Security Lab — Cisco Nexus learning track
NX-OS, MP-BGP EVPN, VXLAN, services VRF, and Nexus Dashboard learning plan.
The current Cisco data center track is NX-OS first. ACI should come later, after the manual control-plane and data-plane behavior is understood.
Current Built State
The first Nexus phase is complete for lab use:
- Cisco Nexus 9300v nodes are imported into EVE-NG.
- The lab uses two spines, two leaves, and two tenant border nodes.
- BGP underlay and MP-BGP EVPN overlay are working.
- VXLAN tenant segments and inter-VLAN routing are validated.
- Dual-border upstream reachability is validated.
- Services VRF handoff is implemented with explicit route-leak controls.
- Oxidized backs up all six Nexus nodes.
- Nautobot seed data records the Nexus devices and key interfaces.
- Batfish snapshots model the underlay, EVPN/VXLAN, dual-border handoff, and services VRF handoff.
- Daily validation and guard scripts exist in the private lab repo.
Recommended Order
Completed:
- Build a single-site VXLAN EVPN fabric manually in EVE-NG.
- Add MP-BGP EVPN route exchange between spines and leaves.
- Add anycast gateway, VLAN-to-VNI mapping, and tenant VRFs.
- Add dual tenant border nodes and upstream reachability.
- Add services VRF route-leak controls and recovery drills.
- Add source-of-truth, config backup, validation, and SOC evidence loops.
Next:
- Schedule the services VRF guard after several manual daily runs.
- Add Nexus Dashboard and Nexus Dashboard Fabric Controller.
- Compare manual NX-OS operations with NDFC-managed workflows.
- Expand from one tenant to multiple tenants.
- Add multisite EVPN behavior when the single-site dual-border model is enough for current learning.
- Add telemetry ingestion from Nexus and EVE-NG into the SOC path.
Image Choices
For KVM/EVE-NG, use QCOW2 images.
| Software | Preferred artifact | Reason |
|---|---|---|
| Nexus 9300v | nexus9300v64.10.3.9.M.qcow2 | Full Nexus 9300v image for KVM, suitable for advanced NX-OS lab work |
| Nexus Dashboard | nd-dk9.4.2.1.10.qcow2 | KVM image for Nexus Dashboard; staged for standalone libvirt deployment |
The Nexus 9300v image is imported into EVE-NG as:
nxosv9k-9300v-10.3.9.M
Inside EVE-NG, the disk is installed as:
/opt/unetlab/addons/qemu/nxosv9k-9300v-10.3.9.M/sataa.qcow2
Avoid these for the EVE-NG boot image:
- EPLD images such as
n9000-epld.*.img. - Physical switch upgrade
.binimages. liteNexus 9000v images when testing advanced features.
9300v Versus 9500v
Use nexus9300v as the default lab node. It maps well to leaf, spine, and border gateway roles in a virtual EVPN/VXLAN topology.
Use nexus9500v only when the learning objective specifically needs chassis-style behavior or 9500-oriented documentation. For most EVE-NG EVPN/VXLAN learning, standardizing on 9300v reduces image sprawl and keeps the topology easier to reproduce.
Nexus Dashboard
Nexus Dashboard is worth installing because it appears in real Cisco data center operations. In the lab it is most useful after the manual NX-OS fabric works, because then NDFC can be evaluated against behavior already understood from the CLI.
Do not run Nexus Dashboard inside the current EVE-NG VM. Nexus Dashboard 4.2.x has large KVM sizing requirements, so it should be deployed as a standalone libvirt appliance when the lab is ready for NDFC and dashboard workflows.
Validation Entry Points
Run these from the private lab repo:
python3 runtime/nexus_2x2_validate_full_lab.py
./scripts/run-nexus-services-vrf-guard.sh
./scripts/run-final-nexus-soc-replay.sh
The expected final signals are:
nexus_2x2_full_lab_validation_complete- services VRF guard
ready: true - Oxidized/Nautobot drift report
ready: true