Method and device for supporting MLAG active-active access in VXLAN network

A dual-active access and network technology, applied in the virtual network field, can solve problems such as inability to isolate VXLAN service messages, messages not taking effect, and inability to adapt to VXLAN networks

Active Publication Date: 2021-09-10
浪潮思科网络科技有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional isolation of peer-link ports and member ports based on physical port settings does not take effect for packets forwarded by VXLAN, that is, one-way isolation cannot isolate VXLAN se

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for supporting MLAG active-active access in VXLAN network
  • Method and device for supporting MLAG active-active access in VXLAN network
  • Method and device for supporting MLAG active-active access in VXLAN network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] Embodiment 1: as figure 2 As shown, if the BUM message is forwarded from vm1 on server1 to the VTEP direction, the forwarding process of the BUM message is as follows:

[0055]Step 1: vm1 on server1 sends a BUM message, the VLAN tag of the BUM message is 10, and the destination MAC address is: FF:FF:FF:FF:FF:FF. Since server1 is connected to leaf1 and leaf2 respectively, the BUM message may be forwarded to leaf1 or leaf2, assuming that the LAG algorithm sends the message to leaf1.

[0056] Step 2: The LAG1 member interface in the MLAG1 member interface group on leaf1 receives a BUM packet with VLAN 10 tag and destination MAC address FF:FF:FF:FF:FF:FF broadcast address. According to the VLAN tag of the BUM message, the chip finds that the VXLAN network ID corresponding to the message is 100, that is, the message needs to be flood forwarded in the VXLAN 100 forwarding domain. Then leaf1 sends a BUM message to VP2, VP3, VP4, VP5, and VP10. The VTEP tunnel corresponding...

Embodiment 2

[0058] Embodiment 2: as figure 2 As shown, if a BUM packet is forwarded from the VTEP device on the leaf1 side to vm1 on server1, the forwarding process of the BUM packet is as follows:

[0059] Step 1: Decapsulate the BUM packet through the VTEP device on the leaf1 side, and obtain the inner destination MAC address of the BUM packet as the FF:FF:FF:FF:FF:FF broadcast address. According to the VLAN tag of the BUM message, the chip finds that the VXLAN network ID corresponding to the message is 100, that is, the message needs to be flood forwarded in the VXLAN 100 forwarding domain. Then leaf1 sends a BUM message to VP1, VP2, VP3, VP4, and VP5. Among them, VP1, VP2, VP3, and VP4 correspond to the local MLAG member devices of VXLAN 100 on leaf1, and are finally sent to vm1, vm2 on server1, and vm1, vm2 on server2. At the same time, leaf1 will send a QINQ packet with outer VLAN 4000 and inner VLAN 5 to the peer-link interface.

[0060] Step 2: The peer-link port on Leaf2 rece...

Embodiment 3

[0061] Embodiment 3: as figure 2 As shown, if the BUM packet is forwarded from the VTEP device on the leaf2 side to the vm1 direction on server1, the forwarding process of the BUM packet is as follows:

[0062] Step 1: Check the table and decapsulate the BUM packet through the VTEP device on the leaf2 side, and obtain the inner destination MAC address of the BUM packet as the FF:FF:FF:FF:FF:FF broadcast address. According to the VLAN tag of the BUM message, the chip finds that the VXLAN network ID corresponding to the message is 100, that is, the message needs to be flood forwarded in the VXLAN 100 forwarding domain. Then leaf2 sends a BUM message to VP1, VP2, VP3, VP4, and VP5. Among them, VP1, VP2, VP3, and VP4 correspond to the local MLAG member devices of VXLAN 100 on leaf2, and are finally sent to vm1 and vm2 on server1, and vm1 and vm2 on server2. At the same time, leaf2 will send a QINQ message with outer VLAN 4000 and inner VLAN 5 to the peer-link interface.

[006...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method and a device for supporting MLAG active-active access in a VXLAN. The method comprises the following steps: constructing an MLAG active-active access system based on a cross-device link aggregation group MLAG technology; based on an access control list (ACL) technology, creating an ACL matching rule corresponding to a current VXLAN network on a peer-link interface of a switch, and creating a multicast group for the current VXLAN network; based on an ACL matching rule, under the condition that a preset message corresponding to the current VXLAM network is received on a peer-link interface of any switch, redirecting the preset message to a multicast group of the current VXLAN network, wherein the preset message at least comprises one or more of the following messages: a broadcast message, a multicast message and an unknown unicast message; and forwarding a preset message to the corresponding MLAG member equipment through the virtual port in the multicast group. In the MLAG system applied to the VXLAN network, the one-way isolation of the BUM message of the peer-link interface and the MLAG member interface is realized.

Description

technical field [0001] The present application relates to the field of virtual network technology, and in particular to a method and device for supporting MLAG dual-active access in a VXLAN network. Background technique [0002] Currently, when a server is connected to a virtual extended local area network (Virtual eXtensible Local Area Network, VXLAN), in order to ensure reliability, a stacking scheme is generally used to implement active-active access. When an access link fails, packets can be quickly switched to another link for forwarding. In order to utilize the bandwidth efficiently, the two links are activated at the same time, so that packets can be forwarded in the way of load sharing between the two links. However, in the stacking solution, after virtualizing multiple switches into one device for management, the master device controls them uniformly, and the slave devices only perform service forwarding. Therefore, the stacking solution only has a single managemen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/709H04L12/46H04L12/935H04L12/931H04L45/243H04L49/111
CPCH04L45/245H04L12/4641H04L49/201H04L49/30
Inventor 刘宏强蔡旺
Owner 浪潮思科网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products