In a scenario where a data center is interconnected with an enterprise site, a CE is dual-homed to a VXLAN network, which enhances VXLAN access reliability and implements rapid convergence in the case of a fault. IPsec encapsulation implements encrypted packet transmission, securing packet transmission.
On the network shown in Figure 1, CE1 is dual-homed to PE1 and PE2, and PE1 and PE2 use a virtual address as the VTEP address of the source NVE interface. In this way, the CPE is aware of only one remote NVE interface and establishes a static VXLAN tunnel with the anycast VTEP address. VXLAN packets are transmitted in plain text on the network, which is insecure. IPsec encapsulation implements encrypted packet transmission, securing packet transmission.
Interfaces 1 through 3 in this example represent GE 0/1/1, GE 0/1/8, and GE 0/1/16, respectively.

Device |
Interface |
IP address |
|---|---|---|
PE1 |
GE 0/1/1 |
10.1.20.1/24 |
GE 0/1/2 |
192.168.1.1/24 |
|
GE 0/1/3 |
10.1.1.1/24 |
|
Loopback 0 |
1.1.1.1/32 |
|
Loopback 1 |
3.3.3.3/32 |
|
Loopback 2 |
5.5.5.5/32 |
|
PE2 |
GE 0/1/1 |
10.1.20.2/24 |
GE 0/1/2 |
192.168.2.1/24 |
|
GE 0/1/3 |
10.1.2.1/24 |
|
Loopback 0 |
2.2.2.2/32 |
|
Loopback 1 |
3.3.3.3/32 |
|
Loopback 2 |
5.5.5.5/32 |
|
CE1 |
GE 0/1/1 |
192.168.1.2/24 |
GE 0/1/2 |
192.168.2.2/24 |
|
CPE |
GE 0/1/1 |
10.1.1.2/24 |
Loopback 0 |
4.4.4.4/32 |
|
Loopback 1 |
6.6.6.6/32 |
The configuration roadmap is as follows:
To complete the configuration, you need the following data:
Interfaces and their IP addresses
EVPN instance names
VPN targets of the received and sent routes in EVPN instances
Preshared key
Security protocol, encryption algorithm, and authentication algorithm to be adopted by IPsec
Encryption algorithm and authentication algorithm that an IKE proposal uses
For detailed configurations, see Configuration Files.
For detailed configurations, see Configuration Files.
# Configure PE1.
<PE1> system-view [~PE1] evpn [*PE1-evpn] vlan-extend private enable [*PE1-evpn] vlan-extend redirect enable [*PE1-evpn] local-remote frr enable [*PE1-evpn] bypass-vxlan enable [*PE1-evpn] quit [*PE1] commit
The configuration of PE2 is similar to the configuration of PE1. For configuration details, see Configuration Files in this section.
# Configure PE1.
[~PE1] bgp 100 [*PE1-bgp] peer 2.2.2.2 as-number 100 [*PE1-bgp] peer 2.2.2.2 connect-interface LoopBack 1 [*PE1-bgp] ipv4-family unicast [*PE1-bgp-af-ipv4] undo synchronization [*PE1-bgp-af-ipv4] peer 2.2.2.2 enable [*PE1-bgp-af-ipv4] quit [*PE1-bgp] l2vpn-family evpn [*PE1-bgp-af-evpn] undo policy vpn-target [*PE1-bgp-af-evpn] peer 2.2.2.2 enable [*PE1-bgp-af-evpn] peer 2.2.2.2 advertise encap-type vxlan [*PE1-bgp-af-evpn] quit [*PE1-bgp] quit [*PE1] commit
The configuration of PE2 is similar to the configuration of PE1. For configuration details, see Configuration Files in this section.
Configure PE1.
[*PE1] e-trunk 1 [*PE1-e-trunk-1] priority 10 [*PE1-e-trunk-1] peer-address 2.2.2.2 source-address 1.1.1.1 [*PE1-e-trunk-1] quit [*PE1] interface eth-trunk 1 [*PE1-Eth-Trunk1] mac-address 00e0-fc12-3456 [*PE1-Eth-Trunk1] mode lacp-static [*PE1-Eth-Trunk1] e-trunk 1 [*PE1-Eth-Trunk1] e-trunk mode force-master [*PE1-Eth-Trunk1] es track evpn-peer 2.2.2.2 [*PE1-Eth-Trunk1] esi 0000.0001.0001.0001.0001 [*PE1-Eth-Trunk1] quit [*PE1] interface eth-trunk1.1 mode l2 [*PE1-Eth-Trunk1.1] encapsulation dot1q vid 1 [*PE1-Eth-Trunk1.1] rewrite pop single [*PE1-Eth-Trunk1.1] bridge-domain 10 [*PE1-Eth-Trunk1.1] quit [~PE1] commit
The configuration of PE2 is similar to the configuration of PE1. For configuration details, see Configuration Files in this section.
# Configure PE1.
[~PE1] evpn enhancement port 1345 [*PE1] commit
The same UDP port number must be set for the PEs in the active state.
The configuration of PE2 is similar to the configuration of PE1. For configuration details, see Configuration Files in this section.
PE1 configuration file
#
sysname PE1
#
evpn enhancement port 1345
#
evpn
vlan-extend private enable
vlan-extend redirect enable
local-remote frr enable
bypass-vxlan enable
#
evpn vpn-instance evpn1 bd-mode
route-distinguisher 11:11
vpn-target 1:1 export-extcommunity
vpn-target 1:1 import-extcommunity
#
bridge-domain 10
vxlan vni 10 split-horizon-mode
evpn binding vpn-instance evpn1
#
acl number 3000
rule 5 permit ip source 3.3.3.3 0 destination 4.4.4.4 0
#
e-trunk 1
priority 10
peer-address 2.2.2.2 source-address 1.1.1.1
#
isis 1
network-entity 10.0000.0000.0001.00
frr
#
ike proposal 10
encryption-algorithm aes-cbc 256
dh group14
authentication-algorithm sha2-256
integrity-algorithm hmac-sha2-256
#
ike peer b
pre-shared-key %$%$THBGMJK2659z"C(T{J"-,.2n%$%$
ike-proposal 10
remote-address 6.6.6.6
#
service-location 1
location slot 1
#
service-instance-group group1
service-location 1
#
ipsec proposal tran1
esp authentication-algorithm sha2-256
esp encryption-algorithm aes 256
#
ipsec policy map1 10 isakmp
security acl 3000
ike-peer b
proposal tran1
local-address 5.5.5.5
#
interface Eth-Trunk1
mac-address 00e0-fc12-3456
mode lacp-static
e-trunk 1
e-trunk mode force-master
es track evpn-peer 2.2.2.2
esi 0000.0001.0001.0001.0001
#
interface Eth-Trunk1.1 mode l2
encapsulation dot1q vid 1
rewrite pop single
bridge-domain 10
#
interface GigabitEthernet 0/1/1
undo shutdown
ip address 10.1.20.1 255.255.255.0
#
interface GigabitEthernet 0/1/2
undo shutdown
eth-trunk 1
#
interface GigabitEthernet 0/1/3
undo shutdown
ip address 10.1.1.1 255.255.255.0
#
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
isis enable 1
#
interface LoopBack2
ip address 5.5.5.5 255.255.255.255
isis enable 1
#
interface Nve1
source 3.3.3.3
bypass source 1.1.1.1
mac-address 00e0-fc12-7890
vni 10 head-end peer-list protocol bgp
vni 10 head-end peer-list 4.4.4.4
#
bgp 100
peer 2.2.2.2 as-number 100
peer 2.2.2.2 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
peer 2.2.2.2 enable
#
l2vpn-family evpn
undo policy vpn-target
peer 2.2.2.2 enable
peer 2.2.2.2 advertise encap-type vxlan
#
interface Tunnel1
ip address 10.11.1.1 255.255.255.0
tunnel-protocol ipsec
ipsec policy map1 service-instance-group group1
#
ip route-static 6.6.6.6 255.255.255.255 GigabitEthernet0/1/3 10.1.1.2
ip route-static 4.4.4.4 255.255.255.255 Tunnel1 6.6.6.6
#
return
PE2 configuration file
#
sysname PE2
#
evpn enhancement port 1345
#
evpn
vlan-extend redirect enable
vlan-extend private enable
local-remote frr enable
bypass-vxlan enable
#
evpn vpn-instance evpn1 bd-mode
route-distinguisher 22:22
vpn-target 1:1 export-extcommunity
vpn-target 1:1 import-extcommunity
#
bridge-domain 10
vxlan vni 10 split-horizon-mode
evpn binding vpn-instance evpn1
#
acl number 3000
rule 5 permit ip source 3.3.3.3 0 destination 4.4.4.4 0
#
ike proposal 10
encryption-algorithm aes-cbc 256
dh group14
authentication-algorithm sha2-256
integrity-algorithm hmac-sha2-256
#
ike peer b
pre-shared-key %$%$THBGMJK2659z"C(T{J"-,.2n%$%$
ike-proposal 10
remote-address 2.2.2.2
#
service-location 1
location slot 1
#
service-instance-group group1
service-location 1
#
ipsec proposal tran1
esp authentication-algorithm sha2-256
esp encryption-algorithm aes 256
#
ipsec policy map1 10 isakmp
security acl 3000
ike-peer b
proposal tran1
local-address 5.5.5.5
#
e-trunk 1
priority 10
peer-address 1.1.1.1 source-address 2.2.2.2
#
isis 1
network-entity 10.0000.0000.0002.00
frr
#
interface Eth-Trunk1
mac-address 00e0-fc12-3456
mode lacp-static
e-trunk 1
e-trunk mode force-master
es track evpn-peer 1.1.1.1
esi 0000.0001.0001.0001.0001
#
interface Eth-Trunk1.1 mode l2
encapsulation dot1q vid 1
rewrite pop single
bridge-domain 10
#
interface GigabitEthernet 0/1/1
undo shutdown
ip address 10.1.20.2 255.255.255.0
#
interface GigabitEthernet 0/1/2
undo shutdown
eth-trunk 1
#
interface GigabitEthernet 0/1/3
undo shutdown
ip address 10.1.2.1 255.255.255.0
#
interface LoopBack0
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
isis enable 1
#
interface LoopBack2
ip address 5.5.5.5 255.255.255.255
isis enable 1
#
interface Nve1
source 3.3.3.3
bypass source 2.2.2.2
mac-address 00e0-fc12-7890
vni 10 head-end peer-list protocol bgp
vni 10 head-end peer-list 4.4.4.4
#
bgp 100
peer 1.1.1.1 as-number 100
peer 1.1.1.1 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
peer 1.1.1.1 enable
#
l2vpn-family evpn
undo policy vpn-target
peer 1.1.1.1 enable
peer 1.1.1.1 advertise encap-type vxlan
#
interface Tunnel1
ip address 10.11.1.1 255.255.255.0
tunnel-protocol ipsec
ipsec policy map1 service-instance-group group1
#
ip route-static 6.6.6.6 255.255.255.255 GigabitEthernet0/1/3 10.1.2.2
ip route-static 4.4.4.4 255.255.255.255 Tunnel1 6.6.6.6
#
return
CE configuration file
# sysname CE # vlan batch 1 to 4094 # interface Eth-Trunk1 portswitch port link-type trunk port trunk allow-pass vlan 1 # interface GigabitEthernet 0/1/1 undo shutdown eth-trunk 1 # interface GigabitEthernet 0/1/2 undo shutdown eth-trunk 1 # return
CPE configuration file
#
sysname CPE
#
bridge-domain 10
vxlan vni 10 split-horizon-mode
#
acl number 3000
rule 5 permit ip
#
ike proposal 10
encryption-algorithm aes-cbc 256
dh group14
authentication-algorithm sha2-256
integrity-algorithm hmac-sha2-256
#
ike peer 1
pre-shared-key %$%$THBGMJK2659z"C(T{J"-,.2n%$%$
ike-proposal 10
remote-address 5.5.5.5
#
service-location 1
location slot 1
#
service-instance-group group1
service-location 1
#
ipsec proposal tran1
esp authentication-algorithm sha2-256
esp encryption-algorithm aes 256
#
ipsec policy-template temp1 1
#
security acl 3000
ike-peer 1
proposal tran1
local-address 6.6.6.6
#
ipsec policy 1 1 isakmp template temp1
#
isis 1
network-entity 20.0000.0000.0001.00
frr
#
interface GigabitEthernet 0/1/1
undo shutdown
ip address 10.1.1.2 255.255.255.0
isis enable 1
#
interface GigabitEthernet 0/1/1.1 mode l2
encapsulation dot1q vid 10
rewrite pop single
bridge-domain 10
#
interface LoopBack0
ip address 4.4.4.4 255.255.255.255
isis enable 1
#
interface LoopBack1
ip address 6.6.6.6 255.255.255.255
isis enable 1
#
interface Nve1
source 4.4.4.4
vni 10 head-end peer-list 3.3.3.3
#
interface Tunnel1
ip address 10.22.2.2 255.255.255.255
tunnel-protocol ipsec
ipsec policy 1 service-instance-group group1
#
ip route-static 5.5.5.5 255.255.255.255 GigabitEthernet0/1/1 192.168.1.1
#
return