VXLAN¶
Virtual eXtensible Local Area Networks (VLAN) is used to address the need for overlay networks within virtualized data centers accommodating multiple tenants.
To configure VXLAN, enter the context interface
type vxlan
from the VRF in
which you plan to define VXLAN logical interface. The VXLAN configuration is
valid as soon as the VXLAN ID is set.
Here is an example of VXLAN named vxlan100
in VRF main, with a
tag identifier 100
and linked to underlying interface named eth0
using the
multicast group ‘239.0.0.8’:
vrouter running vrf main# interface vxlan vxlan100
vrouter running vxlan vxlan100#! vni 100
vrouter running vxlan vxlan100# link-interface eth0
vrouter running vxlan vxlan100# group '239.0.0.8'
vrouter running vxlan vxlan100# commit
The VXLAN interface is configured provided eth0
is configured in VRF
main.
Let’s fetch the state afer committing this configuration:
vrouter running vrf main# interface vxlan vxlan100
vrouter running vxlan vxlan100# show state
vxlan vxlan100
mtu 1450
enabled true
ethernet
mac-address 36:22:c6:04:24:49
..
ipv6
address fe80::3422:c6ff:fe04:2449/64
..
vni 100
group 239.0.0.8
link-interface eth0
learning true
gbp false
dst 4789
src-range
49152
65535
..
oper-status UNKNOWN
counters
in-octets 0
in-unicast-pkts 0
in-discards 0
in-errors 0
out-octets 0
out-unicast-pkts 8
out-discards 0
out-errors 0
..
..
The same configuration can be made using this NETCONF XML configuration:
vrouter> show config xml absolute vrf main interface vxlan vxlan100
<config xmlns="urn:6wind:vrouter">
<ha xmlns="urn:6wind:vrouter/ha"/>
<vrf>
<name>main</name>
<interface xmlns="urn:6wind:vrouter/interface">
<vxlan xmlns="urn:6wind:vrouter/vxlan">
<name>vxlan100</name>
<enabled>true</enabled>
<ethernet>
<auto-negotiate>true</auto-negotiate>
<enable-flow-control>false</enable-flow-control>
</ethernet>
<ipv4>
<enabled>true</enabled>
</ipv4>
<ipv6>
<enabled>true</enabled>
</ipv6>
<learning>true</learning>
<gbp>false</gbp>
<dst>4789</dst>
<src-range>
<min>49152</min>
<max>65535</max>
</src-range>
<vni>100</vni>
<link-interface>eth0</link-interface>
<group>239.0.0.8</group>
</vxlan>
</interface>
</vrf>
</config>
An alternative configuration is depicted below, which is using the benefits of
EVPN technology. With BGP, as per chapter BGP EVPN,
VXLAN interfaces are used to connect VPNs between different sites. VXLAN
configuration differs a bit compared with previous configuration. For instance,
there is no need to configure any group
, as it is up to BGP to handle which
overlay traffic to convey to vxlan interface, and which destination IP to
apply to the underlay destination IP. Below configuration is an illustration on
how VXLAN interface can be configured within EVPN configuration:
rt1
vrf custom1
interface
vxlan vxl11
mtu 1550
vni 11
local 10.125.0.1
link-vrf main
learning true
link-interface eth0
link-vrf main
..
..
interface
bridge br11
link-interface vxl11
mtu 1500
..
..
More information can be found on EVPN chapter in routing chapter, in BGP.
See also
The command reference for details.