Got feedback?

 If you would like to provide feedback on this documentation page, you can do one of the following:
  • Add a comment in the Comment box at the bottom of this page.
  • If you're a registered user, you can file a ticket with our support team.

Management VRF — a subset of VRF (virtual routing tables and forwarding) — provides a separation between the out-of-band management network and the in-band data plane network. For all VRFs, the main routing table is the default table for all of the data plane switch ports. With management VRF, a second table, mgmt, is used for routing through the switch's Ethernet ports. The mgmt name is special cased to identify the management VRF from a data plane VRF. FIB rules are installed for DNS servers since this is the typical deployment case. 

Cumulus Linux only supports eth0 as the management interface, or eth1, depending on the switch platform. The Ethernet ports are software-only parts that are not hardware accelerated by switchd. VLAN subinterfaces, bonds, bridges and the front panel switch ports are not supported as management interfaces.

When management VRF is enabled, logins to the switch are set into the management VRF context. IPv4 and IPv6 networking applications (for example, Ansible, Chef and apt-get) run by an administrator communicate out the management network by default. This default context does not impact services run through systemd and the systemctl command, and does not impact commands examining the state of the switch; for example, using the ip command to list links, neighbors or routes.

The management VRF configurations in this chapter contain a localhost loopback IP address (127.0.0.1/8). Putting the loopback address in the management VRF's L3 domain prevents issues with applications that expect the loopback IP address to exist in the VRF, such as NTP.

Contents

 This chapter covers ...

Enabling Management VRF

To enable management VRF on eth0, complete the following steps:

Example Management VRF Configuration

The example NCLU commands below create a VRF called mgmt:

The management VRF must be named mgmt to differentiate from a data plane VRF.

cumulus@switch:~$ net add vrf mgmt
cumulus@switch:~$ net pending
cumulus@switch:~$ net commit

The NCLU commands above create the following snippets in /etc/network/interfaces:

...
 
auto eth0
iface eth0 inet dhcp
    vrf mgmt

...
 
auto mgmt
iface mgmt
    address 127.0.0.1/8
    vrf-table auto
 
...

When you commit the change for adding the management VRF, it drops all connections over eth0. This can impact any automation that may be running, such as Ansible or Puppet scripts.

Bringing the Management VRF Up after Downing It with ifdown

If you take down the management VRF using ifdown, to bring it back up you need to do one of two things:

  • Use ifup --with-depends <vrf>
  • Use ifreload -a

For example:

cumulus@switch:~$ sudo ifdown mgmt
cumulus@switch:~$ sudo ifup --with-depends mgmt

Running ifreload -a disconnects the session for any interface configured as auto.

Enabling NTP

To enable NTP to run in the mgmt VRF:

  1. Configure the mgmt VRF as described in the Enabling Management VRF section above.
  2. If NTP is running, stop the service:

    cumulus@switch:~$ sudo systemctl stop ntp.service

    By default, NTP is running in the default VRF, and to automatically start when the system boots; the NTP service needs to be stopped, disabled, and then restarted once the mgmt VRF is configured.

  3. Disable NTP from automatically starting in the default VRF:

    cumulus@switch:~$ sudo systemctl disable ntp.service
  4. Start NTP in the mgmt VRF.  

    cumulus@switch:~$ sudo systemctl start ntp@mgmt
  5. Verify that NTP peers are active.

    cumulus@switch:~$ ntpq -pn
         remote           refid      st t when poll reach   delay   offset  jitter
    ==============================================================================
    *38.229.71.1     204.9.54.119     2 u   42   64  377   31.275   -0.625   3.105
    -104.131.53.252  209.51.161.238   2 u   47   64  377   16.381   -5.251   0.681
    +45.79.10.228    200.98.196.212   2 u   44   64  377   42.998    0.115   0.585
    +74.207.240.206  127.67.113.92    2 u   43   64  377   73.240   -1.623   0.320 
  6. Enable ntp@mgmt so that it starts when the switch boots:

    cumulus@switch:~$ sudo systemctl enable ntp@mgmt

Enabling snmpd

To enable snmpd to run in the mgmt VRF: 

  1. Configure the mgmt VRF as described in the Enabling Management VRF section above.

  2. Stop the snmpd daemon if it is running:

    cumulus@switch:~$ sudo systemctl stop snmpd.service
  3. Disable snmpd to ensure it does not start in the default VRF if the system is rebooted:

    cumulus@switch:~$ sudo systemctl disable snmpd.service
  4. Start snmpd in the the mgmt VRF:

    cumulus@switch:~$ sudo systemctl start snmpd@mgmt
  5. Enable snmpd@mgmt so it starts when the switch boots:

    cumulus@switch:~$ sudo systemctl enable snmpd@mgmt

Enabling hsflowd

If you're using sFlow to monitor traffic in the mgmt VRF, you need to complete the following steps to enable it.

  1. Add the hsflowd process to the systemd configuration file in /etc/vrf. Edit /etc/vrf/systemd.conf in a text editor.

    cumulus@switch:~$ sudo nano /etc/vrf/systemd.conf 
    # Systemd-based services that are expected to be run in a VRF context.
    #
    # If changes are made to this file run systemctl daemon-reload
    # to re-generate systemd files.
    chef-client
    collectd
    dhcpd
    dhcrelay
    hsflowd  <<< Add this line
    ntp
    puppet
    snmpd
    snmptrapd
    ssh
    zabbix-agent
  2. Stop, disable, reload, reenable and restart the hsflowd service.

    cumulus@switch:~$ sudo systemctl stop hsflowd.service
    cumulus@switch:~$ sudo systemctl disable hsflowd.service
    cumulus@switch:~$ sudo systemctl daemon-reload
    cumulus@switch:~$ sudo systemctl enable hsflowd@mgmt.service
    cumulus@switch:~$ sudo systemctl start hsflowd@mgmt.service
  3. Verify that the hsflowd service is running in the mgmt VRF.

    cumulus@switch:~$ ps aux | grep flow
    root      7294  0.0  0.4  81320  2108 ?        Ssl  22:22   0:00 /usr/sbin/hsflowd
    cumulus   7906  0.0  0.4  12728  2056 pts/0    S+   22:34   0:00 grep flow
    cumulus@switch:~$ vrf task identify 7294
    mgmt

Using ping or traceroute

By default, issuing a ping or traceroute assumes the packet should be sent to the dataplane network (the main routing table). If you wish to use ping or traceroute on the management network, use the -I flag for ping and -i for traceroute.

cumulus@switch:~$ ping -I mgmt

Or:

cumulus@switch:~$ sudo traceroute -i mgmt

OSPF and BGP

In general, no changes are required for either BGP or OSPF. Quagga was updated in Cumulus Linux 3.0 to be VRF-aware and automatically sends packets based on the switch port routing table. This includes BGP peering via loopback interfaces. BGP does routing lookups in the default table. However, one modification you may consider has to do with how your routes get redistributed.

Redistributing Routes in Management VRF

Management VRF uses the mgmt table, including local routes. It does not affect how the routes are redistributed when using routing protocols such as OSPF and BGP.

To redistribute the routes in your network, use the redistribute connected command under BGP or OSPF. This enables the directly connected network out of eth0 to be advertised to its neighbor.

This also creates a route on the neighbor device to the management network through the data plane, which may not be desired.

Cumulus Networks recommends you always use route maps to control the advertised networks redistributed by the redistribute connected command. For example, you can specify a route map to redistribute routes in this way (for both BGP and OSPF):

cumulus@leaf01:~$ net add routing route-map REDISTRIBUTE-CONNECTED deny 100 match interface eth0
cumulus@leaf01:~$ net add routing route-map REDISTRIBUTE-CONNECTED permit 1000

These commands produce the following configuration snippet in the /etc/quagga/Quagga.conf file:

<routing protocol> 
redistribute connected route-map REDISTRIBUTE-CONNECTED

route-map REDISTRIBUTE-CONNECTED deny 100
 match interface eth0
!
route-map REDISTRIBUTE-CONNECTED permit 1000

SNMP Traps Use eth0 Only

SNMP cannot use a switch port to send data. For any SNMP traps, this traffic gets sent out to eth0. Cumulus Networks plans to support switch ports in the future.

For SNMP, this restriction only applies to traps. SNMP polling is not affected.

Using SSH within a Management VRF Context

If you SSH to the switch through a switch port, it works as expected. If you need to SSH from the device out of a switch port, use vrf exec default ssh <ip_address_of_swp_port>. For example:

cumulus@switch:~$ sudo vrf exec default ssh 10.23.23.2 10.3.3.3

Viewing the Routing Tables

When you look at the routing table with ip route show, you are looking at the switch port (main) table. You can also see the dataplane routing table with net show route vrf main.

To look at information about eth0 (the management routing table), use net show route vrf mgmt.

cumulus@switch:~$ net show route vrf mgmt
default via 192.168.0.1 dev eth0

cumulus@switch:~$ net show route
default via 10.23.23.3 dev swp17  proto zebra  metric 20
10.3.3.3 via 10.23.23.3 dev swp17
10.23.23.0/24 dev swp17  proto kernel  scope link  src 10.23.23.2
192.168.0.0/24 dev eth0  proto kernel  scope link  src 192.168.0.11

Viewing a Single Route

Note that if you use ip route get to return information about a single route, the command resolves over the mgmt table by default. To get information about the route in the switching silicon, use: 

cumulus@switch:~$ net show route <addr> 

To get the route for any VRF, run: 

cumulus@switch:~$ net show route vrf mgmt <addr>

Using the mgmt Interface Class

In ifupdown2 interface classes are used to create a user-defined grouping for interfaces. The special class mgmt is available to separate the switch's management interfaces from the data interfaces. This allows you to manage the data interfaces by default using ifupdown2 commands. Performing operations on the mgmt interfaces requires specifying the --allow-mgmt option, which prevents inadvertent outages on the management interfaces. Cumulus Linux by default brings up all interfaces in both the auto (default) class and the mgmt interface class when the switch boots.

You configure the management interface in /etc/network/interfaces. In the example below, the management interface, eth0, and the mgmt VRF stanzas are added to the mgmt interface class:

auto lo
iface lo inet loopback 

allow-mgmt eth0
iface eth0 inet dhcp
    vrf mgmt
  
allow-mgmt mgmt
iface mgmt
    address 127.0.0.1/8
    vrf-table auto 

When you run ifupdown2 commands against the interfaces in the mgmt class, include --allow=mgmt with the commands. For example, to see which interfaces are in the mgmt interface class, run:

cumulus@switch:~$ ifquery l --allow=mgmt
eth0
mgmt 

To reload the configurations for interfaces in the mgmt class, run:

cumulus@switch:~$ sudo ifreload --allow=mgmt

However, you can still bring the management interface up and down using ifup eth0 and ifdown eth0

Management VRF and DNS

Cumulus Linux supports both DHCP and static DNS entries over management VRF through IP FIB rules. These rules are added to direct lookups to the DNS addresses out of the management VRF. However, nameservers configured through DHCP are automatically updated, while statically configured nameservers (configured in /etc/resolv.conf) only get updated when you run ifreload -a.

Because DNS lookups are forced out of the management interface using FIB rules, this could affect data plane ports if there are overlapping addresses.

Incompatibility with cl-ns-mgmt

Management VRF has replaced the management namespace functionality in Cumulus Linux. The management namespace feature (via the cl-ns-mgmt utility) has been deprecated, and the cl-ns-mgmt command has been removed.