Académique Documents
Professionnel Documents
Culture Documents
May 2009 Chuck Hudson (HP) Paul Congdon (HP) c.hudson@hp.com ptcongdon@ucdavis.edu
Agenda
Life
on the Edge VEBs are here to stay Extending VEBs with Tag-less VEPAs Comparing EVB Approaches Using Promiscuous vPorts with VEPA Other Case Studies Conclusion
14-May-09
hudson-vepa_seminar-20090514.pdf
14-May-09
hudson-vepa_seminar-20090514.pdf
14-May-09
hudson-vepa_seminar-20090514.pdf
Blade Switch
14-May-09
hudson-vepa_seminar-20090514.pdf
Proprietary offerings from HP, IBM, Sun, Oracle, etc. NICs with multiple vNICs that share a single link
PCI Single-root or Multiple-root IO Virtualization (SR-IOV, MR-IOV) Other multi-vNIC technologies
14-May-09
hudson-vepa_seminar-20090514.pdf
SR-IOV NICs
Separate buffer for each virtual function (vNIC) May implement hundreds of virtual functions Will usually implement ETS queues at the shared link
14-May-09
hudson-vepa_seminar-20090514.pdf
SR-IOV Device
PCIe Port
Growth of Virtualization
By 2012, over 50% of workloads will be run in a virtualized environment
14-May-09
hudson-vepa_seminar-20090514.pdf
No standards in place for coordinating management between hypervisors and external bridging.
Multiple, vendor-specific vSwitches/VEBs are impractical
10
14-May-09
hudson-vepa_seminar-20090514.pdf
11
14-May-09
hudson-vepa_seminar-20090514.pdf
12
14-May-09
hudson-vepa_seminar-20090514.pdf
All hypervisor environments support some form of VEB capability today. Local bridging with VEB is needed to allow hypervisors to:
Operate without external bridges attached Operate with a broad range of Ethernet environments Maximize local bandwidth Minimize local latency Minimize local packet loss
VEB capability will still be required for hypervisors and SRIOV NICs
14-May-09 hudson-vepa_seminar-20090514.pdf
14
Ingress Egress
15
14-May-09
hudson-vepa_seminar-20090514.pdf
Software VEB
*
expander
Ingress Egress
Hardware VEB
Adjacent Bridge
Adjacent Bridge
16
14-May-09
hudson-vepa_seminar-20090514.pdf
Port Group
Adjacent Bridge
Adjacent Bridge
17
14-May-09
hudson-vepa_seminar-20090514.pdf
VM
B
VM
C
VM
D
VM
E
VM
F
VEB
Adjacent Bridge
18
14-May-09
hudson-vepa_seminar-20090514.pdf
Addressing Security
Limit to assigned MAC Allow guest-OS specific MACs Promiscuous
Default priority and/or priority mapping Traffic shaping & bandwidth management
19
14-May-09
hudson-vepa_seminar-20090514.pdf
DCBX Configuration
ETS Queues Priority Flow Control
20
14-May-09
hudson-vepa_seminar-20090514.pdf
VM
A
VM
B
VM
C
VM
D
VM
E
VM
F
LLDP
Identifies physical NIC of the physical end station
VEB
DCBX
Configures the physical NIC Physical NIC ETS queues Physical NIC PFC settings
Adjacent Bridge
21
14-May-09
hudson-vepa_seminar-20090514.pdf
22
14-May-09
hudson-vepa_seminar-20090514.pdf
Copy To
VM
A
VM
B
VM
C
VM
D
VM
E*
VM
F
VEB
Adjacent Bridge
* Promiscuous vPort
23 14-May-09 hudson-vepa_seminar-20090514.pdf
Copy To
VM
A
VM
B
VM
C
VM
D
VM
E*
VM
F
Bcast Bcast
Adjacent Bridge
* Promiscuous vPort
24 14-May-09 hudson-vepa_seminar-20090514.pdf
Copy To
100000 0 010000 0 001000 0 000100 0 000010 0 000001 0 101010 1 010101 1 101010 1 100010 1 010101 1
VM
A
VM
B
VM
C
VM
D
VM
E*
VM
F
* Promiscuous vPort
25 14-May-09 hudson-vepa_seminar-20090514.pdf
VLAN 1 2 1 2 1 2 1 2 1 1 2 1 2
(ABCDEF Up)
Copy To
100000 0 010000 0 001000 0 000100 0 000010 0 000001 0 101010 1 010101 1 101010 1 100010 1 010101 1 000010 1 000000 1
VM
A
VM
B
VM
C
VM
D
VM
E*
VM
F
VEB
Adjacent Bridge Flooding of unknown unicast limited to promiscuous ports and uplink
* Promiscuous vPort
26 14-May-09
hudson-vepa_seminar-20090514.pdf
SRC = A; DST = C
Copy To
100000 0 010000 0 001000 0 000100 0 000010 0 000001 0 101010 1 010101 1 101010 1 100010 1 010101 1 000010 1 000000 1
VM
A
VM
B
VM
C
VM
D
VM
E*
VM
F
VEB
Adjacent Bridge
* Promiscuous vPort
27 14-May-09 hudson-vepa_seminar-20090514.pdf
Copy To
100000 0 010000 0 001000 0 000100 0 000010 0 000001 0 101010 1 010101 1 101010 1 100010 1 010101 1 000010 1 000000 1
VM
A
VM
B
VM
C
VM
D
VM
E*
VM
F
VEB
Adjacent Bridge
Station
28 14-May-09
* Promiscuous vPort
hudson-vepa_seminar-20090514.pdf
VLAN 1 2 1 2 1 2 1 2 1 1 2 1 2
(ABCDEF Up)
Copy To
100000 0 010000 0 001000 0 000100 0 000010 0 000001 0 101010 1 010101 1 101010 1 100010 1 010101 1 000010 1 000000 1
VM
A
VM
B
VM
C
VM
D
VM
E*
VM
F
VEB
Adjacent Bridge
* Promiscuous vPort
29 14-May-09 hudson-vepa_seminar-20090514.pdf
VM Migration Example
Station 1
1
Station 2
5
VM
A
VM
B
VM
C
VEB Address Table
DST MAC VLAN 1 2 1 2 1 2 1 2 1 1 2 1 2
(ABCDEF Up)
VM
C
VM
X
2. Station 1 hypervisor halts VM & removes address table entries. 3. Station 2 hypervisor adds address table entries. 4. Station 2 hypervisor sends out gratuitous ARP to update external switch caches. 5. Station 2 activates VM.
Copy To
Copy To
VEB
A B C D E F Bcast Bcast MulticastC Unk Mcast Unk Mcast Unk Ucast Unk Ucast
100000 0 010000 0 001000 0 000100 0 000010 0 000001 0 101010 1 010101 1 101010 1 100010 1 010101 1 000010 1 000000 1
VEB
A B C D E F Bcast Bcast MulticastC Unk Mcast Unk Mcast Unk Ucast Unk Ucast
100000 0 010000 0 001000 0 000100 0 000010 0 000001 0 101010 1 010101 1 101010 1 100010 1 010101 1 000010 1 000000 1
Adjacent Bridge
Adjacent Bridge
30
14-May-09
hudson-vepa_seminar-20090514.pdf
31
Limited integration with external network management systems Limited support for promiscuous ports Limited support for 802.1 protocols
14-May-09 hudson-vepa_seminar-20090514.pdf
(typically no learning)
VMware
VI3: Networking Concepts & Best Practices, Session #TA2441, Guy Brunsdon, vmworld 2008 http://vmware.com/go/networking VMware Infrastructure 3 Documentation http://www.vmware.com/support/pubs/vi_pubs.html
Microsoft
XEN
http://wiki.xensource.com/xenwiki/XenNetworking
32
14-May-09
hudson-vepa_seminar-20090514.pdf
33
14-May-09
hudson-vepa_seminar-20090514.pdf
Tag-less VEPA can address most VEB limitations with minimal cost, minimal NIC changes, minimal bridge changes, no frame format changes, and minimal IEEE specification changes.
34
14-May-09
hudson-vepa_seminar-20090514.pdf
35
14-May-09
hudson-vepa_seminar-20090514.pdf
36
14-May-09
hudson-vepa_seminar-20090514.pdf
Ingress Egress
37
14-May-09
hudson-vepa_seminar-20090514.pdf
Software VEPA
*
expander
Ingress Egress
Hardware VEPA
Adjacent Bridge
Adjacent Bridge
38
14-May-09
hudson-vepa_seminar-20090514.pdf
Port Group
VEPA
Adjacent Bridge
Adjacent Bridge
39
14-May-09
hudson-vepa_seminar-20090514.pdf
vNICs in basic tag-less VEPA mode are NOT configured for promiscuous operation This will be addressed in a later section
VEPA
Adjacent Bridge
Adjacent Bridge
40
14-May-09
hudson-vepa_seminar-20090514.pdf
VM
B
VM
C
VM
D
VM
E
VM
F
VEPA
Adjacent Bridge
41
14-May-09
hudson-vepa_seminar-20090514.pdf
Addressing Security
Limit to assigned MAC Allow guest-OS specific MACs No promiscuous for basic tag-less VEPA
Default priority and/or priority mapping Traffic shaping & bandwidth management
42
14-May-09
hudson-vepa_seminar-20090514.pdf
DCBX Configuration
ETS Queues Priority Flow Control
43
VM
A
VM
B
VM
C
VM
D
VM
E
VM
F
LLDP
Identifies physical NIC of the physical end station
VEB
DCBX
Configures the physical NIC Physical NIC ETS queues Physical NIC PFC settings Select EVB Mode (VEB/VEPA)
Adjacent Bridge
44
14-May-09
hudson-vepa_seminar-20090514.pdf
45
14-May-09
hudson-vepa_seminar-20090514.pdf
A B C D E F Bcast
100000 010000 001000 000100 000010 000001 101010 010101 101010 100010 010101 000000 000000
VM
A
VM
B
VM
C
VM
D
VM
E
VM
F
Bcast MulticastC Unk Mcast Unk Mcast Unk Ucast Unk Ucast
VLAN 1 2 1 2 1 2 1 2 1 1 2 1 2
Copy To
(ABCDEF)
100000 010000 001000 000100 000010 000001 101010 010101 101010 100010 010101 000000 000000
VM
A
VM
B
VM
C
VM
D
VM
E
VM
F
VEPA
Adjacent Bridge
2.
Station
47 14-May-09 hudson-vepa_seminar-20090514.pdf
100000 010000 001000 000100 000010 000001 101010 010101 101010 100010 010101 000000 000000
VM
A
VM
B
VM
C
VM
D
VM
E
VM
F
VEPA
3 1
Adjacent Bridge
2 3.
2.
48
14-May-09
hudson-vepa_seminar-20090514.pdf
VLAN 1 2 1 2 1 2 1 2 1 1 2 1 2
Copy To
(ABCDEF)
100000 010000 001000 000100 000010 000001 101010 010101 101010 100010 010101 000000 000000
VM
A
VM
B
VM
C
VM
D
VM
E
VM
F
VEPA
1
Bcast Bcast MulticastC Unk Mcast Unk Mcast Unk Ucast Unk Ucast
Adjacent Bridge 2
2. 3.
4.
49 14-May-09 hudson-vepa_seminar-20090514.pdf
VM Migration Example
Station 1
1
1. Hypervisors copy VM state to target destination. 2. Station 1 hypervisor halts VM & removes address table entries.
Station 2
5
VM
A
VM
B
VM
C
VEB Address Table
DST MAC VLAN 1 2 1 2 1 2 1 2 1 1 2 1 2
(ABCDEF Up)
VM
C
VM
X
VM
Y
VEB Address Table
DST MAC VLAN 1 2 1 2 1 2 1 2 1 1 2 1 2
(ABCDEF Up)
3. Station 2 hypervisor adds address table entries. 4. Station 2 hypervisor notifies adjacent bridge of EVB configuration change & sends out gratuitous ARP to update external switch caches. 5. Station 2 activates VM.
Copy To
Copy To
VEPA 2
A B C D E F Bcast Bcast MulticastC Unk Mcast Unk Mcast Unk Ucast Unk Ucast
100000 0 010000 0 001000 0 000100 0 000010 0 000001 0 101010 1 010101 1 101010 1 100010 1 010101 1 000010 1 000000 1
VEPA 3
4
A B C D E F Bcast Bcast MulticastC Unk Mcast Unk Mcast Unk Ucast Unk Ucast
100000 0 010000 0 001000 0 000100 0 000010 0 000001 0 101010 1 010101 1 101010 1 100010 1 010101 1 000010 1 000000 1
Adjacent Bridge
Adjacent Bridge
50
14-May-09
hudson-vepa_seminar-20090514.pdf
VLAN 1 1,2 1 2 1 2 1 2 1 1 2 1 2
Copy To
(ABCDEF)
100000 010000 001000 000100 000010 000001 111010 010101 111010 110010 010101 000000 000000
VM
A
VM
B
VM
C
VM
D
VM
E
VM
F
VEPA
Adjacent Bridge
51
14-May-09
hudson-vepa_seminar-20090514.pdf
100000 010000 001000 000100 000010 000001 101000 101010 010101 101010 100010 010101 000000 000000
VM
A
VM
B
VM
C
VM
D
VM
E
VM
F
VEPA
Bcast
Adjacent Bridge
Caused by VMs A & C registering H as a listening MAC address (if allowed by hypervisor)
Bcast MulticastC Unk Mcast Unk Mcast Unk Ucast Unk Ucast
52
14-May-09
hudson-vepa_seminar-20090514.pdf
53
14-May-09
hudson-vepa_seminar-20090514.pdf
Solves nearly all of the issues with VEBs Allows easy migration between VEB and VEPA modes
54
Controlling Bridge
Interface Virtualizer
Interface Virtualizer
Introduces additional latency. Breaks distributed computing approaches that can exploit physical proximity.
VM
VM
55
14-May-09
hudson-vepa_seminar-20090514.pdf
VN-Tags will not work with any switch not specifically designed for it
14-May-09 hudson-vepa_seminar-20090514.pdf
56
Tag-less VEPA
uses MAC+VID to steer frames
VN-Tagged
uses new tag to steer frames
Emulates 802.1 Bridge Works with all existing bridges No changes to existing frame format. Limited bridge visibility Limited feature set Best performance. Will always be there
14-May-09
Exploits 802.1 Bridge Works with many existing bridges No changes to existing frame format. Full bridge visibility Access to bridge features Constrained performance Leverages VEB
Extends 802.1 Bridge Works with few or no existing bridges Changes existing frame format. Full bridge visibility Access to bridge features Constrained performance Doesnt leverage VEB
hudson-vepa_seminar-20090514.pdf
58
14-May-09
hudson-vepa_seminar-20090514.pdf
Agenda
Life
on the Edge VEBs are here to stay Extending VEBs with Tag-less VEPAs Comparing EVB Approaches Using Promiscuous vPorts with VEPA Other Case Studies Conclusion
59
14-May-09
hudson-vepa_seminar-20090514.pdf
60
14-May-09
hudson-vepa_seminar-20090514.pdf
Promiscuous ports are not common at the edge of the virtualization environment However,
Simultaneous operation of a VEB and VEPA provides both performance and flexibility A small number of inline virtual appliances may be useful The VN-Tag alternative believes it is necessary
61
14-May-09
hudson-vepa_seminar-20090514.pdf
62
14-May-09
hudson-vepa_seminar-20090514.pdf
Use a set of VLANs internal to the VEPA and adjacent bridge to create proper filtering behavior Promiscuous vPorts send on a different set of VLANs than they receive on Non-promiscuous vPorts send and receive on a set of VLANs and may also receive on promiscuous vPort VLANs The adjacent bridge enables hairpin mode on some VLANs, but not others
63
14-May-09
hudson-vepa_seminar-20090514.pdf
Non-promiscuous vPorts may egress internal VLANs. Internal Promiscuous vPort PVID and Egress list are different External Promiscuous vPort is isolated Broadcast table entries are created based on port Egress list
Physical End Station
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
VM
C
VM
D
VM
E
VM
F
Port P2*
VEPA
Ports C,D,E,F
2
(**CDEF Up)
Adjacent Bridge
Z
64 14-May-09 hudson-vepa_seminar-20090514.pdf
SRC = F; DST = Z
Physical End Station
3
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
Transparent Service
P1* P2*
VM
C
VM
D
VM
E
VM
F
2 VEPA
4
1
Port P1*
1
2
Port P2*
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Adjacent Bridge
NOTE: No Hairpin on VLAN 1
Ports C,D,E,F
(**CDEF Up)
5
65 14-May-09
hudson-vepa_seminar-20090514.pdf
SRC = Z; DST = F
Physical End Station
3
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
Transparent Service
P1* P2*
VM
C
VM
D
VM
E
VM
F
4 VEPA 5
Port P1* Port P2*
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Adjacent Bridge
Ports C,D,E,F
(**CDEF Up)
1
66 14-May-09
hudson-vepa_seminar-20090514.pdf
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
Transparent Service
P1* P2*
VM
C
VM
D
VM
E
VM
F
2 VEPA 4
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Adjacent Bridge
NOTE: No Hairpin on VLAN 1
Ports C,D,E,F
(**CDEF Up)
5
67 14-May-09
hudson-vepa_seminar-20090514.pdf
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
Transparent Service
P1* P2*
VM
C
VM
D
VM
E
VM
F
4 VEPA 2 5
Port P1* Port P2*
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Adjacent Bridge
Ports C,D,E,F
(**CDEF Up)
1
68 14-May-09
hudson-vepa_seminar-20090514.pdf
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
VM
B
Bridge3
P1* P2*
VM
C
VM
D
VM
E
VM
F
VEPA
1
Port P1* Port P2*
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Adjacent Bridge
Ports C,D,E,F
(**CDEF Up)
Z
69 14-May-09 hudson-vepa_seminar-20090514.pdf new file name goes here
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
VM
B
Bridge 1
P1* P2*
VM
C
VM
D
VM
E
VM
F
VEPA
2
3
Port P1* Port P2*
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Adjacent Bridge
Ports C,D,E,F
(**CDEF Up)
Z
70 14-May-09 hudson-vepa_seminar-20090514.pdf new file name goes here
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
VM
B
3 Bridge
P1* P2*
VM
C
VM
D
VM
E
VM
F
VEPA
5
Port P1* Port P2*
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Adjacent Bridge
Ports C,D,E,F
(**CDEF Up)
1
71 14-May-09 hudson-vepa_seminar-20090514.pdf
SRC = F; DST = Z
VM
A
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
VM
B
Bridge3
P1* P2*
VM
C
VM
D
VM
E
VM
F
2 VEPA 4
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Adjacent Bridge
NOTE: No Hairpin on VLAN 1
Ports C,D,E,F
(**CDEF Up)
72
14-May-09
hudson-vepa_seminar-20090514.pdf
SRC = F; DST = A
VM
A
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 100000 Egress
VM
B
VEB 3
P1*
VM
C
VM
D
VM
E
VM
F
VEPA
Port P1*
Ports C,D,E,F
Adjacent Bridge
(**CDEF Up)
Z
73 14-May-09 hudson-vepa_seminar-20090514.pdf
2 3
SRC = F; DST = Z
VM
A
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
VM
B
VEB
P1*
VM
C
VM
D
VM
E
VM
F
VEPA
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Adjacent Bridge
2
Z
74 14-May-09 hudson-vepa_seminar-20090514.pdf
Ports C,D,E,F
(**CDEF Up)
SRC = A; DST = Z
VM
A
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
VM
B
VEB
P1*
VM
C
VM
D
VM
E
VM
F
2
NOTE: VLAN Translation Here
VEPA
Port P1* Port P2*
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Adjacent Bridge
Ports C,D,E,F
(**CDEF Up)
3
75 14-May-09
hudson-vepa_seminar-20090514.pdf
Copy To
(ABCDEF)
001000 000100 000010 000001 100000 001111 011111 100000 000000 010000 Egress
VM
B
VEB1
P1*
VM
C
VM
D
VM
E
VM
F
2
NOTE: VLAN Translation Here
VEPA
3
Port P1* Port P2*
PVID = 1 Egress list = 1 PVID = 2 Egress list = 3 PVID = 3 Egress list = 2,3
Adjacent Bridge
3
Z
76 14-May-09 hudson-vepa_seminar-20090514.pdf
Ports C,D,E,F
(**CDEF Up)
VLAN 3 3 3 3 1 2 3 1 2 3 Reflect N N Y
Copy To
(123DEF)
001000 000100 000010 000001 100000 011000 000111 100000 011000 000000 Egress
Transparent Service
P1* P2*
IDS
P3*
VM
D
VM
E
VM
F
VEB Mode
VEPA Mode
VEPA
Adjacent Bridge
Ports C,D,E,F
(**CDEF Up)
Z
77 14-May-09 hudson-vepa_seminar-20090514.pdf
SRC = Z; DST = F
Copy To
(123DEF)
001000 000100 000010 000001 000000 000111 000111 000000 000000 000000 Egress
Transparent Service
P1* P2*
IDS
P3*
VM
D
VM
E
VM
F
VEB Mode
VEPA Mode
VEPA
Adjacent Bridge
Ports C,D,E,F
(**CDEF Up)
Z
78 14-May-09 hudson-vepa_seminar-20090514.pdf
VLAN 3 3 3 3 1 2 3 1 2 3 Reflect N N Y
Copy To
(123DEF)
001000 000100 000010 000001 100000 011000 000111 100000 011000 000000 Egress
Transparent Service
P1* P2*
IDS
P3*
VM
D
VM
E
VM
F
VEB Mode
VEPA Mode
VEPA
Adjacent Bridge
Ports C,D,E,F
(**CDEF Up)
Z
79 14-May-09 hudson-vepa_seminar-20090514.pdf
SRC = Z; DST = F
VLAN 3 3 3 3 1 2 3 1 2 3 Reflect N N Y
Copy To
(123DEF)
001000 000100 000010 000001 100000 011000 000111 100000 011000 000000 Egress
Transparent Service
P1* P2*
IDS
P3*
VM
D
VM
E
VM
F
VEB Mode 2
NOTE: VLAN Translation Here
VEPA Mode
VEPA
Adjacent Bridge
1
Z
80 14-May-09 hudson-vepa_seminar-20090514.pdf
Ports C,D,E,F
(**CDEF Up)
SRC = F; DST = Z
VLAN 3 3 3 3 1 2 3 1 2 3 Reflect N N Y
Copy To
(123DEF)
001000 000100 000010 000001 100000 011000 000111 100000 011000 000000 Egress
Transparent Service
P1* P2*
IDS
P3*
VM
D
VM
E
VM
F
VEB Mode 4
VEPA Mode
VEPA
Adjacent Bridge
5
Z
81 14-May-09 hudson-vepa_seminar-20090514.pdf
Ports C,D,E,F
(**CDEF Up)
82
14-May-09
hudson-vepa_seminar-20090514.pdf
General Comments
Some examples assume that the logic to support VEBs is not there.
VEBs are a necessity at the edge VEPA is a simple, low-cost extension to VEBs
Responses assume that you are already familiar with the case studies.
83
14-May-09
hudson-vepa_seminar-20090514.pdf
Case Study
Note:
Example shows stacked VEPAs (not the focus for EVB)
Response:
VEPAs can be configured to isolate the traffic into and out of transparent services using private VLAN techniques.
Such an approach does not require new frame formats, new number/name spaces, and new address tables.
Case Study
Description:
Note:
VEBs and VEPAs have similar behavior
Response:
There is limited need to support multiple VLANs at the vPort
End stations using several VLANs are usually VM hosts (therefore not a virtual end station) Hypervisors can simply create an additional vNICs instead
Address table can be used to validate VLAN IDs vPorts with VLAN choices of: (none, one, few, all) meet market requirements VEBs/VEPAs could provide full 4K if market requires it
Hardware to support 4K VLANs is the same regardless of whether it is in the VEB/VEPA or built into the switch to support a virtual switch port. Many 802.1 devices do not support 4K VLANs
85 14-May-09 hudson-vepa_seminar-20090514.pdf
Case Study
Description:
Note:
VEBs and VEPAs have similar behavior Example shows stacked VEPAs (not the focus for EVB)
Response:
Hypervisors do not usually expose FC/FCoE devices to the VMs
Storage adapters terminate in the hypervisor Exposed to VMs as generic SCSI devices
86
14-May-09
hudson-vepa_seminar-20090514.pdf
Case Study
Description:
Bridge Stacking
Attaching a bridge beneath a VEPA appears beyond the scope of the VEPA proposal.
Note:
Example shows stacked VEPAs (not the focus for EVB)
Response:
VEPA is focused at the Edge Virtual Bridging issue described up-front. VEPA can handle transparent services and promiscuous ports if and when required.
87
14-May-09
hudson-vepa_seminar-20090514.pdf
Case Study
Description:
Note:
VEBs and VEPAs have similar behavior Example shows stacked VEPAs (not the focus for EVB)
Response:
A similar load-balancing approach can be achieved in a edge VEPA/VEB environment as follows:
Isolate the services a separate VLAN (e.g., VID translation) Place an egress ACL on the traffic going to each instance of the service (which is now isolated from other VEB/VEPA ports by the VLAN). Have the egress ACL block traffic with odd or even source MACs. Services will now distributed by the client MAC
88
14-May-09
hudson-vepa_seminar-20090514.pdf
Case Study
Description:
Note:
Example shows stacked VEPAs (not the focus for EVB)
Response:
Yes! VEPAs and VEBs have extremely similar address tables and forwarding logic. Since you already have a VEB, the VEPA mode is essentially free. If you combine a VEB and an Interface Virtualizer, then now get extra VNTag table, logic, and testing. Also, the forwarding complexity is grossly over stated. Edge devices can typically work well without learning.
89
14-May-09
hudson-vepa_seminar-20090514.pdf
Conclusion
90
14-May-09
hudson-vepa_seminar-20090514.pdf
91
14-May-09
hudson-vepa_seminar-20090514.pdf
92
14-May-09
hudson-vepa_seminar-20090514.pdf