<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: L2VPN/EVPN E-BGP Session not forming in Server Networking</title>
    <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4616588#M13388</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no firewall between these Nexus switches these are x-Connects between DC Racks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Total peers 4, established peers 4&lt;BR /&gt;ASN 65002&lt;BR /&gt;VRF default, local ASN 65002&lt;BR /&gt;peers 4, established peers 4, local router-id 221.221.221.221&lt;BR /&gt;State: I-Idle, A-Active, O-Open, E-Established, C-Closing, S-Shutdown&lt;/P&gt;
&lt;P&gt;Neighbor ASN Flaps LastUpDn|LastRead|LastWrit St Port(L/R) Notif(S/R)&lt;BR /&gt;121.121.121.121 65001 1136 00:02:12|00:02:12|00:00:11 E 179/31544 1136/0&lt;BR /&gt;122.122.122.122 65001 1136 00:02:00|00:02:00|00:00:59 E 179/45164 1136/0&lt;BR /&gt;211.211.211.211 65002 0 4w1d |00:00:51|00:00:02 E 179/31192 0/0&lt;BR /&gt;212.212.212.212 65002 0 4w1d |00:00:02|00:00:51 E 179/34865 0/0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can see it using port 179.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Lewis&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 May 2022 15:24:42 GMT</pubDate>
    <dc:creator>LewisD1</dc:creator>
    <dc:date>2022-05-24T15:24:42Z</dc:date>
    <item>
      <title>L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4616475#M13386</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm having an issue with BGP sessions expiring. This issues seems to resolve itself after hours/days then works solidly for weeks before the issue then re-occurs and i'm drawing up a blank. All the iBGP sessions work without issues just the E-BGP sessions causing me grief. Im using BGP multihop for the Peering with dual 10GB Links and a multiarea OSPF underlay.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is what i'm seeing in the logs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;22 May 24 12:35:51.876119 bgp: [23668] (default) ADJ: 122.122.122.122 keepalive timer fired&lt;BR /&gt;2022 May 24 12:35:51.876144 bgp: [23668] (default) ADJ: 122.122.122.122 keepalive timer fired for peer&lt;BR /&gt;2022 May 24 12:35:51.876155 bgp: [23668] (default) ADJ: 122.122.122.122 sending KEEPALIVE&lt;BR /&gt;2022 May 24 12:35:51.876639 bgp: [23668] (default) ADJ: 122.122.122.122 next keepalive expiry due in 00:00:59&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2022 May 24 12:32:22.329490 bgp: [23668] (default) ADJ: 121.121.121.121 keepalive timer fired&lt;BR /&gt;2022 May 24 12:32:22.329520 bgp: [23668] (default) ADJ: 121.121.121.121 keepalive timer fired for peer&lt;BR /&gt;2022 May 24 12:32:22.329537 bgp: [23668] (default) ADJ: 121.121.121.121 sending KEEPALIVE&lt;BR /&gt;2022 May 24 12:32:22.330033 bgp: [23668] (default) ADJ: 121.121.121.121 next keepalive expiry due in 00:00:59&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the other side i see this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2022 May 24 12:34:18.077881 bgp: [26672] (default) ADJ: 221.221.221.221 keepalive timer fired&lt;BR /&gt;2022 May 24 12:34:18.077907 bgp: [26672] (default) ADJ: 221.221.221.221 keepalive timer fired for peer&lt;BR /&gt;2022 May 24 12:34:18.077918 bgp: [26672] (default) ADJ: 221.221.221.221 sending KEEPALIVE&lt;BR /&gt;2022 May 24 12:34:18.078387 bgp: [26672] (default) ADJ: 221.221.221.221 next keepalive expiry due in 00:00:59&lt;BR /&gt;2022 May 24 12:34:18.086460 bgp: [26672] (default) ADJ: Peer 221.221.221.221 has pending data on socket during recv, extending expiry timer&lt;BR /&gt;2022 May 24 12:34:18.086940 bgp: [26672] (default) ADJ: 221.221.221.221 KEEPALIVE rcvd&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2022 May 24 12:34:03.584558 bgp: [26672] (default) ADJ: 222.222.222.222 keepalive timer fired&lt;BR /&gt;2022 May 24 12:34:03.584588 bgp: [26672] (default) ADJ: 222.222.222.222 keepalive timer fired for peer&lt;BR /&gt;2022 May 24 12:34:03.584598 bgp: [26672] (default) ADJ: 222.222.222.222 sending KEEPALIVE&lt;BR /&gt;2022 May 24 12:34:03.585085 bgp: [26672] (default) ADJ: 222.222.222.222 next keepalive expiry due in 00:00:59&lt;BR /&gt;2022 May 24 12:34:03.587219 bgp: [26672] (default) ADJ: Peer 222.222.222.222 has pending data on socket during recv, extending expiry timer&lt;BR /&gt;2022 May 24 12:34:03.587696 bgp: [26672] (default) ADJ: 222.222.222.222 KEEPALIVE rcvd&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So keep alives are being sent in both directions but only received on one side. Everytime the other side sends one it get the error,&amp;nbsp;has pending data on socket during recv, extending expiry timer. This causing the timers to expire and it to start all over again.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Site 1 Relationships.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show bgp l2vpn evpn summary&lt;BR /&gt;BGP summary information for VRF default, address family L2VPN EVPN&lt;BR /&gt;BGP router identifier 121.121.121.121, local AS number 65001&lt;BR /&gt;BGP table version is 879001, L2VPN EVPN config peers 4, capable peers 4&lt;BR /&gt;356 network entries and 505 paths using 104744 bytes of memory&lt;BR /&gt;BGP attribute entries [77/13244], BGP AS path entries [1/6]&lt;BR /&gt;BGP community entries [0/0], BGP clusterlist entries [0/0]&lt;/P&gt;
&lt;P&gt;Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd&lt;BR /&gt;111.111.111.111 4 65001 80151 67103 879001 0 0 6w5d 118&lt;BR /&gt;112.112.112.112 4 65001 69159 64569 879001 0 0 6w5d 89&lt;BR /&gt;221.221.221.221 4 65002 130290 71161 879001 0 0 00:00:50 149&lt;BR /&gt;222.222.222.222 4 65002 130307 71155 879001 0 0 00:00:05 149&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Site 2&lt;/P&gt;
&lt;P&gt;show bgp l2vpn evpn summary&lt;BR /&gt;BGP summary information for VRF default, address family L2VPN EVPN&lt;BR /&gt;BGP router identifier 221.221.221.221, local AS number 65002&lt;BR /&gt;BGP table version is 52220, L2VPN EVPN config peers 4, capable peers 4&lt;BR /&gt;149 network entries and 149 paths using 36356 bytes of memory&lt;BR /&gt;BGP attribute entries [36/6192], BGP AS path entries [0/0]&lt;BR /&gt;BGP community entries [0/0], BGP clusterlist entries [0/0]&lt;/P&gt;
&lt;P&gt;Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd&lt;BR /&gt;121.121.121.121 4 65001 48978 46551 52220 0 0 00:01:34 0&lt;BR /&gt;122.122.122.122 4 65001 48986 46548 52220 0 0 00:01:16 0&lt;BR /&gt;211.211.211.211 4 65002 48500 40812 52220 0 0 4w1d 92&lt;BR /&gt;212.212.212.212 4 65002 42174 39843 52220 0 0 4w1d 57&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show run bgp&lt;/P&gt;
&lt;P&gt;router bgp 65002&lt;BR /&gt;router-id 221.221.221.221&lt;BR /&gt;log-neighbor-changes&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;address-family l2vpn evpn&lt;BR /&gt;retain route-target all&lt;BR /&gt;template peer INTER-BGP-PEER&lt;BR /&gt;remote-as 65001&lt;BR /&gt;update-source loopback0&lt;BR /&gt;ebgp-multihop 10&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;send-community&lt;BR /&gt;send-community extended&lt;BR /&gt;address-family l2vpn evpn&lt;BR /&gt;send-community&lt;BR /&gt;send-community extended&lt;BR /&gt;route-map NH-Unchanged out&lt;BR /&gt;template peer INTRA-BGP-PEER&lt;BR /&gt;remote-as 65002&lt;BR /&gt;update-source loopback0&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;send-community&lt;BR /&gt;send-community extended&lt;BR /&gt;route-reflector-client&lt;BR /&gt;address-family l2vpn evpn&lt;BR /&gt;send-community&lt;BR /&gt;send-community extended&lt;BR /&gt;route-reflector-client&lt;BR /&gt;neighbor 121.121.121.121&lt;BR /&gt;inherit peer INTER-BGP-PEER&lt;BR /&gt;remote-as 65001&lt;BR /&gt;neighbor 122.122.122.122&lt;BR /&gt;inherit peer INTER-BGP-PEER&lt;BR /&gt;remote-as 65001&lt;BR /&gt;neighbor 211.211.211.211&lt;BR /&gt;inherit peer INTRA-BGP-PEER&lt;BR /&gt;neighbor 212.212.212.212&lt;BR /&gt;inherit peer INTRA-BGP-PEER&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show run bgp&lt;/P&gt;
&lt;P&gt;router bgp 65001&lt;BR /&gt;router-id 121.121.121.121&lt;BR /&gt;log-neighbor-changes&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;address-family l2vpn evpn&lt;BR /&gt;retain route-target all&lt;BR /&gt;template peer INTER-BGP-PEER&lt;BR /&gt;remote-as 65002&lt;BR /&gt;update-source loopback0&lt;BR /&gt;ebgp-multihop 10&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;send-community&lt;BR /&gt;send-community extended&lt;BR /&gt;address-family l2vpn evpn&lt;BR /&gt;send-community&lt;BR /&gt;send-community extended&lt;BR /&gt;route-map NH-Unchanged out&lt;BR /&gt;template peer INTRA-BGP-PEER&lt;BR /&gt;remote-as 65001&lt;BR /&gt;update-source loopback0&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;send-community&lt;BR /&gt;send-community extended&lt;BR /&gt;route-reflector-client&lt;BR /&gt;address-family l2vpn evpn&lt;BR /&gt;send-community&lt;BR /&gt;send-community extended&lt;BR /&gt;route-reflector-client&lt;BR /&gt;neighbor 111.111.111.111&lt;BR /&gt;inherit peer INTRA-BGP-PEER&lt;BR /&gt;neighbor 112.112.112.112&lt;BR /&gt;inherit peer INTRA-BGP-PEER&lt;BR /&gt;neighbor 221.221.221.221&lt;BR /&gt;inherit peer INTER-BGP-PEER&lt;BR /&gt;remote-as 65002&lt;BR /&gt;neighbor 222.222.222.222&lt;BR /&gt;inherit peer INTER-BGP-PEER&lt;BR /&gt;remote-as 65002&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Software Version&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BIOS: version 07.69&lt;/P&gt;
&lt;P&gt;NXOS: version 9.3(8)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help would be appreciated. Like i say it will just fix its self without any changes but once its down i cant seem to get the peers to form.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 10:02:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4616475#M13386</guid>
      <dc:creator>LewisD1</dc:creator>
      <dc:date>2022-05-27T10:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Session not forming</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4616577#M13387</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;SPAN&gt;show bgp summary no &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;OutQ&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;so both peer send&amp;nbsp;receive&amp;nbsp;keep alive but the message is drop in away&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;show tcp brief&lt;BR /&gt;&lt;/SPAN&gt;check the router that not receive the keep alive is using known 179 TCP port not use unknown port.&lt;BR /&gt;&lt;BR /&gt;this give us a sign that there is FW in away that drop TCP connection and since the KEEPalive don't have SYN flag the FW will drop it "drop in one way"&lt;BR /&gt;then after both Peer find that TCP is down they establish new TCP session with new SYN flag TCP packet and this allow to pass from FW.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;so depend on your topology check this point.&lt;BR /&gt;Note:- if you have two FW and the IGP is shift traffic from one FW to other you will also face same issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 24 May 2022 15:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4616577#M13387</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-24T15:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Session not forming</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4616588#M13388</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no firewall between these Nexus switches these are x-Connects between DC Racks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Total peers 4, established peers 4&lt;BR /&gt;ASN 65002&lt;BR /&gt;VRF default, local ASN 65002&lt;BR /&gt;peers 4, established peers 4, local router-id 221.221.221.221&lt;BR /&gt;State: I-Idle, A-Active, O-Open, E-Established, C-Closing, S-Shutdown&lt;/P&gt;
&lt;P&gt;Neighbor ASN Flaps LastUpDn|LastRead|LastWrit St Port(L/R) Notif(S/R)&lt;BR /&gt;121.121.121.121 65001 1136 00:02:12|00:02:12|00:00:11 E 179/31544 1136/0&lt;BR /&gt;122.122.122.122 65001 1136 00:02:00|00:02:00|00:00:59 E 179/45164 1136/0&lt;BR /&gt;211.211.211.211 65002 0 4w1d |00:00:51|00:00:02 E 179/31192 0/0&lt;BR /&gt;212.212.212.212 65002 0 4w1d |00:00:02|00:00:51 E 179/34865 0/0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can see it using port 179.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Lewis&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 15:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4616588#M13388</guid>
      <dc:creator>LewisD1</dc:creator>
      <dc:date>2022-05-24T15:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619160#M13390</link>
      <description>&lt;P&gt;Any ideas. Really scratching my head on this one.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 10:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619160#M13390</guid>
      <dc:creator>LewisD1</dc:creator>
      <dc:date>2022-05-27T10:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619203#M13392</link>
      <description>&lt;P&gt;I not finish the analysis the issue but&amp;nbsp;&lt;BR /&gt;flapping BGP Peer may cause from&amp;nbsp;&lt;BR /&gt;1-Bad BGP update&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;2-MTU mismatch&amp;nbsp;&lt;BR /&gt;3- High CPU&lt;BR /&gt;4-Improper Control-Plane Policing&amp;nbsp;&lt;/P&gt;&lt;P&gt;5-Hold Timer Expired&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;according to info. you give me I will send you roadmap to how check which of five is causing the BGP flap.&lt;BR /&gt;&lt;BR /&gt;but until that time you can check&amp;nbsp;&lt;BR /&gt;High CPU&amp;nbsp;&lt;BR /&gt;Control-Plane Policing&amp;nbsp;&lt;BR /&gt;MTU mismatch&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for MTU mismatch this easy&amp;nbsp;&lt;BR /&gt;ping BGP peer using MTU with DF bit set, see if ping is success&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 27 May 2022 11:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619203#M13392</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-27T11:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619215#M13393</link>
      <description>&lt;P&gt;Hello MHM,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The hold timer is expiring due to it not being able to received the messages. This is the error i am receiving.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Peer .... has pending data on socket during recv, extending expiry timer&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I am currently using the default timers but have tried to adjust the timers as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We currently have Copp profile set to strict on the 4 switches.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Its not an MTU mismatch because the relationship forms ok just failed to keep it up. I have done a ping test just to be sure.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ping 222.222.222.222 packet-size 9000&lt;BR /&gt;PING 222.222.222.222 (222.222.222.222): 9000 data bytes&lt;BR /&gt;9008 bytes from 222.222.222.222: icmp_seq=0 ttl=252 time=3.918 ms&lt;BR /&gt;9008 bytes from 222.222.222.222: icmp_seq=1 ttl=252 time=3.395 ms&lt;BR /&gt;9008 bytes from 222.222.222.222: icmp_seq=2 ttl=252 time=3.346 ms&lt;BR /&gt;9008 bytes from 222.222.222.222: icmp_seq=3 ttl=252 time=3.357 ms&lt;BR /&gt;9008 bytes from 222.222.222.222: icmp_seq=4 ttl=252 time=3.452 ms&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Lewis&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 12:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619215#M13393</guid>
      <dc:creator>LewisD1</dc:creator>
      <dc:date>2022-05-27T12:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619224#M13394</link>
      <description>&lt;P&gt;please do one more ping test with&amp;nbsp;&lt;BR /&gt;use source IP the BGP Peer IP.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 12:16:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619224#M13394</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-27T12:16:54Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619241#M13395</link>
      <description>&lt;P&gt;Done another one&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;# ping 2.2.2.3 source 121.121.121.121 packet-size 9000&lt;BR /&gt;PING 2.2.2.3 (2.2.2.3) from 121.121.121.121: 9000 data bytes&lt;BR /&gt;9008 bytes from 2.2.2.3: icmp_seq=0 ttl=252 time=3.873 ms&lt;BR /&gt;9008 bytes from 2.2.2.3: icmp_seq=1 ttl=252 time=3.468 ms&lt;BR /&gt;9008 bytes from 2.2.2.3: icmp_seq=2 ttl=252 time=3.379 ms&lt;BR /&gt;9008 bytes from 2.2.2.3: icmp_seq=3 ttl=252 time=3.379 ms&lt;BR /&gt;9008 bytes from 2.2.2.3: icmp_seq=4 ttl=252 time=3.44 ms&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 12:35:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619241#M13395</guid>
      <dc:creator>LewisD1</dc:creator>
      <dc:date>2022-05-27T12:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619321#M13396</link>
      <description>&lt;P&gt;&lt;SPAN&gt;time-1 do&amp;nbsp;&lt;BR /&gt;show bgp l2vpn evpn summary&lt;BR /&gt;for both Peer&lt;BR /&gt;time-2 do&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;show bgp l2vpn evpn summary&lt;BR /&gt;for both peer&amp;nbsp;&lt;BR /&gt;please if you can share here&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 14:10:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619321#M13396</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-27T14:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619328#M13397</link>
      <description>&lt;P&gt;show bgp l2vpn evpn summary&lt;BR /&gt;BGP summary information for VRF default, address family L2VPN EVPN&lt;BR /&gt;BGP router identifier 121.121.121.121, local AS number 65001&lt;BR /&gt;BGP table version is 786094, L2VPN EVPN config peers 4, capable peers 4&lt;BR /&gt;348 network entries and 491 paths using 102072 bytes of memory&lt;BR /&gt;BGP attribute entries [73/12556], BGP AS path entries [1/6]&lt;BR /&gt;BGP community entries [0/0], BGP clusterlist entries [0/0]&lt;/P&gt;
&lt;P&gt;Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd&lt;BR /&gt;111.111.111.111 4 65001 5243 4274 786094 0 0 2d22h 117&lt;BR /&gt;112.112.112.112 4 65001 4275 4113 786094 0 0 2d22h 88&lt;BR /&gt;221.221.221.221 4 65002 61058 9410 786094 0 0 00:01:41 143&lt;BR /&gt;222.222.222.222 4 65002 3759 646 786094 0 0 00:00:01 143&lt;/P&gt;
&lt;P&gt;---------------------------&lt;/P&gt;
&lt;P&gt;show bgp l2vpn evpn summary&lt;BR /&gt;BGP summary information for VRF default, address family L2VPN EVPN&lt;BR /&gt;BGP router identifier 122.122.122.122, local AS number 65001&lt;BR /&gt;BGP table version is 1686043, L2VPN EVPN config peers 4, capable peers 4&lt;BR /&gt;348 network entries and 491 paths using 102072 bytes of memory&lt;BR /&gt;BGP attribute entries [73/12556], BGP AS path entries [1/6]&lt;BR /&gt;BGP community entries [0/0], BGP clusterlist entries [0/0]&lt;/P&gt;
&lt;P&gt;Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd&lt;BR /&gt;111.111.111.111 4 65001 85526 71264 1686043 0 0 7w1d 117&lt;BR /&gt;112.112.112.112 4 65001 73554 68564 1686043 0 0 7w1d 88&lt;BR /&gt;221.221.221.221 4 65002 193260 80898 1686043 0 0 00:02:44 143&lt;BR /&gt;222.222.222.222 4 65002 192901 80862 1686043 0 0 00:01:36 143&lt;/P&gt;
&lt;P&gt;----------------------------&lt;/P&gt;
&lt;P&gt;show bgp l2vpn evpn summary&lt;BR /&gt;BGP summary information for VRF default, address family L2VPN EVPN&lt;BR /&gt;BGP router identifier 221.221.221.221, local AS number 65002&lt;BR /&gt;BGP table version is 377, L2VPN EVPN config peers 4, capable peers 4&lt;BR /&gt;143 network entries and 143 paths using 34892 bytes of memory&lt;BR /&gt;BGP attribute entries [31/5332], BGP AS path entries [0/0]&lt;BR /&gt;BGP community entries [0/0], BGP clusterlist entries [0/0]&lt;/P&gt;
&lt;P&gt;Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd&lt;BR /&gt;121.121.121.121 4 65001 142 534 377 0 0 00:00:34 0&lt;BR /&gt;122.122.122.122 4 65001 145 535 377 0 0 00:00:16 0&lt;BR /&gt;211.211.211.211 4 65002 253 218 377 0 0 03:23:49 86&lt;BR /&gt;212.212.212.212 4 65002 232 210 377 0 0 03:21:03 57&lt;/P&gt;
&lt;P&gt;---------------------------&lt;/P&gt;
&lt;P&gt;show bgp l2vpn evpn summary&lt;BR /&gt;BGP summary information for VRF default, address family L2VPN EVPN&lt;BR /&gt;BGP router identifier 2.2.2.3, local AS number 65002&lt;BR /&gt;BGP table version is 407, L2VPN EVPN config peers 4, capable peers 4&lt;BR /&gt;143 network entries and 229 paths using 45212 bytes of memory&lt;BR /&gt;BGP attribute entries [50/8600], BGP AS path entries [0/0]&lt;BR /&gt;BGP community entries [0/0], BGP clusterlist entries [1/8]&lt;/P&gt;
&lt;P&gt;Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd&lt;BR /&gt;121.121.121.121 4 65001 128 517 407 0 0 00:02:41 0&lt;BR /&gt;122.122.122.122 4 65001 140 517 407 0 0 00:02:57 0&lt;BR /&gt;211.211.211.211 4 65002 256 216 407 0 0 03:23:37 86&lt;BR /&gt;212.212.212.212 4 65002 267 207 407 0 0 03:21:37 143&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 14:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619328#M13397</guid>
      <dc:creator>LewisD1</dc:creator>
      <dc:date>2022-05-27T14:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619367#M13398</link>
      <description>&lt;P&gt;&lt;STRONG&gt;commend reference&amp;nbsp;&lt;BR /&gt;ping&lt;/STRONG&gt; &lt;SPAN class=""&gt;{&lt;/SPAN&gt; &lt;EM&gt;dest-address&lt;/EM&gt; &lt;SPAN class=""&gt;| &lt;/SPAN&gt;&lt;EM&gt;hostname&lt;/EM&gt; &lt;SPAN class=""&gt;} [&lt;/SPAN&gt; &lt;STRONG&gt;count&lt;/STRONG&gt; &lt;SPAN class=""&gt;{&lt;/SPAN&gt; &lt;EM&gt;number&lt;/EM&gt; &lt;SPAN class=""&gt;| &lt;/SPAN&gt;&lt;STRONG&gt;unlimited&lt;/STRONG&gt; &lt;SPAN class=""&gt;}] [&lt;/SPAN&gt; &lt;STRONG&gt;df-bit&lt;/STRONG&gt; &lt;SPAN class=""&gt;] [&lt;/SPAN&gt; &lt;STRONG&gt;interval&lt;/STRONG&gt; &lt;EM&gt;seconds&lt;/EM&gt; &lt;SPAN class=""&gt;] [&lt;/SPAN&gt; &lt;STRONG&gt;packet-size&lt;/STRONG&gt; &lt;EM&gt;bytes&lt;/EM&gt; &lt;SPAN class=""&gt;] [&lt;/SPAN&gt;&lt;STRONG&gt;source&lt;/STRONG&gt; &lt;EM&gt;src-address&lt;/EM&gt; &lt;SPAN class=""&gt;] [&lt;/SPAN&gt; &lt;STRONG&gt;timeout&lt;/STRONG&gt; &lt;EM&gt;seconds&lt;/EM&gt; &lt;SPAN class=""&gt;] [&lt;/SPAN&gt; &lt;STRONG&gt;vrf&lt;/STRONG&gt; &lt;SPAN class=""&gt;{&lt;/SPAN&gt; &lt;EM&gt;vrf-name&lt;/EM&gt; &lt;SPAN class=""&gt;|&lt;/SPAN&gt; &lt;STRONG&gt;default&lt;/STRONG&gt; &lt;SPAN class=""&gt;|&lt;/SPAN&gt; &lt;STRONG&gt;management&lt;/STRONG&gt; &lt;SPAN class=""&gt;}]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;# ping 2.2.2.3 source 121.121.121.121 packet-size 8500 &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;df-bit&amp;lt;- without this bit set the packet is fragment, we must sure that the ALL PATH have MTU 9000&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 15:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619367#M13398</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-27T15:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619369#M13399</link>
      <description>&lt;P&gt;show bgp l2vpn even summary&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;222.222.222.222 4 65002 &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;3759&lt;/FONT&gt;&lt;/STRONG&gt; 646 786094 0 0 00:00:01 143&lt;/P&gt;&lt;P&gt;---------------------------&lt;/P&gt;&lt;P&gt;show bgp l2vpn evpn summary&lt;BR /&gt;...&lt;BR /&gt;222.222.222.222 4 65002 &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;192901&lt;/FONT&gt;&lt;/STRONG&gt; 80862 1686043 0 0 00:01:36 143&lt;BR /&gt;&lt;BR /&gt;where other Peer see send message with around 50 message, there is MTU mismatch, one is send with MTU 9000 other use default 1500, that why we see many message receive between two show even so the sender show around 50 message.&lt;BR /&gt;i.e. the 9000 message is fragment into many 1500 message.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 15:28:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619369#M13399</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-27T15:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619374#M13401</link>
      <description>&lt;P&gt;When im using the df-bit im still able to ping.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ping 2.2.2.3 source 121.121.121.121 packet-size 8500 df-bit&lt;BR /&gt;PING 2.2.2.3 (2.2.2.3) from 121.121.121.121: 8500 data bytes&lt;BR /&gt;8508 bytes from 2.2.2.3: icmp_seq=0 ttl=252 time=3.685 ms&lt;BR /&gt;8508 bytes from 2.2.2.3: icmp_seq=1 ttl=252 time=3.389 ms&lt;BR /&gt;8508 bytes from 2.2.2.3: icmp_seq=2 ttl=252 time=3.343 ms&lt;BR /&gt;8508 bytes from 2.2.2.3: icmp_seq=3 ttl=252 time=3.714 ms&lt;BR /&gt;8508 bytes from 2.2.2.3: icmp_seq=4 ttl=252 time=3.305 ms&lt;/P&gt;
&lt;P&gt;How can i confirm what MTU it is using.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 15:34:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619374#M13401</guid>
      <dc:creator>LewisD1</dc:creator>
      <dc:date>2022-05-27T15:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619375#M13402</link>
      <description>&lt;P&gt;For IOS and i think it same for Nexus,&lt;/P&gt;&lt;P&gt;Show ip bgp neighbor x.x.x.x&lt;/P&gt;&lt;P&gt;Segment show mtu size use to this neighbor&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 15:43:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619375#M13402</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-27T15:43:16Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619378#M13403</link>
      <description>&lt;P&gt;Nothing comes back when i add include segment&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show ip bgp neighbor 121.121.121.121&lt;BR /&gt;BGP neighbor is 121.121.121.121, remote AS 65001, ebgp link, Peer index 3&lt;BR /&gt;Inherits peer configuration from peer-template INTER-BGP-PEER&lt;BR /&gt;BGP version 4, remote router ID 121.121.121.121&lt;BR /&gt;Neighbor previous state = OpenConfirm&lt;BR /&gt;BGP state = Established, up for 00:01:03&lt;BR /&gt;Neighbor vrf: default&lt;BR /&gt;Using loopback3 as update source for this peer&lt;BR /&gt;Enable logging neighbor events&lt;BR /&gt;External BGP peer might be up to 10 hops away&lt;BR /&gt;Last read 00:01:03, hold time = 180, keepalive interval is 60 seconds&lt;BR /&gt;Last written 00:00:02, keepalive timer expiry due 00:00:57&lt;BR /&gt;Received 188 messages, 0 notifications, 0 bytes in queue&lt;BR /&gt;Sent 759 messages, 93 notifications, 0(0) bytes in queue&lt;BR /&gt;Enhanced error processing: On&lt;BR /&gt;0 discarded attributes&lt;BR /&gt;Connections established 94, dropped 93&lt;BR /&gt;Last reset by us 00:01:14, due to holdtimer expired error&lt;BR /&gt;Last error length sent: 0&lt;BR /&gt;Reset error value sent: 0&lt;BR /&gt;Reset error sent major: 4 minor: 0&lt;BR /&gt;Notification data sent:&lt;BR /&gt;Last reset by peer never, due to No error&lt;BR /&gt;Last error length received: 0&lt;BR /&gt;Reset error value received 0&lt;BR /&gt;Reset error received major: 0 minor: 0&lt;BR /&gt;Notification data received:&lt;/P&gt;
&lt;P&gt;Neighbor capabilities:&lt;BR /&gt;Dynamic capability: advertised (mp, refresh, gr) received (mp, refresh, gr)&lt;BR /&gt;Dynamic capability (old): advertised received&lt;BR /&gt;Route refresh capability (new): advertised received&lt;BR /&gt;Route refresh capability (old): advertised received&lt;BR /&gt;4-Byte AS capability: advertised received&lt;BR /&gt;Address family IPv4 Unicast: advertised received&lt;BR /&gt;Address family L2VPN EVPN: advertised received&lt;BR /&gt;Graceful Restart capability: advertised received&lt;/P&gt;
&lt;P&gt;Graceful Restart Parameters:&lt;BR /&gt;Address families advertised to peer:&lt;BR /&gt;IPv4 Unicast L2VPN EVPN&lt;BR /&gt;Address families received from peer:&lt;BR /&gt;IPv4 Unicast L2VPN EVPN&lt;BR /&gt;Forwarding state preserved by peer for:&lt;BR /&gt;IPv4 Unicast L2VPN EVPN&lt;BR /&gt;Restart time advertised to peer: 120 seconds&lt;BR /&gt;Stale time for routes advertised by peer: 300 seconds&lt;BR /&gt;Restart time advertised by peer: 120 seconds&lt;BR /&gt;Extended Next Hop Encoding Capability: advertised received&lt;BR /&gt;Receive IPv6 next hop encoding Capability for AF:&lt;BR /&gt;IPv4 Unicast VPNv4 Unicast&lt;/P&gt;
&lt;P&gt;Message statistics:&lt;BR /&gt;Sent Rcvd&lt;BR /&gt;Opens: 95 94&lt;BR /&gt;Notifications: 93 0&lt;BR /&gt;Updates: 3309 0&lt;BR /&gt;Keepalives: 375 94&lt;BR /&gt;Route Refresh: 0 0&lt;BR /&gt;Capability: 2 0&lt;BR /&gt;Total: 759 188&lt;BR /&gt;Total bytes: 724366 0&lt;BR /&gt;Bytes in queue: 0 0&lt;/P&gt;
&lt;P&gt;For address family: IPv4 Unicast&lt;BR /&gt;BGP table version 187, neighbor version 187&lt;BR /&gt;0 accepted prefixes (0 paths), consuming 0 bytes of memory&lt;BR /&gt;0 received prefixes treated as withdrawn&lt;BR /&gt;0 sent prefixes (0 paths)&lt;BR /&gt;Community attribute sent to this neighbor&lt;BR /&gt;Extended community attribute sent to this neighbor&lt;BR /&gt;Last End-of-RIB sent 00:00:01 after session start&lt;BR /&gt;First convergence 00:00:01 after session start with 0 routes sent&lt;/P&gt;
&lt;P&gt;For address family: L2VPN EVPN&lt;BR /&gt;BGP table version 537, neighbor version 537&lt;BR /&gt;0 accepted prefixes (0 paths), consuming 0 bytes of memory&lt;BR /&gt;0 received prefixes treated as withdrawn&lt;BR /&gt;146 sent prefixes (146 paths)&lt;BR /&gt;Community attribute sent to this neighbor&lt;BR /&gt;Extended community attribute sent to this neighbor&lt;BR /&gt;Allow my ASN 3 times&lt;BR /&gt;Advertise GW IP is enabled&lt;BR /&gt;Outbound route-map configured is NH-Unchanged, handle obtained&lt;BR /&gt;Last End-of-RIB sent 00:00:01 after session start&lt;BR /&gt;First convergence 00:00:01 after session start with 146 routes sent&lt;/P&gt;
&lt;P&gt;Local host: 2.2.2.3, Local port: 179&lt;BR /&gt;Foreign host: 121.121.121.121, Foreign port: 42575&lt;BR /&gt;fd = 74&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 15:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619378#M13403</guid>
      <dc:creator>LewisD1</dc:creator>
      <dc:date>2022-05-27T15:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619383#M13404</link>
      <description>&lt;P&gt;&lt;SPAN&gt;ping &lt;FONT color="#0000FF"&gt;&lt;STRONG&gt;222.222.222.222&lt;/STRONG&gt;&lt;/FONT&gt;&amp;nbsp;source &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;121.121.121.121&lt;/FONT&gt;&lt;/STRONG&gt; packet-size &lt;FONT color="#FF0000"&gt;8500&lt;/FONT&gt; &lt;FONT color="#FF0000"&gt;df-bit &amp;lt;- use IP see in BGP not other IP.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 16:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619383#M13404</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-27T16:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619396#M13405</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;SPAN&gt;show sockets connection tcp foreign x.x.x.x detail &amp;lt;- this commend give the MSS/MTU use for BGP TCP connection&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 27 May 2022 16:44:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619396#M13405</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-27T16:44:20Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619748#M13406</link>
      <description>&lt;P&gt;Hi friend,&lt;BR /&gt;I spent whole last night think about your issue,&amp;nbsp;&lt;BR /&gt;the BGP table revision is increase rapidly...&lt;BR /&gt;so If we check the MTU and their is no mismatch then&amp;nbsp;&lt;BR /&gt;route oscillation&lt;BR /&gt;route oscillation is happened when the Peer learn one prefix and next-hop is &amp;nbsp;learn also from BGP not from IGP, here the Router will enter in LOOP of select best path,&amp;nbsp;&lt;BR /&gt;how I detect it ?&lt;BR /&gt;please select one prefix from show ip bgp&lt;BR /&gt;do&lt;BR /&gt;show ip route &amp;lt;prefix&amp;gt;&lt;BR /&gt;show ip bgp &amp;lt;prefix&amp;gt;&lt;BR /&gt;after some time&amp;nbsp;&lt;BR /&gt;show ip route &amp;lt;prefix&amp;gt;&lt;BR /&gt;show ip bgp &amp;lt;prefix&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if there the next-hop is oscillation then&amp;nbsp;&lt;BR /&gt;show ip bgp &amp;lt;next-hop&amp;gt;&lt;BR /&gt;see if the next-hop is learn from BGP or it learn from IGP.&lt;BR /&gt;&lt;BR /&gt;this indicate for Best path LOOP.&lt;/P&gt;</description>
      <pubDate>Sat, 28 May 2022 21:01:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4619748#M13406</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-28T21:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4620241#M13415</link>
      <description>&lt;P&gt;Would route oscillation cause the BGP relationships to come down?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ping 222.222.222.222 source 121.121.121.121 packet-size 8000 df-bit&lt;BR /&gt;PING 222.222.222.222 (222.222.222.222) from 121.121.121.121: 8000 data bytes&lt;BR /&gt;8008 bytes from 222.222.222.222: icmp_seq=0 ttl=252 time=3.741 ms&lt;BR /&gt;8008 bytes from 222.222.222.222: icmp_seq=1 ttl=252 time=3.327 ms&lt;BR /&gt;8008 bytes from 222.222.222.222: icmp_seq=2 ttl=252 time=3.289 ms&lt;BR /&gt;8008 bytes from 222.222.222.222: icmp_seq=3 ttl=252 time=3.321 ms&lt;BR /&gt;8008 bytes from 222.222.222.222: icmp_seq=4 ttl=252 time=3.324 ms&lt;/P&gt;</description>
      <pubDate>Mon, 30 May 2022 08:13:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4620241#M13415</guid>
      <dc:creator>LewisD1</dc:creator>
      <dc:date>2022-05-30T08:13:07Z</dc:date>
    </item>
    <item>
      <title>Re: L2VPN/EVPN E-BGP Peers Flapping</title>
      <link>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4620494#M13418</link>
      <description>&lt;P&gt;Ok, we check now that along path the mtu is 9000 that perfect,&lt;/P&gt;&lt;P&gt;Now only check that bgp tcp use mss same as mtu.&lt;/P&gt;</description>
      <pubDate>Mon, 30 May 2022 11:58:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/server-networking/l2vpn-evpn-e-bgp-peers-flapping/m-p/4620494#M13418</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-30T11:58:30Z</dc:date>
    </item>
  </channel>
</rss>

