Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

GPU Backend Fabric with EVPN/VXLAN type 5, IPv6 Link-Local (RFC 5549) underlay and IPv4/IPv6 overlay Implementation Details

This section outlines the configuration details to implement an EVPN/VXLAN fabric using the IPv6 Link-Local (RFC 5549) underlay and IPv4/IPv6 overlay deployment model.

Note:

Details on how to implement IPv4 underlay/IPv4 overlay fabric and an IPv6 underlay/IPv6 overlay fabric have been included in the Appendix.

GPU server to leaf nodes connections

The GPU servers are connected following a rail-aligned architecture as described in the Backend GPU Rail Optimized Stripe Architecture section where GPU 0 is connected to the first Leaf node, GPU 1 is connected to the second leaf node and so on, as shown in Figure 35

Figure 35. GPU servers to leaf nodes rail-aligned connectivity

Each server to leaf node link is configured with a /31 IPv4 address as shown in Figure 35 and Table 10.

Table 10. GPU Servers to Leaf Nodes Connections.

SUBNET LEAF NODE INTERFACE

LEAF NODE IPv4

ADDRESS

GPU NIC

GPU NIC IPv4

ADDRESS

/31_subnet1-1 Stripe 1 Leaf 1 - et-0/0/0:0 10.200.0.0/31 Server 1 - gpu0_eth 10.200.0.1/31
/31_subnet1-2 Stripe 1 Leaf 2 - et-0/0/0:0 10.200.0.2/31 Server 1 - gpu1_eth 10.200.0.3/31
/31_subnet1-3 Stripe 1 Leaf 3 - et-0/0/0:0 10.200.0.4/31 Server 1 - gpu2_eth 10.200.0.5/31
/31_subnet1-4 Stripe 1 Leaf 4 - et-0/0/0:0 10.200.0.6/31 Server 1 - gpu3_eth 10.200.0.7/31
/31_subnet1-5 Stripe 1 Leaf 5 - et-0/0/0:0 10.200.0.8/31 Server 1 - gpu4_eth 10.200.0.9/31
/31_subnet1-6 Stripe 1 Leaf 6 - et-0/0/0:0 10.200.0.10/31 Server 1 - gpu5_eth 10.200.0.11/31
/31_subnet1-7 Stripe 1 Leaf 7 - et-0/0/0:0 10.200.0.12/31 Server 1 - gpu6_eth 10.200.0.13/31
/31_subnet1-8 Stripe 1 Leaf 8 - et-0/0/0:0 10.200.0.14/31 Server 1 - gpu7_eth 10.200.0.15/31
/31_subnet1-9 Stripe 1 Leaf 1 - et-0/0/1:0 10.200.0.16/31 Server 2 - gpu0_eth 10.200.0.17/31
/31_subnet1-10 Stripe 1 Leaf 2 - et-0/0/1:0 10.200.0.18/31 Server 2 - gpu1_eth 10.200.0.19/31
/31_subnet1-11 Stripe 1 Leaf 3 - et-0/0/1:0 10.200.0.20/31 Server 2 - gpu2_eth 10.200.0.21/31
/31_subnet1-12 Stripe 1 Leaf 4 - et-0/0/1:0 10.200.0.22/31 Server 2 - gpu3_eth 10.200.0.23/31
/31_subnet1-13 Stripe 1 Leaf 5 - et-0/0/1:0 10.200.0.24/31 Server 2 - gpu4_eth 10.200.0.25/31
/31_subnet1-14 Stripe 1 Leaf 6 - et-0/0/1:0 10.200.0.26/31 Server 2 - gpu5_eth 10.200.0.27/31
/31_subnet1-15 Stripe 1 Leaf 7 - et-0/0/1:0 10.200.0.28/31 Server 2 - gpu6_eth 10.200.0.29/31
/31_subnet1-16 Stripe 1 Leaf 8 - et-0/0/1:0 10.200.0.30/31 Server 2 - gpu7_eth 10.200.0.31/31
/31_subnet1-17 Stripe 1 Leaf 1 - et-0/0/2:0 10.200.0.32/31 Server 3 - gpu0_eth 10.200.0.33/31
/31_subnet1-18 Stripe 1 Leaf 2 - et-0/0/2:0 10.200.0.34/31 Server 3 - gpu1_eth 10.200.0.35/31
/31_subnet1-19 Stripe 1 Leaf 3 - et-0/0/2:0 10.200.0.36/31 Server 3 - gpu2_eth 10.200.0.37/31
/31_subnet1-20 Stripe 1 Leaf 4 - et-0/0/2:0 10.200.0.38/31 Server 3 - gpu3_eth 10.200.0.39/31
/31_subnet1-21 Stripe 1 Leaf 5 - et-0/0/2:0 10.200.0.40/31 Server 3 - gpu4_eth 10.200.0.41/31
/31_subnet1-22 Stripe 1 Leaf 6 - et-0/0/2:0 10.200.0.42/31 Server 3 - gpu5_eth 10.200.0.43/31
/31_subnet1-23 Stripe 1 Leaf 7 - et-0/0/2:0 10.200.0.44/31 Server 3 - gpu6_eth 10.200.0.45/31
/31_subnet1-24 Stripe 1 Leaf 8 - et-0/0/2:0 10.200.0.46/31 Server 3 - gpu7_eth 10.200.0.47/31

.

.

.

       
/31_subnet2-1 Stripe 2 Leaf 1 - et-0/0/0:0 10.200.1.0/31 Server 9 - gpu0_eth 10.200.1.1/31
/31_subnet2-2 Stripe 2 Leaf 2 - et-0/0/0:0 10.200.1.2/31 Server 9 - gpu1_eth 10.200.1.3/31
/31_subnet2-3 Stripe 2 Leaf 3 - et-0/0/0:0 10.200.1.4/31 Server 9 - gpu2_eth 10.200.1.5/31
/31_subnet2-4 Stripe 2 Leaf 4 - et-0/0/0:0 10.200.1.6/31 Server 9 - gpu3_eth 10.200.1.7/31
/31_subnet2-5 Stripe 2 Leaf 5 - et-0/0/0:0 10.200.1.8/31 Server 9 - gpu4_eth 10.200.1.9/31
/31_subnet2-6 Stripe 2 Leaf 6 - et-0/0/0:0 10.200.1.10/31 Server 9 - gpu5_eth 10.200.1.11/31
/31_subnet2-7 Stripe 2 Leaf 7 - et-0/0/0:0 10.200.1.12/31 Server 9 - gpu6_eth 10.200.1.13/31

.

.

.

       

These interfaces are configured as untagged interfaces, with family inet and a static IPv4 address as shown in the example below:

Table 11. GPU Server to Leaf Nodes Interface Configuration Example.

A screenshot of a computer program AI-generated content may be incorrect.

The MTU is configured as per Recommended MTU section.

Follow the steps in:

AMD Configuration | Juniper Networks to configure the interfaces on AMD GPU servers or NVIDIA Configuration | Juniper Networks for NVIDIA GPU servers.

Configure the netplan as shown in the example below.

The /24 routes allow communication between the GPUs belonging to a specific tenant in different stripes:

Example:

Figure 36. Per-tenant GPU server routes example

Table 12. Per-Tenant GPU Server Interface Connection Examples.

A screenshot of a computer program AI-generated content may be incorrect.

GPU Backend Fabric Underlay

Ref. Configure BGP Unnumbered EVPN Fabric | Juniper Networks

The underlay EBGP sessions are configured between the leaf and spine nodes to use peer auto-discovery, and are configured to advertise these loopback interfaces, as shown in the example between Stripe1 Leaf 1 and Spine 1 below:

Table 21. GPU Backend Fabric: BGP Underlay with Peer Auto-Discovery – Configuration Examples

To configure peer auto discovery, the dynamic-neighbor block named underlay-dynamic-neighbors under the BGP group l3clos-inet6-auto-underlay specifies the interfaces where auto discovery is permitted. This replaces the neighbor a.b.c.d commands that would statically configure the neighbors.

The family inet6 ipv6-nd statement enables the use of IPv6 Neighbor Discovery to dynamically determine the addresses of neighbors with which to establish BGP sessions. To control and secure dynamic peer formation, a peer-as-list (discovered-as-list) is configured, restricting peering to neighbors whose autonomous system numbers fall within the defined range of AS 101–104.

The family inet unicast and family inet6 unicast statements configure the sessions to advertise both IPv4 and IPv6 prefixes. When BGP sessions are established over IPv6 link-local addresses but carry IPv4 routes, the extended-nexthop statement must be configured under family inet unicast. This allows IPv4 next-hops to be resolved across an IPv6 transport session, enabling correct installation of IPv4 prefixes in the routing table. Failing to include the extended-nexthop will result in hidden routes, as the protocol next-hop cannot be resolved.

Example:

The BGP sessions are also configured with multipath multiple-as, allowing multiple paths (even with different AS paths) to be considered for ECMP (Equal-Cost Multi-Path) routing. BFD (Bidirectional Forwarding Detection) is additionally enabled to accelerate convergence in case of link or neighbor failures.

You can check that the sessions have been established by using the show bgp summary command:

Notice that when BGP sessions are established using link-local addresses Junos displays the neighbor address along with the interface scope (e.g. fe80::5a86:70ff:fe78:e0d5%et-0/0/1:0.0). The scope identifier (the part after the %) is necessary because the same link-local address (fe80::/10) could exist on multiple interfaces. The device must know which interface to use to send packets to that neighbor. Thus, after peer discovery is completed, the show bgp summary output lists the neighbor using the format: IPv6 link-local address % interface-name.

You can check details about the discovered neighbors using show bgp neighbor auto-discovered as shown in the example below:

To control the propagation of routes, and make sure the loopback interface addresses are advertised, export policies are applied to these EBGP sessions as shown in the example in table 22.

Table 22. Export policy example to advertise IPv4 routes over IPv6 Underlay with auto discovery

A screenshot of a computer program AI-generated content may be incorrect.

These policies ensure loopback reachability is advertised cleanly and without the risk of route loops.

On the spine nodes, routes are exported only if they are accepted by both the SPINE_TO_LEAF_FABRIC_OUT and BGP-AOS-Policy export policies.

  • The SPINE_TO_LEAF_FABRIC_OUT policy has no match conditions and accepts all routes unconditionally, tagging them with the FROM_SPINE_FABRIC_TIER community (0:15).
  • The BGP-AOS-Policy accepts BGP-learned routes as well as any routes accepted by the nested AllPodNetworks policy.
  • The AllPodNetworks policy, in turn, matches directly connected IPV6 routes and tags them with the DEFAULT_DIRECT_V4 community (1:20007 and 21001:26000 on Spine1).

As a result, each spine advertises both its directly connected routes (including its loopback interface) and any routes it has received from other leaf nodes.

Example:

On the leaf nodes, routes are exported only if they are accepted by both the LEAF_TO_SPINE_FABRIC_OUT and BGP-AOS-Policy export policies.

  • The LEAF_TO_SPINE_FABRIC_OUT policy accepts all routes except those learned via BGP that are tagged with the FROM_SPINE_FABRIC_TIER community (0:15). These routes are explicitly rejected to prevent re-advertisement of spine-learned routes back into the spine layer. As described earlier, spine nodes tag all routes they advertise to leaf nodes with this community to facilitate this filtering logic.
  • The BGP-AOS-Policy accepts all routes allowed by the nested AllPodNetworks policy, which matches directly connected IPV6 routes and tags them with the DEFAULT_DIRECT_V4 community (5:20007 and 21001:26000 for Stripe1-Leaf1).
  • As a result, leaf nodes will advertise only their directly connected interface routes—including their loopback interfaces—to the spines.

GPU Backend Fabric Overlay using IPv4

The overlay EBGP sessions are configured between the leaf and spine nodes using the IPv4 addresses of the loopback interfaces, as shown in the example between Stripe1 Leaf 1/Stripe 2 Leaf 1 and Spine 1.

Table 23. GPU Backend Fabric Overlay Using IPv4 Loopback Addresses – Stripe 1 Example

A screenshot of a computer program AI-generated content may be incorrect.

Table 24. GPU Backend Fabric Overlay Using IPv4 Loopback Addresses – Stripe 2 Example

A screenshot of a computer program AI-generated content may be incorrect.

The overlay BGP sessions use family evpn signaling to enable EVPN route exchange. The multihop ttl 1 statement allows EBGP sessions to be established between the loopback interfaces.

As with the underlay BGP sessions, these sessions are configured with multipath multiple-as, allowing multiple EVPN paths with different AS paths to be considered for ECMP (Equal-Cost Multi-Path) routing. BFD (Bidirectional Forwarding Detection) is also enabled to improve convergence time in case of failures.

The no-nexthop-change knob on the spine nodes is used to preserve the original next-hop address, which is critical in EVPN for ensuring that the remote VTEP can be reached directly. The vpn-apply-export statement is included to ensure that the export policies are evaluated for VPN address families, such as EVPN, allowing fine-grained control over which routes are advertised to each peer.

To control the propagation of routes, export policies are applied to these EBGP sessions as shown in the example in table 25.

Table 25. Export Policy example to advertise EVPN routes over IPv4 overlay

A screenshot of a computer AI-generated content may be incorrect.

These policies are simpler in structure and are intended to enable end-to-end EVPN reachability between tenant GPUs, while preventing route loops within the overlay.

Routes will only be advertised if EVPN routing-instances have been created. Example:

Table 26. EVPN Routing-Instances for a single tenant example across different leaf nodes.A screenshot of a computer AI-generated content may be incorrect.

On the spine nodes, routes are exported if they are accepted by the SPINE_TO_LEAF_EVPN_OUT policy.

The SPINE_TO_LEAF_EVPN_OUT policy has no match conditions and accepts all routes. It tags each exported route with the FROM_SPINE_EVPN_TIER community (0:14).

As a result, the spine nodes export EVPN routes received from one leaf to all other leaf nodes, allowing tenant-to-tenant communication across the fabric.

Example:

On the leaf nodes, routes are exported if they are accepted by both the LEAF_TO_SPINE_EVPN_OUT and EVPN_EXPORT policies.

The LEAF_TO_SPINE_EVPN_OUT policy rejects any BGP-learned routes that carry the FROM_SPINE_EVPN_TIER community (0:14). These routes are explicitly rejected to prevent re-advertisement of spine-learned routes back into the spine layer. As described earlier, spine nodes tag all routes they advertise to leaf nodes with this community to facilitate this filtering logic.

The EVPN_EXPORT policy accepts all routes without additional conditions.

As a result, the leaf nodes export only locally originated EVPN routes for the directly connected interfaces between GPU servers and the leaf nodes. These routes are part of the tenant routing instances and are required to establish reachability between GPUs belonging to the same tenant.

Configuration and verification example

Consider the following scenario where Tenant-A has been assigned GPU 0 on Server 1 and GPU1 on Server 2, and Tenant-B has been assigned GPU 0 on Server 2 and GPU1 on Server 1 as shown in diagram 39

Figure 39. Overlay example with two tenants

A diagram of a network AI-generated content may be incorrect.

Both Stripe 1 Leaf 1 and Leaf 2 have been configured for Tenant-A and Tenant-B as shown below:

Table 27. EVPN Routing-Instance for Tenant-A and Tenant-B Across Stripe 1 and Stripe 2

Table 28. Policies Examples for Tenant-A and Tenant-B Across Stripe 1 and Stripe 2

A screenshot of a computer AI-generated content may be incorrect.

The routing instances create separate routing spaces for the two tenants, providing full route and traffic isolation across the EVPN-VXLAN fabric. Each routing instance has been configured with the following key elements:

  1. Interfaces: The interfaces listed under each tenant VRF (e.g. et-0/0/0:0.0 and et-0/0/1:0.0) are explicitly added to the corresponding routing table. By placing these interfaces under the VRF, all routing decisions and traffic forwarding associated with them are isolated from other tenants and from the global routing table. Assigning an interface that connects a particular GPU to the leaf node effectively maps that GPU to a specific tenant, isolating it from GPUs assigned to other tenants.
  2. Route-distinguisher (RD):

    10.0.1.1:2001 and 10.0.1.1:2002 uniquely identify EVPN routes from Tenant-A and Tenant-B, respectively. Even if both tenants use overlapping IP prefixes, the RD ensures their routes remain distinct in the BGP control plane. Although the GPU to leaf links use unique /32 prefixes, an RD is still required to advertise these routes over EVPN.

  3. Route target (RT) community:

    VRF targets 20001:1 and 20002:1 control which routes are exported from and imported into each tenant routing table. These values determine which routes are shared between VRFs that belong to the same tenant across the fabric and are essential for enabling fabric-wide tenant connectivity—for example, when a tenant has GPUs assigned to multiple servers across different stripes.

  4. Protocols evpn parameters:
    • The ip-prefix-routes controls how IP Prefix Routes (EVPN Type 5 routes) are advertised.
    • The advertise direct-nexthop enables the leaf node to send IP prefix information using EVPN pure Type 5 routes, which includes a router MAC extended community. These routes include a Router MAC extended community, which allows the remote VTEP to resolve the next-hop MAC address without relying on Type 2 routes.
    • The encapsulation vxlan indicates that the payload traffic for this tenant will be encapsulated using VXLAN. The same type of encapsulation must be used end to end.
    • The VXLAN Network Identifier (VNI) acts as the encapsulation tag for traffic sent across the EVPN-VXLAN fabric. When EVPN Type 5 (IP Prefix) routes are advertised, the associated VNI is included in the BGP update. This ensures that remote VTEPs can identify the correct VXLAN segment for returning traffic to the tenant’s VRF.

      Unlike traditional use cases where a VNI maps to a single Layer 2 segment, in EVPN Type 5 the VNI represents the tenant-wide Layer 3 routing domain. All point-to-point subnets—such as the /32 links between GPU servers and the leaf—that belong to the same VRF are advertised with the same VNI.

    In this configuration, VNIs 20001 and 20002 are mapped to the Tenant-A and Tenant-B VRFs, respectively. All traffic destined for interfaces in Tenant-A will be forwarded using VNI 20001, and all traffic for Tenant-B will use VNI 20002.

    Notice that the same VNI for a specific tenant is configured on both Stripe1-Leaf1 and Stripe2-Leaf1.

  5. Export Policy Logic

EVPN Type 5 routes from Tenant-A are exported if they are accepted by the BGP-AOS-Policy-Tenant-A export policy, which references a nested policy named AllPodNetworks-Tenant-A (and the equivalent policies for Tenant-B)

  • Policy BGP-AOS-Policy-Tenant-A controls which prefixes from this VRFs are allowed to be advertised into EVPN. It accepts any route that is permitted by the AllPodNetworks-Tenant-A policy and explicitly rejects all other routes.
  • Policy AllPodNetworks-Tenant-A accepts directly connected IPv4 routes (family inet4, protocol direct) that are part of the Tenant-A VRF. It tags these routes with the TENANT-A_COMMUNITY_V4 (5:20007 21002:26000 ) community before accepting them. All other routes are rejected.

As a result, only the directly connected IPv4 routes from the Tenant-A (/32 links between GPU servers and the leaf) are exported as EVPN Type 5 routes.

To verify the interface assignments to the different tenants, use show interfaces routing-instance <tenant-name> terse.

You can also check the direct routes installed to the correspondent routing table:

To verify evpn l3 contexts including encapsulation, VNI, router MAC address use show evpn l3-context.

Use <tenant-name> extensive for more details.

When EVPN Type 5 is used to implement L3 tenant isolation across a VXLAN fabric, multiple routing tables are instantiated on each participating leaf node. These tables are responsible for managing control-plane separation, enforcing tenant boundaries, and supporting the overlay forwarding model. Each routing instance (VRF) creates its own set of routing and forwarding tables, in addition to the global and EVPN-specific tables used for fabric-wide communication. These tables are listed in table 29.

Table 29. Routing and Forwarding Tables for EVPN Type 5

TABLE DESCRIPTON
bgp.evpn.0

Holds EVPN route information received via BGP, including Type 5 (IP Prefix) routes and other EVPN route types.

This is the control plane source for EVPN-learned routes

:vxlan.inet.0

Used internally for VXLAN tunnel resolution.

Maps VTEP IP addresses to physical next hops.

<tenant>.inet.0

The tenant-specific IPv4 unicast routing table.

Contains directly connected and EVPN-imported Type 5 prefixes for that tenant.

Used for routing data plane traffic.

<tenant>.evpn.0 The tenant-specific EVPN table.

The protocol next hop is extracted from each EVPN route, and resolved in inet.0. The EVPN route is added to the bgp.evpn.0 table. The result is placed in :vxlan.inet.0.

The route-target community value is used to determine which tenant the route belongs to, and the route is placed in tenant.evpn.0. From there, IPv4 routes are imported into tenant.inet4.0 to be used for route lookups when traffic arrives at the interfaces belonging to the VRF.

IPv4 EBGP sessions advertising evpn routes for Tenant-A and Tenant-B should be established. The routes should be installed in both the bgp.evpn.0 table and the <Tenant>.inet.0 table.

To check that evpn routes are being advertised use show route advertising-protocol bgp <neighbor>. For a specific route use the match-prefix option and include the entire evpn prefix as shown in the example below:

The /248 prefixes represent EVPN route type 5 advertising each IPv4 prefix connecting the GPU servers and leaf nodes.

For example: 5:10.0.1.2:2001::0::10.200.0.0::31/248 is an EVPN route type 5 for prefix 10.200.0.0/31 where:

Table 30. EVPN Type 5 Route Advertisement Fields Description.

Name Value Description
Route type 5: Indicates the route is a Type 5 (IP Prefix) route
Route Distinguisher 10.0.1.2:2001 Uniquely identifies the routes
Placeholder fields ::0:: For MAC address and other Type 2-related fields (not used here)
IP Prefix 10.200.0.4::31 The actual prefix being advertised
VNI 20001 VNI to push for traffic to the destination
Advertising router 10.0.0.1 (Spine 1) Spine the route was received from.

To check that evpn routes are being received use show route receive-protocol bgp <neighbor>. For a specific route use the match-prefix option and include the entire evpn prefix as shown in the example below:

Note:

The examples show routes received from Spine 1, but each route is received from all 4 spines nodes, which you can also confirm by entering:

Additional information for a given route can be found using the extensive keyword:

Table 31. EVPN Type 5 Route Advertisement Fields descriptions - Extensive

Name Value Description
Route type 5: Indicates the route is a Type 5 (IP Prefix) route
Route Distinguisher 10.0.1.2:2001 Uniquely identifies the routes
Placeholder fields ::0:: For MAC address and other Type 2-related fields (not used here)
IP Prefix 10.200.105.0::24 The actual prefix being advertised
VNI 20001 VNI to push for traffic to the destination
Advertising router 10.0.0.1 Spine the route was received from.
Protocol next hop 10.0.1.2 (Stripe 1 Leaf 2) Router that originated the EVPN route (remote VTEP)
Encapsulation Type: 0x08 standardized IANA-assigned value for VXLAN encapsulation in the EVPN Encapsulation extended community (RFC 9014).
Route target target:20001:1 Identifies the route as belonging to Tenant-A

To check that the routes are being imported into the correspondent tenant’s routing tables use show route table <tenant-name>.inet.0 protocol evpn, as shown in the example below:

GPU Backend Fabric Overlay using IPv6

The overlay EBGP sessions are configured between the leaf and spine nodes using the IPv4 addresses of the loopback interfaces, as shown in the example between Stripe1 Leaf 1/Stripe 2 Leaf 1 and Spine 1.

Table 32. GPU Backend Fabric Overlay Using IPv6 Loopback Addresses – Stripe 1 Leaf 1 to Spine 1

A screenshot of a computer program AI-generated content may be incorrect.

Table 33. GPU Backend Fabric Overlay Using IPv6 Loopback Addresses – Stripe 2 Leaf 1 to Spine 1

A screenshot of a computer program AI-generated content may be incorrect.

The overlay BGP sessions use family evpn signaling to enable EVPN route exchange. The multihop ttl 1 statement allows EBGP sessions to be established between the loopback interfaces.

As with the underlay BGP sessions, these sessions are configured with multipath multiple-as, allowing multiple EVPN paths with different AS paths to be considered for ECMP (Equal-Cost Multi-Path) routing. BFD (Bidirectional Forwarding Detection) is also enabled to improve convergence time in case of failures.

The no-nexthop-change knob on the spine nodes is used to preserve the original next-hop address, which is critical in EVPN for ensuring that the remote VTEP can be reached directly. The vpn-apply-export is included to ensure that the export policies are evaluated for VPN address families, such as EVPN, allowing fine-grained control over which routes are advertised to each peer.

To control the propagation of routes, export policies are applied to these EBGP sessions as shown in the example in table 34.

Table 34. Export Policy example to advertise EVPN routes over IPv6 overlay

A screenshot of a computer AI-generated content may be incorrect.

These policies are simpler in structure and are intended to enable end-to-end EVPN reachability between tenant GPUs, while preventing route loops within the overlay.

Routes will only be advertised if EVPN routing-instances have been created. Example:

Table 35. EVPN Routing-Instances for a single tenant example across different leaf nodes.A screenshot of a computer AI-generated content may be incorrect.

On the spine nodes, routes are exported if they are accepted by the SPINE_TO_LEAF_EVPN_OUT policy.

  • The SPINE_TO_LEAF_EVPN_OUT policy has no match conditions and accepts all routes. It tags each exported route with the FROM_SPINE_EVPN_TIER community (0:14).

As a result, the spine nodes export EVPN routes received from one leaf to all other leaf nodes, allowing tenant-to-tenant communication across the fabric.

Example:

On the leaf nodes, routes are exported if they are accepted by both the LEAF_TO_SPINE_EVPN_OUT and EVPN_EXPORT policies.

  • The LEAF_TO_SPINE_EVPN_OUT policy rejects any BGP-learned routes that carry the FROM_SPINE_EVPN_TIER community (0:14). These routes are explicitly rejected to prevent re-advertisement of spine-learned routes back into the spine layer. As described earlier, spine nodes tag all routes they advertise to leaf nodes with this community to facilitate this filtering logic.
  • The EVPN_EXPORT policy accepts all routes without additional conditions.

As a result, the leaf nodes export only locally originated EVPN routes for the directly connected interfaces between GPU servers and the leaf nodes. These routes are part of the tenant routing instances and are required to establish reachability between GPUs belonging to the same tenant.

Configuration and verification example

Consider the following scenario where Tenant-A has been assigned GPU 0 on Server 1 and GPU1 on Server 2, and Tenant-B has been assigned GPU 0 on Server 2 and GPU1 on Server 1 as shown in diagram 39

Figure 39. Overlay example with two tenants

Both Stripe 1 Leaf 1 and Leaf 2 have been configured for Tenant-A and Tenant-B as shown below:

Table 36. EVPN Routing-Instance for Tenant-A and Tenant-B Across Stripe 1 and Stripe 2

A screenshot of a computer program AI-generated content may be incorrect.

Table 37. Policies Examples for Tenant-A and Tenant-B Across Stripe 1 and Stripe 2

The routing instances create separate routing spaces for the two tenants, providing full route and traffic isolation across the EVPN-VXLAN fabric. Each routing instance has been configured with the following key elements:

  1. Interfaces: The interfaces listed under each tenant VRF (e.g. et-0/0/0:0.0 and et-0/0/1:0.0) are explicitly added to the corresponding routing table. By placing these interfaces under the VRF, all routing decisions and traffic forwarding associated with them are isolated from other tenants and from the global routing table. Assigning an interface that connects a particular GPU to the leaf node effectively maps that GPU to a specific tenant, isolating it from GPUs assigned to other tenants.
  2. Route-distinguisher (RD):

    10.0.1.1:2001 and 10.0.1.1:2002 uniquely identify EVPN routes from Tenant-A and Tenant-B, respectively. Even if both tenants use overlapping IP prefixes, the RD ensures their routes remain distinct in the BGP control plane. Although the GPU to leaf links use unique /32 prefixes, an RD is still required to advertise these routes over EVPN.

  3. Route target (RT) community:

    VRF targets 20001:1 and 20002:1 control which routes are exported from and imported into each tenant routing table. These values determine which routes are shared between VRFs that belong to the same tenant across the fabric and are essential for enabling fabric-wide tenant connectivity—for example, when a tenant has GPUs assigned to multiple servers across different stripes.

  4. Protocols evpn parameters:
    • The ip-prefix-routes controls how IP Prefix Routes (EVPN Type 5 routes) are advertised.
    • The advertise direct-nexthop enables the leaf node to send IP prefix information using EVPN pure Type 5 routes, which includes a router MAC extended community. These routes include a Router MAC extended community, which allows the remote VTEP to resolve the next-hop MAC address without relying on Type 2 routes.
    • The encapsulation vxlan indicates that the payload traffic for this tenant will be encapsulated using VXLAN. The same type of encapsulation must be used end to end.
    • The VXLAN Network Identifier (VNI) acts as the encapsulation tag for traffic sent across the EVPN-VXLAN fabric. When EVPN Type 5 (IP Prefix) routes are advertised, the associated VNI is included in the BGP update. This ensures that remote VTEPs can identify the correct VXLAN segment for returning traffic to the tenant’s VRF.

      Unlike traditional use cases where a VNI maps to a single Layer 2 segment, in EVPN Type 5 the VNI represents the tenant-wide Layer 3 routing domain. All point-to-point subnets—such as the /32 links between GPU servers and the leaf—that belong to the same VRF are advertised with the same VNI.

    In this configuration, VNIs 20001 and 20002 are mapped to the Tenant-A and Tenant-B VRFs, respectively. All traffic destined for interfaces in Tenant-A will be forwarded using VNI 20001, and all traffic for Tenant-B will use VNI 20002.

    Notice that the same VNI for a specific tenant is configured on both Stripe1-Leaf1 and Stripe2-Leaf1.

  5. Export Policy Logic

EVPN Type 5 routes from Tenant-A are exported if they are accepted by the BGP-AOS-Policy-Tenant-A export policy, which references a nested policy named AllPodNetworks-Tenant-A (and the equivalent policies for Tenant-B)

  • Policy BGP-AOS-Policy-Tenant-A controls which prefixes from this VRFs are allowed to be advertised into EVPN. It accepts any route that is permitted by the AllPodNetworks-Tenant-A policy and explicitly rejects all other routes.
  • Policy AllPodNetworks-Tenant-A accepts directly connected IPv4 routes (family inet, protocol direct) that are part of the Tenant-A VRF. It tags these routes with the TENANT-A_COMMUNITY_V4 (5:20007 21002:26000 ) community before accepting them. All other routes are rejected.

    As a result, only the directly connected IPv4 routes from the Tenant-A (/32 links between GPU servers and the leaf) are exported as EVPN Type 5 routes.

To verify the interface assignments to the different tenants, use: show interfaces routing-instance <tenant-name> terse.

To verify evpn l3 contexts including encapsulation, VNI, router MAC address use show evpn l3-context.

Use <tenant-name> extensive for more details.

When EVPN Type 5 is used to implement L3 tenant isolation across a VXLAN fabric, multiple routing tables are instantiated on each participating leaf node. These tables are responsible for managing control-plane separation, enforcing tenant boundaries, and supporting the overlay forwarding model. Each routing instance (VRF) creates its own set of routing and forwarding tables, in addition to the global and EVPN-specific tables used for fabric-wide communication. These tables are listed in table 38.

Table 38. Routing and Forwarding Tables for EVPN Type 5

TABLE DESCRIPTON
bgp.evpn.0

Holds EVPN route information received via BGP, including Type 5 (IP Prefix) routes and other EVPN route types.

This is the control plane source for EVPN-learned routes

:vxlan.inet.0

Used internally for VXLAN tunnel resolution.

Maps VTEP IP addresses to physical next hops.

<tenant>.inet.0

The tenant-specific IPv4 unicast routing table.

Contains directly connected and EVPN-imported Type 5 prefixes for that tenant.

Used for routing data plane traffic.

<tenant>.evpn.0 The tenant-specific EVPN table.

The protocol next hop is extracted from each EVPN route, is extracted and resolved in inet6.0. The EVPN route is added to the bgp.evpn.0 table. The result is placed in :vxlan.inet.0.

The route-target community value is used to determine which tenant the route belongs to, and the route is placed in tenant.evpn.0. From there, IPv4 routes are imported into tenant.inet4.0 to be used for route lookups when traffic arrives at the interfaces belonging to the VRF.

IPv6 EBGP sessions advertising evpn routes for Tenant-A and Tenant-B should be established. The routes should be installed in both the bgp.evpn.0 table and the <Tenant>.inet.0 table.

To check that evpn routes are being advertised use show route advertising-protocol bgp <neighbor>. For a specific route use the match-prefix option and include the entire evpn prefix as shown in the example below:

The /248 prefixes represent EVPN route type 5 advertising each IPv4 prefix connecting the GPU servers and leaf nodes.

For example: 5:10.0.1.2:2001::0::10.200.0.0::31/248 is an EVPN route type 5 for prefix 10.200.0.0/31 where:

Table 39. EVPN Type 5 Route Advertisement Fields Description.

Name Value Description
Route type 5: Indicates the route is a Type 5 (IP Prefix) route
Route Distinguisher 10.0.1.2:2001 Uniquely identifies the routes
Placeholder fields ::0:: For MAC address and other Type 2-related fields (not used here)
IP Prefix 10.200.0.4::31 The actual prefix being advertised
VNI 20001 VNI to push for traffic to the destination
Advertising router 2001:10::1 (Spine 1) Spine the route was received from.

To check that evpn routes are being received use show route receive-protocol bgp <neighbor>. For a specific route use the match-prefix option and include the entire evpn prefix as shown in the example below:

Note:

The examples show routes received from Spine 1, but each route is received from all 4 spines nodes, which you can also confirm by entering:

Additional information for a given route can be found using the extensive keyword:

Table 40. EVPN Type 5 Route Advertisement Fields Description - Extensive

Name Value Description
Route type 5: Indicates the route is a Type 5 (IP Prefix) route
Route Distinguisher 10.0.1.2:2001 Uniquely identifies the routes
Placeholder fields ::0:: For MAC address and other Type 2-related fields (not used here)
IP Prefix 10.200.105.0::24 The actual prefix being advertised
VNI 20001 VNI to push for traffic to the destination
Advertising router 2001:10::1 Spine the route was received from.
Protocol next hop 10.0.1.2 (Stripe 1 Leaf 2) Router that originated the EVPN route (remote VTEP)
Encapsulation Type: 0x08 standardized IANA-assigned value for VXLAN encapsulation in the EVPN Encapsulation extended community (RFC 9014).
Route target target:20001:1 Identifies the route as belonging to Tenant-A

To check that the routes are being imported into the correspondent tenant’s routing tables use show route table <tenant-name>.inet.0 protocol evpn as shown in the example below: