Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

配置园区交换矩阵核心分布

瞻博网络 园区交换矩阵 提供单一的、基于标准的 EVPN-VXLAN 解决方案,您可以将其部署在任何园区。园区交换矩阵核心分布解决方案扩展了 EVPN 交换矩阵,以连接跨多个建筑物的 VLAN。此网络架构包括核心层和分布层,通过标准 LACP 与接入交换层集成。

有关园区交换矩阵核心分布架构的更多背景信息,请参阅以下文档:

要配置园区交换矩阵核心分布,请执行以下操作:

  1. 单击>园区交换矩阵的组织。
  2. 如果要为站点创建园区交换矩阵,请从页眉旁边的下拉列表中选择该站点。如果要为整个组织创建园区交换矩阵,请从下拉列表中选择整个组织

    您可以使用组织级园区交换矩阵拓扑来构建包含多个建筑物的园区范围架构。否则,可以使用一组核心交换机、分布交换机和接入交换机构建特定于站点的园区交换矩阵。

  3. 单击相关的选项。点击:
    • “配置园区交换矩阵 ”按钮(如果站点没有与之关联的园区交换矩阵配置,则显示)。

    • “创建园区交换矩阵 ”按钮(如果站点已至少有一个与之关联的园区交换矩阵配置,则显示)。

    将显示 拓扑 选项卡。
  4. 选择拓扑类型园区交换矩阵核心分布
  5. 拓扑 选项卡上配置拓扑名称和其他设置,如下所述:
    注意:

    我们建议您使用此屏幕上的默认设置,除非它们与连接到园区交换矩阵的任何网络冲突。每层之间的点对点链路利用 /31 寻址来保留地址。

    1. “配置”部分中,输入以下内容:
      • 拓扑名称 - 输入拓扑的名称。

      • 拓扑子类型 - 选择以下选项之一:

        • CRB — 在此模型中,仅在核心设备上配置第 3 层 (L3) VXLAN 网关功能。这是通过在核心设备上定义集成路由和桥接 (IRB) 接口以提供 L3 路由服务来实现的。此选项对参与 L3 子网的所有设备使用虚拟网关寻址。启用此选项将为每个 L3 子网配置具有共享 IP 地址的核心交换机。此地址在两个核心交换机之间共享,并用作 VLAN 中所有设备的默认网关地址。此外,Mist 还会为每个核心设备分配一个唯一的 IP 地址。

          • 虚拟网关 v4 MAC 地址 - 仅当选择了 CRB 时才可用。如果启用,Mist 将为每个 L3 IRB 接口(每个网络)提供唯一的 MAC 地址。

        • ERB — 在此模型中,L2 和 L3 VXLAN 网关功能在分配设备上配置。在这种情况下,将在分配设备上定义 IRB 接口以提供 L3 路由服务。此选项对参与 L3 子网的所有设备使用任播寻址。在这种情况下,将为每个 L3 子网配置相同的 IP 地址。

    2. (如果选择不使用默认设置)在“拓扑设置”部分中,输入以下内容:
      • BGP 本地 AS — 表示 Mist 自动分配给每台设备的专用 BGP AS 编号的起点。您可以使用适合您的部署的任何专用 BGP AS 编号范围。Mist 调配路由策略,以便在交换矩阵的底层中仅交换环路 IP 地址。

      • 底层 — 为底层选择互联网协议。选项为 IPv4 和 IPv6。只有 ERB 拓扑支持 IPv6。仅当选择 ERB 作为拓扑子类型时,才能选择“IPv6”。

      • 子网— — Mist 用于设备之间点对点链路的 IP 地址范围。您可以使用适合您的部署的范围。Mist 将此子网分成每个链路的 /31 子网寻址。可以修改此数字以适应特定的部署规模。例如,/24 网络将提供多达 128 个点对点 /31 子网。

      • IPv6 环路接口 — 指定 IPv6 环路接口子网,用于在交换矩阵中的每台设备上自动配置 IPv6 环路接口。

      • IPv4 自动路由器 ID 子网/环路接口 — Mist 使用此子网自动为交换矩阵中的每个设备(包括接入设备,无论其是否配置 EVPN)分配路由器 ID。路由器 ID 是用于设备之间叠加对等互连的环路接口 (lo0.0)。对于新拓扑,此字段会自动填充默认子网值 (172.16.254.0/23),您可以修改该值。编辑现有拓扑时,此字段不会填充任何默认值。部署路由协议(如 BGP)时,路由器 ID 用作标识符。

        您可以通过在交换机配置页面(交换机>交换机名称)的路由磁贴上的路由器 ID 字段中手动配置环路接口来覆盖自动分配的路由器 ID。但是,如果之后修改园区交换矩阵配置,Mist 将再次自动分配路由器 ID,取代手动配置的环路接口。

      • 每个 VRF 子网的环回 — Mist 使用此子网为每个用于 DHCP 中继等服务的虚拟路由和转发 (VRF) 实例自动配置环路接口 (lo0.x)。对于新拓扑,此字段会自动填充默认子网值 (172.16.192.0/24),您可以修改该值。此字段支持 /19 或更小的子网(例如 /24)。编辑现有拓扑时,此字段不会填充任何默认值。

  6. 单击继续转到节点选项卡,您可以在其中选择构成园区交换矩阵部署一部分的设备。
  7. 将交换机添加到核心层、分布层和接入层部分。

    要添加交换机:

    1. 单击要向其添加交换机的部分中的选择交换机
    2. 选择要添加到园区交换矩阵的交换机。
    3. 单击“选择”。

    我们建议您在创建园区交换矩阵之前验证交换机清单中是否存在每个设备。

    默认情况下,Mist 将核心交换机配置为运行服务块功能的边界节点。在园区交换矩阵拓扑中,边界节点与防火墙、路由器或关键设备等外部设备互连。外部服务或设备(例如 DHCP 和 RADIUS 服务器)通过边界节点连接到园区交换矩阵。如果要从核心交换机卸载此任务并将专用交换机用作边界节点,请清除页面左上角的“ 使用核心作为边界” 复选框。然后,您最多可以将两台交换机添加为专用边界节点。

    此外,Mist 还提供了用于提高可扩展性的 Pod。您的访问和分发设备将分组到容器中。豆荚可以代表建筑物。例如,您可以为站点中的每个建筑物创建一个容器,并在该容器中的接入设备和分发设备之间创建连接。您不必将同一组接入设备连接到跨多个建筑物的配电设备。您可以通过单击 +添加节点来创建多个 Pod。

  8. 选择交换机后,单击继续以转到网络设置选项卡,您可以在其中配置网络。
  9. 配置网络设置,如下所述:
    1. 在“网络”磁贴上,将网络或 VLAN 添加到配置中。您可以创建新网络,也可以从组织>交换机模板页面上定义的交换机模板导入网络。

      要添加新 VLAN,请单击 创建新网络 并配置 VLAN。这些设置包括名称、VLAN ID 和子网。

      要从模板导入 VLAN,请执行以下操作:

      1. 单击 添加现有网络

      2. 模板 下拉列表中选择一个交换机模板,以查看该模板中可用的 VLAN。

      3. 从显示的列表中选择所需的 VLAN,然后单击 ✓ 标记。

      VLAN 映射到虚拟网络标识符 (VNI)。您可以选择将 VLAN 映射到 VRF 实例,以在逻辑上分离流量。

    2. 查看“其他 IP 配置”磁贴上的设置,当您在“网络”部分中指定网络后,该磁贴会自动填充信息。

      Mist 为每个 VLAN 提供 IRB 的自动 IP 寻址。然后,端口配置文件将 VLAN 与指定的端口相关联。

    3. (可选)在 VRF 磁贴上配置 VRF 实例。默认情况下,Mist 将所有 VLAN 放置在默认 VRF 中。VRF 选项允许您根据流量隔离要求将常见 VLAN 分组到同一 VRF 或单独的 VRF 中。每个 VRF 中的所有 VLAN 彼此之间以及与其他外部网络资源之间都有完全的连接。一个常见的用例是将访客无线流量与大多数企业域(Internet 连接除外)隔离开来。默认情况下,园区交换矩阵在 VRF 之间提供完全隔离,强制 VRF 间通信遍历防火墙。如果需要 VRF 间通信,则需要包含到 VRF 的额外路由。额外的路由可以是指示园区交换矩阵使用外部路由器的默认路由。它也可以是用于进一步安全检查或路由功能的防火墙。

      要创建 VRF,请执行以下操作:

      1. 单击 添加 VRF 实例 并指定设置。这些设置包括 VRF 的名称以及与 VRF 关联的网络。

      2. 要添加额外路由,请单击新建 VRF 实例页面上的添加额外路由链接并指定路由。

    4. 在分发/接入端口配置磁贴上,完成折叠核心和接入交换机之间的 ESI-LAG 端口配置。这些设置包括名称和其他端口配置元素。默认情况下,此配置包括在同一页面上的“网络”磁贴上添加的网络。如果要删除或修改设置,请单击显示高级并配置设置。使用屏幕上的提示配置端口配置文件设置。
    5. 在“DHCP 中继”磁贴上,配置 DHCP 中继设置。您有以下选项:
      • 已启用 — 在园区交换矩阵中所有启用 IRB 的设备上配置 DHCP 中继。此选项允许您在所选网络上启用 DHCP 中继。只要网络列在同一页面的“网络”选项卡上,网络就会填充在 DHCP 中继磁贴内。

      • 已禁用 — 禁用园区交换矩阵中设备上的 DHCP 中继。选择此选项时,将在所有启用 IRB 的设备上禁用 DHCP 中继。您应谨慎选择此选项,因为这将在交换机详细信息页面上删除本地定义的 DHCP 中继。

      • 无 — 当园区交换矩阵拓扑在 DHCP 中继配置方面具有混合设备时,将自动选择此选项;也就是说,有些设备启用了 DHCP 中继,有些设备禁用了它,有些设备没有定义它。对于在各个交换机上本地定义了 DHCP 中继的所有园区交换矩阵拓扑,此选项都是可见的。

      如果要删除所有本地定义的 DHCP 中继网络 ,请选择已启用 ,然后选择 删除所有现有设备级 DHCP 网络。您可以通过集中园区交换矩阵工作流程中的任何配置更改来简化 DHCP 中继部署。

      如果在园区交换矩阵配置中启用 DHCP 中继,则会在交换矩阵中所有 IRB 定义的设备上启用该中继,并在其余设备上禁用该中继。例如,在园区交换矩阵核心分布 (CRB) 拓扑中,DHCP 中继在核心设备上启用,其余设备禁用。同样,在园区交换矩阵核心分布 (ERB) 中,DHCP 在分发设备上启用,其余设备禁用。

  10. 单击继续转到端口选项卡,您可以在其中配置端口并在核心、分布和接入层交换机之间创建连接。
  11. 在核心层中配置交换机端口,如下所述:
    1. 在“核心”部分中选择一个交换机以打开交换机端口面板。
    2. 从核心交换机的端口面板中,选择要配置的端口。
    3. 指定端口类型(例如,gexe)。
    4. 选择链路应终止的分布式交换机。您需要配置需要成为园区交换矩阵一部分的所有端口。

    要在分布层中配置交换机端口:

    1. 在分布部分中选择一个交换机以打开交换机端口面板。
    2. 从交换机的端口面板中,选择要配置的端口。
    3. 指定端口类型(例如,gexe)。
    4. 选择:
      • 链接到核心 ,将端口连接到核心交换机。

      • 链接到接入 ,将端口连接到接入交换机。

    5. 选择链路应终止的核心或接入交换机(基于上一步中的选择)。您需要配置需要成为园区交换矩阵一部分的所有端口。
    要在接入层中配置交换机端口:
    1. 在“访问”部分中选择一个交换机以打开交换机端口面板。
    2. 从交换机的端口面板中,选择要配置的端口。
    3. 指定端口类型(例如,gexe)。
      如果接入层使用虚拟机箱 (VC),您可以在主和备份选项卡上配置端口。

    对于接入交换机,请仅选择应用于与分布式交换机互连的接口。系统通过 AE 索引选项将所有接口捆绑到单个以太网捆绑包中。您可以为接入设备指定 AE 索引值。

    如果要查看特定端口的配置和状态信息,请将鼠标悬停在端口面板 UI 中代表该端口的编号框上。

  12. 单击继续以转到确认选项卡。
  13. 单击每个交换机图标以查看和验证配置。
  14. 验证配置后,单击应用更改>确认
    此步骤会将园区交换矩阵配置保存到 Mist 云,并将其应用于交换机。如果交换机处于脱机状态,则下次交换机联机时将对其应用配置。交换机最多可能需要 10 分钟才能完成配置。
  15. 单击关闭园区交换矩阵配置

    Mist 构建园区交换矩阵后,或者在构建交换矩阵时,您可以下载连接表。连接表表示园区交换矩阵的物理布局。您可以使用此表验证参与物理园区交换矩阵构建的设备的所有交换机互连。单击 “连接表 ”进行下载(.csv格式)。

  16. 验证园区交换矩阵配置。要进行验证,请按照园区交换矩阵核心分布 CRB (JVD)园区交换矩阵核心分布 ERB (JVD)验证部分中列出的步骤操作。

For a demo, watch the following video:

Hello and welcome to this new edition of Wired Assurance. My name is Rohan Chadha and I am a part of the MIST product management team. Today we'll be talking about deployment of campus fabric core distribution topology with Wired Assurance.

This particular EVPN topology is one of the three main topologies recommended by Juniper for EVPN VxLAN in campus. Today we'll be talking about how to deploy this using Wired Assurance and I assure you none of this deployment will include any CLI configuration and we'll use the UI throughout with just a click of a few buttons. So let's just jump right into it and I'll walk you through the four steps to deploy this topology.

Before we begin, let's talk about the building blocks of campus fabric core distribution. What are the devices that we're going to use today? And what is essentially campus fabric core distribution? So today we'll be using two core devices that are QFX 10,000 use. We'll be using two distribution devices that are QFX 5120Y and we'll be using one access switch for the purposes of this video.

And this particular device is an EX440024T, a copper switch. In this case, it's a virtual chassis. You can use a standalone or you can use a virtual chassis for an access device in campus fabric core distribution.

Before we jump into building the topology in four steps, let's talk about if campus fabric core distribution is right for you or your network environment. I would highly recommend you watch the other video by Rick Bartosik in which he explains why should you use campus fabric core distribution versus, let's say, an IP CLO or an EVPN multi-homing topology. So if you're new to EVPN makes land and you're trying to explore this area, I would highly recommend you go watch that video.

But if you're sure that you want to use this topology and you want to learn how to build it, you're in the right spot. One other thing that I'd like to point out to you on this page is that all of these devices are not being managed by Wired Assurance at this moment. And what does that mean? That means that they are only in monitoring mode.

As you can see, the configuration is not being managed by MIST. There is a reason why I'm demoing it a certain way and I'll show you why. So none of these devices are being managed.

The configuration will not be pushed to the devices unless we explicitly ask the UI to do it. So towards the end of the video, I'll show you why we want it to be a certain way. So let's click on organization and under Wired, we'll click on campus fabric.

We'll build a site-based campus fabric. There is also something called an org-based campus fabric. And what that means is you can build a campus fabric for an entire organization using pods from multiple sites.

But today for the purposes of this video, we'll be building only a site-based campus fabric, campus fabric core distribution as they call it. So let's click on configure campus fabric. And as you can see that at the time of making of this video, campus fabric core distribution along with campus fabric IP Clo are in beta state.

So let's talk about choosing a campus fabric topology. As I mentioned earlier, if you're sure that you want to build campus fabric core distribution, then this is the right place for you. If you're not, then go watch the other video.

But let's talk about what campus fabric core distribution is. It is essentially a two-layer EVPN VXLAN fabric, which involves a core layer and a distribution layer. If you look at this diagram on the left side, you see a horizontal line.

This horizontal line basically differentiates what is EVPN VXLAN configured versus what is not. As you can see, the top is a core layer and a distribution layer. Below the horizontal line are access devices that are basically dual home to the distribution boxes.

These access devices are pure layer two dummy devices that can run LACP, but that's not a requirement. You can also directly connect servers or any other devices that you would like to single home directly to these distribution devices, and that can come outside of the campus fabric core distribution workflow. That is possible.

So let's begin by configuring a topology name. There are two kinds of topologies that we can build within campus fabric core distribution, CRB as well as ERB. As you can see on the screen, it's centrally routed and edge routed.

So centrally routed means routing on the core device, and edge routed means routing on the edge, which in this case, our edge is distribution. For the purposes of this video, we'll be building a campus fabric core distribution that is CRB. So let's give it a name.

After you've given a topology name, we have some other default settings that do not need to be changed if there isn't a reason. These are basically the overlay and the underlay settings. For this campus fabric core distribution, we do IBGP in the overlay, and we use EBGP in the underlay.

As you can see, we have 65,000 local is that will be assigned to all the devices in the overlay, and we have 65,001 that will be sequentially incremented on any device that you use in this fabric. All of these settings will be taken care of by campus fabric. As a user, you do not have to manually configure any of these settings on the device itself, as I mentioned earlier.

The loopback prefix is the prefix assigned to loopback interfaces for every VTEP in campus fabric core distribution. It's slash 24 by default. If you do not want to use this number, you can reduce it.

If your campus fabric core distribution is a smaller fabric, let's say 5 to 10 devices, something like a slash 28 would work for you. Subnet in this particular setting is basically the subnet that as a user, you would provide us, or you can use this default subnet. This will be used for the IP address allocation for the fabric links between the core and the distribution devices.

Again, all of this will be done and taken care of by campus fabric itself. The second step is basically selecting the campus fabric nodes. What nodes would you want to be a part of core distribution and access layer? There are a few requirements.

The first one that we see on the screen is service blog border. Let me talk a little about what this is. So if you're someone who would want their network environment core devices to be lean spine, and what that means is if you do not want the firewall or the WAN or DHCP DNS NTP services to be connected to the core devices, you can use something that's called service blog.

This service blog basically connects to the core and you can connect all of your services, including the connectivity to the cloud and your data centers in this particular service blog. For the purposes of this video, I'm going to keep it simple and we're going to be just building a fabric here and connecting. The service blog will not be a part of this video.

So we'll go ahead and select two devices that are a part of the core layer and that is, as I mentioned, core one and core two. We will select two distribution devices, distribution one and distribution two. As you can see in this little dropdown, there is all the information provided to you at your fingertips, including the name and the model.

And for the access layer, we'll be selecting a virtual chassis that is access switch three. Once you've selected all the devices, you can verify by clicking on these. You also need to provide the router IDs here.

These router IDs are used for loopback interfaces. These loopback interfaces are used to pair with each other for building the VX LAN tunnels. One more thing that I'd like to point out is that once you build the fabric, you can always come back and add more devices and you can scale as much as you would like.

You can add more distribution devices. You can add more access devices based on your network environment needs. So you do not have to connect all the devices in the same setting.

We understand that network environment needs grow. And without any impact to other devices or the network operations itself, you can always come in and add more access devices later if there is a need. The third step is basically to provide networks.

And if you'd like to do some segmentation between those networks, we have VRF settings as well for that. For networks, you can either create a new network. And I'll go and create a new network here.

And we'll call it EVPN-CRB. And I'll give it a VLAN ID 10. And I'll give it a VLAN subnet of 192.160.10.1.0.24. And then I'll assign it a virtual gateway.

This virtual gateway will be used on your gateways depending on if you've chosen a CRB or an ERB network. Once you've created a network, you can see that two IP addresses have automatically been chosen for two core devices. This is where the gateways will be set for this fabric.

And as you can see, since we chose CRB as our topology, core 1 and core 2 will have these two different IRB addresses on their devices. And that will be 192.160.10.2 and 10.3. And we know that 10.1 will be the virtual gateway since we've manually assigned that. We can go ahead and either create more networks or we can also add an existing network.

An existing network is basically something that is being used in your existing site. And in this case, this site called Bangalore-site has a bunch of devices. So we're going to go and choose one and two VLANs that are being used on other devices.

And we'll try to inherit these. What this does is it reduces our work of configuring VLANs manually time and again on every device. So as we can see, 4091 on the subnet and virtual gateway has been inherited without me inputting anything again.

So now we have three VLANs for which all of the gateways will reside on the core devices as we asked for. But what if you do not want the gateways to reside on the core and instead you would like the gateways to reside on outside the fabric, perhaps the firewall or the VAN itself, or perhaps your gateways are in the data center, right? That is an option as well. And that is something that's called bridge overlay.

We can create a new network. Let's call it VLAN 100. And we'll assign a VLAN ID 100.

And we don't have to assign the subnet or the virtual gateway. What this does is VLAN 100 will be a part of the fabric or VNI will be assigned to it and it will be existing on all devices. However, the gateway for VLAN 100 will not exist on the fabric.

And the assumption here is that it will exist somewhere outside the fabric. So it will be a layer to stretch from the access device all the way until where the gateway exists. And it could be the firewall or the router if that exists before.

So now that we've spoken about networks, let's talk about how can you segment these networks using VRF. I'll go ahead and enable these instances for VRFs. And I'll try and create some VRFs here where I'll try to keep CRB10 as a part of one VRF.

And then I'll keep the other two VLANs as a part of VRF2. What this does is it segments the traffic between VRF1 and VRF2. If you would like more security and segmentation where you want to keep these networks separate and have different routing tables, this is an option for you.

You can also add extra routes if that is a requirement for your network needs. The last step on this page is to assign a name to the distribution access configuration. Once you've built the fabric, there will be an ESL lag between your distribution and your access devices.

Your access devices will be dual-homed to your distribution devices. So let's give it a name and call it EBPN-ESI. We've automatically taken all four networks that you assigned to the fabric and you added it to the trunk networks list, assuming that all of them will be a part of the fabric and the ESI lag.

If for some reason you would not want to have any of the VLANs as a part of the ESI lag, you can always come in and remove that here. There are other properties that you can change. Most of them are default.

If you would like to change the MTU or enable storm control, or if you would like to set up a MAC limit, that is an option as well for you. The last and final step is to assign how these ports are connected to each other. So far, we've picked the devices.

We've picked the VLANs and the VRFs that we want, but we haven't really told Campus Fabric how to connect these devices. So what I'm going to do is I'm going to go ahead and connect these devices, and I'll fast-forward the video so you don't have to go through each of the connections that I picked. So as you can see here, I've connected all these devices to each other.

I've connected two links from the core to the distribution, and then upwards as well from distribution to the core, and then from distribution to access, I've connected two links as well. As you can see, we support a virtual chassis in the access layer, so you can very well use that as well here. And if you'd like to change the AE index number, that is an option as well, as long as it is within the AE index range.

So this was the last and final step. We'll hit Continue, and this is our final step to verify you've built the fabric at this point. Ensure that you have selected the right VLANs, your IP addresses on a per-device level that is selected here as you'd like it to be.

Verify your connections. Is the core connected to the right distribution devices? And as we can see, and as an example, this is our bridged overlay design wherein VLAN 100 does not have an IP address, and that means that it exists somewhere outside the fabric. Go ahead and hit Apply Changes, and click Confirm.

At this point, as I mentioned earlier, the devices are not being managed by MIST, and let's go to the switches, and let's look at each device, and let's understand the configuration that is being pushed here. So before I go through the UI and show you how the configuration is being displayed here in terms of VLANs and VRFs, let's talk about the configuration. If you're running a brownfield environment, what that means is if you have an existing campus fabric, and you are trying to convert to a wireless assurance-based campus fabric, and you do not want to afford any downtime, you can come in, you can onboard your devices to the cloud, but do not manage the devices.

Once you build the fabric, ensure that all the configurations are there. We have a nice utility called Download Genos Config. Without logging into the device, you can ensure that the configuration that you wanted to be on the device is there.

Now, this configuration is the point of view of the cloud, as in wired assurance. Wired assurance, once you turn on Manage by MIST, and you click Save, all the configuration through the CLI will be overwritten, and wired assurance will be the source of truth. So if you look at this configuration, you'll see that we've configured your underlay BGP, we've configured overlay BGP.

In your underlay BGP, we have two neighbors from core one to two distribution devices. Similarly, we have two overlay between core one and distribution one and distribution two. We have the appropriate EVPN configuration.

And similarly, we have the gateways on the core devices with the appropriate virtual gateway. As you can see, we have set appropriate Jumbo MTUs. If there's any configuration that you think does not match your requirement, you can always add or delete using the additional CLI commands.

So if, let's say, you would like to add an existing MTU configuration that is not supported by the UI, let's say, you can always come in and add it to the additional CLI command box. So going back to the configuration, we see that we have the gateways defined. We have the routing instances defined as we did for your segregation of the networks, right? So we can look that vRF1 has a particular network that's a part of it.

And similarly, vRF2 has two networks that are a part of it, and then appropriate routing policies that are needed to talk between the four VTEPs that is there as well. And similarly, all the VLANs that you want are here as well. If there's any configuration, as I mentioned, that can always be added by additional CLI commands.

So now let's go ahead and enable Manage by MIST. So as I mentioned earlier, let's go ahead and enable Manage by MIST. And we can do that for all devices in just a single click.

We do not have to manually do that for all devices. So I click on this particular checkmark next to Status and click on More and Enable Switch Configuration. As you can see, there is a warning here that says that if you have anything that is assigned via the CLI, please ensure that that will be overwritten.

So please take care of that. So what this does is at this point, all of the configuration that we built through the fabric will be pushed to the devices. Your responsibility as a network administrator is to ensure that the configuration that you've been managing through the CLI is the same as the configuration that you see in the downloaded configuration file.

And if you see that there is something that's missing, then you need to rectify that or add through additional CLI commands or perhaps go back to the Campus Fabric and edit the fields provided there. So now that we've reviewed the configuration for Campus Fabric core distribution, let's have a look at the topology itself. And we assume that it's been a while.

So BGP would have come up by now in the underlay and overlay and also the tunnels would have established between the core and the distribution devices. So as you can see, I am in the EVPN-CRV topology that I named and I can see two core devices, two distribution and one access. As I can see, if I click on the core device, all the properties that we saw earlier are available as well.

You would see some green and red links and they are not just the status of that link, but they also depict the traffic flow. So what I mean by that is if you see a thick link, that basically tells you that there's more traffic between those two devices versus if you look at distribution and access. So a good point of comparison would be if the link between core 1 and distribution 2 is thicker than distribution and core 2, you would know that there is more traffic passing through the left link versus the right link.

And that's a very useful way to understand how the traffic flow is working and if, you know, some sort of equal path load balancing is in play or not. So now that we've reviewed the topology itself, we know that since we know we see all these green links, but what if you saw red links and what if you saw some BGP issues over there or if you were seeing some errors? We can always click on a particular device and click on switch insights and see what's happening on that box. And we know for a fact that there are DDoS violations happening.

DDoS violations aren't a problem all the time, but if something's happening repetitively, then that is something that needs to be looked into. We see that there are a bunch of DDoS violations here, but we also see that at the time when we built the topology, the last BGP pure state change was open confirmed to established. Of course, we know that looking at the green links that the neighborhood is up, but if it wasn't, you can always come ahead and look at the switch insights and see that your BGP has gone through its regular steps of coming to an established state.

If for whatever reason, you'd also like to look at the device itself and log into the CLI, if you're used to operating a device a certain way, we've also provided an option for you to click on the remote shell for any device and a pop up window will open right here on the screen, using which you can run any outputs as you'd like. So let's go ahead and check BGP summary as we saw earlier. As we can see, BGP has been up here for 42 minutes.

Let's look at our EVPN database. We see a bunch of MAC addresses in the EVPN database. We see some updated timestamps as well.

Let's look at the Ethernet switching MAC table as well. Of course, we know that all of these devices have been populated. There are a bunch of devices that we have that are locally connected to this particular core device.

Now that we've looked at the topology itself, we know that the topology is up and running. What do you do on day two when your network environment requirements grow? You want to access more devices? You want to add more distribution devices? You can always edit the configuration and add more devices as your needs grow. There is no limit to the number of devices you can add.

There's always a minimum requirement, but there's no maximum limitation here. What if you want to add more networks? You want to do some more segmentation? Similar to what we showed you earlier, you can always come in and create new networks or add existing networks. Nothing changes really from that point.

You can always come in and modify the connectivity between these devices. This concludes our session for EVPN Campus Fabric Core Distribution. I hope that there are some good takeaways for you from this video.

If there's input for us, please send me an email at archada.juniper.net. Thank you.