Deploying Juniper Data Centers with EVPN VXLAN

by Aninda Chatterjee

Networking

Book Details

Book Title

Deploying Juniper Data Centers with EVPN VXLAN

Author

Aninda Chatterjee

Publisher

Independently Published

Publication Date

2024

ISBN

9780138225391

Number of Pages

689

Language

English

Format

PDF

File Size

15.8MB

Subject

Computers > Networking: Internet

Table of Contents

  • Cover
  • Half Title
  • Title Page
  • Copyright Page
  • Contents at a Glance
  • Contents
  • Introduction
  • Chapter 1 Introducing the Juniper Ecosystem
  • Junos Architecture
  • Building Layer 2 and Layer 3 Networks with Junos
  • Miscellaneous Junos Features
  • Summary
  • Chapter 2 Overview of Data Center Architecture
  • History and Evolution of Data Centers
  • Data Center Designs and Overlay Architectures
  • Summary
  • Chapter 3 BGP for the Data Center
  • BGP Path Hunting and ASN Scheme for Data Centers
  • Implementing BGP for the Underlay
  • Auto-Discovered BGP Neighbors
  • Summary
  • Chapter 4 VXLAN as a Network Virtualization Overlay
  • Introducing VXLAN
  • EVPN for Data Center VXLAN Fabrics
  • Summary
  • Chapter 5 Bridged Overlay in an EVPN VXLAN Fabric
  • Configuring and Validating a Bridged Overlay EVPN VXLAN Fabric
  • Learning MAC Addresses and EVPN Type-2 Routes
  • Proxy ARP and ARP Suppression
  • Replication of BUM Traffic and EVPN Type-3 Routes
  • EVPN Multihoming with ESI LAG and EVPN Type-1/Type-4 Routes
  • Core Isolation in an EVPN VXLAN Fabric
  • Route Targets in an EVPN VXLAN Fabric
  • MAC Mobility
  • Loop Detection
  • Bidirectional Forwarding Detection in an EVPN VXLAN Fabric
  • Summary
  • Chapter 6 MAC-VRFs
  • Introducing EVPN Service Types
  • VLAN-Based MAC-VRFs
  • Order of Operations with MAC-VRFs
  • Shared Tunnels with MAC-VRFs
  • VLAN-Aware MAC-VRFs
  • Overlapping VLANs, VLAN Translation, and VLAN Normalization
  • Summary
  • Chapter 7 Centrally Routed Bridging
  • Introducing Integrated Routing and Bridging and CRB Design
  • Configuring a Centrally Routed Bridging EVPN VXLAN Fabric
  • Validating and Understanding EVPN Route Exchange in a CRB Fabric
  • Importance of “Sticky” MACs for Virtual Gateway and IRB Addresses
  • Historical (and Present Day) Relevance of proxy-macip-advertisement
  • Packet Walk for Hosts in Different Subnets
  • Summary
  • Chapter 8 Edge-Routed Bridging
  • Overview of Different Routing Models with Edge-Routed Bridging
  • Asymmetric IRB
  • Symmetric IRB
  • Summary
  • Chapter 9 Routed Overlay and Host-Routed Bridging
  • Overview of a Routed Overlay Design
  • Understanding EVPN Type-5 Routes and Their Use in Data Centers
  • Configuring and Validating Routed Overlay
  • Host-Routed Bridging
  • Summary
  • Chapter 10 DHCP in EVPN VXLAN Fabrics
  • A DHCP Refresher
  • DHCP in a Bridged Overlay Fabric
  • DHCP in an Edge-Routed Bridging Fabric
  • DHCP Server in a Dedicated Services VRF
  • Summary
  • Chapter 11 Data Center Interconnect
  • Introduction to DCI
  • Over-the-Top DCI
  • Integrated Interconnect with IP Transit
  • Integrated Interconnect with MPLS Transit
  • Summary
  • Chapter 12 Building Data Centers with Juniper Apstra, Part I—Apstra Foundation
  • Introduction to Juniper Apstra
  • Building Blocks of Apstra
  • Onboarding Devices in Apstra
  • Creating Rack Types and Templates
  • Deploying a Bridged Overlay 3-Stage Clos Fabric
  • Lifecycle of a Device in Juniper Apstra
  • Summary
  • Chapter 13 Building Data Centers with Juniper Apstra, Part II—Advanced Apstra Deployments
  • Edge-Routed Bridging with Symmetric IRB
  • Data Center Interconnect with Juniper Apstra
  • Summary
  • Chapter 14 Building Virtual Fabrics with vJunos, Containerlab, and Juniper Apstra
  • Installing Containerlab and Building the vJunos-switch Image
  • Instantiating a Virtual Topology with vJunos-switch and Containerlab
  • Orchestrating a Virtual Fabric with Apstra
  • Summary
  • Chapter 15 Large-Scale Fabrics, Inter-VRF Routing, and Security Policies in Apstra
  • Deploying a 5-Stage Clos Fabric
  • Inter-VRF Routing in Apstra Deployments
  • Deploying Security Policies in Apstra
  • Summary
  • Acronym Legend
  • Appendix A Quick Reference Guide
  • Index