I found the solution in the Juniper interoperability documentation
here:
https://www.juniper.net/documentation/us/en/software/nce/evpn-vxlan-interop-between-nxos-and-junos-os/evpn-vxlan
-interop-between-nxos-and-junos-os.pdf
Basically you have to access the evpn address family in the
configuration
I'm configuring two spine switches with Juniper and two leaf switches
running Nxos 9k to validate EVPN-VXLAN interoperability
I configured the propagation of the loopbacks via OSPF and then
OVERLAY, in the spines I configured the cluster-id to function as a
route-reflector of the motes that are lea
Reviewing my old emails, I noticed that I didn't give the final overview of
the case. The problem was resolved in 2021 by the team that takes care of
server virtualization. The root of the problem was updating a package
relating to the XCP-NG system network. After they isolated the update, the
IRQ
No, I use MX's and QFX''s and EX these days.
Em ter., 21 de mar. de 2023 às 08:05, Laurent CARON <
lca...@unix-scripts.info> escreveu:
> Thanks Cristian,
>
> Not specifing source should work since this rule is supposed to be wider.
>
> I think my question is EX4650 specific. Do you use the EX4650
Hi
Here I use "from prefix-list", from what I understand from Juniper, when
"from destination-prefix-list" is inserted it is as if it were an IP on the
internal interface of the network and not an IP source IP filter and the
"from prefix-list" is more like source address.
set firewall family inet
Hi Andrey
In my case, what you said happened, as I modified the arp suppression
configuration of evpn-vxlan, since this was silently dropping mac's and
dropping VRRPv4 only, in IPv6 this did not happen.
set protocols evpn duplicate-mac-detection detection-threshold 20
set protocols evpn duplicate
Hi Johan
I experienced a similar issue in my evpn-vxlan environment on QFX5120-48y
switches. The DDOS alert occurred whenever a large number of VM migrations
occurred simultaneously in my environment, some times there were 20 VM's in
simultaneous migration and the DDOS alarmed.
To solve this, I s
Hi
I had a strange behavior in my environment where I use qfx5120-48y-8c
switches, in spine/leaf topology with EVPN-VXLAN configured.
I transport the VLANs via VXLAN between the servers that are below the
leafs, to my mx routers that are above the spines. To make my life easier,
I use the configu
nd up
happening.
I did several reboots between one MX80 and another and so far there
was no problem with the gateway dying for the network that is in VRRP.
Em sex., 23 de jul. de 2021 às 14:34, Andrey Kostin
escreveu:
>
> Cristian Cardoso via juniper-nsp писал 2021-07-19 14:15:
> > Hi
&
oes the MAC get learnt from the other MX80 properly? Does the EVPN
> > update get generated?
> >
> >
> > On 19/07/2021 13:56, Cristian Cardoso via juniper-nsp wrote:
> > > I had several problems using the virtual gateway via EVPN on the
> > > switches, even the funct
21, at 12:23 AM, Cristian Cardoso via juniper-nsp
> > wrote:
> >
> > I have a scenario here where I use EVPN-VXLAN with qfx5120 switches
> > and until then I was using the gateways on the switches, but as the
> > switch does not have the possibility to use any kind o
I have a scenario here where I use EVPN-VXLAN with qfx5120 switches
and until then I was using the gateways on the switches, but as the
switch does not have the possibility to use any kind of firewall on
the irb interfaces, I had the idea to migrate the networks to two
routers MX80.
But I caught a
12 matches
Mail list logo