cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
712
Views
2
Helpful
1
Replies

ASR 920 EVPN device tracking

ccnplv
Level 1
Level 1

Starting with ios-xe 17.5 on ASR920, when configuring a EVPN bridge domain, device tracking functionality is automatically enabled and  corresponding evpn policies block some ARP requests.

Looking for a way to disable device tracking functionality on ASR920.

'no device-tracking tracking' command has no effect

1 Reply 1

AshSe
VIP
VIP

Hey @ccnplv 

Starting with IOS-XE 17.5 on ASR920, the device tracking functionality is automatically enabled when configuring an EVPN bridge domain. This is part of the EVPN implementation to enhance ARP suppression and optimize network performance. However, this can sometimes block certain ARP requests due to the EVPN policies.

Unfortunately, as of now, Cisco does not provide a direct way to disable the device tracking functionality in this scenario. The no device-tracking tracking command does not affect the behavior in EVPN bridge domains because the device tracking is tightly integrated with the EVPN functionality.

Workarounds:

While you cannot directly disable device tracking, you can try the following workarounds to address the issue:

  1. Adjust EVPN Policies:

    • Review and modify the EVPN policies to ensure that the ARP requests you need are not being blocked. For example, you can adjust the ARP suppression or proxy ARP settings to allow the desired traffic.
  2. Disable ARP Suppression:

    • If ARP suppression is causing issues, you can disable it for the specific bridge domain. Use the following command under the EVPN bridge domain configuration:
      no ip arp suppression
      
      This will disable ARP suppression and allow ARP requests to be forwarded normally.
  3. Upgrade to a Newer IOS-XE Version:

    • If the issue persists, consider upgrading to a newer IOS-XE version. Cisco may have introduced additional commands or fixes in later releases to provide more control over device tracking and EVPN behavior.
  4. Contact Cisco TAC:

    • If none of the above workarounds resolve your issue, it is recommended to contact Cisco Technical Assistance Center (TAC). They can provide guidance specific to your deployment and may offer additional solutions or workarounds.

Note:

Always test any configuration changes in a lab or non-production environment before applying them to your live network. Additionally, consult the release notes and configuration guides for your specific IOS-XE version to ensure compatibility and understand the impact of any changes.

 

Hope This Helps!!!

AshSe

Forum Tips: 

  1. Insert photos/images inline - don't attach.
  2. Always mark helpful and correct answers, it helps others find what they need.
  3. For a prompt reply, kindly tag @name. An email will be automatically sent to the member.