New Project: Open-Source VXLAN/EVPN Labs
After launching the BGP labs in 2023 and IS-IS labs in 2024, it was time to start another project that was quietly sitting on the back burner for ages: open-source (and free) VXLAN/EVPN labs.
The first lab exercise is already online and expects you to extend a single VLAN segment across an IP underlay network using VXLAN encapsulation with static ingress replication.
You can use the labs on your own netlab-enabled infrastructure (more details), but also within a free GitHub Codespace or even on your Apple-silicon Mac (installation, using Arista cEOS container, using VXLAN/EVPN labs).
I also collected a long list of ideas for future lab exercises. Further suggestions are most welcome; leave them in comments or send me an email.
The lab would start with H1-S1-S2-H2 and VLAN 100 end to end. The challenge is to convert this into VXLAN while running a ping from H1 to H2, trying to come up with ways to avoid or minimize loss of connectivity.
This invites users to explore the impact of introducing these changes
Lovely idea, but pretty hard to implement. I'm guessing you'd run into all sorts of bridging loops as STP is usually not forwarded across VXLAN.
If you find a vendor document saying "this is how you do it" please let me know.