SlideShare una empresa de Scribd logo
1 de 59
Descargar para leer sin conexión
VXLAN with NSX -MH
VMWARE SDN Solution
Sethuraman Ramanathan
Protocols Sytest Team
Agenda
• Virtualization Basics
• VXLAN Basics
• VXLAN - Controller less solution
• VXLAN – Controller based (NSX-MH solution)
Virtualization Basics - Physical
Infrastructure
Fibre Channel
storage
Fibre
Channel
Ethernet
NFS
storage
iSCSI
storage
applications
operating system
physical host
Virtualization Basics Virtual Infrastructure
hypervisor
VMware ESXi™ host
Fibre
Channel
Fibre Channel
storage
Ethernet
NFS
storage
iSCSI
storage
virtual
machines
Servers 10
Utilization 8%
Annual cost per server $4,000
Total Cost $40,000
Servers 3
Utilization 80%
Annual cost per
server
$4,000
Total Cost $12,000
Before Virtualization After Virtualization
More applications per
machine = less machines
$28,000 in cost avoidance
Source: IT Business Edge, “The Business Value of Server Virtualization” – cost for average a 2 x CPU server in three-year amortized hardware purchase, and annual
support and maintenance contract costs 9/07
The CapEx Story: Make better use of existing infrastructure
Virtualization Basics Virtual Infrastructure
 Physical Network is tied with virtual Network.
 STP required.Scaling issues is seen as STP is not stable
with scale.
 Network troubleshooting is a challenge in layer 2 Networks
with STP.
 Cannot scale the network beyond 4096 vlans.
 Problems being addressed:
 VLAN scale – VXLAN extends the L2 segment ID field to 24-bits,
potentially allowing for up to 16 million unique L2 segments over
the same network
 Layer 2 segment elasticity over Layer 3 boundary – VXLAN
encapsulates L2 frame in IP-UDP header.So No STP is required.
 Removes the need to have additional physical
infrastructure. For example, the forwarding table of the
external switch does not grow with the increase in the
VMs behind the physical port on the server.
VXLAN Packet Structure
Original L2 Frame Given a VXLAN Header with VNI
Original L2 FrameVXLAN Header
FCS
Allows for 16M
possible segmentsUDP 4789
Enables better ECMP Load
balancing in the Network.
Src and Dst addresses of
the VTEPs
Src VTEP MAC Address
Next-Hop MAC Address
VXLAN Terminology
• VTEP (VXLAN Tunnel
End Point)
– Performs VXLAN encap & decap
– Usually located at the Aggregation Layer
or in the compute devices
• VNI (Virtual Network
Identifier)
– Mapping of VLAN to VXLAN (i.e., VNI
5000 maps to VLAN 20)
– Can have multiple VLANs mapped to the
same VNI
VXLAN Devices
10
VTEP
VTEPVTEP
VTEP
VXLAN MAC Learning
 Flood & Learn is used today
 Control-Plane based in future
 Multicast is required
OVS (Open Virtual Switch): Controller based
 Controller learns the mac Data with VTEP information from all OVS devices.
 Controller advertises the mac data with VTEP information to all OVS devices.
PIM-SM or PIM-Bidir : Controller less
11
VTEP Discovery (Pim method)
 VTEPs join specified multicast group (*, G)
 PIM-SM or PIM-BiDir
 Can have one multicast group per VNI
 Example: 239.1.1.1 is mapped to vxlan 10
 Can have multiple VNIs per multicast group
 Example: 239.1.1.1 is mapped to vxlan 10 and vxlan11.
How VTEPs find each other in PIM protocol based learning
method ?
13
VXLAN Multicast Mode 1mgroup:2 vxlan Mapping
VTEP VTEP VTEP
Pim jointo Multicast Group
239.1.1.1
Pim join Multicast Group
239.1.1.1
Pim join to Multicast Group
239.2.2.2
Pim join to Multicast Group
239.2.2.2
Web
VM
Web
VM
DB
VM
DB
VM
Multicast-enabled
Transport
ARP Request
VM 1 VM 3VM 2
VTEP 1
1.1.1.1
VTEP 3
3.3.3.3
VTEP 2
2.2.2.2
IP A  GARP Req
MAC IP Addr
VM 1 VTEP 1
MAC IP Addr
VM 1 VTEP 1
ARP Req
IP A  GARP Req
ARP Req ARP Req
Multicast-enabled
Transport
ARP Response
VM 1 VM 3VM 2
VTEP 1
1.1.1.1
VTEP 3
3.3.3.3
VTEP 2
2.2.2.2
ARP Resp
MAC IP Addr
VM 2 VTEP 2
Multicast-enabled
Transport
VTEP 2  VTEP 1ARP Resp
ARP Resp
MAC IP Addr
VM 1 VTEP 1
routing-instances {
sw1 {
vtep-source-interface lo0.1;
instance-type virtual-switch;
interface xe-0/0/0.1;
bridge-domains {
vxlan1 {
domain-type bridge;
vlan-id 1;
routing-interface irb.1;
vxlan {
vni 1;
multicast-group 239.1.1.1;
encapsulate-inner-vlan;
decapsulate-accept-inner-vlan;
}
}
}
}
}
Gateway config spine switch– Multicast based
vxlan
Gateway config spine switch– Multicast based
vxlanvrf1{
instance-type vrf;
interface xe-0/0/1.1
route-distinguisher 100:1;
vrf-target target:100:1;
protocols {
ospf {
area 0.0.0.0 {
interface all {
bfd-liveness-detection {
minimum-interval 2000;
multiplier 3;
}
}
}
}
pim {
rp {
local {
address 5.0.0.1;
}
}
interface all;
}
}
}
NSX Control Plane
NSX Control Plane
 The NSX Controller Cluster accepts logical network configuration instructions from
administrators (through the NVP API) or from its clients), calculates the required
network flow entries, and inserts these network flow entries into Open vSwitch
(OVS) instances running on the transport nodes (hypervisor switches and NSX
appliances).
 In each transport node, the flow entries give OVS the routing information it needs
to direct logical Ethernet frames to the right hypervisor or network gateway.
NSX Data Plane Views
 Transport Network view
 Hypervisors,Physical gateways/or virtual gateways and service nodes.
 Logical Network View
 Logical switch,Logical switch port,Transport zone
NSX Data Plane (Transport Network View)
 The transport network view is the view presented to cloud / data center administrators
(people who deploy hypervisors and their associated network infrastructure).
 This view describes the physical devices that underlie the logical networks.
We refer to these devices as “transport nodes” and they include the
Hypervisors that host VMs and the network hardware that interconnects
hypervisors and connects them to external, physical networks.
 Each transport node runs an instance of Open vSwitch (OVS), so we also refer to
transport nodes as “OVS devices”.
 The cloud/data center administrator works in the transport network view, connecting
hypervisors to the transport network, deploying other NSX transport nodes such as NSX
Gateways, and connecting them to the physical network
8
VLAN
Hardware
Software
L2
L3
Virtual Network
L2
Open vSwitch
NSX Gateway
Physical Network (Arista, Cisco, HP, Juniper, Cumulus,…)
VMVM
NSX vSwitch
ESXi
Open vSwitch
KVM
Open vSwitch
XenServer
Open vSwitch
Hyper-V*
Controller Cluster
Transport Network
NSX Manager
VTEP
HW Partner
VLAN
* Hyper-V plan 2H2014
API
NSX Data Plane (Gateway Service)
 An NSX Gateway Service consists of one or more NSX Gateways that attach a
logical network to a physical network not managed by NSX.
 Each Gateway Service can operate as an L2 Gateway Service expanding a logical
L2 segment to include a physical L2 segment, or as an L3 Gateway Service
mapped to a physical router port.
 Each Gateway in the service is a virtual appliance running OVS, or a physical
VTEP-enabled appliance.
Destination is in another segment.
Packet is routed to the new segment
VXLANORANGE VXLANBLUE
Ingress VXLAN packet on
Orange segment
VXLAN
Router
 V(X)LAN-to-V(X)LAN Routing (L3 Gateway)
VXLAN on HW Platforms
Supported Functionalities
 VXLAN to VLAN Bridging (L2 Gateway)
VXLANORANGE
Ingress VXLAN packet on
Orange segment
Egress interface chosen (bridge
may .1Q tag the packet)
VXLAN L2
Gateway
Egress interface chosen (bridge
may .1Q tag the packet)
VNI 6000
VXLAN-to-VLAN Bridging
Virtual to Physical
VxLAN
VLAN
untagged
VXLAN L2
Gateway
VXLAN L2
Gateway
VNI 5000
VLAN 10
VLAN 20
VXLAN VTEP
HW VXLAN L2 Gateway
Intra-Subnet Communication
L3 Fabric
L3 Cloud
Controller
L3 Cloud
VXLAN L3
Gateway
VXLAN L3
Gateway
HW VXLAN Routing
Inter-Subnets Communication
VXLAN-to-VXLAN Routing
VNI 5000 <-> VNI 7000
VXLAN L2
Gateway
VXLAN L2
Gateway
VxLAN
VLAN
untagged
VLAN-to-VXLAN Routing
VNI 6000 <-> L3_Ext_Intf
VNI 5000
VLAN 20VLAN 30
VXLAN-to-VLAN Bridging
VNI 7000 <-> VLAN 30
VXLAN-to-VLAN Bridging
VLAN 20 <-> VNI 6000
L3 Fabric
Controller
Inter-VXLAN Routing using SW L3 Gateway
SW
Gwy
VXLAN Routing
VNI 5000 <-> VNI 6000
Virtual to Virtual
VNI 5000 VNI 6000
vMX acting as L3 gateway
L3 Fabric
WAN/Core
VxLAN
untagged
Controller
SW L3 Gateway
Communicating with the External L3 Domain
SW
Gwy
VXLAN to VLAN Bridging
VNI 5000 <-> V:LAN 100
Virtual to Physical
VNI 6000
vMX acting as L3 gateway
VLAN
L3 Fabric
WAN/Core
VxLAN
untagged
Controller
NSX SW L2 Gateway
SW
Gwy
VXLAN Routing
VNI 5000 <-> VNI 6000
Virtual to Physical
VNI 5000
vMX acting as L2 gateway
L3 Fabric
WAN/Core
VxLAN
untagged
VLAN 10
VXLAN L2
Gateway
Controller
NSX Data Plane (Service Node)
 NSX employs NSX Service Nodes, OVS-enabled x86 appliances that are managed
by the Controller Cluster to provide extra packet processing capacity for logical
networks.
 For example, Service Nodes assist with the packet replication required for
logical network broadcast/multicast and unknown unicast flooding in overlay
logical networks.
 In VXLAN Multicast mode packet replication is done by router in the physical
network.
Logical Network view
 The logical network view is the set of connectivity and network services a VM sees
in the cloud. The logical view is the view presented to VMs and VM administrators
and is independent of the underlying physical devices of the data center.
 In a multi-tenant cloud, each tenant has his or her own logical network view and
cannot see the logical network views of other tenants. The logical network view
consists of the logical ports, logical switches, and logical routers that interconnect
VMs and connect VMs to the external physical network.
 From the point of view of a VM and its administrators, the logical network is the
network. The VM administrator just connects VMs to logical switches and logical
routers.
Logical Network view
Logical Network View
Logical Switch:
A logical switch is a layer-2 switching overlay implemented using one of NSX’s
supported encapsulation mechanisms (VXLAN,GRE, IPsecGRE) .
Basic network set-up in NSX is accomplished by connecting VMs to logical switches.
Logical switch port:
Similar to physical switch ports, logical switch ports enable the configuration
of network services.
Attachment:
A Logical wire that can be used to connect virtual interfaces, logical switch ports,.
Common attachment types include L2 gateway attachments, and
L3 gateway attachments.
Logical Network View:
Transport zone—Physical network connectivity between transport nodes is modeled in the API
as a transport zone. A transport zone corresponds to a physical network used to send data
traffic between OVS devices. A simple NSX deployment will have a single transport zone that
represents the physical network connectivity within the data center.
Logical Network View
DEMO
L3 Cloud
VXLAN L2
Gateway
VLAN 1
VLAN 1
VXLAN-to-VLAN Bridging
VLAN1<-> VLAN 1
VXLAN L2
Gateway
Topology1
foot Littlefoot
Service node
Controller
Thtys
VxlanL2/L3
gateway
L3 Cloud
VXLAN L2
Gateway
VLAN 1
VLAN 1
VXLAN-to-VLAN Bridging
VLAN1<-> VLAN 1
VXLAN L2
Gateway
Topology2
Thtys Littlefoot
Service node
Controller
VXLAN L2 GATEWAY CONFIGURATION
{master}
regress@thtys> show configuration interfaces xe-2/3/3.1
family bridge {
interface-mode trunk; << connects to servers
vlan-id-list 1;
}
regress@foot>
{master}
regress@littlefoot> show configuration interfaces xe-1/1/1.1
family bridge {
interface-mode trunk; << connects to servers
vlan-id-list 1;
}
{master}
regress@littlefoot>
VXLAN L2 GATEWAY CONFIGURATION
{master}
regress@thtys> show configuration interfaces xe-2/0/0.1
vlan-tagging;
unit 1 {
vlan-id 1;
family inet {
address 1.0.1.1/30; ; << connects to spine
}
}
{master}
regress@littlefoot> show configuration interfaces xe-1/1/0
vlan-tagging;
unit 1 {
vlan-id 1;
family inet {
address 11.0.1.1/30; << connects to spine
master}
regress@thtys> show configuration routing-instances sw1
vtep-source-interface lo0.0;
instance-type virtual-switch;
interface xe-2/3/3.1; << Connects to the compute node
86a9576a-3b68-4412-9658-6218b3ac02fa {<< UUID of logical switch
generated by controller
domain-type bridge;
vlan-id 1;
vxlan {
ovsdb-managed;
vni 1; <<<<< VNI 1 is mapped to vlan 1
encapsulate-inner-vlan; ; <<Configure the switch to preserve the
original VLAN tag (in the inner Ethernet packet) when performing VXLAN
encapsulation.
decapsulate-accept-inner-vlan; ; <<<Configure the switch to de-
encapsulate and accept original VLAN tags in VXLAN packets
VXLAN L2 GATEWAY CONFIGURATION:
{master}
regress@thtys> show configuration routing-instances vrf1
instance-type vrf;
interface ge-1/0/9.0; <<<< connected to service node;
interface xe-2/0/0.1; <<<< connects to the spine
interface lo0.0;
route-distinguisher 100:1;
vrf-target target:100:1;
protocols {
ospf {
area 0.0.0.0 {
interface all {
bfd-liveness-detection {
minimum-interval 2000;
multiplier 3;
}
}
}
}
}
VXLAN L2 GATEWAY CONFIGURATION:
sw1 {
vtep-source-interface lo0.0;
instance-type virtual-switch;
interface xe-1/1/1.1; << Connects to the compute node
bridge-domains {
86a9576a-3b68-4412-9658-6218b3ac02fa {
domain-type bridge;
vlan-id 1;
vxlan {
ovsdb-managed;
vni 1; <<<<< VNI 1 is mapped to vlan 1
encapsulate-inner-vlan; <<Configure the switch to preserve the original VLAN tag
inner Ethernet packet) when performing VXLAN encapsulation.
decapsulate-accept-inner-vlan; <<<Configure the switch to de-encapsulate and a
original VLAN tags in VXLAN packets
}
}
}
VXLAN GATEWAY CONFIGURATION:Littlefoot
< < UUID of logical switch generated
by controller
{master}
regress@littlefoot> show configuration routing-instances vrf1
instance-type vrf;
interface xe-1/1/0.1; <<<< connects to the spine
interface lo0.0;
route-distinguisher 100:1;
vrf-target target:100:1;
protocols {
ospf {
area 0.0.0.0 {
interface all {
bfd-liveness-detection {
minimum-interval 2000;
multiplier 3;
}
}
}
}
}
VXLAN GATEWAY CONFIGURATION:Littlefoot
{master}
regress@littlefoot> show ovsdb mac logical-switch 86a9576a-3b68-4412-9658-6218b3ac02fa
Logical Switch Name: 86a9576a-3b68-4412-9658-6218b3ac02fa
Mac IP Encapsulation Vtep
Address Address Address
ff:ff:ff:ff:ff:ff 0.0.0.0 Vxlan over Ipv4 10.255.178.140
ff:ff:ff:ff:ff:ff 0.0.0.0 Vxlan over Ipv4 24.24.24.1
{master}
regress@littlefoot>
{master}
regress@littlefoot>
MAC learning:Littlefoot
{master}
regress@littlefoot> show ovsdb controller
VTEP controller information:
Controller IP address: 192.168.181.3
Controller protocol: ssl
Controller port: 6632
Controller connection: up
Controller seconds-since-connect: 697109
Controller seconds-since-disconnect: 652143
Controller connection status: backoff
{master}
regress@littlefoot>
Controller status:Littlefoot
Logical Network View :Gateway service
Logical Network View: Logical port attachment
Logical Network view: Gateway service
Logical Network view: Logical switch port attachment
Logical Network view: Logical switch port status
Logical Network view: Logical Switch
Logical Network view:Transport Node
Logical Network view:Transport Connectors
Logical Network view:

Más contenido relacionado

La actualidad más candente

VMworld 2013: vSphere Distributed Switch – Design and Best Practices
VMworld 2013: vSphere Distributed Switch – Design and Best Practices VMworld 2013: vSphere Distributed Switch – Design and Best Practices
VMworld 2013: vSphere Distributed Switch – Design and Best Practices VMworld
 
VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack VMworld
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld
 
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
 
VMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectVMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectDavid Pasek
 
VMUGbe 21 Filip Verloy
VMUGbe 21 Filip VerloyVMUGbe 21 Filip Verloy
VMUGbe 21 Filip VerloyFilip Verloy
 
VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization VMworld
 
Reference design for v mware nsx
Reference design for v mware nsxReference design for v mware nsx
Reference design for v mware nsxsolarisyougood
 
NSX Reference Design version 3.0
NSX Reference Design version 3.0NSX Reference Design version 3.0
NSX Reference Design version 3.0Doddi Priyambodo
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld
 
VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
 
VMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG IT
 
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationVMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationBayu Wibowo
 
VMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSXVMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSXVMworld
 
Network Virtualization with VMware NSX
Network Virtualization with VMware NSXNetwork Virtualization with VMware NSX
Network Virtualization with VMware NSXScott Lowe
 
NSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep DiveNSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep DivePooja Patel
 
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...VMworld
 
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
 

La actualidad más candente (20)

VMWare NSX Components
VMWare NSX ComponentsVMWare NSX Components
VMWare NSX Components
 
VMworld 2013: vSphere Distributed Switch – Design and Best Practices
VMworld 2013: vSphere Distributed Switch – Design and Best Practices VMworld 2013: vSphere Distributed Switch – Design and Best Practices
VMworld 2013: vSphere Distributed Switch – Design and Best Practices
 
VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture
 
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments
 
VMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectVMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real project
 
VMUGbe 21 Filip Verloy
VMUGbe 21 Filip VerloyVMUGbe 21 Filip Verloy
VMUGbe 21 Filip Verloy
 
VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization
 
Reference design for v mware nsx
Reference design for v mware nsxReference design for v mware nsx
Reference design for v mware nsx
 
NSX Reference Design version 3.0
NSX Reference Design version 3.0NSX Reference Design version 3.0
NSX Reference Design version 3.0
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep Dive
 
VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX
 
VMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG - NSX Architettura e Design
VMUG - NSX Architettura e Design
 
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationVMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
 
VMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSXVMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSX
 
Network Virtualization with VMware NSX
Network Virtualization with VMware NSXNetwork Virtualization with VMware NSX
Network Virtualization with VMware NSX
 
NSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep DiveNSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep Dive
 
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...
 
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSX
 

Destacado

VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
ESX Server from VMware
ESX Server from VMwareESX Server from VMware
ESX Server from VMwareAhmet Bulut
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
もう一つのHCI VxRackとVBlock
もう一つのHCI VxRackとVBlockもう一つのHCI VxRackとVBlock
もう一つのHCI VxRackとVBlockGaku Takahashi
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 RecapKevin Groat
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxsolarisyougood
 
Blue Medora - VMware vROps Management Pack for VCE Vblock Overview
Blue Medora - VMware vROps Management Pack for VCE Vblock OverviewBlue Medora - VMware vROps Management Pack for VCE Vblock Overview
Blue Medora - VMware vROps Management Pack for VCE Vblock OverviewBlue Medora
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld
 
Emc vmax3 technical deep workshop
Emc vmax3 technical deep workshopEmc vmax3 technical deep workshop
Emc vmax3 technical deep workshopsolarisyougood
 
SEC8022_Securing_SDDC_NSX_Hammad_Shahzad
SEC8022_Securing_SDDC_NSX_Hammad_ShahzadSEC8022_Securing_SDDC_NSX_Hammad_Shahzad
SEC8022_Securing_SDDC_NSX_Hammad_Shahzadshezy22
 
Is SDN Necessary?
Is SDN Necessary?Is SDN Necessary?
Is SDN Necessary?Bruce Davie
 
NFV Use Case_Virtual Network Function As Service
NFV Use Case_Virtual Network Function As ServiceNFV Use Case_Virtual Network Function As Service
NFV Use Case_Virtual Network Function As ServiceAbdul Ravoof
 
Cloud, SDN, NFV
Cloud, SDN, NFVCloud, SDN, NFV
Cloud, SDN, NFVIgor D.C.
 
Emc recoverpoint technical
Emc recoverpoint technicalEmc recoverpoint technical
Emc recoverpoint technicalsolarisyougood
 

Destacado (17)

VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
ESX Server from VMware
ESX Server from VMwareESX Server from VMware
ESX Server from VMware
 
NSX, un salt natural cap a SDN
NSX, un salt natural cap a SDNNSX, un salt natural cap a SDN
NSX, un salt natural cap a SDN
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
もう一つのHCI VxRackとVBlock
もう一つのHCI VxRackとVBlockもう一つのHCI VxRackとVBlock
もう一つのHCI VxRackとVBlock
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 Recap
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
 
Blue Medora - VMware vROps Management Pack for VCE Vblock Overview
Blue Medora - VMware vROps Management Pack for VCE Vblock OverviewBlue Medora - VMware vROps Management Pack for VCE Vblock Overview
Blue Medora - VMware vROps Management Pack for VCE Vblock Overview
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSX
 
Emc vmax3 technical deep workshop
Emc vmax3 technical deep workshopEmc vmax3 technical deep workshop
Emc vmax3 technical deep workshop
 
SEC8022_Securing_SDDC_NSX_Hammad_Shahzad
SEC8022_Securing_SDDC_NSX_Hammad_ShahzadSEC8022_Securing_SDDC_NSX_Hammad_Shahzad
SEC8022_Securing_SDDC_NSX_Hammad_Shahzad
 
Is SDN Necessary?
Is SDN Necessary?Is SDN Necessary?
Is SDN Necessary?
 
NFV Use Case_Virtual Network Function As Service
NFV Use Case_Virtual Network Function As ServiceNFV Use Case_Virtual Network Function As Service
NFV Use Case_Virtual Network Function As Service
 
Cloud, SDN, NFV
Cloud, SDN, NFVCloud, SDN, NFV
Cloud, SDN, NFV
 
Emc recoverpoint technical
Emc recoverpoint technicalEmc recoverpoint technical
Emc recoverpoint technical
 

Similar a NSX-MH

PLNOG16: VXLAN Gateway, efektywny sposób połączenia świata wirtualnego z fizy...
PLNOG16: VXLAN Gateway, efektywny sposób połączenia świata wirtualnego z fizy...PLNOG16: VXLAN Gateway, efektywny sposób połączenia świata wirtualnego z fizy...
PLNOG16: VXLAN Gateway, efektywny sposób połączenia świata wirtualnego z fizy...PROIDEA
 
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...VMworld
 
PLNOG15: Is there something less complicated than connecting two LAN networks...
PLNOG15: Is there something less complicated than connecting two LAN networks...PLNOG15: Is there something less complicated than connecting two LAN networks...
PLNOG15: Is there something less complicated than connecting two LAN networks...PROIDEA
 
[OpenStack 스터디] OpenStack With Contrail
[OpenStack 스터디] OpenStack With Contrail[OpenStack 스터디] OpenStack With Contrail
[OpenStack 스터디] OpenStack With ContrailOpenStack Korea Community
 
VXLAN in the contemporary data center
VXLAN in the contemporary data centerVXLAN in the contemporary data center
VXLAN in the contemporary data centerAnthony Chow
 
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSXOVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSXOVHcloud
 
VMware nsx network virtualization tool
VMware nsx network virtualization toolVMware nsx network virtualization tool
VMware nsx network virtualization toolDaljeet Singh Randhawa
 
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...VMworld
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld
 
VyOS Users Meeting #2, VyOSのVXLANの話
VyOS Users Meeting #2, VyOSのVXLANの話VyOS Users Meeting #2, VyOSのVXLANの話
VyOS Users Meeting #2, VyOSのVXLANの話upaa
 
Atf 3 q15-4 - scaling the the software driven cloud network
Atf 3 q15-4 - scaling the the software driven cloud networkAtf 3 q15-4 - scaling the the software driven cloud network
Atf 3 q15-4 - scaling the the software driven cloud networkMason Mei
 
Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015SDN Hub
 
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Ali
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_AliNET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Ali
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Alishezy22
 
Demystifying OpenStack for NFV
Demystifying OpenStack for NFVDemystifying OpenStack for NFV
Demystifying OpenStack for NFVTrinath Somanchi
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaVMUG IT
 
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld
 
VMworld 2013: An Introduction to Network Virtualization
VMworld 2013: An Introduction to Network Virtualization VMworld 2013: An Introduction to Network Virtualization
VMworld 2013: An Introduction to Network Virtualization VMworld
 
OpenStack MeetUp - OpenContrail Presentation
OpenStack MeetUp - OpenContrail PresentationOpenStack MeetUp - OpenContrail Presentation
OpenStack MeetUp - OpenContrail PresentationStacy Véronneau
 

Similar a NSX-MH (20)

PLNOG16: VXLAN Gateway, efektywny sposób połączenia świata wirtualnego z fizy...
PLNOG16: VXLAN Gateway, efektywny sposób połączenia świata wirtualnego z fizy...PLNOG16: VXLAN Gateway, efektywny sposób połączenia świata wirtualnego z fizy...
PLNOG16: VXLAN Gateway, efektywny sposób połączenia świata wirtualnego z fizy...
 
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
 
PLNOG15: Is there something less complicated than connecting two LAN networks...
PLNOG15: Is there something less complicated than connecting two LAN networks...PLNOG15: Is there something less complicated than connecting two LAN networks...
PLNOG15: Is there something less complicated than connecting two LAN networks...
 
[OpenStack 스터디] OpenStack With Contrail
[OpenStack 스터디] OpenStack With Contrail[OpenStack 스터디] OpenStack With Contrail
[OpenStack 스터디] OpenStack With Contrail
 
VXLAN in the contemporary data center
VXLAN in the contemporary data centerVXLAN in the contemporary data center
VXLAN in the contemporary data center
 
VXLAN Practice Guide
VXLAN Practice GuideVXLAN Practice Guide
VXLAN Practice Guide
 
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSXOVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
 
VMware nsx network virtualization tool
VMware nsx network virtualization toolVMware nsx network virtualization tool
VMware nsx network virtualization tool
 
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep Dive
 
VyOS Users Meeting #2, VyOSのVXLANの話
VyOS Users Meeting #2, VyOSのVXLANの話VyOS Users Meeting #2, VyOSのVXLANの話
VyOS Users Meeting #2, VyOSのVXLANの話
 
Atf 3 q15-4 - scaling the the software driven cloud network
Atf 3 q15-4 - scaling the the software driven cloud networkAtf 3 q15-4 - scaling the the software driven cloud network
Atf 3 q15-4 - scaling the the software driven cloud network
 
Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015Network and Service Virtualization tutorial at ONUG Spring 2015
Network and Service Virtualization tutorial at ONUG Spring 2015
 
Inf net2227 heath
Inf net2227 heathInf net2227 heath
Inf net2227 heath
 
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Ali
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_AliNET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Ali
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Ali
 
Demystifying OpenStack for NFV
Demystifying OpenStack for NFVDemystifying OpenStack for NFV
Demystifying OpenStack for NFV
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
 
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
 
VMworld 2013: An Introduction to Network Virtualization
VMworld 2013: An Introduction to Network Virtualization VMworld 2013: An Introduction to Network Virtualization
VMworld 2013: An Introduction to Network Virtualization
 
OpenStack MeetUp - OpenContrail Presentation
OpenStack MeetUp - OpenContrail PresentationOpenStack MeetUp - OpenContrail Presentation
OpenStack MeetUp - OpenContrail Presentation
 

NSX-MH

  • 1. VXLAN with NSX -MH VMWARE SDN Solution Sethuraman Ramanathan Protocols Sytest Team
  • 2. Agenda • Virtualization Basics • VXLAN Basics • VXLAN - Controller less solution • VXLAN – Controller based (NSX-MH solution)
  • 3. Virtualization Basics - Physical Infrastructure Fibre Channel storage Fibre Channel Ethernet NFS storage iSCSI storage applications operating system physical host
  • 4. Virtualization Basics Virtual Infrastructure hypervisor VMware ESXi™ host Fibre Channel Fibre Channel storage Ethernet NFS storage iSCSI storage virtual machines
  • 5. Servers 10 Utilization 8% Annual cost per server $4,000 Total Cost $40,000 Servers 3 Utilization 80% Annual cost per server $4,000 Total Cost $12,000 Before Virtualization After Virtualization More applications per machine = less machines $28,000 in cost avoidance Source: IT Business Edge, “The Business Value of Server Virtualization” – cost for average a 2 x CPU server in three-year amortized hardware purchase, and annual support and maintenance contract costs 9/07 The CapEx Story: Make better use of existing infrastructure Virtualization Basics Virtual Infrastructure
  • 6.
  • 7.  Physical Network is tied with virtual Network.  STP required.Scaling issues is seen as STP is not stable with scale.  Network troubleshooting is a challenge in layer 2 Networks with STP.  Cannot scale the network beyond 4096 vlans.
  • 8.  Problems being addressed:  VLAN scale – VXLAN extends the L2 segment ID field to 24-bits, potentially allowing for up to 16 million unique L2 segments over the same network  Layer 2 segment elasticity over Layer 3 boundary – VXLAN encapsulates L2 frame in IP-UDP header.So No STP is required.  Removes the need to have additional physical infrastructure. For example, the forwarding table of the external switch does not grow with the increase in the VMs behind the physical port on the server.
  • 9. VXLAN Packet Structure Original L2 Frame Given a VXLAN Header with VNI Original L2 FrameVXLAN Header FCS Allows for 16M possible segmentsUDP 4789 Enables better ECMP Load balancing in the Network. Src and Dst addresses of the VTEPs Src VTEP MAC Address Next-Hop MAC Address
  • 10. VXLAN Terminology • VTEP (VXLAN Tunnel End Point) – Performs VXLAN encap & decap – Usually located at the Aggregation Layer or in the compute devices • VNI (Virtual Network Identifier) – Mapping of VLAN to VXLAN (i.e., VNI 5000 maps to VLAN 20) – Can have multiple VLANs mapped to the same VNI VXLAN Devices 10 VTEP VTEPVTEP VTEP
  • 11. VXLAN MAC Learning  Flood & Learn is used today  Control-Plane based in future  Multicast is required OVS (Open Virtual Switch): Controller based  Controller learns the mac Data with VTEP information from all OVS devices.  Controller advertises the mac data with VTEP information to all OVS devices. PIM-SM or PIM-Bidir : Controller less 11
  • 12.
  • 13. VTEP Discovery (Pim method)  VTEPs join specified multicast group (*, G)  PIM-SM or PIM-BiDir  Can have one multicast group per VNI  Example: 239.1.1.1 is mapped to vxlan 10  Can have multiple VNIs per multicast group  Example: 239.1.1.1 is mapped to vxlan 10 and vxlan11. How VTEPs find each other in PIM protocol based learning method ? 13
  • 14. VXLAN Multicast Mode 1mgroup:2 vxlan Mapping VTEP VTEP VTEP Pim jointo Multicast Group 239.1.1.1 Pim join Multicast Group 239.1.1.1 Pim join to Multicast Group 239.2.2.2 Pim join to Multicast Group 239.2.2.2 Web VM Web VM DB VM DB VM Multicast-enabled Transport
  • 15. ARP Request VM 1 VM 3VM 2 VTEP 1 1.1.1.1 VTEP 3 3.3.3.3 VTEP 2 2.2.2.2 IP A  GARP Req MAC IP Addr VM 1 VTEP 1 MAC IP Addr VM 1 VTEP 1 ARP Req IP A  GARP Req ARP Req ARP Req Multicast-enabled Transport
  • 16. ARP Response VM 1 VM 3VM 2 VTEP 1 1.1.1.1 VTEP 3 3.3.3.3 VTEP 2 2.2.2.2 ARP Resp MAC IP Addr VM 2 VTEP 2 Multicast-enabled Transport VTEP 2  VTEP 1ARP Resp ARP Resp MAC IP Addr VM 1 VTEP 1
  • 17. routing-instances { sw1 { vtep-source-interface lo0.1; instance-type virtual-switch; interface xe-0/0/0.1; bridge-domains { vxlan1 { domain-type bridge; vlan-id 1; routing-interface irb.1; vxlan { vni 1; multicast-group 239.1.1.1; encapsulate-inner-vlan; decapsulate-accept-inner-vlan; } } } } } Gateway config spine switch– Multicast based vxlan
  • 18. Gateway config spine switch– Multicast based vxlanvrf1{ instance-type vrf; interface xe-0/0/1.1 route-distinguisher 100:1; vrf-target target:100:1; protocols { ospf { area 0.0.0.0 { interface all { bfd-liveness-detection { minimum-interval 2000; multiplier 3; } } } } pim { rp { local { address 5.0.0.1; } } interface all; } } }
  • 19.
  • 21. NSX Control Plane  The NSX Controller Cluster accepts logical network configuration instructions from administrators (through the NVP API) or from its clients), calculates the required network flow entries, and inserts these network flow entries into Open vSwitch (OVS) instances running on the transport nodes (hypervisor switches and NSX appliances).  In each transport node, the flow entries give OVS the routing information it needs to direct logical Ethernet frames to the right hypervisor or network gateway.
  • 22. NSX Data Plane Views  Transport Network view  Hypervisors,Physical gateways/or virtual gateways and service nodes.  Logical Network View  Logical switch,Logical switch port,Transport zone
  • 23. NSX Data Plane (Transport Network View)  The transport network view is the view presented to cloud / data center administrators (people who deploy hypervisors and their associated network infrastructure).  This view describes the physical devices that underlie the logical networks. We refer to these devices as “transport nodes” and they include the Hypervisors that host VMs and the network hardware that interconnects hypervisors and connects them to external, physical networks.  Each transport node runs an instance of Open vSwitch (OVS), so we also refer to transport nodes as “OVS devices”.  The cloud/data center administrator works in the transport network view, connecting hypervisors to the transport network, deploying other NSX transport nodes such as NSX Gateways, and connecting them to the physical network
  • 24. 8 VLAN Hardware Software L2 L3 Virtual Network L2 Open vSwitch NSX Gateway Physical Network (Arista, Cisco, HP, Juniper, Cumulus,…) VMVM NSX vSwitch ESXi Open vSwitch KVM Open vSwitch XenServer Open vSwitch Hyper-V* Controller Cluster Transport Network NSX Manager VTEP HW Partner VLAN * Hyper-V plan 2H2014 API
  • 25. NSX Data Plane (Gateway Service)  An NSX Gateway Service consists of one or more NSX Gateways that attach a logical network to a physical network not managed by NSX.  Each Gateway Service can operate as an L2 Gateway Service expanding a logical L2 segment to include a physical L2 segment, or as an L3 Gateway Service mapped to a physical router port.  Each Gateway in the service is a virtual appliance running OVS, or a physical VTEP-enabled appliance.
  • 26.
  • 27. Destination is in another segment. Packet is routed to the new segment VXLANORANGE VXLANBLUE Ingress VXLAN packet on Orange segment VXLAN Router  V(X)LAN-to-V(X)LAN Routing (L3 Gateway) VXLAN on HW Platforms Supported Functionalities  VXLAN to VLAN Bridging (L2 Gateway) VXLANORANGE Ingress VXLAN packet on Orange segment Egress interface chosen (bridge may .1Q tag the packet) VXLAN L2 Gateway Egress interface chosen (bridge may .1Q tag the packet)
  • 28. VNI 6000 VXLAN-to-VLAN Bridging Virtual to Physical VxLAN VLAN untagged VXLAN L2 Gateway VXLAN L2 Gateway VNI 5000 VLAN 10 VLAN 20 VXLAN VTEP HW VXLAN L2 Gateway Intra-Subnet Communication L3 Fabric L3 Cloud Controller
  • 29. L3 Cloud VXLAN L3 Gateway VXLAN L3 Gateway HW VXLAN Routing Inter-Subnets Communication VXLAN-to-VXLAN Routing VNI 5000 <-> VNI 7000 VXLAN L2 Gateway VXLAN L2 Gateway VxLAN VLAN untagged VLAN-to-VXLAN Routing VNI 6000 <-> L3_Ext_Intf VNI 5000 VLAN 20VLAN 30 VXLAN-to-VLAN Bridging VNI 7000 <-> VLAN 30 VXLAN-to-VLAN Bridging VLAN 20 <-> VNI 6000 L3 Fabric Controller
  • 30.
  • 31. Inter-VXLAN Routing using SW L3 Gateway SW Gwy VXLAN Routing VNI 5000 <-> VNI 6000 Virtual to Virtual VNI 5000 VNI 6000 vMX acting as L3 gateway L3 Fabric WAN/Core VxLAN untagged Controller
  • 32. SW L3 Gateway Communicating with the External L3 Domain SW Gwy VXLAN to VLAN Bridging VNI 5000 <-> V:LAN 100 Virtual to Physical VNI 6000 vMX acting as L3 gateway VLAN L3 Fabric WAN/Core VxLAN untagged Controller
  • 33. NSX SW L2 Gateway SW Gwy VXLAN Routing VNI 5000 <-> VNI 6000 Virtual to Physical VNI 5000 vMX acting as L2 gateway L3 Fabric WAN/Core VxLAN untagged VLAN 10 VXLAN L2 Gateway Controller
  • 34. NSX Data Plane (Service Node)  NSX employs NSX Service Nodes, OVS-enabled x86 appliances that are managed by the Controller Cluster to provide extra packet processing capacity for logical networks.  For example, Service Nodes assist with the packet replication required for logical network broadcast/multicast and unknown unicast flooding in overlay logical networks.  In VXLAN Multicast mode packet replication is done by router in the physical network.
  • 35. Logical Network view  The logical network view is the set of connectivity and network services a VM sees in the cloud. The logical view is the view presented to VMs and VM administrators and is independent of the underlying physical devices of the data center.  In a multi-tenant cloud, each tenant has his or her own logical network view and cannot see the logical network views of other tenants. The logical network view consists of the logical ports, logical switches, and logical routers that interconnect VMs and connect VMs to the external physical network.  From the point of view of a VM and its administrators, the logical network is the network. The VM administrator just connects VMs to logical switches and logical routers.
  • 37. Logical Network View Logical Switch: A logical switch is a layer-2 switching overlay implemented using one of NSX’s supported encapsulation mechanisms (VXLAN,GRE, IPsecGRE) . Basic network set-up in NSX is accomplished by connecting VMs to logical switches. Logical switch port: Similar to physical switch ports, logical switch ports enable the configuration of network services. Attachment: A Logical wire that can be used to connect virtual interfaces, logical switch ports,. Common attachment types include L2 gateway attachments, and L3 gateway attachments.
  • 38. Logical Network View: Transport zone—Physical network connectivity between transport nodes is modeled in the API as a transport zone. A transport zone corresponds to a physical network used to send data traffic between OVS devices. A simple NSX deployment will have a single transport zone that represents the physical network connectivity within the data center.
  • 40. DEMO
  • 41. L3 Cloud VXLAN L2 Gateway VLAN 1 VLAN 1 VXLAN-to-VLAN Bridging VLAN1<-> VLAN 1 VXLAN L2 Gateway Topology1 foot Littlefoot Service node Controller Thtys VxlanL2/L3 gateway
  • 42. L3 Cloud VXLAN L2 Gateway VLAN 1 VLAN 1 VXLAN-to-VLAN Bridging VLAN1<-> VLAN 1 VXLAN L2 Gateway Topology2 Thtys Littlefoot Service node Controller
  • 43. VXLAN L2 GATEWAY CONFIGURATION {master} regress@thtys> show configuration interfaces xe-2/3/3.1 family bridge { interface-mode trunk; << connects to servers vlan-id-list 1; } regress@foot> {master} regress@littlefoot> show configuration interfaces xe-1/1/1.1 family bridge { interface-mode trunk; << connects to servers vlan-id-list 1; } {master} regress@littlefoot>
  • 44. VXLAN L2 GATEWAY CONFIGURATION {master} regress@thtys> show configuration interfaces xe-2/0/0.1 vlan-tagging; unit 1 { vlan-id 1; family inet { address 1.0.1.1/30; ; << connects to spine } } {master} regress@littlefoot> show configuration interfaces xe-1/1/0 vlan-tagging; unit 1 { vlan-id 1; family inet { address 11.0.1.1/30; << connects to spine
  • 45. master} regress@thtys> show configuration routing-instances sw1 vtep-source-interface lo0.0; instance-type virtual-switch; interface xe-2/3/3.1; << Connects to the compute node 86a9576a-3b68-4412-9658-6218b3ac02fa {<< UUID of logical switch generated by controller domain-type bridge; vlan-id 1; vxlan { ovsdb-managed; vni 1; <<<<< VNI 1 is mapped to vlan 1 encapsulate-inner-vlan; ; <<Configure the switch to preserve the original VLAN tag (in the inner Ethernet packet) when performing VXLAN encapsulation. decapsulate-accept-inner-vlan; ; <<<Configure the switch to de- encapsulate and accept original VLAN tags in VXLAN packets VXLAN L2 GATEWAY CONFIGURATION:
  • 46. {master} regress@thtys> show configuration routing-instances vrf1 instance-type vrf; interface ge-1/0/9.0; <<<< connected to service node; interface xe-2/0/0.1; <<<< connects to the spine interface lo0.0; route-distinguisher 100:1; vrf-target target:100:1; protocols { ospf { area 0.0.0.0 { interface all { bfd-liveness-detection { minimum-interval 2000; multiplier 3; } } } } } VXLAN L2 GATEWAY CONFIGURATION:
  • 47. sw1 { vtep-source-interface lo0.0; instance-type virtual-switch; interface xe-1/1/1.1; << Connects to the compute node bridge-domains { 86a9576a-3b68-4412-9658-6218b3ac02fa { domain-type bridge; vlan-id 1; vxlan { ovsdb-managed; vni 1; <<<<< VNI 1 is mapped to vlan 1 encapsulate-inner-vlan; <<Configure the switch to preserve the original VLAN tag inner Ethernet packet) when performing VXLAN encapsulation. decapsulate-accept-inner-vlan; <<<Configure the switch to de-encapsulate and a original VLAN tags in VXLAN packets } } } VXLAN GATEWAY CONFIGURATION:Littlefoot < < UUID of logical switch generated by controller
  • 48. {master} regress@littlefoot> show configuration routing-instances vrf1 instance-type vrf; interface xe-1/1/0.1; <<<< connects to the spine interface lo0.0; route-distinguisher 100:1; vrf-target target:100:1; protocols { ospf { area 0.0.0.0 { interface all { bfd-liveness-detection { minimum-interval 2000; multiplier 3; } } } } } VXLAN GATEWAY CONFIGURATION:Littlefoot
  • 49. {master} regress@littlefoot> show ovsdb mac logical-switch 86a9576a-3b68-4412-9658-6218b3ac02fa Logical Switch Name: 86a9576a-3b68-4412-9658-6218b3ac02fa Mac IP Encapsulation Vtep Address Address Address ff:ff:ff:ff:ff:ff 0.0.0.0 Vxlan over Ipv4 10.255.178.140 ff:ff:ff:ff:ff:ff 0.0.0.0 Vxlan over Ipv4 24.24.24.1 {master} regress@littlefoot> {master} regress@littlefoot> MAC learning:Littlefoot
  • 50. {master} regress@littlefoot> show ovsdb controller VTEP controller information: Controller IP address: 192.168.181.3 Controller protocol: ssl Controller port: 6632 Controller connection: up Controller seconds-since-connect: 697109 Controller seconds-since-disconnect: 652143 Controller connection status: backoff {master} regress@littlefoot> Controller status:Littlefoot
  • 51. Logical Network View :Gateway service
  • 52. Logical Network View: Logical port attachment
  • 53. Logical Network view: Gateway service
  • 54. Logical Network view: Logical switch port attachment
  • 55. Logical Network view: Logical switch port status
  • 56. Logical Network view: Logical Switch

Notas del editor

  1. The savings that come from hardware cost are pretty clear, so let’s look at annual costs of running your servers. If your cost per server is $4,000, that’s $40K a year. If you consolidate this to three servers, that’s $28 in savings. This represents a conservative consolidation ratio (~3:1) typically we see ratios around 8~10.
  2. The key component a VXLAN implementation is called the VXLAN Tunnel End Point, or VTEP. The VTEP keeps track of what remote MAC addresses exist on which remote VTEPs within a given VXLAN. It performs encapsulation of local frames to send them to remote VTEPs and decapsulation of received VXLAN packets for delivery to local connected Ethernet End Systems. VTEPs don’t exist all by themselves, but are a component within a larger system. In this figure, the VTEP is embedded within an access switch. This could be a virtual switch on a hypervisor, or it could be a physical switch. Inside this access switch, is another component labeled “Bridge Domain Switch”, this is the heart of any layer 2 switch that performs MAC address learning and Ethernet frame forwarding. The term Bridge Domain is a generic term that covers both VLANs and VXLANs. Internally, the BD switch, switches frames based on an internal BD ID. When frames enter the switch on an interface, the frames are identified as belonging to a bridge domain based on both the interface it was received on and how the frame is tagged, whether that tag is a VLAN tag, or in the case of an internal VTEP, the VTEP maps the frames to the internal BD ID based on the VXLAN ID of the encapsulated packet. In the case of a VXLAN, any locally connected End Systems see no difference from being connected to a VLAN. Frames are switched between them locally by the BD switch and are not sent to the VTEP internal interface on the switch. If however, the destination MAC address is for a remote End System, then that ES appears to the BD switch to be connected to the VTEP internal interface. On the other side of the VTEP is an IP interface connected to the underlying IP transport network in the datacenter. Note that this interface need not (and usually is not) a physical interface, but instead is usually a virtual interface connected to a VLAN. So, that’s what a VTEP is. So if we now look at how the VTEPs communicate with each other over the IP transport network, when first they start out, they are completely unaware of any other VTEP. When a new VXLAN is configured on the VTEP, part of the configuration is an IP multicast group. Each VTEP uses IGMPv2 to perform an Any Source Multicast (aka star comma G) join to the multicast group. It needs to be any source because the VTEPs do not know what other VTEPs are currently participating in the VXLAN. This multicast group acts as a communication bus for VTEPs to communicate when sending unknown/broadcast/multicast frames. Once a frame is sent over this communication bus, each VTEP looks at the source IP address in the packet and learns which VTEPs have which remote MAC addresses behind them. Once that learning has happened, all unicast MAC addresses can be sent over point to point unicast tunnels to the correct VTEP directly.
  3. - Clarify HW capabilities and SW support for VXLAN-to-VXLAN bridging