EVPN
-
EVPN-VXLAN pure T5 host-route auto-generated community (ACX7024, ACX7100-32C, ACX7100-48L, PTX10001-36MR, PTX10004, and PTX10008)—Starting in Junos OS Evolved Release 23.4R1, we've added support for the EVPN-VXLAN pure T5 host-route auto-generated community. This feature adds a community to MAC-IP ARP/NDP-based pure Type 5 host routes. Border leaf devices in edge-routed bridging (ERB) topologies with Type 5 connectivity to other leaf devices in the data center and Type 5 connections to external networks need to advertise aggregate routes to the external network instead of individual Type 5 routes. Border leaf devices can use this community to identify these routes and create an aggregate route to advertise to external EVPN networks.
[See EVPN-VXLAN Pure T5 Host-Route Auto-Generated Community.]
-
OISM PEG DF election (ACX7100-32C, ACX7100-48L, PTX10001-36MR, PTX10004, and PTX10008)—Starting in Junos OS Evolved Release 23.4R1, you can customize the designated forwarder (DF) election method on border leaf devices that act as Protocol Independent Multicast (PIM) EVPN gateway (PEG) devices in an EVPN network running optimized intersubnet multicast (OISM). You can configure peer PEG devices to use one of the following DF election methods:
-
Mod-based DF election
-
Preference-based DF election with a specified preference value
By default, a PEG device uses PIM-based DF election. When you configure this feature, the selected PEG DF election method replaces PIM-based DF election.
[See peg-df-election and PEG DF Election.]
-
-
Static configuration of MAC-IP bindings with EVPN-VXLAN (ACX7100-32C, ACX7100-48L, PTX10001-36MR, PTX10008, and PTX10016)—Starting in Junos OS Evolved Release 23.4R1, we’ve added the functionality to allow static configuration of MAC-IP bindings on an interface, similar to configuring static MACs on an interface. This feature enables the static configuration of IP and MAC entries for crucial services provided by management and infrastructure hosts. It proves particularly advantageous in Internet Exchange Point (IXP) networks where participant customer edge (CE) devices remain well-known and static, not transitioning to different provider edge (PE) devices.
You can now utilize a new feature that establishes a static link between an IP address and a MAC address for a logical interface within a bridge domain or VLAN. When you provision a static MAC-IP entry on a PE device, the PE device initiates a probe following an exponential backoff pattern. The probe uses an all-zero sender IP address on the associated interface. If the entity owning the IP to MAC entry responds to the probe, the system will learn the IP to MAC binding as static. Subsequently, it will be propagated to remote PE devices through the BGP/EVPN Type 2 MAC advertisement route. The corresponding MAC address will be recognized as a dynamic entry. If you want to deactivate the probing mechanism for learning the IP to MAC binding, you can do so by configuring the new configuration option
arp-nd-probe-disable
. Without probing, both the MAC and IP to MAC binding will be acquired from network traffic and communicated using EVPN.We’ve introduced the following commands and configuration statements:
-
Configuration of static IP to MAC bindings
Note:A maximum of eight MACs can be configured per static IP address.
The aforementioned commands provide an option to configure
router
andoverride
bits for IPv6 entries. For example:
-
Disable probing on configuration of static IP to MAC entries:
To turn off the default probing on configuration of static IP to MAC entries, you can use the global configuration statement
arp-nd-probe-disable
.set protocols l2-learning arp-nd-probe-disable
-
Enable logging for failed probing of static IP to MAC entries:
To turn on the logging, configure the global configuration statement
arp-nd-probe-failed-log
.set protocols l2-learning arp-nd-probe-failed-log
-
Enable GARP/unsolicited-NA for local and remote static entries
If this feature is required, you must configure the global configuration statement
garp-na-enable
.set protocols l2-learning garp-na-enable
-
Disable dynamic learning [all static provisioning]
If dynamic learning of MAC-IP entries is not required, configure the statement
drop-unknown-macip
under BD/VLAN.
-
Drop unicast ARP request
To drop unicast address resolution requests (for instance, NUD NS messages), you can configure the statement
block-unicast-arp
at global level. -
[See EVPN Proxy ARP and ARP Suppression, and Proxy NDP and NDP Suppression and interface-mac-ip-limit.]
-