If you are using the current version of Cumulus Linux, the content on this page may not be up to date. The current version of the documentation is available here. If you are redirected to the main page of the user guide, then this page may have been renamed; please search for it there.

Data Center Host to ToR Architecture

This chapter discusses the various architectures and strategies available from the top of rack (ToR) switches all the way down to the server hosts.

Layer 2 - Traditional Spanning Tree - Single Attached

Example
Summary
Bond and Etherchannel are not configured on host to multiple switches (bonds can still occur but only to one switch at a time), so leaf01 and leaf02 see two different MAC addresses.
Benefits
Caveats
  • Established technology: Interoperability with other vendors, easy configuration, a lot of documentation from multiple vendors and the industry
  • Ability to use spanning tree commands: PortAdminEdge and BPDU guard
  • Layer 2 reachability to all VMs
  • The load balancing mechanism on the host can cause problems. If there is only host pinning to each NIC, there are no problems, but if you have a bond, you need to look at an MLAG solution.
  • No active-active host links. Some operating systems allow HA (NIC failover), but this still does not utilize all the bandwidth. VMs use one NIC, not two.
Active-Active Mode
Active-Passive Mode
L2 to L3 Demarcation
None (not possible with traditional spanning tree)VRR
  • ToR layer (recommended)
  • Spine layer
  • Core/edge/exit

You can configure VRR on a pair of switches at any level in the network. However, the higher up the network, the larger the layer 2 domain becomes. The benefit is layer 2 reachability. The drawback is that the layer 2 domain is more difficult to troubleshoot, does not scale as well, and the pair of switches running VRR needs to carry the entire MAC address table of everything below it in the network. Cumulus Professional Services recommends minimizing the layer 2 domain as much as possible. For more information, see this presentation.

Example Configuration

auto bridge
iface bridge
  bridge-vlan-aware yes
  bridge-ports swp1 peerlink
  bridge-vids 1-2000
  bridge-stp on

auto bridge.10
iface bridge.10
  address 10.1.10.2/24

auto peerlink
iface peerlink
    bond-slaves glob swp49-50

auto swp1
iface swp1
  mstpctl-portadminedge yes
  mstpctl-bpduguard yes
auto eth1
iface eth1 inet manual

auto eth1.10
iface eth1.10 inet manual

auto eth2
iface eth1 inet manual

auto eth2.20
iface eth2.20 inet manual

auto br-10
iface br-10 inet manual
  bridge-ports eth1.10 vnet0

auto br-20
iface br-20 inet manual
  bridge-ports eth2.20 vnet1

Layer 2 - MLAG

Example
Summary
MLAG (multi-chassis link aggregation) uses both uplinks at the same time. VRR enables both spines to act as gateways simultaneously for HA (high availability) and active-active mode (both are used at the same time).
Benefits
Caveats
100% of links utilized
  • More complicated (more moving parts)
  • More configuration
  • No interoperability between vendors
  • ISL (inter-switch link) required
Active-Active ModeActive-Passive ModeL2 to L3 DemarcationMore Information
VRRNone
  • ToR layer (recommended)
  • Spine layer
  • Core/edge/exit

    Example Configuration

    auto bridge
    iface bridge
      bridge-vlan-aware yes
      bridge-ports host-01 peerlink
      bridge-vids 1-2000
      bridge-stp on
    
    auto bridge.10
    iface bridge.10
      address 172.16.1.2/24
      address-virtual 44:38:39:00:00:10 172.16.1.1/24
    
    auto peerlink
    iface peerlink
        bond-slaves glob swp49-50
    
    auto peerlink.4094
    iface peerlink.4094
        address 169.254.1.1/30
        clagd-enable yes
        clagd-peer-ip 169.254.1.2
        clagd-system-mac 44:38:39:FF:40:94
    
    auto host-01
    iface host-01
      bond-slaves swp1
      clag-id 1
      {bond-defaults removed for brevity}
    
    auto bond0
    iface bond0 inet manual
      bond-slaves eth0 eth1
      {bond-defaults removed for brevity}
    
    auto bond0.10
    iface bond0.10 inet manual
    
    auto vm-br10
    iface vm-br10 inet manual
      bridge-ports bond0.10 vnet0
    

    Layer 3 - Single-attached Hosts

    Example
    Summary
    The server (physical host) has only has one link to one ToR switch.
    Benefits
    Caveats
    • Relatively simple network configuration
    • No STP
    • No MLAG
    • No layer 2 loops
    • No crosslink between leafs
    • Greater route scaling and flexibility
    • No redundancy for ToR, upgrades can cause downtime
    • There is often no software to support application layer redundancy
      FHR (First Hop Redundancy)
      More Information
      No redundancy for ToR, uses single ToR as gateway.For additional bandwidth, links between host and leaf can be bonded.

      Example Configuration

      /etc/network/interfaces file

      auto swp1
      iface swp1
        address 172.16.1.1/30
      

      /etc/frr/frr.conf file

      router ospf
        router-id 10.0.0.11
      interface swp1
        ip ospf area 0
      

      /etc/network/interfaces file

      auto swp1
      iface swp1
        address 172.16.2.1/30
      

      /etc/frr/frr.conf file

      router ospf
        router-id 10.0.0.12
      interface swp1
        ip ospf area 0
      
      auto eth1
      iface eth1 inet static
        address 172.16.1.2/30
        up ip route add 0.0.0.0/0 nexthop via 172.16.1.1
      
      auto eth1
      iface eth1 inet static
        address 172.16.2.2/30
        up ip route add 0.0.0.0/0 nexthop via 172.16.2.1
      

      Layer 3 - Redistribute Neighbor

      Example
      Summary
      The Redistribute neighbor daemon grabs ARP entries dynamically and uses the redistribute table for FRRouting to take these dynamic entries and redistribute them into the fabric.
      Benefits
      Caveats
      Configuration in FRRouting is simple (route map plus redistribute table)
      • Silent hosts do not receive traffic (depending on ARP)
      • IPv4 only
      • If two VMs are on the same layer 2 domain, they can learn about each other directly instead of using the gateway, which causes problems (such as VM migration or getting the network routed). Put hosts on /32 (no other layer 2 adjacency).
      • VM moves do not trigger a route withdrawal from the original leaf (four hour timeout).
      • Clearing ARP impacts routing.
      • No layer 2 adjacency between servers without VXLAN.
      FHR (First Hop Redundancy)More Information
      • Equal cost route installed on server, host, or hypervisor to both ToRs to load balance evenly.
      • For host/VM/container mobility, use the same default route on all hosts (such as x.x.x.1) but do not distribute or advertise the .1 on the ToR into the fabric. This allows the VM to use the same gateway no matter to which pair of leafs it is cabled.

      Layer 3 - Routing on the Host

      Example
      Summary
      Routing on the host means there is a routing application (such as FRRouting, either on the bare metal host (no VMs or containers) or the hypervisor (for example, Ubuntu with KVM). This is highly recommended by the our Professional Services team.
      Benefits
      Caveats
      • No requirement for MLAG
      • No spanning tree or layer 2 domain
      • No loops
      • You can use three or more ToRs instead of the usual two
      • Host and VM mobility
      • You can use traffic engineering to migrate traffic from one ToR to another when upgrading both hardware and software
      • The hypervisor or host OS might not support a routing application like FRRouting and requires a virtual router on the hypervisor
      • No layer 2 adjacnecy between servers without VXLAN
      FHR (First Hop Redundancy)
      More Information
      • The first hop is still the ToR, just like redistribute neighbor
      • A default route can be advertised by all leaf/ToRs for dynamic ECMP paths

      Layer 3 - Routing on the VM

      Example
      Summary
      Instead of routing on the hypervisor, each virtual machine uses its own routing stack.
      Benefits
      Caveats
      In addition to routing on host:
      • The hypervisor/base OS does not need to be able to do routing.
      • VMs can be authenticated into routing fabric.
      • All VMs must be capable of routing
      • You need to take scale considerations into an account; instead of one routing process, there are as many as there are VMs
      • No layer 2 adjacency between servers without VXLAN
      FHR (First Hop Redundancy)
      More Information
      • The first hop is still the ToR, just like redistribute neighbor
      • You can use multiple ToRs (two or more)

        Layer 3 - Virtual Router

        Example
        Summary
        Virtual router (vRouter) runs as a VM on the hypervisor or host and sends routes to the ToR using BGP or OSPF.
        Benefits
        Caveats
        In addition to routing on a host:
        • Multi-tenancy can work, where multiple customers share the same racks
        • The base OS does not need to be routing capable
        • ECMP might not work correctly (load balancing to multiple ToRs); the Linux kernel in older versions is not capable of ECMP per flow (it does it per packet)
        • No layer 2 adjacency between servers without VXLAN
        FHR (First Hop Redundancy)
        More Information
        • The gateway is the vRouter, which has two routes out (two ToRs)
        • You can use multiple vRouters

        Layer 3 - Anycast with Manual Redistribution

        Example
        Summary
        In contrast to routing on the host (preferred), this method allows you to route to the host. The ToRs are the gateway, as with redistribute neighbor, except because there is no daemon running, you must manually configure the networks under the routing process. There is a potential to black hole unless you run a script to remove the routes when the host no longer responds.
        Benefits
        Caveats
        • Most benefits of routing on the host
        • No requirement for host to run routing
        • No requirement for redistribute neighbor
        • Removing a subnet from one ToR and re-adding it to another (network statements from your router process) is a manual process
        • Network team and server team have to be in sync, or the server team controls the ToR, or automation is used used whenever VM migration occurs
        • When using VMs or containers it is very easy to black hole traffic, as the leafs continue to advertise prefixes even when the VM is down
        • No layer 2 adjacency between servers without VXLAN
        FHR (First Hop Redundancy)
        The gateways are the ToRs, exactly like redistribute neighbor with an equal cost route installed.

        Example Configuration

        /etc/network/interfaces file

        auto swp1
        iface swp1
          address 172.16.1.1/30
        

        /etc/frr/frr.conf file

        router ospf
          router-id 10.0.0.11
        interface swp1
          ip ospf area 0
        

        /etc/network/interfaces file

        auto swp2
        iface swp2
          address 172.16.1.1/30
        

        /etc/frr/frr.conf file

        router ospf
          router-id 10.0.0.12
        interface swp1
          ip ospf area 0
        
        auto lo
        iface lo inet loopback
        
        auto lo:1
        iface lo:1 inet static
          address 172.16.1.2/32
          up ip route add 0.0.0.0/0 nexthop via 172.16.1.1 dev eth0 onlink nexthop via 172.16.1.1 dev eth1 onlink
        
        auto eth1
        iface eth2 inet static
          address 172.16.1.2/32
        
        auto eth2
        iface eth2 inet static
          address 172.16.1.2/32
        

        Layer 3 - EVPN with Symmetric VXLAN Routing

        Symmetric VXLAN routing is configured directly on the ToR, using EVPN for both VLAN and VXLAN bridging as well as VXLAN and external routing.

        Each server is configured on a VLAN, with a total of two VLANs for the setup. MLAG is also set up between servers and the leafs. Each leaf is configured with an anycast gateway and the servers default gateways are pointing towards the corresponding leaf switch IP gateway address. Two tenant VNIs (corresponding to two VLANs/VXLANs) are bridged to corresponding VLANs.

        Benefits
        Caveats
        • Layer 2 domain is reduced to the pair of ToRs
        • Aggregation layer is all layer 3 (VLANs do not have to exist on spine switches)
        • Greater route scaling and flexibility
        • High availability
        Needs MLAG (with the same caveats as the MLAG section above)
        Active-Active ModeActive-Passive ModeDemarcationMore Information
        VRRNoneToR layer

        Example Configuration

        # Loopback interface
        auto lo
        iface lo inet loopback
          address 10.0.0.11/32
          clagd-vxlan-anycast-ip 10.0.0.112
          alias loopback interface
        
        # Management interface
         auto eth0
         iface eth0 inet dhcp
            vrf mgmt
        
        auto mgmt
        iface mgmt
            address 127.0.0.1/8
            address ::1/128
            vrf-table auto
        
        # Port to Server01
        auto swp1
        iface swp1
          alias to Server01
          # This is required for Vagrant only
          post-up ip link set swp1 promisc on
        
        # Port to Server02
        auto swp2
        iface swp2
          alias to Server02
          # This is required for Vagrant only
          post-up ip link set swp2 promisc on
        
        # Port to Leaf02
        auto swp49
        iface swp49
          alias to Leaf02
          # This is required for Vagrant only
          post-up ip link set swp49 promisc on
        
        # Port to Leaf02
        auto swp50
        iface swp50
          alias to Leaf02
          # This is required for Vagrant only
          post-up ip link set swp50 promisc on
        
        # Port to Spine01
        auto swp51
        iface swp51
          mtu 9216
          alias to Spine01
        
        # Port to Spine02
        auto swp52
        iface swp52
          mtu 9216
          alias to Spine02
        
        # MLAG Peerlink bond
        auto peerlink
        iface peerlink
          mtu 9000
          bond-slaves swp49 swp50
        
        # MLAG Peerlink L2 interface.
        # This creates VLAN 4094 that only lives on the peerlink bond
        # No other interface will be aware of VLAN 4094
        auto peerlink.4094
        iface peerlink.4094
          address 169.254.1.1/30
          clagd-peer-ip 169.254.1.2
          clagd-backup-ip 10.0.0.12
          clagd-sys-mac 44:39:39:ff:40:94
          clagd-priority 100
        
        # Bond to Server01
        auto bond01
        iface bond01
          mtu 9000
          bond-slaves swp1
          bridge-access 13
          clag-id 1
        
        # Bond to Server02
        auto bond02
        iface bond02
          mtu 9000
          bond-slaves swp2
          bridge-access 24
          clag-id 2
        
        # Define the bridge for STP
        auto bridge
        iface bridge
          bridge-vlan-aware yes
          # bridge-ports includes all ports related to VxLAN and CLAG.
          # does not include the Peerlink.4094 subinterface
          bridge-ports bond01 bond02 peerlink vni13 vni24 vxlan4001
          bridge-vids 13 24
          bridge-pvid 1
        
        # VXLAN Tunnel for Server1-Server3 (Vlan 13)
        auto vni13
        iface vni13
          mtu 9000
          vxlan-id 13
          vxlan-local-tunnelip 10.0.0.11
          bridge-access 13
          mstpctl-bpduguard yes
          mstpctl-portbpdufilter yes
        
        #VXLAN Tunnel for Server2-Server4 (Vlan 24)
        auto vni24
        iface vni24
          mtu 9000
          vxlan-id 24
          vxlan-local-tunnelip 10.0.0.11
          bridge-access 24
          mstpctl-bpduguard yes
          mstpctl-portbpdufilter yes
        
        auto vxlan4001
        iface vxlan4001
            vxlan-id 104001
            vxlan-local-tunnelip 10.0.0.11
            bridge-access 4001
        
        auto vrf1
        iface vrf1
           vrf-table auto
        
        #Tenant SVIs - anycast GW
        auto vlan13
        iface vlan13
            address 10.1.3.11/24
            address-virtual 44:39:39:ff:00:13 10.1.3.1/24
            vlan-id 13
            vlan-raw-device bridge
            vrf vrf1
        
        auto vlan24
        iface vlan24
            address 10.2.4.11/24
            address-virtual 44:39:39:ff:00:24 10.2.4.1/24
            vlan-id 24
            vlan-raw-device bridge
            vrf vrf1
        
        #L3 VLAN interface per tenant (for L3 VNI)
        auto vlan4001
        iface vlan4001
            hwaddress 44:39:39:FF:40:94
            vlan-id 4001
            vlan-raw-device bridge
            vrf vrf1
        
        # Loopback interface
        auto lo
        iface lo inet loopback
          address 10.0.0.12/32
          clagd-vxlan-anycast-ip 10.0.0.112
          alias loopback interface
        
        # Management interface
        auto eth0
        iface eth0 inet dhcp
            vrf mgmt
        
        auto mgmt
        iface mgmt
            address 127.0.0.1/8
            address ::1/128
            vrf-table auto
        
        # Port to Server01
        auto swp1
        iface swp1
          alias to Server01
          # This is required for Vagrant only
          post-up ip link set swp1 promisc on
        
        # Port to Server02
        auto swp2
        iface swp2
          alias to Server02
          # This is required for Vagrant only
          post-up ip link set swp2 promisc on
        
        # Port to Leaf01
        auto swp49
        iface swp49
          alias to Leaf01
          # This is required for Vagrant only
          post-up ip link set swp49 promisc on
        
        # Port to Leaf01
        auto swp50
        iface swp50
          alias to Leaf01
          # This is required for Vagrant only
          post-up ip link set swp50 promisc on
        
        # Port to Spine01
        auto swp51
        iface swp51
          mtu 9216
          alias to Spine01
        
        # Port to Spine02
        auto swp52
        iface swp52
          mtu 9216
          alias to Spine02
        
        # MLAG Peerlink bond
        auto peerlink
        iface peerlink
          mtu 9000
          bond-slaves swp49 swp50
        
        # MLAG Peerlink L2 interface.
        # This creates VLAN 4094 that only lives on the peerlink bond
        # No other interface will be aware of VLAN 4094
        auto peerlink.4094
        iface peerlink.4094
          address 169.254.1.2/30
          clagd-peer-ip 169.254.1.1
          clagd-backup-ip 10.0.0.11
          clagd-sys-mac 44:39:39:ff:40:94
          clagd-priority 200
        
        # Bond to Server01
        auto bond01
        iface bond01
          mtu 9000
          bond-slaves swp1
          bridge-access 13
          clag-id 1
        
        # Bond to Server02
        auto bond02
        iface bond02
          mtu 9000
          bond-slaves swp2
          bridge-access 24
          clag-id 2
        
        # Define the bridge for STP
        auto bridge
        iface bridge
          bridge-vlan-aware yes
          # bridge-ports includes all ports related to VxLAN and CLAG.
          # does not include the Peerlink.4094 subinterface
          bridge-ports bond01 bond02 peerlink vni13 vni24 vxlan4001
          bridge-vids 13 24
          bridge-pvid 1
        
        auto vxlan4001
        iface vxlan4001
             vxlan-id 104001
             vxlan-local-tunnelip 10.0.0.12
             bridge-access 4001
        
        # VXLAN Tunnel for Server1-Server3 (Vlan 13)
        auto vni13
        iface vni13
          mtu 9000
          vxlan-id 13
          vxlan-local-tunnelip 10.0.0.12
          bridge-access 13
          mstpctl-bpduguard yes
          mstpctl-portbpdufilter yes
        
        #VXLAN Tunnel for Server2-Server4 (Vlan 24)
        auto vni24
        iface vni24
          mtu 9000
          vxlan-id 24
          vxlan-local-tunnelip 10.0.0.12
          bridge-access 24
          mstpctl-bpduguard yes
          mstpctl-portbpdufilter yes
        
        auto vrf1
        iface vrf1
           vrf-table auto
        
        auto vlan13
        iface vlan13
            address 10.1.3.12/24
            address-virtual 44:39:39:ff:00:13 10.1.3.1/24
            vlan-id 13
            vlan-raw-device bridge
            vrf vrf1
        
        auto vlan24
        iface vlan24
            address 10.2.4.12/24
            address-virtual 44:39:39:ff:00:24 10.2.4.1/24
            vlan-id 24
            vlan-raw-device bridge
            vrf vrf1
        
        #L3 VLAN interface per tenant (for L3 VNI)
        auto vlan4001
        iface vlan4001
            hwaddress 44:39:39:FF:40:94
            vlan-id 4001
            vlan-raw-device bridge
            vrf vrf1
        
        auto lo
        iface lo inet loopback
        
        auto eth0
        iface eth0 inet dhcp
        
        auto eth1
        iface eth1 inet manual
          bond-master uplink
          # Required for Vagrant
          post-up ip link set promisc on dev eth1
        
        auto eth2
        iface eth2 inet manual
          bond-master uplink
          # Required for Vagrant
          post-up ip link set promisc on dev eth2
        
        auto uplink
        iface uplink inet static
          mtu 9000
          bond-slaves none
          bond-mode 802.3ad
          bond-miimon 100
          bond-lacp-rate 1
          bond-min-links 1
          bond-xmit-hash-policy layer3+4
          address 10.1.3.101
          netmask 255.255.255.0
          post-up ip route add default via 10.1.3.1
        
        auto lo
        iface lo inet loopback
        
        auto eth0
        iface eth0 inet dhcp
        
        auto eth1
        iface eth1 inet manual
          bond-master uplink
          # Required for Vagrant
          post-up ip link set promisc on dev eth1
        
        auto eth2
        iface eth2 inet manual
          bond-master uplink
          # Required for Vagrant
          post-up ip link set promisc on dev eth2
        
        auto uplink
        iface uplink inet static
          mtu 9000
          bond-slaves none
          bond-mode 802.3ad
          bond-miimon 100
          bond-lacp-rate 1
          bond-min-links 1
          bond-xmit-hash-policy layer3+4
          address 10.2.4.102
          netmask 255.255.255.0
          post-up ip route add default via 10.2.4.1