Escolar Documentos
Profissional Documentos
Cultura Documentos
Lawrence Kreeger
Distinguished Engineer, Cloud Networking and
Services Group
Agenda
Session Is Broken Into 3 Main Parts
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Part 1: VXLAN Overview
What Is A VXLAN?
A VLAN with an X in the middle
A VXLAN provides the same service to End Systems as a VLAN
The X stands for eXtensible
– Scale!
– More layer 2 segments than VLANs
– Wider stretch than VLANs
VXLANs are an Overlay Network technology
– MAC Over UDP/IP
A draft specifying VXLAN was submitted to the IETF by Cisco, VMware and
several other hypervisor and network equipment vendors (draft-mahalingam-
dutt-dcops-vxlan)
– Currently sponsored by an IETF Area Director and being sheparded for publishing as
an RFC
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Overlay Networks
SFO
MXP
Air Traffic Control System
Ethernet Frames
V V
M M
1 4
IP Addr IP Addr
1.1.1.1 2.2.2.2
V Virtual IP Network Virtual V
M M
2 Switch Switch 5
V V
M UDP/IP Packets M
3 6
Hypervisor Hypervisor
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
VXLAN Data Plane High Level Overview
VM to VM Ethernet traffic on different access switches is encapsulated in
a VXLAN header + UDP + IP
The VXLAN header contains a 24 bit VXLAN Network Identifier
VM MAC to access switch IP address mappings are learned by receiving
encapsulated packets
– Similar to Ethernet bridge flood and learn behavior
VXLAN uses IP multicast to deliver bcast/mcast/unknown destination VM
MAC addresses to all access switches participating in a given VXLANs
Known destination VM MAC addresses are carried over point to point
tunnels between access switches
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Why VXLANs?
Pain Points in Scaling Cloud Networking
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Server Virtualization and MAC Addresses
Comparison of Physical vs. Virtualized Servers
Assume each server has 2 NICs (e.g. front end and management)
A physical server uses only 1 MAC addresses per NIC (2 MACs)
Virtualized servers have a MAC address for each Virtual NIC (VNIC)
– Multiple kernel VNICs are used by the hypervisor itself (e.g. management, iSCSI,
vMotion, Fault Tolerance, VXLAN VTEP etc) (e.g. 6 MACs)
– Each VM may have multiple VNICs (e.g. 2)
Assume 1 RU servers with 16 cores (32 threads), and hundreds of GB of
memory
– e.g. 32 VMs with 2 VNICs each = 64 MACs (This number will only be rising)
Physical with 2 MACs -> Virtualized with 70 MACs = 35 fold increase in MACs
per server!
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
High Density Switch Architectures Can Pack
Thousands of Servers in One STP Domain
4K Physical Servers = 4K * 2 = 8K MACs
4K Virtualized Servers:
Without VXLAN: 4K * 70 = 280K MACs IP Core
With VXLAN: 4K * 6 = 24K MACs
286 Uplink Ports each
4096 Servers
2 x 10GE each
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Multi-Tenancy and vApps Drive the Need for Many
L2 Segments
Both MAC and IP addresses could overlap between two tenants, or even within
the same tenant in different vApps.
– Each overlapping address space needs a separate segment
VLANs use 12 bit IDs = 4K
VXLANs use 24 bit IDs = 16M
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Spanning Tree Logical Port Limitations
A Logical Port is the intersection of a VLAN with a physical switch port
– e.g. A single trunk port with 1000 VLANs uses 1000 Logical Ports
Switches have a limited number of Logical Ports
− This is a STP software limitation
− Nexus 7000 NX-OS 6.x supports 16,000 for PVST+ and 90,000 for MST
− Nexus 5000 NX-OS 5.2 supports 32,000 for either PVST+ or MST
e.g. A 96 port Nexus 5000 switch can support on average 333 VLANs per port
− Numbers get worse for a larger switch and/or with FEX
e.g. The previous example topology had 288 ports per Nexus 5000 -> 111 VLANs per port
When using VXLANs, all traffic travels over just one transport VLAN
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Challenges Configuring VLAN Trunks to Servers
Trunk ports to virtualized servers are typically manually configured
– Slow to react to dynamic needs of the cloud, which usually leads to over-provisioning
the trunks
Over-provisioned trunk ports lead to
– Broadcast and Unknown unicast traffic arriving at servers that don’t need them
– Excessive use of Spanning Tree Logical Port resources on access switches
VXLANs use the multicast IGMP protocol to automatically prune traffic on
demand
– Logical Port resources are traded for multicast IGMP Snooping state in switches and
IP Route state in routers
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Extending Layer 2 Across the Data Center
Exacerbates 4K VLAN Limit
Using FabricPath or OTV to extend layer 2 across the entire data center
increases VM mobility and deployment flexibility
However...it makes the 4K VLAN limit a data center wide limitation
With VLANs a tradeoff must be made between the number of segments within
a data center, and the span of those segments
– Small layer 2 domains give many islands of 4K VLANs, but limits VM placement and
mobility
VXLANs can be extended data center wide and still support up to 16M layer 2
segments
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
VMware vCloud Director and vApps
What is VMware vCloud Director?
Organization 1 Organization m
Users
Pools virtual infrastructure resources
into tiers called Virtual Datacenters
VMware vCloud Director
Defines standard collections of VMs User Portals Catalogs Security
called vApps
Creates Organizations and manages
users Virtual Datacenter 1 (Gold) Virtual Datacenter n (Silver)
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
What Is A vApp?
A Cloud Provider using vCloud Director offers catalogs of vApps to their Users
When cloned, new vApps retain the same MAC and IP addresses
Duplicate MACs within different vApps requires L2 isolation
Duplicate IP addresses requires L2/L3 isolation (NAT of externally facing IP addresses)
Usage of vApps causes an explosion in the need for isolated L2 segments
Org Network
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Possible vApp Instantiation
Edge Gateway: vShield Edge (now renamed to NSX Edge)
Edge Gateway performs NAT or VPN to remote location
VXLANs are perfect candidates for vApp internal networks
– Only VMs connect to vApp Networks
VLAN 100
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
VXLAN Benefits
On demand network segments without physical network reconfiguration
Massive scale of layer 2 segments for multi-tenant environments
Allows virtual layer 2 segments to stretch across physical layer 2 network
boundaries
– Provides operational flexibility for deploying VMs anywhere in the data center
VXLANs work over existing deployed data center switches and routers
– Alleviates network scaling issues associated with server virtualization
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Part 1: Q & A
Part 2: Deeper Dive
VXLAN Network Model
End End
Bridge Bridge System
System Domain
Domain
Switch Switch
VTEP
VTEP IP Multicast
Enabled Underlying
Network
End End
System System
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
VXLAN Data Plane Model
VTEP VTEP
VXLAN’s IP Any Source Multicast Group (*,G)
acts as a bus for delivery to all relevant VTEPs
for a given VNI. (Carries
unknown/broadcast/multicast frames)
VTEP VTEP
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
VXLAN Packet Structure
Transport MAC
Addresses
IP Addresses of Contains 24 bit MAC Addresses
(change each
the VTEPs VXLAN Network of the VMs
IP hop)
Identifier (VNI)
Outer Outer
Outer Outer Outer Outer VXLAN Inner Inner Inner Inner Original IP
MAC MAC CRC
802.1Q IP DA IP SA UDP Header MAC DA MAC SA IP DA IP SA Payload
DA SA
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
VTEP Use Of IGMP
IGMP Used to Join Each VXLANs Assigned Multicast Group on Demand
Web DB DB Web
VM VM VM VM
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
VXLAN Example Data Flow
VM1 Communicating with VM2 in a VXLAN
ARP
Request
ARP ARP
MAC: MAC: Request VM 3 Request
VM 1 abc
VM 2
xyz
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
VXLAN Example Data Flow
VM1 Communicating with VM2 in a VXLAN
ARP
MAC: MAC: Response VM 3
VM 1 abc
VM 2
xyz
Unicast
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
VXLAN Example Data Flow
VM1 Communicating with VM2 in a VXLAN
ARP
MAC: Response VM 3
VM 1 abc
VM 2 MAC:
xyz
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
VXLAN Example Data Flow
VM1 Communicating with VM2 in a VXLAN
MAC: VM 3
VM 1 abc
VM 2 MAC:
xyz
Unicast
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Multiple VXLANs Can Share One Multicast Group
Blue & Red VXLANs Share the 239.1.1.1 Multicast Group
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Multicast-less Mode
Several customers have asked for a way to support VXLAN without using IP
multicast
A single Nexus 1000V is actually one virtual switch, controlled by the same
Virtual Supervisor Module
The VSM is already used to distribute MAC addresses between VEMs for
features such as:
– Private VLAN
– Port Security
For this feature, the VSM is also used to distribute the VTEP IP addresses for
each VXLAN between the VEMs
VEMs perform head-end replication of multi-destination frames only to the
other VEMs which are participating in the VXLAN
Should only be used if the amount of multi-destination traffic is low (e.g. ARP,
DHCP, discovery)
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
MAC Address Distribution
VSM distributes assigned VNIC MAC addresses and their VTEP IP address
mappings
This pre-populates the VXLAN forwarding tables
– This eliminates the need for unknown flooding for these addresses
Especially useful in conjunction with Multicast-less mode to minimize head-end
replication
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
VXLAN Trunking to VNICs
VMs have a limited number of VNICs (e.g. 10 or 8)
– This typically limits the number of VLANs or VXLANs a VM can connect to
Sometimes it is desirable for a VM to connect to many networks
– e.g. If the VM is a network service appliance or router
For VLANs, the Nexus 1000V supports VLAN trunks
It is possible for VMs to have there own VTEPs to terminate many VXLANs, but
most existing VMs do not support this.
Solution:
– Map each VXLAN to a locally significant VLAN tag on the virtual Ethernet interface
– These locally significant tag values can be reused with different mappings on different
interfaces
– The VM thinks it is connected to a VLAN trunk
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
VXLAN to VLAN Virtual Service Blade
Bridging The Virtual/Physical Divide
??
Si
Si
VXLANs/virtual VLANs/physical
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
VXLAN to VLAN Gateway (Logical View)
L3
VLANs
VXLANs
L2 Domain 1 L2 Domain 2 L2 Domain 3
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
VXLAN Gateway: A Two Port Bridge
VXLAN 10000 VLAN 100
bridge-domain red
Uplink
VXLAN Gateway
Virtual Service Blade
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Future Cisco VXLAN Enhancements
Extend VXLAN unicast-only mode to
– work across Nexus 1000V VSMs
– work across Nexus 1000V VSMs and hardware gateways
– using standards based protocols
VXLAN support for Nexus 1000V for KVM/OpenStack
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
N1KV on KVM
OpenStack
REST API
vWAAS Partners
Virtual Services
Tenant 1 Tenant 2 Tenant 3
VXLAN Segments
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
VXLAN on HW Platforms
Supported Functionalities
VXLAN-to-VLAN Bridging (L2 Gateway) Inner Ethernet frame sent on
Configured Egress VLAN
VXLANORANGE VXLANBLUE
N5600, N7000 (F3), N9000 VXLAN
Ingress VXLAN packet on Router
Orange segment
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
VXLAN Overlay Comparisons
VXLAN Versus STT
Stateless Transport Tunneling Protocol
Similarities Differences
Both carry Ethernet Frames Encapsulation Format and Overhead
– VXLAN: UDP with 50 bytes
– STT: “TCP-like” with 72 to 54 bytes (not uniform) *
Both use IP Transport
Segment ID Size
Both can use IP Multicast – VXLAN: 24 bit
– STT: 64 bit
– For broadcast and multicast frames
Firewall ACL can act on VXLAN UDP port
Both can take advantage of existing – Firewalls will likely block STT since it has no TCP state
machine handshake
Port Channel load distribution
algorithms Forwarding Logic
– VXLAN: Flooding/Learning
– 5 Tuple Hashing (UDP vs TCP) – STT: Not specified
Note: STT uses the TCP header, but not the protocol state machine. TCP header fields are repurposed.
* The STT header does not exist in every packet. Only the first packet of a large segment, therefore reassembly is required.
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
VXLAN Versus NVGRE
Network Virtualization using Generic Routing Encapsulation
Similarities Differences
Both carry Ethernet frames Encapsulation Format and Overhead
– VXLAN: UDP with 50 bytes
– NVGRE: GRE with 42 bytes
Both use IP Transport
Port Channel Load Distribution
Both can use IP Multicast – VXLAN: UDP 5-tuple hashing
– Most (if not all) current switches do not hash on the GRE
– For broadcast and multicast frames header
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
VXLAN Versus OTV
Overlay Transport Virtualization
Similarities Differences
Both carry Ethernet frames Forwarding Logic
– VXLAN: Flooding/Learning
Same UDP based encapsulation – OTV: Uses the IS-IS protocol to advertise the MAC
address to IP bindings
header
– VXLAN does not use the OTV Overlay ID field OTV can locally terminate ARP and doesn’t
flood unknown MACs
Both can use IP Multicast
– For broadcast and multicast frames OTV can use an adjacency server to eliminate
(optional for OTV) the need for IP multicast
OTV is optimized for Data Center Interconnect
to extend VLANs between or across data
centers
VXLAN is optimized for intra-DC and multi-
tenancy
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
VXLAN Versus LISP
Locator / ID Separation Protocol
Similarities Differences
Same UDP based encapsulation LISP carries IP packets, while VXLAN carries
header Ethernet frames
– VXLAN does not use the control flag bits or
Nonce/Map-Version field Forwarding Logic
– VXLAN: Flooding/Learning
24 Bit Segment ID – LISP: Uses a mapping system to register/resolve inner IP to
outer IP mappings
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Part 2: Q & A
Part 3: Deployment
Nexus 1000V VEM VMKNICs
Management VMKNIC
– For VSM to VEM communication
VXLAN VMKNIC(s)
– For terminating VXLAN encapsulated traffic VM VM
Mgmt VMKNIC
VXLAN VMKNIC
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Configure VMKNIC On Each ESX Host
Allocate a separate VLAN to carry VXLAN traffic to/from ESX hosts
– Add this VLAN to allowed VLANs on trunk ports leading to ESX servers
– Add this VLAN to allowed VLANs on Nexus 1000V uplink port profiles
Create an Access Port port profile connected to the above created VXLAN
transport VLAN
– Add the command “capability vxlan” to the port profile to indicate the associated
VMKNIC will be used to send/receive VXLAN encapsulated packets
Using vCenter, create a new VMKNIC on each host that requires access to
VXLANs
– Assign the above port profile to this VMKNIC
– Assign an available IP address within the subnet of the VXLAN transport VLAN
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
VXLAN Infrastructure MTU Requirements
Increase MTU To Accommodate Added Encapsulation Overhead
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Enable IP Multicast Forwarding
Layer 2 Multicast Configuration
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Enable IP Multicast Forwarding
Layer 3 Multicast Configuration
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Enable UDP Port Based Load Distribution
For Both Layer 2 and Layer 3
VTEPs transfer inter-VM flow entropy into the outer IP encapsulation source
UDP port
– VTEP generates a hash value based on the VM’s IP or L2 headers and put this into the
outer UDP source port
Take advantage of this in the underlying network by using UDP port based flow
distribution
Enable 5-tuple (L3 Src/Dst, L4 Proto, L4 Port Src/Dst) based load distribution
for
– Port Channels and Virtual Port Channels to VXLAN enabled hosts
– Port Channels and Virtual Port Channels between switches
– For router Equal Cost Multi-Pathing (ECMP)
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Enable Proxy ARP on Transport VLAN SVIs
VEM VTEP function will always ARP for destination IP addresses
– This simplifies the ESX host routing table configuration
If host VXLAN VMKNICs are on different subnets
– SVIs must be created on the VXLAN transport VLANs
– Proxy ARP must be enabled on these SVIs
IOS and NX-OS defaults are different for Proxy ARP
– IOS defaults to enabled
– NX-OS defaults to disabled
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Nexus 1000V VXLAN CLI
Manual Provisioning of VXLANs
Enable the feature
switch(config)# feature segmentation
Create a VXLAN Instance
switch(config)# bridge-domain my-vxlan-1
switch(config-bd)# segment id 20480
switch(config-bd)# group 239.1.1.1
Assign a Port Profile to connect to a VXLAN
switch(config-port-prof)# switchport mode access
switch(config-port-prof)# switchport access bridge-domain my-vxlan-1
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Nexus 1000V vCloud Director Integration
Four Main Components
Management of
1. VMware vCloud Tenant VMs
Director
Center (vCD)
Network Management of
Management vShield Edge
through vShield VMs
Manager
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Integrating Nexus 1000V and vShield Manager
1. Turn on Network Segmentation Manager feature on Nexus 1000V
N1KV(config)# feature network-segmentation-manager
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Part 3: Q & A
Related Sessions
LTRDCT-1223 - Implementing VXLAN in Datacenter
BRKDCT-1301 - VxLAN Deployment - Use Cases and Best Practices
BRKVIR-2017 - The Nexus 1000V on Microsoft Hyper-V: Expanding the Virtual
Edge
BRKAPP-9004 - Data Center Mobility, VXLAN & ACI Fabric Architecture
BRKDCT-2328 - Evolution of Network Overlays in Data Center Clouds
BRKDCT-2337 - Virtual Services for Scalable Multi-tenant Cloud Architectures
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Resources
Whitepapers and Deployment Guides (www.cisco.com/go/1000v)
– Deploying the VXLAN Feature in Cisco Nexus 1000V Series Switches
– Deploying Cisco Nexus 1000V Series Switches with VMware vCloud Director and
VXLAN 1.0
– Scalable Cloud Networking with Cisco Nexus 1000V Series Switches and VXLAN
– Enable Cisco Virtual Security Gateway Service on a Virtual Extensible LAN Network in
VMware vCloud Director
Cisco Cloud Lab (cloudlab.cisco.com)
– Demo: Virtual Extensible LAN (VXLAN)
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Summary / Next Steps
VXLANs can help you scale your cloud networking
VXLANs work over your existing switches and routers
The Nexus 1000V’s VXLAN support is fully integrated with VMware vCloud Director and
OpenStack
Explore available resources
Try VXLANs for yourself!
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Complete Your Online Session Evaluation
Complete your online session
evaluation
Complete four session evaluations
and the overall conference evaluation
to receive your Cisco Live T-shirt
BRKVIR-2014 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 68