When I configure EVPN Vxlan used source ip of Loopback like 1.1.1.1/32, It would learn vxlan remotevtep by bgp evpn. And then I configure the IP Address of Vxlan Tunnel like 100.1.1.1/24 and another is 100.1.1.2/24. Using command of "ping 100.1.1.2“ from "100.1.1.1", Vxlan tunnel 100.1.1.2 would receive the arp request encapsulated by Vxlan Header in Kernel, but Vxlan tunnel 100.1.1.2 doesn't send the arp reply.
I found that there is one netfilter rule 1.1.1.1 with target drop in linux kernel when I configure ip 1.1.1.1/32 on interface loopback. So vxlan packet is drop by this rule.
When I configure EVPN Vxlan used source ip of Loopback like 1.1.1.1/32, It would learn vxlan remotevtep by bgp evpn. And then I configure the IP Address of Vxlan Tunnel like 100.1.1.1/24 and another is 100.1.1.2/24. Using command of "ping 100.1.1.2“ from "100.1.1.1", Vxlan tunnel 100.1.1.2 would receive the arp request encapsulated by Vxlan Header in Kernel, but Vxlan tunnel 100.1.1.2 doesn't send the arp reply.