MAC-VRF network-instances can provide aggregation for a group of servers into the same subnet. This chapter defines concepts and procedures for configuring MAC-VRF network-instances and IRB subinterfaces.
The information and configuration in this chapter are based on SR Linux Release 20.6.
Data Center (DC) servers or hosts are connected to TOR routers so that they can be reached from other TOR routers in the same IP fabric. The TOR nodes run BGP to learn and propagate subnet reachability in the underlaying routing infrastructure. The server or hosts connected to these TOR BGP routers use routed subinterfaces on the TOR, and static routes or a PE-CE BGP session, to learn or advertise reachability to the rest of the DC.
Each server requires a separate routed subinterface and subnet on the TOR and the number of subinterfaces and local routes in the route-table will grow linearly as the number of servers increase. The use of a MAC-VRF network-instance provides aggregation for a group of servers into the same subnet. This saves routes and subinterfaces in the TOR. A MAC-VRF is attached to the default network-instance by a single Integrated Routing and Bridging (IRB) interface and subnet, instead of a separate subinterface and route per server. Figure 2 illustrates this concept.
Figure 2 shows Leaf-1 and Leaf-2 configured with MAC-VRF instances that aggregate a group of servers. These servers are assigned IP addresses on the same subnet and are connected to the Leaf default network-instance by a single IRB subinterface. The servers use a PE-CE BGP session with the IRB IP address to exchange reachability. The use of the MAC-VRF with an IRB subinterface saves routed subinterfaces on the default network-instance; only one routed subinterface is needed instead of one per server.
Figure 3 illustrates how to configure MAC-VRF network-instances and their IRB subinterfaces to the default network-instance, and how EBGP sessions are configured with the servers. In this example, DUT2 is the TOR being configured. DUT1 and DUT3 are servers that are running BGP against DUT2's IRB subinterface.
This example shows how to configure the DUT2 with a MAC-VRF, bridged subinterfaces to DUT1 and DUT3, and an IRB subinterface (reference Figure 3).
Note: This example assumes DUT2 is pre-configured with a default network-instance that runs BGP sessions to the spine routers, as defined in the section: Using BGP for underlay routing. |
A MAC-VRF network-instance uses a bridge-table to forward frames between its subinterfaces. Some bridge-table properties can be configured. For example:
Where:
SR Linux supports mac-duplication detection and associated procedures to protect the system against network loops. Figure 4 shows a simple loop and describes the associated configuration.
Figure 4 shows the MAC-VRF 2 connected using two bridged subinterfaces to a layer-2 switch creating a loop. When a host with mac M1 sends a broadcast frame, a loop is created. MAC-duplication is by default enabled in mac-vrf network-instances with the following parameters:
The loops shown in Figure 4 are resolved in the following sequence:
As a loop protection mechanism, MAC-duplication is self-contained and does not require a control plane protocol that runs network-wide among network devices.
Use this example to assist in configuring MAC-duplication. Consider MAC-VRF 1 is connected to a layer-2 switch (not shown) using two bridge sub-interfaces (ethernet-1/1.2 and ethernet-1/1.3). This creates a loop. DUT2 is configured with the following MAC-duplication settings:
Where the subinterfaces are also configured with the following actions:
In this example, the mac-duplication action configured under the network-instance is overridden by the more specific action under the subinterfaces 2 and 3. When traffic is generated by the remote layer-2 switch, the same mac address moves between ethernet-1/1.2 and ethernet-1/1.3. After the third move, the mac is declared a duplicate mac and displays in the duplicate-entries list:
A log event can help to troubleshoot when MACs are detected as duplicate, or when they are deleted after the hold-down-timer. For example:
The network-instance manager logs also show when the subinterfaces go down due to mac-duplication. For example: