Netgear CSM4532 Software Administration Manual - Page 239

Functional Description

Page 239 highlights

arbitrary access routers are attached to a common layer-2 networks. The VXLAN encapsulation includes a 24bit virtual network ID (VNID). Hosts can be associated to a VNID and restricted to communicate only with hosts associated to the same VNID. This association segregates communities of interest, or tenants, into different virtual networks. VXLAN allows a public or private data center operator to use a common network infrastructure to provide virtual private network service to multiple tenants while distributing any given tenant's compute and storage resources anywhere in the network infrastructure. In a data center, VXLAN encapsulation and decapsulation of tenant packets is normally done by a virtual switch within a virtualized server; however, not all tenant systems are virtualized. Non-virtualized tenant systems can participate in a VXLAN by using a VXLAN gateway. A VXLAN gateway is a networking device that does VXLAN encapsulation and decapsulation. A server's first-hop router, often referred to as a top-of-rack (ToR) device, can be a VXLAN gateway. With VXLAN, the inner Ethernet header can optionally include an incoming VLAN tag. The VXLAN application always strips the inner VLAN information from the incoming Ethernet packet during encapsulation. The inner payload in the VXLAN encapsulated packet does not contain the incoming VLAN tag information in it, which enables flexibility in mapping available VLANs to VNIDs. The allowed range of VNID values is 1-16777214. VNID 16777215 is reserved for internal purposes. 9.6.2. Functional Description 9.6.2.1. VTEP to VN Association The operator must configure switches that are to serve as VXLAN gateways. A gateway may serve one or more VPNs. For VXLAN, the operator specifies the virtual network ID (VNID), the type of network (VXLAN), and a method for identifying which incoming native packets belong to the VPN. The ingress VLAN ID can be used as this classifier. Only one VLAN ID can be associated with a specific VNID on a given router. However, the VLAN ID used has no significance beyond that router, and so the same ID can be used on other routers. In this case the number of tenant networks is not limited to VLAN ID space (i.e., 4096). All ingress ports that are members of specified VLAN ID are treated as access ports for the VPN identified by VNID. This defines the access port set for the specified VPN. The access port set for the VXLAN can be altered by updating the VLAN membership configuration. All incoming VLAN traffic is translated to virtual network traffic identified by VNID. A VLAN ID that is already used or configured for routing is not allowed to be configured as an access VLAN for VXLAN. A source IP address (local VTEP) must be specified for configured VXLAN. The valid source IP interface is either a loopback interface or a routing interface (port-based or VLAN-based) on the router. It is recommended that a loopback interface be dedicated for VXLAN gateway purposes and configured with the intended source IP configuration before associating it with VXLAN. If the configured source IP interface is down or has no IP address, all remote VTEPs in the VPN are considered unreachable. No traffic flows to the remote VTEPs. Note that the configured source IP address must correspond to an IP address configured on each remote VTEP. Otherwise, the remote VTEPs will discard the gateway's packets. NETGEAR M4500 Series Switches Software Administration Manual 239

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251

NETGEAR M4500 Series Switches Software Administration Manual
239
arbitrary access routers are attached to a common layer-2 networks. The VXLAN encapsulation includes a 24-
bit virtual network ID (VNID). Hosts can be
associated
to a VNID and
restricted
to
communicate
only with hosts
associated to the same VNID. This association segregates communities of interest, or tenants, into different
virtual networks. VXLAN allows a public or private data center operator to use a common network
infrastructure to provide virtual private network service to multiple tenants while distributing any given
tenant's compute and storage resources anywhere in the network infrastructure.
In a data center, VXLAN encapsulation and decapsulation of tenant packets is normally done by a virtual switch
within a virtualized server; however, not all tenant systems are virtualized. Non-virtualized tenant systems can
participate in a VXLAN by using a VXLAN gateway. A VXLAN gateway is a networking device that does VXLAN
encapsulation and
decapsulation.
A server's first-hop router, often referred to as a top-of-rack (ToR) device, can
be a VXLAN gateway.
With VXLAN, the inner Ethernet header can optionally include an incoming VLAN tag. The VXLAN application
always strips the inner VLAN information from the incoming Ethernet packet during encapsulation. The inner
payload in the VXLAN encapsulated packet does not contain the incoming VLAN tag information in it, which
enables flexibility in mapping available VLANs to VNIDs.
The allowed range of VNID values is 1–16777214. VNID 16777215 is reserved for internal purposes.
9.6.2.
Functional Description
9.6.2.1.
VTEP to VN Association
The operator must configure switches that are to serve as VXLAN gateways. A gateway may serve one or
more VPNs. For VXLAN, the operator specifies the virtual network ID (VNID), the type of network (VXLAN),
and a method for identifying which incoming native packets belong to the VPN. The ingress VLAN ID can be
used as this classifier. Only one VLAN ID can be associated with a specific VNID on a given router. However,
the VLAN ID used has no significance beyond that router, and so the same ID can be used on other routers. In
this case the number of tenant networks is not limited to VLAN ID space (i.e., 4096). All ingress ports that are
members of specified VLAN ID are treated as access ports for the VPN identified by VNID. This defines the
access port set for the specified VPN. The access port set for the VXLAN can be altered by updating the VLAN
membership configuration. All incoming VLAN traffic is translated to virtual network traffic identified by
VNID. A VLAN ID that is already used or configured for routing is not allowed to be configured as an access
VLAN for VXLAN.
A source IP address (local VTEP) must be specified for configured VXLAN. The valid source IP interface is
either a loopback interface or a routing interface (port-based or VLAN-based) on the router. It is
recommended that a loopback interface be dedicated for VXLAN gateway purposes and configured with the
intended source IP configuration before associating it with VXLAN. If the configured source IP interface is
down or has no IP address, all remote VTEPs in the VPN are considered unreachable. No traffic flows to the
remote VTEPs.
Note that the configured source IP address must correspond to an IP address configured on each remote
VTEP. Otherwise, the remote VTEPs will discard the gateway's packets.