24 via 10.78.78.1` ### 📁 Files Changed #### Switch Configurations (Updated) - `configs/spine1.cfg` - Added ip routing, EVPN activation - `configs/spine2.cfg` - Added ip routing, EVPN activation - `configs/leaf1.cfg` - Port-Channel trunk mode, VLAN config - `configs/leaf2.cfg` - Port-Channel trunk mode, VLAN config - `configs/leaf3.cfg` - Added ip routing, loopback ads, Port-Channel config - `configs/leaf4.cfg` - Added ip routing, loopback ads, Port-Channel config - `configs/leaf5.cfg` - Port-Channel trunk mode, VLAN config - `configs/leaf6.cfg` - Port-Channel trunk mode, VLAN config - `configs/leaf7.cfg` - Added ip routing, loopback ads, Port-Channel config - `configs/leaf8.cfg` - Added ip routing, loopback ads, Port-Channel config #### Topology (Updated) - `evpn-lab.clab.yml` - Updated all host configurations with network-multitool image and proper LACP/VLAN setup #### Documentation (New) - `hosts/README.md` - Host interface configuration guide - `hosts/host1_interfaces` - Interface file for host1 (not currently used, kept for reference) - `hosts/host2_interfaces` - Interface file for host2 (not currently used, kept for reference) - `hosts/host3_interfaces` - Interface file for host3 (not currently used, kept for reference) - `hosts/host4_interfaces` - Interface file for host4 (not currently used, kept for reference) ## Testing & Verification ### ✅ L2 VXLAN (VLAN 40) ``` host1 (10.40.40.101) → host3 (10.40.40.103) - Connectivity: VERIFIED ✓ - VXLAN tunnel: VTEP1 ↔ VTEP3 - MAC learning: Working via EVPN Type-2 ``` ### ✅ L3 VXLAN (VRF gold) ``` host2 (10.34.34.102) → host4 (10.78.78.104) - Connectivity: VERIFIED ✓ - Ping results: 0% packet loss, TTL=62 - Routing: Via EVPN Type-5 through fabric ``` ### ✅ Infrastructure Status - BGP Underlay: All sessions ESTAB - EVPN Overlay: All neighbors ESTAB - MLAG: All 4 pairs operational - Port-Channels: LACP negotiated on all hosts ## Related Issues Fixes #1 - Lab deployment and configuration fixes Fixes #2 - BGP EVPN neighbors stuck in Connect state Fixes #3 - Ready for deployment with EVPN activation Fixes #4 - Lab convergence in progress Fixes #5 - BGP EVPN neighbors stuck in Active state Fixes #11 - Host LACP bonding configuration Fixes #13 - L3 VXLAN default route issue ## Key Technical Learnings 1. **Arista EOS requires explicit `ip routing`** before BGP can function 2. **MLAG peer-link must be trunk mode** to allow VLAN 4090/4091 traversal 3. **VLAN tagging location matters** - hosts tag, switches use trunk mode 4. **network-multitool image** superior to Alpine for LACP bonding 5. **Specific routes better than default routes** when management network present 6. **LACP rate fast** ensures quick negotiation with Arista switches ## Deployment After merging, deploy with: ```bash cd ~/arista-evpn-vxlan-clab sudo containerlab destroy -t evpn-lab.clab.yml --cleanup sudo containerlab deploy -t evpn-lab.clab.yml ``` No manual post-deployment configuration needed - everything works from initial deployment! ## Breaking Changes ⚠️ **Host image changed** from `alpine:latest` to `ghcr.io/hellt/network-multitool` ⚠️ **Host configuration completely redesigned** - old exec commands replaced ## Reviewers @Damien - Please review and merge when ready --- **This PR represents the complete troubleshooting journey and brings the lab to production-ready status with full L2 and L3 VXLAN functionality.** 🚀 Reviewed-on: #14 Co-authored-by: Damien <damien@arnodo.fr> Co-committed-by: Damien <damien@arnodo.fr>
20 KiB
EVPN-VXLAN Fabric Troubleshooting Guide
This guide provides systematic troubleshooting steps for Arista EVPN-VXLAN fabrics with MLAG.
📋 Table of Contents
- Troubleshooting Methodology
- Layer 1: Physical Connectivity
- Layer 2: MLAG & Port-Channels
- Layer 3: Underlay (BGP IPv4)
- Layer 4: Overlay (BGP EVPN)
- Layer 5: VXLAN Data Plane
- End-to-End Traffic Flow
- Common Issues & Solutions
🔍 Troubleshooting Methodology
Always troubleshoot bottom-up:
Physical Links → MLAG → Underlay BGP → Overlay EVPN → VXLAN → Traffic Flow
For each layer:
- ✅ Verify expected state
- ❌ Identify issues
- 🔧 Apply fixes
- ♻️ Re-verify
Layer 1: Physical Connectivity
Check Interface Status
On all switches (spines + leafs):
# Quick overview
show interfaces status
# Detailed view of a specific interface
show interfaces Ethernet11
# Check for errors
show interfaces Ethernet11 | include error|drop|discard
Expected Output:
Ethernet11 is up, line protocol is up (connected)
Hardware is Ethernet, address is 001c.7300.000b
Internet address is 10.0.1.1/31
MTU 9214 bytes
Troubleshooting:
down/down→ Physical issue (cable, peer interface)up/down→ Layer 2 issue (switchport config, STP)- Check MTU: Should be 9214 on underlay P2P links
Layer 2: MLAG & Port-Channels
2.1 Verify MLAG Peering
On each MLAG leaf pair (e.g., leaf1/leaf2):
# MLAG global status
show mlag
# MLAG detailed info
show mlag detail
# MLAG interfaces
show mlag interfaces
Expected Output (show mlag):
MLAG Configuration:
domain-id : leafs
local-interface : Vlan4090
peer-address : 10.0.199.255
peer-link : Port-Channel999
MLAG Status:
state : Active
negotiation status : Connected
peer-link status : Up
local-int status : Up
system-id : 0c:1d:c0:1d:62:10
dual-primary detection : Configured
Troubleshooting:
| Issue | Cause | Fix |
|---|---|---|
state: Inactive |
Peer-link down | Check Po999 and Ethernet10 |
negotiation: Connecting |
VLAN4090 issue | Verify IP addressing, peer-address config |
peer-link: Down |
Port-Channel999 down | Check show port-channel 999 |
dual-primary: Detected |
Peer-link failed + heartbeat failed | Check mgmt network connectivity |
2.2 Verify MLAG Peer-Link (Port-Channel999)
# Port-Channel status
show port-channel 999
# Detailed view
show port-channel 999 detailed
# LACP status (if using LACP mode)
show lacp interface Ethernet10
Expected Output:
Port Channel Port-Channel999 (Fallback State: Unconfigured):
Active Ports: Ethernet10
Troubleshooting:
- No active ports → Check
show interfaces Ethernet10 - Wrong mode → Should be
switchport mode trunk - Missing VLANs → Check
switchport trunk group mlag-peer
2.3 Verify Host-Facing Port-Channels (MLAG)
On each leaf connected to hosts:
# Port-Channel status
show port-channel 1
# Port-Channel detailed view
show port-channel 1 detailed
# MLAG interfaces status
show mlag interfaces
# LACP neighbor (if LACP established)
show lacp neighbor
Expected Output (show port-channel 1):
Port Channel Port-Channel1 (Fallback State: individual):
Active Ports: Ethernet1
Expected Output (show mlag interfaces):
local/remote
mlag desc state local remote status
------ -------------- ------------- ----------- ------------ ---------------
1 host1 active-full Po1 Po1 up/up
Troubleshooting:
| Issue | Cause | Fix |
|---|---|---|
inactive |
MLAG peering down | Fix MLAG first (section 2.1) |
active-partial |
Remote Po1 down on peer leaf | Check peer leaf's Po1 |
configured-inactive |
Missing mlag 1 config |
Add mlag 1 to Po1 |
| No LACP neighbor | Host bonding issue | Check host: ip link show bond0 |
| Ports in fallback mode | LACP not negotiating | Normal - will transition after LACP establishes |
2.4 Verify iBGP Peering Link (VLAN 4091)
# VLAN4091 interface status
show ip interface Vlan4091
# Ping peer
ping vrf default 10.0.3.1 source 10.0.3.0
Expected:
- Interface:
up/up - Ping: Successful
Layer 3: Underlay (BGP IPv4)
3.1 Verify BGP Neighbors (Underlay)
On Spines:
# BGP summary
show ip bgp summary
# Specific neighbor
show ip bgp neighbor 10.0.1.1
Expected Output:
Neighbor V AS MsgRcvd MsgSent InQ OutQ Up/Down State PfxRcd PfxAcc
10.0.1.1 4 65001 245 243 0 0 02:01:23 Estab 2 2
10.0.1.3 4 65001 245 243 0 0 02:01:20 Estab 2 2
...
On Leafs:
# BGP summary
show ip bgp summary
# Check underlay peer-group
show bgp peer-group underlay
Expected neighbors:
- eBGP to both spines (state:
Estab) - iBGP to MLAG peer (state:
Estab)
3.2 Verify Loopback Reachability
On any leaf, ping all other loopbacks:
# Ping spine loopbacks
ping 10.0.250.1 source 10.0.250.11
ping 10.0.250.2 source 10.0.250.11
# Ping other leaf loopbacks
ping 10.0.250.13 source 10.0.250.11
ping 10.0.250.15 source 10.0.250.11
ping 10.0.250.17 source 10.0.250.11
# Ping VTEP loopbacks (important!)
ping 10.0.255.12 source 10.0.255.11
ping 10.0.255.13 source 10.0.255.11
ping 10.0.255.14 source 10.0.255.11
Expected:
- All pings successful
- RTT < 10ms (virtual environment)
Troubleshooting:
# Check routing table
show ip route
# Verify loopback advertisements
show ip bgp 10.0.250.13
# Check BGP is advertising loopbacks
show ip bgp neighbors 10.0.1.0 advertised-routes
Common issues:
- Missing
network 10.0.250.X/32in BGP config - Missing
network 10.0.255.X/32(VTEP loopback!) - BGP neighbor not activated in IPv4 address-family
3.3 Verify ECMP (Equal-Cost Multi-Path)
# Check routes to a remote loopback
show ip route 10.0.250.13
# Should show multiple next-hops
show ip route 10.0.250.13 detail
Expected Output:
B E 10.0.250.13/32 [20/0] via 10.0.1.0, Ethernet11
via 10.0.2.0, Ethernet12
Two paths via both spines = ✅ ECMP working
Layer 4: Overlay (BGP EVPN)
4.1 Verify EVPN Neighbors
On Spines:
# EVPN summary
show bgp evpn summary
# Check specific neighbor
show bgp evpn neighbor 10.0.250.11
Expected:
- All 8 leafs in
Estabstate - PfxRcd > 0 (receiving EVPN routes)
On Leafs:
# EVPN summary
show bgp evpn summary
Expected:
- Both spines in
Estabstate - PfxRcd > 0
4.2 Verify EVPN Routes
Check EVPN route types:
# Type-2: MAC/IP routes (L2 VXLAN)
show bgp evpn route-type mac-ip
# Type-3: IMET routes (VXLAN flood list)
show bgp evpn route-type imet
# Type-5: IP Prefix routes (L3 VXLAN)
show bgp evpn route-type ip-prefix ipv4
Expected for L2 VXLAN (VLAN 40):
show bgp evpn route-type mac-ip
Output should show:
- Local MACs (learned on Port-Channel1)
- Remote MACs (from other VTEPs via EVPN)
Expected for L3 VXLAN (VRF gold):
show bgp evpn route-type ip-prefix ipv4
Output should show:
- Local subnets (e.g., 10.34.34.0/24 on VTEP2)
- Remote subnets (e.g., 10.78.78.0/24 from VTEP4)
4.3 Troubleshoot EVPN Issues
No EVPN neighbors:
# Check if EVPN is activated
show running-config | section evpn
# Should see:
# address-family evpn
# neighbor evpn activate
No EVPN routes received:
# Check route-target configuration
show running-config | section vlan 40
# Should have:
# vlan 40
# rd 65001:110040
# route-target both 40:110040
# redistribute learned
EVPN routes received but not installed:
# Check VXLAN interface
show interfaces Vxlan1
# Verify VNI mapping
show vxlan vni
Layer 5: VXLAN Data Plane
5.1 Verify VXLAN Interface
# VXLAN interface status
show interfaces Vxlan1
# VNI to VLAN mappings
show vxlan vni
# VTEP flood lists
show vxlan flood vtep
# Address table (MAC learning)
show vxlan address-table
Expected Output (show interfaces Vxlan1):
Vxlan1 is up, line protocol is up (connected)
Hardware is Vxlan
Source interface is Loopback1 and is active with 10.0.255.11
Replication/Flood Mode is headend with Flood List Source: EVPN
Remote MAC learning via EVPN
VNI mapping to VLANs
Static VLAN to VNI mapping is
[40, 110040]
Static VRF to VNI mapping is
[gold, 100001]
Expected Output (show vxlan vtep):
Remote VTEPS for Vxlan1:
VTEP Tunnel Type(s)
-------------- --------------
10.0.255.12 flood, unicast
10.0.255.13 flood, unicast
10.0.255.14 flood, unicast
Total number of remote VTEPS: 3
5.2 Verify MAC Learning
Check local MAC learning:
# MACs learned on Port-Channel1
show mac address-table interface Port-Channel1
# MACs learned via VXLAN
show mac address-table interface Vxlan1
# Combined view for a VLAN
show mac address-table vlan 40
Expected Output:
Mac Address Table
------------------------------------------------------------------
Vlan Mac Address Type Ports Moves Last Move
---- ----------- ---- ----- ----- ---------
40 00c1.ab00.0011 DYNAMIC Po1 1 0:05:23 ago
40 00c1.ab00.0033 DYNAMIC Vx1 1 0:05:20 ago
- Local host MAC → learned on Po1
- Remote host MAC → learned on Vx1 (VXLAN)
5.3 Verify VXLAN Address Table
# VXLAN-specific MAC table
show vxlan address-table
# Detailed view
show vxlan address-table vlan 40
Expected Output:
Vxlan Mac Address Table
----------------------------------------------------------------------
VLAN Mac Address Type Prt VTEP Moves Last Move
---- ----------- ---- --- ---- ----- ---------
40 00c1.ab00.0033 EVPN Vx1 10.0.255.13 1 0:05:20 ago
Shows which remote VTEP the MAC is behind!
End-to-End Traffic Flow
Scenario: host1 (VTEP1) pings host3 (VTEP3) - L2 VXLAN
Both hosts in VLAN 40 (10.40.40.0/24)
Step 1: Host Sends Packet
On host1:
docker exec -it clab-arista-evpn-fabric-host1 sh
# Check bond interface
ip link show bond0
# Check VLAN interface
ip link show bond0.40
# Send ping
ping 10.40.40.103
Expected:
- bond0:
state UP - bond0.40:
state UP
Step 2: Packet Arrives at leaf1 (VTEP1)
On leaf1:
# Check Port-Channel received the packet
show interfaces Port-Channel1 | include packets
# Check MAC learning
show mac address-table dynamic vlan 40
# Should see host1's MAC on Po1
Traffic flow:
host1:bond0.40 → [802.1Q VLAN 40] → leaf1:Eth1 → Po1
Step 3: Leaf1 Lookup & VXLAN Encapsulation
Leaf1 checks MAC table:
show mac address-table address 00c1.ab00.0033
# Output:
# VLAN 40, MAC 00c1.ab00.0033 → Vxlan1
Leaf1 checks VXLAN address-table:
show vxlan address-table address 00c1.ab00.0033
# Output:
# VLAN 40, MAC 00c1.ab00.0033 → VTEP 10.0.255.13
Encapsulation:
Original: [Eth: host1→host3][IP: 10.40.40.101→103][ICMP]
VXLAN: [Outer IP: 10.0.255.11→10.0.255.13]
[Outer UDP: src=random, dst=4789]
[VXLAN Header: VNI=110040]
[Inner Eth: host1→host3][IP: 10.40.40.101→103][ICMP]
Step 4: Underlay Routing
Leaf1 routes outer packet:
# Check route to remote VTEP
show ip route 10.0.255.13
# Output:
# via 10.0.1.0, Ethernet11 (spine1)
# via 10.0.2.0, Ethernet12 (spine2)
ECMP: Packet can go via spine1 OR spine2!
Spine forwards based on outer IP:
# On spine1
show ip route 10.0.255.13
# Output:
# via 10.0.1.5, Ethernet3 (leaf5)
Step 5: Packet Arrives at leaf5 (VTEP3)
On leaf5:
# Check VXLAN received the packet
show interfaces Vxlan1 | include packets
# VXLAN decapsulation happens automatically
Decapsulation:
VXLAN packet → Strip outer IP/UDP/VXLAN headers
→ Original frame: [Eth: host1→host3][IP: 10.40.40.101→103][ICMP]
Leaf5 checks MAC table:
show mac address-table address 00c1.ab00.0033
# Output:
# VLAN 40, MAC 00c1.ab00.0033 → Port-Channel1
Step 6: Packet Delivered to host3
leaf5:Vxlan1 → VLAN 40 → Po1 → Eth1 → host3:bond0.40
On host3:
docker exec -it clab-arista-evpn-fabric-host3 sh
# Check received ping
ping 10.40.40.101 # Reply should work!
Complete Flow Diagram
┌─────────────────────────────────────────────────────────────────┐
│ L2 VXLAN Traffic Flow │
└─────────────────────────────────────────────────────────────────┘
host1 (10.40.40.101) host3 (10.40.40.103)
│ ▲
│ 1. Send ping to 10.40.40.103 │
│ [VLAN 40 tag] │ 6. Receive reply
│ │ [VLAN 40 tag]
▼ │
leaf1:Po1 leaf5:Po1
│ ▲
│ 2. MAC lookup: │ 5. MAC lookup:
│ 00c1.ab00.0033 → Vx1 → 10.0.255.13 │ 00c1.ab00.0011 → Vx1
│ │
▼ │
leaf1:Vxlan1 leaf5:Vxlan1
│ ▲
│ 3. VXLAN encap: │ 4. VXLAN decap:
│ Outer: 10.0.255.11 → 10.0.255.13 │ Strip outer headers
│ VNI: 110040 │
│ Inner: original frame │
│ │
▼ │
leaf1:Eth11 ──────► spine1 ──────► leaf5:Eth11 ──────────┘
(underlay BGP routing)
Common Issues & Solutions
Issue 1: Ping Fails Between Hosts in Same VLAN
Symptoms:
- Host1 cannot ping Host3 (both VLAN 40)
- MACs not learning
Troubleshooting Steps:
# 1. Check Port-Channel
show port-channel 1
# → Should show active ports
# 2. Check VLAN config
show vlan 40
# → Should show Po1 as member
# 3. Check MAC learning
show mac address-table vlan 40
# → Should see local host MAC on Po1
# 4. Check VXLAN interface
show interfaces Vxlan1
# → Should be up/up
# 5. Check remote VTEPs
show vxlan vtep
# → Should list remote VTEPs
# 6. Check EVPN routes
show bgp evpn route-type mac-ip
# → Should see remote MACs
# 7. Check VXLAN address-table
show vxlan address-table vlan 40
# → Should see remote MACs via Vx1
Common Causes:
| Issue | Fix |
|---|---|
| Port-Channel down | Check LACP, add fallback config |
| MLAG not synced | Fix MLAG peering (VLAN 4090) |
| VNI not configured | Add vxlan vlan 40 vni 110040 |
| EVPN not advertising | Add redistribute learned under vlan 40 in BGP |
| Wrong route-target | Verify RT matches on all VTEPs |
Issue 2: Ping Fails Between VRFs (L3 VXLAN)
Symptoms:
- host2 (10.34.34.102) cannot ping host4 (10.78.78.104)
- Both in VRF gold
Troubleshooting Steps:
# 1. Check VRF routing
show ip route vrf gold
# 2. Check BGP EVPN Type-5 routes
show bgp evpn route-type ip-prefix ipv4
# 3. Check VRF VNI mapping
show vxlan vni
# → Should show VRF gold → VNI 100001
# 4. Check SVI is in VRF
show ip interface Vlan34
# → Should show "VRF: gold"
# 5. Check virtual gateway
show ip virtual-router
Common Causes:
| Issue | Fix |
|---|---|
| SVI not in VRF | Add vrf gold under interface Vlan34 |
| VRF not mapped to VNI | Add vxlan vrf gold vni 100001 |
| Route-target mismatch | Verify route-target both evpn 1:100001 |
| BGP not redistributing | Add redistribute connected under vrf gold |
Issue 3: MLAG Port-Channel Inactive
Symptoms:
show mlag interfaces
# mlag 1: configured-inactive
Troubleshooting:
# 1. Check MLAG global state
show mlag
# → Should be "Active"
# 2. Check Port-Channel on BOTH leafs
show port-channel 1
# 3. Check MLAG config on BOTH leafs
show running-config interfaces Port-Channel1
# → Should have "mlag 1"
# 4. Check peer leaf
# SSH to peer and run: show port-channel 1
Fix:
- Ensure BOTH leafs have
mlag 1configured - Ensure MLAG peering is up first
- Check peer leaf's Port-Channel status
Issue 4: LACP Not Establishing
Symptoms:
show port-channel 1
# No Active Ports
# Configured, but inactive ports:
# Ethernet1: waiting for LACP response
Fix:
# Add LACP fallback
configure
interface Port-Channel1
port-channel lacp fallback timeout 5
port-channel lacp fallback individual
Verify:
show port-channel 1
# → Should show Ethernet1 in "Active Ports" (fallback mode)
# Wait 5 seconds, check LACP
show lacp neighbor
# → Should show LACP neighbor if host is configured correctly
Issue 5: BGP EVPN Neighbors Not Establishing
Symptoms:
show bgp evpn summary
# Neighbors stuck in "Connect" or "Active" state
Troubleshooting:
# 1. Check underlay reachability
ping 10.0.250.1 source Loopback0
# 2. Check EVPN neighbor config
show running-config | section evpn
# 3. Check if EVPN is activated
show bgp evpn neighbors 10.0.250.1
# → Look for "Address Family: evpn"
# 4. Check for BGP errors
show bgp evpn summary
show log | include BGP|EVPN
Common Fixes:
- Add
neighbor evpn activateinaddress-family evpn - Check
update-source Loopback0is configured - Verify
ebgp-multihop 3for leaf-spine peering - Check
send-community extendedis configured
Quick Reference Commands
Health Check Script
Run these commands on each leaf for quick validation:
#!/bin/bash
# Quick EVPN-VXLAN Health Check
echo "=== Physical Interfaces ==="
show interfaces status | include Ethernet[1-9]
echo "=== MLAG Status ==="
show mlag | include state|negotiation|peer-link
echo "=== BGP Underlay ==="
show ip bgp summary | include Estab|Neighbor
echo "=== BGP EVPN Overlay ==="
show bgp evpn summary | include Estab|Neighbor
echo "=== VXLAN ==="
show interfaces Vxlan1 | include "is up|Source interface"
show vxlan vtep
echo "=== Port-Channels ==="
show port-channel 1
echo "=== MAC Addresses ==="
show mac address-table count
Traffic Flow Verification
Test L2 VXLAN (VLAN 40):
# On host1
ping 10.40.40.103 -c 3
# On leaf1 (VTEP1)
show mac address-table address 00c1.ab00.0033
show vxlan address-table address 00c1.ab00.0033
# On leaf5 (VTEP3)
show mac address-table address 00c1.ab00.0011
show vxlan address-table address 00c1.ab00.0011
Test L3 VXLAN (VRF gold):
# On host2
ping 10.78.78.104 -c 3
# On leaf3 (VTEP2)
show ip route vrf gold 10.78.78.0/24
show bgp evpn route-type ip-prefix ipv4 10.78.78.0/24
# On leaf7 (VTEP4)
show ip route vrf gold 10.34.34.0/24
Additional Resources
Happy Troubleshooting! 🚀