CloudCampus Solution V100R021C00 Design and Deployment Guide for Small- and Medium-Sized Campus Networks

This document describes network planning, service planning, deployment, and configuration processes for small- and medium-sized campus networks.

This document describes network planning, service planning, deployment, and configuration processes for small- and medium-sized campus networks.

VXLAN Fabric Network Management

VXLAN Fabric Network Management

Overview of VXLAN

Definition

Virtual eXtensible Local Area Network (VXLAN), defined in RFC 7348, is a Network Virtualization over Layer 3 (NVO3) technology that uses MAC-in-User Datagram Protocol (MAC-in-UDP) encapsulation.

Purpose

Cloud computing has become the new trend in enterprise IT construction with its features such as high system utilization, low manpower and management costs, flexibility, and strong scalability. As one of the core technologies of cloud computing, server virtualization has been widely used.

For details about server virtualization, see Server Virtualization.

The extensive deployment of server virtualization greatly increases the computing density in a data center (DC). In addition, virtual machines (VMs) need to be freely migrated on the network to meet flexible service change requirements. These bring challenges to traditional data center networks (DCNs) using the Layer 2 + Layer 3 architecture.

VXLAN addresses the preceding problems:
  • For VM scale limited by entry specifications of devices

    Server virtualization leads to an exponential growth of the number of VMs, compared with physical servers. However, the MAC address table size of a Layer 2 device at the access side is incapable to meet this change.

    VXLAN encapsulates original packets sent by VMs in the same region into UDP packets, and uses the physical IP and MAC addresses as outer headers so that other network devices on the network only sense the UDP packets. This technology greatly reduces the requirements of large Layer 2 networks on MAC address specifications.

  • Provides greater network isolation capabilities.

    While VLAN is the most commonly used network isolation technology, it has its own limitations. The VLAN field in packets is only 12 bits long, which means that at most 4096 VLANs can be used on a network. In public cloud or other large cloud computing scenarios involving tens of thousands of or even more tenants, VLAN technology can no longer meet network isolation requirements.

    A tenant is a complete collection of logical resources deployed on a DCN, including network resources such as VLANs and IP address pools, as well as computing resources such as physical servers and virtual machines (VMs). Each tenant has its own tenant administrator to orchestrate and deploy network services.

    VXLAN uses a VXLAN Network Identifier (VNI) similar to a VLAN ID to identify users. The VNI is 24 bits in length and can identify up to 16 million VXLAN segments, effectively isolating massive tenants in cloud computing scenarios.

  • Limited VM migration scope

    VM migration is a process in which a VM moves from one physical server to another. To ensure uninterrupted services during VM migration, the IP address of VMs must remain unchanged. To meet this requirement, server migration must occur in a Layer 2 network. However, VM migration on a traditional Layer 2 network is limited to a small scope.

    VXLAN encapsulates original packets sent by VMs over a VXLAN tunnel. VMs at two ends of a VXLAN tunnel do not need to know the physical architecture of the transmission network. In this way, VMs with IP addresses on the same network segment are logically located in the same Layer 2 domain even if they are physically located on different Layer 2 networks. VXLAN technology constructs a virtual large Layer 2 network over a Layer 3 network, so that VMs are on the same large Layer 2 network as long as there are reachable routes between them. The virtual large Layer 2 network enlarges the VM migration scope.

    For details about a large Layer 2 network, see Large Layer 2 Network.

Benefits

As server virtualization is being rapidly deployed on DCs based on the physical network infrastructure, VXLAN offers the following benefits:
  • VXLAN is essentially a VPN technology and can be used to build a Layer 2 virtual network over any networks with reachable routes. VXLAN uses VXLAN gateways to implement communication within a VXLAN network and communication between a VXLAN network and a non-VXLAN network.

  • VXLAN utilizes MAC-in-UDP encapsulation to extend Layer 2 networks. It encapsulates Ethernet packets into IP packets for these Ethernet packets to be transmitted over routes, without considering the MAC addresses of VMs. In addition, routed networks are not limited by the network architecture and support large-scale scalability. As such, VM migration is not constrained by the network architecture.

Understanding VXLANs

VXLAN Network Architecture

VXLAN is an NVO3 network virtualization technology that encapsulates data packets sent from original hosts into UDP packets and encapsulates IP and MAC addresses used on the physical network in outer headers before sending the packets over an IP network. The virtual tunnel endpoint (VTEP) then decapsulates the packets and sends the packets to the destination host.

By leveraging VXLAN, a virtual network can accommodate a large number of tenants. Tenants can plan their own virtual networks without being limited by physical network IP addresses or broadcast domains. This technology significantly simplifies network management, allows VMs to migrate over a large Layer 2 network, and isolates tenants in a virtual.

Similar to a traditional VLAN, a VXLAN also allows for intra- and inter-VXLAN communication.

Intra-VXLAN Communication

VXLAN technology constructs a virtual Layer 2 network over a Layer 3 network, implementing Layer 2 communication between VMs. Figure 9-160 shows intra-VXLAN communication.

Figure 9-160 Intra-VXLAN Communication

Involved concepts

  • VXLAN Network Identifier (VNI)

    A VNI is similar to a VLAN ID on a traditional network, and it identifies a VXLAN segment. Tenants on different VXLAN segments cannot communicate at Layer 2. One tenant may have one or more VNIs. A VNI consists of 24 bits and supports up to 16 million tenants.

  • Broadcast Domain (BD)

    Similar to VLANs divided on a traditional network, BD is used for broadcast domain division on a VXLAN.

    On a VXLAN, to allow Layer 2 communication between VMs in a BD, VNIs and BDs are mapped in 1:1 mode.

  • VXLAN VTEP

    A VTEP encapsulates and decapsulates VXLAN packets.

    The source and destination IP addresses in a VXLAN packet are the IP addresses of the local and remote VTEPs, respectively. A pair of VTEP addresses defines one VXLAN tunnel. A source VTEP encapsulates packets and selects a tunnel to forward them. The corresponding destination VTEP decapsulates the received packets.

  • Virtual Access Point (VAP)

    A VAP is a VXLAN service access point used for service access based on VLANs or packet encapsulation modes. For more information, see VXLAN Identification:
    • Service access based on VLANs: The 1:1 or N:1 mapping between VLANs and BDs is configured on VTEPs. When a VTEP receives a service packet, it forwards the packet in a BD based on the mapping between VLANs and BDs.
    • Service access based on packet encapsulation modes: Layer 2 sub-interfaces are created on a downlink physical interface of a VTEP, and different encapsulation modes are configured for these sub-interfaces to enable different interfaces to receive different data packets. The 1:1 mapping between Layer 2 sub-interfaces and BDs is also defined. Then service packets are sent to specific Layer 2 sub-interfaces after reaching the VTEP. That is, packets are forwarded in a BD based on the mapping between Layer 2 sub-interfaces and BDs.
  • Network Virtualization Edge (NVE)

    An NVE is a network entity used to implement network virtualization functions. After packets are encapsulated and decapsulated through NVEs, a Layer 2 VXLAN can be established between NVEs over the basic Layer 3 network.

  • Layer 2 gateway

    Similar to a Layer 2 access device on a traditional network, it allows tenant access to VXLANs and intra-subnet VXLAN communication in the same network segment.

Inter-VXLAN Network Communication (Centralized Gateway)

VMs in different BDs cannot directly communicate at Layer 2. VXLAN Layer 3 gateways need to be configured to implement Layer 3 communication between VMs. Figure 9-161 shows inter-VLAN communication.

Figure 9-161 Inter-VXLAN Communication

Involved concepts
  • Layer 3 gateway

    On a traditional network, users in different VLANs cannot directly communication at Layer 2. Layer 2 communication is also not allowed between VXLANs identified by different VNIs or between VXLANs and non-VXLANs. To address these problems, the VXLAN Layer 3 gateway is introduced to enable data transmission between VXLANs or between VXLANs and non-VXLANs.

    The VXLAN Layer 3 gateway is used for cross-subnet communication on the VXLAN and external network access.

  • VBDIF interface

    On a traditional network, VLANIF interfaces are used to enable communication between different BDs. Similarly, VBDIF interfaces are introduced in a VXLAN to implement such function.

    The VBDIF interface is configured on the VXLAN Layer 3 gateway and is a Layer 3 logical interface based on BDs. After IP addresses are configured for VBDIF interfaces, VXLANs on different network segments, VXLANs and non-VXLANs, and Layer 2 and Layer 3 networks can communicate with each other.

Inter-VXLAN Network Communication (Distributed Gateway)

A distributed gateway is the device that supports the functions of a VXLAN Layer 2 gateway and a Layer 3 gateway. As shown in Figure 9-162, the VTEP device work as a Layer 2 gateway on the VXLAN network and is connected to hosts, allowing terminal tenants to access the VXLAN network. The VTEP device can also work as a Layer 3 gateway on the VXLAN network, allowing terminal tenants across subnets to communicate with each other and access the extranet. The distributed gateway is supported only for the VXLAN network deployed in BGP EVPN mode.

Figure 9-162 Inter-VXLAN communication

The VXLAN distributed gateway has the following characteristics:
  • One VTEP node can work as a VXLAN Layer 2 or 3 gateway, enabling flexible deployment.
  • Unlike the centralized Layer 3 gateway which has to learn the ARP entries of all servers, the VTEP node only needs to learn the ARP entries of the connected server, solving the ARP entry problem of the centralized Layer 3 gateway and improving network scalability.

Comparison Between VXLAN and VLAN

The following table lists the differences between VXLAN and VLAN.

Table 9-555 Comparison between VXLAN and VLAN
Item VLAN VXLAN

Concept

Virtual local area network

Virtual extensible local area network

Implementation Method

A physical LAN is divided into multiple BDs logically to limit the network to a small geographic range.

Layer 2 virtual networks are established between networks with reachable routes. Such networks are not subject to geographical restrictions and can deliver a large-scale scalability.

Supported capacity

VLAN is the most commonly used network isolation technology. The VLAN field in packets is only 12 bits in length, which means that only a maximum of 4096 VLANs can be used on a network. In public cloud or other cloud computing scenarios involving tens of thousands or even more tenants, VLAN technology can no longer meet network isolation requirements.

VXLAN is a new network isolation technology defined in IETF RFC 7348. It has a 24-bit segment identifier (VNI) and can isolate up to 16 million tenants. This technology effectively enables isolation of mass tenants in cloud computing.

Network division mode

VLAN IDs are used to divide broadcast domains. Hosts within a BD can communicate at Layer 2.

BDs are used to divide broadcast domains. VMs within a BD can communicate at Layer 2.

Encapsulation mode

A VLAN tag is added to packets.

During VXLAN encapsulation, a VXLAN header, UDP header, IP header, and outer MAC header are added in sequence to an original packet. For details, see Packet Encapsulation Format.

Network communication mode

Inter-VLAN communication is implemented by VLANIF interfaces. As Layer 3 logical interfaces, VLANIF interfaces enable Layer 3 communication between VLANs.

Communication between VXLANs or between VXLANs and non-VXLANs is implemented by VBDIF interfaces.

VBDIF interfaces are configured on VXLAN Layer 3 gateways and are Layer 3 logical interfaces based on BDs.

Benefits

Limits broadcast domains: A broadcast domain is limited in a VLAN, which saves bandwidth and improves network processing capabilities.

Enhances LAN security: Packets from different VLANs are separately transmitted. Hosts in a VLAN cannot directly communicate with hosts in another VLAN.

Location-independent capability: Services can be deployed flexibly at any location, solving network expansion issues related to server virtualization.

Flexible network deployment: VXLANs are constructed over the traditional network. They are easy to deploy and highly scalable while preventing broadcast storms on a large Layer 2 network.

Cloud service adaptation: A VXLAN is able to isolate ten millions of tenants and support large-scale deployment of cloud services.

Technical advantage: VXLAN uses MAC-in-UDP encapsulation. Such encapsulation mode does not rely on MAC addresses of VMs, reducing the number of MAC address entries required on a large Layer 2 network.

Combinations of Underlay and Overlay Networks

The infrastructure network on which VXLAN tunnels are established is called the underlay network, and the service network carried over VXLAN tunnels is called the overlay network. VXLAN-capable S series switches support the following combinations of underlay and overlay networks.

Category

Description

Example

IPv4 over IPv4

The overlay and underlay networks are both IPv4 networks.

The network shown in Figure 9-163 is of this category if the host IP addresses and VXLAN tunnel endpoint (VTEP) IP addresses are all IPv4 addresses.

IPv6 over IPv4

The overlay network is an IPv6 network, and the underlay network is an IPv4 network.

The network shown in Figure 9-163 is of this category if the host IP addresses are IPv6 addresses and the VTEP IP addresses are IPv4 addresses.

IPv4 over IPv6

The overlay network is an IPv4 network, and the underlay network is an IPv6 network.

The network shown in Figure 9-163 is of this category if the host IP addresses are IPv4 addresses, and the VTEP IP addresses are IPv6 addresses.

IPv6 over IPv6

The overlay and underlay networks are both IPv6 networks.

The network shown in Figure 9-163 is of this category if the host IP addresses and VTEP IP addresses are all IPv6 addresses.

Figure 9-163 Combinations of underlay and overlay networks

Packet Encapsulation Format

During VXLAN encapsulation, a VXLAN header, UDP header, IP header, and Ethernet header are added in sequence to an original packet.

Figure 9-164 shows the packet encapsulation format.

Figure 9-164 VXLAN packet format

Table 9-556 describes headers added to an original packet during VXLAN encapsulation.

Table 9-556 Description of headers added to an original packet

Field

Description

VXLAN header

  • VXLAN Flags: specifies flags (8 bits). The value is 00001000.
  • VXLAN Flags: specifies flags (8 bits). The value is 00001000.
  • Group ID: indicates the user group ID (16 bits). When the first bit of VXLAN Flags is 1, the value is the group ID. When the first bit of VXLAN Flags is 0, the value is 16 zeros.
  • VNI: specifies an identifier (24 bits) used to identify a VXLAN segment, with up to 16M tenants. Users in different VXLAN segments cannot directly communicate at Layer 2.
  • Reserved: The two reserved fields (24 and 8 bits respectively) are set to 0.
  • Reserved: The two reserved fields (8 and 8 bits respectively) are set to 0..

Outer UDP header

  • DestPort: specifies the destination UDP port number. The value is 4789.
  • Source Port: specifies the source port number. It is the hash value calculated using parameters in the inner Ethernet frame header.
  • Source Port: specifies the source UDP port number. For Ethernet packets that contain IP headers, the source UDP port number is calculated using the hash algorithm based on the factors configured using the ecmp load-balance command. For Ethernet packets that do not contain IP headers, the source UDP port number is not calculated using the hash algorithm. The source UDP port numbers in VXLAN headers encapsulated into packets entering the same interface card are the same.

Outer IP header

  • IP SA: specifies the source IP address, which is the IP address of the source VTEP.
  • IP DA: specifies the destination IP address, which is the IP address of the destination VTEP.

Outer Ethernet header

  • MAC DA: specifies the destination MAC address, which is the MAC address of the next-hop device on the route to the destination VTEP.
  • MAC SA: specifies the source MAC address, which is the MAC address of the source VTEP that sends the packet.
  • 802.1Q Tag (optional): specifies the VLAN tag in the packet.
  • Ethernet Type: specifies the type of the Ethernet frame. The value of this field is 0x0800 when an IP packet is transmitted.

VXLAN Identification

On a VXLAN network, VNIs are mapped to bridge domains (BDs) in 1:1 mode. A VTEP can determine the correct VXLAN tunnel for forwarding a received packet once it identifies the BD to which the packet belongs. Two methods are available for a VTEP to identify the BD to which a packet belongs.

VXLAN Identification by VLAN

The 1:1 or N:1 mapping between VLANs and BDs is configured on VTEPs based on network planning. After a VTEP receives service packets, it selects a VXLAN tunnel to forward the packets based on the mappings between VLANs and BDs and between BDs and VNIs.

As shown in Figure 9-165, VLANs 10 and 20 are mapped to BD 10. The mappings between BD 10 and VLAN 10 and between BD 10 and VLAN 20 exist on the VTEP. In addition, the VNI of the VXLAN corresponding to BD 10 is 1000. After the VTEP receives a packet from PC_1 or PC_2, the VTEP forwards the packet over the VXLAN tunnel with VNI 1000.

Figure 9-165 VXLAN identification by VLAN

  • When VLAN access is configured on a VXLAN network, if the VLAN mapped to a BD is the port VLAN ID (PVID) of an interface, packets with multiple VLAN tags and the outer VLAN ID being the PVID cannot be transmitted to the VXLAN network.
  • When VLAN access is configured on a VXLAN network, packets cannot be transmitted to the VXLAN network through a dot1q-tunnel interface.

VXLAN Identification by Encapsulation Mode

An encapsulation mode defines packet processing based on whether a packet contains VLAN tags. To implement VXLAN identification by encapsulation mode, Layer 2 sub-interfaces need to be configured on a downlink physical interface of a VTEP, different encapsulation modes need to be configured for these sub-interfaces, and 1:1 mapping between Layer 2 sub-interfaces and BDs needs to be defined. Then service packets are sent to specified Layer 2 sub-interfaces after reaching the VTEP. The VTEP selects a correct VXLAN tunnel to forward packets based on the mappings between Layer 2 sub-interfaces and BDs and between BDs and VNIs.

Table 9-557 lists four default packet processing methods of Layer 2 sub-interfaces that use different encapsulation modes.

Table 9-557 Four default packet processing methods of Layer 2 sub-interfaces that use different encapsulation modes

Encapsulation Mode

Type of Packets That Can Enter a VXLAN Tunnel

VXLAN Packet Encapsulation

VXLAN Packet Decapsulation

dot1q

Only packets with a specified VLAN tag

Removes the VLAN tag from original packets.

Adds a VLAN tag to packets based on the VLAN ID for Dot1q termination on the sub-interface after VXLAN decapsulation and then forwards the packets.

untag

Only packets without VLAN tags

Does not perform any operation on original packets.

Does not perform any operation on original packets, including adding, replacing, or removing the VLAN tag, after VXLAN decapsulation is performed.

default

All packets regardless of whether they carry VLAN tags

Does not perform any operation on original packets, including adding, replacing, or removing the VLAN tag.

Does not perform any operation on original packets, including adding, replacing, or removing the VLAN tag, after VXLAN decapsulation is performed.

qinq

Only packets with double specified VLAN tags

Removes all VLAN tags from original packets.

After performing VXLAN decapsulation:
  • S5720-HI, S5730-HI, S6720-HI, S6730-S, S6730S-S, S5732-H, S5732-H-K, S5731-S, S5731S-S, S5731S-H, S6730-H, S6730-H-K, S6730S-H, S5731-H-K and S5731-HS5320-HI, S5330-HI, S6320-HI, S5331-H, S5332-H, and S6330-HLE1D2S04SEC0, LE1D2X32SEC0, LE1D2H02QEC0, and X series cards: Double VLAN tags are added to packets based on the outer and inner VLAN IDs for QinQ termination on the sub-interface configured using the qinq termination pe-vid ce-vid command before the packets are forwarded.
  • Other cardsmodels: If received packets do not carry any VLAN tag, double VLAN tags are added to the packets based on the outer and inner VLAN IDs for QinQ termination on the sub-interface configured using the qinq termination pe-vid ce-vid command before the packets are forwarded. If received packets carry VLAN tags, the outer VLAN tag is removed and double VLAN tags are added to the packets based on the outer and inner VLAN IDs for QinQ termination on the sub-interface configured using the qinq termination pe-vid ce-vid command before the packets are forwarded.
In Figure 9-166, GE0/0/1 on the VTEP has two sub-interfaces that are configured with different encapsulation modes and associated with different BDs. PC_1 and PC_2 belong to VLAN 10 and VLAN 30 respectively. The uplink interface that connects the Layer 2 switch to the VTEP is a trunk interface, permits packets from VLAN 10 and VLAN 30, and has the PVID of VLAN 30. When the packet sent by PC_1 arrives at the interface, the packet is transparently transmitted to the VTEP because the default VID of the interface is different from the VID of the packet. When the packet sent by PC_2 arrives at the interface, because the default VID of the interface is the same as the VID of the packet, the tag with the VID 30 is removed from the packet. Therefore, when the packets sent by PC_1 and PC_2 reach GE0/0/1 of the VTEP, one of the packets carries VLAN 10 and the other does not carry VLAN tags. To differentiate the two types of packets, create a dot1q Layer 2 sub-interface and an untagged Layer 2 sub-interface on GE0/0/1.
  • Create Layer 2 sub-interface GE0/0/1.1, set the encapsulation type to dot1q, and configure the sub-interface to allow packets with VLAN tag 10 to enter a VXLAN tunnel.

  • Create Layer 2 sub-interface GE0/0/1.2, set the encapsulation type to untag, and configure the sub-interface to allow untagged packets to enter a VXLAN tunnel.

After packets from PC_1 or PC_2 reach the VTEP, the VTEP sends the packets to different Layer 2 sub-interfaces based VLAN tags in the packets. Then the VTEP selects a correct VXLAN tunnel to forward the packets based on the mappings between sub-interfaces and BDs and between BDs and VNIs.

Figure 9-166 VXLAN identification by encapsulation mode

VXLAN Tunnel Establishment Mode

A VXLAN tunnel is identified by a pair of VTEP IP addresses. Packets are encapsulated on VTEPs and then transmitted in the VXLAN tunnel via routing. After a VXLAN tunnel is configured, it can be established successfully as long as the VTEPs at both ends of the tunnel have reachable routes to each other's IP address at Layer 3.

Figure 9-167 VXLAN networking
Based on tunnel creation modes, VXLAN tunnels are divided into:
  • Static VXLAN tunnels: created by manually configuring the local and remote VNIs, VTEP IP addresses, and ingress replication lists. This mode is applicable only to the centralized VXLAN gateway scenario.
  • Dynamic VXLAN tunnels: dynamically established using BGP Ethernet VPN (EVPN). When BGP EVPN is used to dynamically establish a VXLAN tunnel, the local and remote VTEPs first establish a BGP EVPN peer relationship before exchanging BGP EVPN routes to learn the VNIs and VTEP IP addresses from each other. This mode is applicable to both centralized and distributed VXLAN gateway scenarios.

BGP EVPN Basic Principles

Introduction

Ethernet virtual private network (EVPN) is a VPN technology used for Layer 2 internetworking. EVPN is similar to BGP/MPLS IP VPN. EVPN defines a new type of BGP network layer reachability information (NLRI), called the EVPN NLRI. The EVPN NLRI defines new BGP EVPN routes to implement MAC address learning and advertisement between Layer 2 networks at different sites.

VXLAN does not provide the control plane, and VTEP discovery and host information (IP and MAC addresses, VNIs, and gateway VTEP IP address) learning are implemented by traffic flooding on the data plane, resulting in high traffic volumes on VXLAN networks. To address this problem, VXLAN uses EVPN as the control plane. EVPN allows VTEPs to exchange BGP EVPN routes to implement automatic VTEP discovery and host information advertisement, preventing unnecessary traffic flooding.

EVPN uses extended BGP and defines new BGP EVPN routes to transmit VTEP addresses and host information. As such, the application of EVPN on VXLANs moves VTEP discovery and host information learning from the data plane to the control plane.

BGP EVPN Routes

EVPN NLRI defines the following BGP EVPN route types applicable to the VXLAN control plane:

Type 2 route—MAC/IP route

The following figure shows the format of MAC/IP routes.

Figure 9-168 MAC/IP route

The following table describes the fields.

Field

Description

Route Distinguisher

RD value of an EVPN instance

Ethernet Segment Identifier

Unique ID for defining the connection between local and remote devices

Ethernet Tag ID

VLAN ID configured on the device

MAC Address Length

Length of the host MAC address carried in the route

MAC Address

Host MAC address carried in the route

IP Address Length

Mask length of the host IP address carried in the route

IP Address

Host IP address carried in the route

MPLS Label1

Layer 2 VNI carried in the route

MPLS Label2

Layer 3 VNI carried in the route

MAC/IP routes function as follows on the VXLAN control plane:

  • MAC address advertisement

    To implement Layer 2 communication between intra-subnet hosts, the source and remote VTEPs must learn the MAC addresses of the hosts. The VTEPs function as BGP EVPN peers to exchange MAC/IP routes so that they can obtain the host MAC addresses. The MAC Address Length and MAC Address fields identify the MAC address of a host.

  • ARP advertisement

    A MAC/IP route can carry both the MAC and IP addresses of a host, and therefore can be used to advertise ARP entries between VTEPs. The MAC Address and MAC Address Length fields identify the MAC address of the host, whereas the IP Address and IP Address Length fields identify the IP address of the host. This type of MAC/IP route is called the ARP route. ARP advertisement applies to the following scenarios:

    1. ARP broadcast suppression. After a Layer 3 gateway learns the ARP entries of a host, it generates host information that contains the host IP and MAC addresses, Layer 2 VNI, and gateway's VTEP IP address. The Layer 3 gateway then transmits an ARP route carrying the host information to a Layer 2 gateway. When the Layer 2 gateway receives an ARP request, it checks whether it has the host information corresponding to the destination IP address of the packet. If such host information exists, the Layer 2 gateway replaces the broadcast MAC address in the ARP request with the destination unicast MAC address and unicasts the packet. This implementation suppresses ARP broadcast packets.

    2. VM migration in distributed gateway scenarios. After a VM migrates from one gateway to another, the new gateway learns the ARP entry of the VM (after the VM sends gratuitous ARP packets) and generates host information that contains the host IP and MAC addresses, Layer 2 VNI, and gateway's VTEP IP address. The new gateway then transmits an ARP route carrying the host information to the original gateway. After the original gateway receives the ARP route, it detects a VM location change and triggers ARP probe. If ARP probe fails, the original gateway withdraws the ARP and host routes of the VM.

  • IP route advertisement

    In distributed VXLAN gateway scenarios, to implement Layer 3 communication between inter-subnet hosts, the source and remote VTEPs that function as Layer 3 gateways must learn the host IP routes. The VTEPs function as BGP EVPN peers to exchange MAC/IP routes so that they can obtain the host IP routes. The IP Address Length and IP Address fields identify the destination address of the IP route. In addition, the MPLS Label2 field must carry the Layer 3 VNI. This type of MAC/IP route is called the integrated routing and bridging (IRB) route.

    An ARP route carries host MAC and IP addresses and a Layer 2 VNI. An IRB route carries host MAC and IP addresses, a Layer 2 VNI, and a Layer 3 VNI. Therefore, IRB routes carry ARP routes and can be used to advertise IP routes as well as ARP entries.

  • ND entry flooding

    A MAC/IP route can carry both the MAC address and IPv6 address of a host. Therefore, this type of route can be used to transmit ND entries between VTEPs, implementing ND entry advertisement. The MAC Address and MAC Address Length fields carried in a MAC/IP route indicate information about the host MAC address, and the IP Address and IP Address Length fields indicate information about the host IPv6 address. The MAC/IP route in this case is also called an ND route. ND entry flooding applies to the following scenarios:
    • NS multicast suppression. After a VXLAN gateway collects information about a local IPv6 host, it generates an NS multicast suppression entry and floods the entry through a MAC/IP route. After receiving the MAC/IP route, other VXLAN gateways (BGP EVPN peers) each generate a local NS multicast suppression entry. In this manner, when a VXLAN gateway receives an NS message, it searches the local NS multicast suppression table. If an entry is hit, the VXLAN gateway directly performs multicast-to-unicast processing to reduce or suppress NS message flooding.

    • IPv6 VM migration in a distributed gateway scenario. After an IPv6 VM is migrated from one gateway to another, the VM sends a gratuitous NA message. After receiving the message, the new gateway generates an ND entry and floods it to the original gateway through a MAC/IP route. After receiving the message, the original gateway detects that the location of the IPv6 VM changes and triggers NUD. When the original gateway cannot detect the IPv6 VM in the original location, it deletes its local ND entry and uses an MAC/IP route to instruct the new gateway to delete the old proxy ND entry for the IPv6 VM.

  • Host IPv6 route advertisement

    In a distributed gateway scenario, to implement Layer 3 communication between hosts on different subnets, the VTEPs (functioning as Layer 3 gateways) must learn host IPv6 routes from each other. To achieve this, VTEPs as EVPN peers exchange MAC/IP routes to advertise host IPv6 routes to each other. The IP Address Length and IP Address fields carried in the MAC/IP routes indicate the destination addresses of host IPv6 routes, and the MPLS Label2 field must carry a Layer 3 VNI. MAC/IP routes in this case are also called IRBv6 routes.

    An ND route carries the following valid information: host MAC address, host IPv6 address, and Layer 2 VNI. An IRBv6 route carries the following valid information: host MAC address, host IPv6 address, Layer 2 VNI, and Layer 3 VNI. It can be seen that an IRBv6 route includes information about an ND route and therefore can be used to advertise both a host IPv6 route and host ND entry.

Type 3 route—inclusive multicast route

An inclusive multicast route comprises a prefix and a PMSI attribute.

Figure 9-169 Format of an inclusive multicast route

The following table describes the fields.

Field

Description

Route Distinguisher

RD value of an EVPN instance

Ethernet Tag ID

VLAN ID

The value is all 0s in this type of route.

IP Address Length

Mask length of the local VTEP's IP address carried in the route

Originating Router's IP Address

Local VTEP's IP address carried in the route

Flags

Flags indicating whether leaf node information is required for the tunnel

This field is inapplicable in VXLAN scenarios.

Tunnel Type

Tunnel type carried in the route

The value can only be 6, representing Ingress Replication in VXLAN scenarios. It is used for BUM packet forwarding.

MPLS Label

Layer 2 VNI carried in the route

Tunnel Identifier

Tunnel identifier carried in the route

This field is the local VTEP's IP address in VXLAN scenarios.

This type of route is used on the VXLAN control plane for automatic VTEP discovery and dynamic VXLAN tunnel establishment. VTEPs that function as BGP EVPN peers exchange inclusive multicast routes to transfer Layer 2 VNIs and VTEPs' IP addresses. The Originating Router's IP Address field identifies the local VTEP's IP address; the MPLS Label field identifies a Layer 2 VNI. If the remote VTEP's IP address is reachable at Layer 3, a VXLAN tunnel to the remote VTEP is established. If the remote VNI is the same as the local VNI, an ingress replication list is created for subsequent BUM packet forwarding.

Type 5 route—IP prefix route

The following figure shows the format of IP prefix routes.

Figure 9-170 IP prefix route

The following table describes the fields.

Field

Description

Route Distinguisher

RD value of an EVPN instance

Ethernet Segment Identifier

Unique ID for defining the connection between local and remote devices

Ethernet Tag ID

VLAN ID configured on the device

IP Prefix Length

Length of the IP prefix carried in the route

IP Prefix

IP prefix carried in the route

GW IP Address

Default gateway address

This field is inapplicable in VXLAN scenarios.

MPLS Label

Layer 3 VNI carried in the route

The IP Prefix Length and IP Prefix fields in an IP prefix route can identify a host IP address or network segment.

  • If the IP Prefix Length and IP Prefix fields in an IP prefix route identify a host IP address, the route is used for IP route advertisement in distributed VXLAN gateway scenarios, which functions the same as an IRB route on the VXLAN control plane.

  • If the IP Prefix Length and IP Prefix fields in an IP prefix route identify a network segment, the route allows external network access.

Server Virtualization

Server virtualization virtualizes one physical server into multiple logical servers, that is virtual machines (VMs), as shown in Figure 9-171.

Figure 9-171 Basic architecture of server virtualization
  • VM

    Each VM has its own operating system and application software, and has an independent MAC address and IP address. VMs can run independently.

  • vSwitch

    A vSwitch provides Layer 2 communication, isolation, and QoS capabilities for VMs.

Server virtualization has the following advantages:
  • Effectively improves server utilization.
  • Provides services and resources on demand.
  • Reduces energy consumption.
  • Lowers customers' operations and maintenance (O&M) costs.

Large Layer 2 Network

Dynamic VM migration becomes a critical issue to meet flexible service changes. Dynamic VM migration is a process of moving VMs from one physical server to another, while ensuring normal running of the VMs. End users are unaware of this process, so administrators can flexibly allocate server resources or maintain and upgrade servers without affecting server usage by end users. The key of dynamic VM migration is to ensure uninterrupted services during the migration, so the IP and MAC addresses of VMs must remain unchanged. To meet this requirement, VM migration must occur within a Layer 2 domain but not across Layer 2 domains, as shown in Figure 9-172.

Figure 9-172 VM migration on a traditional network

In the traditional data center network architecture, the Layer 2 network uses redundant devices and links to improve reliability. This will inevitably result in physical loops during VM migration.

To prevent broadcast storms caused by physical loops, a loop prevention protocol such as Spanning Tree Protocol (STP) is required to block redundant links. Due to STP limitations, an STP-enabled Layer 2 network can contain no more than 50 network nodes, so dynamic VM migration can only occur in a limited scope.

To enable VM migration in a large scope or across domains, servers involved must be on the same Layer 2 network, which is called large Layer 2 network.

Generally, the following technologies can be used to provide a large Layer 2 network:
  • Network device virtualization
  • Transparent Interconnection of Lots of Links (TRILL)
  • VXLAN
  • Ethernet Virtual Network (EVN)

Network device virtualization, TRILL, and EVN technologies can construct a physical large Layer 2 network to enlarge the VM migration scope. However, a physical large Layer 2 network requires huge changes to the existing network structure, and still has many restrictions on the VM migration scope. VXLAN can solve the preceding problems.

A virtual large Layer 2 network can solve the problem and enable VM migration in a larger scope, as shown in Figure 9-173.

Figure 9-173 VM migration on a large Layer 2 network

Overview of Small- and Medium-sized Campus Networks

A campus network generally refers to the internal network of an enterprise or organization, which is connected to the wide area network (WAN) and data center network. A campus network is built to ensure that key enterprise services are running more efficiently. Differing in the number of end users or network elements (NEs), campus networks can be typically classified into three types: small, midsize, and large campus networks. On the live network, the campus network scale can be determined by empirical values during engineering implementation, as described in Table 9-558. Sometimes, small campus networks and midsize campus networks are collectively called small- and medium-sized campus networks.

Table 9-558 Campus network scale measured by the number of end users or NEs

Campus Network Classification

Small Campus Network

Midsize Campus Network

Large Campus Network

Quantity of end users

< 200

200–2000

> 2000

Quantity of NEs

< 10

10–128

> 128

  • Most large- and medium-sized campus networks use the traditional local management mode. Such networks have clear structures and are typically designed with three layers: core layer, aggregation layer, and access layer. In addition, they are generally equipped with data centers, which provide service computing and storage capabilities.
  • Some large enterprises have branches in different countries or regions. In this case, a headquarter (HQ) campus network and branch networks are designed for the HQ and branches respectively. A branch network is typically a small- or medium-sized campus network, and connects to the HQ campus network and other branch networks through network interconnection technologies. Generally, branch networks are scattered in different regions and independent of each other. Therefore, such networks are designed and managed independently.

Large- and Medium-Sized Campus Networking Solution

Solution Overview

Huawei CloudCampus Solution adopts a new philosophy of Intent-Driven Network (IDN), and introduces big data analytics and artificial intelligence (AI) technologies into cloud and SDN, helping enterprises build ultra-broadband, simplified, intelligent, secure, and open networks.

Ultra-Broadband

  • Wired, wireless, and IoT convergence, meeting diversified access terminals and services

    Huawei campus switches integrate the WLAN access controller (WAC) functionality to implement wired and wireless convergence and provide unified wired and wireless management and experience. Huawei APs integrate IoT modules to provide functions of IoT base stations, implementing Wi-Fi and IoT convergence as well as simplified management. The solution provides unified authentication and access policy control for wired and wireless users by integrating the user authentication, user management, and policy association functions. Administrators can obtain consistent user management experience and simplify O&M management of wired and wireless networks.

  • All-scenario WLAN, ideal for differentiated access requirements of customers

    Huawei provides Wi-Fi 6 APs, high-density APs, and an agile distributed Wi-Fi solution tailored for a diverse of scenarios, such as common indoor deployments, high-density stadiums, outdoor environments, and densely populated rooms. These offerings provide pervasive high-density WLAN coverage and deliver assured user access experience. The resulting benefits include convenient deployment and reduced investment costs.

    Wi-Fi 6 is the sixth generation of Wi-Fi standards. It inherits a large number of key 5G technologies, such as orthogonal frequency division multiple access (OFDMA), multi-user multiple-input multiple-output (MU-MIMO), and 1024 Quadrature Amplitude Modulation (1024-QAM). Compared with Wi-Fi 5, Wi-Fi 6 achieves a four-fold increase in both the network bandwidth and the number of concurrent access users, and shortens the network latency from an average of 30 ms to 20 ms. Wi-Fi 6 can easily meet the ultra-large bandwidth, ultra-high density access, and ultra-low latency requirements in application scenarios, for example, 4K ultra-HD video conferences (ultra-large bandwidth), high-density stadiums (ultra-high concurrency), and VR (ultra-low latency) scenarios. Based on the profound understanding and grasp of 5G technologies, Huawei becomes a major contributor to the Wi-Fi 6 standard. Huawei experts have served as the chairmen of five Wi-Fi standard working groups.

  • Multi-GE access, higher bandwidth and more flexible network deployment

    With the advent of 802.11ac standards and products, the access rate of wireless terminals exceeds 1 Gbps. However, the access rate of GE interfaces fails to meet this trend. Huawei provides abundant multi-GE switches that can supply PoE++ (60 W) power to APs within 300 m, implementing flattened network deployment and reducing investment costs.

Simplified

  • Automated deployment of a physical network: Devices can be pre-configured and plug-and-play

    Through the GUI, iMaster NCE-Campus can help implement automated deployment of devices, as well as route orchestration and interworking configuration for the underlay network.

  • Automated provisioning of virtual networks: Virtual networks can be automatically created to achieve 'one network for multiple purposes'

    With iMaster NCE-Campus, fabric networks can be deployed, and VXLAN tunnels can be automatically set up based on the BGP EVPN control plane. iMaster NCE-Campus helps achieve automated virtual network construction, centralized service configuration, and automatic service provisioning.

  • Automated user policy configuration and delivery: user/service/experience-centricity for policy migration with users and consistent service experience

    The free mobility solution uses iMaster NCE-Campus to plan user groups and inter-group policies and automatically deliver policies to network devices. When an authenticated user accesses the network using different terminals and at different locations, iMaster NCE-Campus automatically identifies the user and delivers relevant user policies to the corresponding policy enforcement devices on the network. This achieves consistent and assured user access experience. A user can have consistent policies and service experience anywhere, irrespective of its access locations.

Intelligent

The CloudCampus Solution introduces Huawei's intelligent campus network analyzer iMaster NCE-CampusInsight, which transforms the traditional way of monitoring focusing on the resource status. By leveraging Telemetry technology, iMaster NCE-CampusInsight provides data visibility from user, application, and time perspectives, performs feature analysis and baseline calculation by utilizing the machine learning algorithm, and identifies potential faults and locates their root causes, thereby improving user experience.

  • Full-journey experience visibility for each user, at each moment

    iMaster NCE-CampusInsight uses the de facto industry standard Telemetry technology to dynamically capture network KPI data in seconds, enabling fault tracing. In addition, it collects data from multiple dimensions, displays the network profile of each user in real time, and visualizes the network experience throughout the full user journey (who, when, which AP the user connects to, experience, and issue).

  • Automatic identification of network issues

    Through big data and AI technologies, iMaster NCE-CampusInsight automatically identifies connection, air interface performance, roaming, and device issues, improving the potential issue identification rate to 85%. It leverages the machine learning algorithm to learn historical data and dynamically generates a baseline. It then predicts the possible faults by comparing real-time data with the dynamic baseline.

  • Intelligent demarcation and root cause analysis of network issues

    iMaster NCE-CampusInsight intelligently identifies fault patterns and impact scopes based on the network O&M expert system and various intelligent algorithms, helping administrators identify and demarcate faults. iMaster NCE-CampusInsight can also analyze possible fault causes by working with the big data platform and provides rectification suggestions.

Open

The intent-driven campus network architecture is open at all layers and supports over 150 service APIs. With this architecture, Huawei collaborates with more than 30 industry partners to build an ecosystem to accelerate digital transformation of industries. Because Huawei devices are developed in strict compliance with international universal standards and industry standards, together they can perfectly interoperate with third-party devices.

Solution Architecture

Figure 9-174 shows the network architecture of the CloudCampus Solution for large- and medium-sized campus networks. The network architecture consists of the network layer, management layer, and application layer.

Figure 9-174 CloudCampus Solution architecture (large- and medium-sized campus network scenario)
  • Network layer

    Virtualization technologies are introduced to divide the network layer into a physical network and a virtual network.

    • Physical network: is also called the underlay network and provides basic connection services for campus networks. To meet access requirements of diverse types of terminals, the underlay network provides a unified, converged terminal access capability that allows access of wired, wireless, and IoT terminals simultaneously.
    • Virtualized network: is also called the overlay network. Virtualization technologies are used to construct one or more overlay networks over the underlay network. Service policies are deployed on the overlay networks and are separated from the underlay network, decoupling services from networks. Multiple overlay networks can serve different services or customer segments.
  • Management layer

    The management layer provides network-level management capabilities, such as configuration management, service management, maintenance and fault detection, and security threat analysis. On a traditional campus network, the NMS is used for network management. The NMS can display the network status but lacks flexibility and automation capabilities. If service requirements change, the administrator needs to re-plan services and then manually modify the configurations of the corresponding network devices (including routers, switches, and firewalls). This manual adjustment mode is inefficient and error-prone. In rapidly changing service environments, network flexibility is critical. Automation tools are required to help administrators manage networks and services. The CloudCampus Solution uses iMaster NCE-Campus to implement automatic network and service provisioning.

    iMaster NCE-Campus abstracts network devices and applications, and rapidly develops and automatically deploys applications through orchestration and by invoking abstract models. iMaster NCE-Campus illustrates the entire network but not independent devices (such as switches, routers, and APs) or discrete configurations (such as access control, QoS, and routing policies).

  • Application layer

    Based on iMaster NCE-Campus, Huawei CloudCampus Solution provides open APIs, through which rich information identified by the network, including user identities, network resources, service quality, location information, and network topology, is opened up to upper-layer services. By using these open APIs, third parties can customize and innovate service applications based on their own service needs. Doing so helps meet service expectations in various fields, such as education, commerce, enterprises, and governments.

Solution Components

Network-layer components include firewalls, WACs, switches, and APs.

  • Firewall

    A firewall is responsible for network security protection. It is usually deployed at a network border, such as the egress of an enterprise campus network, subnet border of a large-sized network, or border of a DC, to provide access control and intrusion prevention functions. Huawei has launched USG series firewalls tailored for campus scenarios.

  • WAC

    The WAC is responsible for AP configuration and management. In campus scenarios, Huawei has launched standalone WACs as well as switches that support the native WAC function.

  • Switch

    Switches exchange data packets of Layer 2 and Layer 3 networks. Huawei has launched series of switches for campus scenarios.

  • AP

    APs provide access to wireless terminals (STAs) and bridge a wireless network and a wired network. Huawei has launched a series of APs suited to campus scenarios.

Management-layer components include iMaster NCE-Campus and iMaster NCE-CampusInsight.

  • iMaster NCE-Campus

    As the automation engine of a network, iMaster NCE-Campus supports network service management, network security management, user admission management, network monitoring, network quality analysis, network application analysis, as well as alarms and reports. It also provides big data analytics capabilities, and open APIs for integration with third-party platforms. In addition, iMaster NCE-Campus functions as the authentication policy (AAA) server to implement automatic access management and control and provide the AAA service and free mobility policy delivery service.

  • iMaster NCE-CampusInsight

    iMaster NCE-CampusInsight is an intelligent network analysis engine and provides intelligent O&M services for user networks. iMaster NCE-CampusInsight applies AI to the O&M domain. Based on existing O&M data (such as device performance indicators and terminal logs), big data, AI algorithms, and more advanced analytics technologies, iMaster NCE-CampusInsight digitizes user experience on the network to help customers detect network issues in a timely manner, improving user experience.

Campus VXLAN Network Deployment Procedure

On top of the physical network (underlay network), virtual Layer 2 and Layer 3 networks (overlay networks) are created to meet the multi-tenant and isolation requirements of campus services. The following figure shows the process of deploying a virtual network through iMaster NCE-Campus. You can select the services to be configured based on the actual networking requirements.

When configuring a VXLAN virtual network (VN), you need to select the network type (VXLAN or traditional VLAN network), and decide the location of the default VN's service gateway (outside or inside the VXLAN fabric) based on whether users access a Layer 2 or Layer 3 network.

Figure 9-175 Deployment process

VXLAN Fabric Management Precautions

VXLAN-supported Device Models

You can use the Info-Finder tool to check VXLAN-supported device models.

Prerequisites

Before deploying VXLAN fabric services on iMaster NCE-Campus, you need to complete the following tasks:

  • Create a site and add devices to be managed on iMaster NCE-Campus. A device can go online as a standalone device or as a stack.
  • To implement interconnection between endpoints on a VXLAN fabric, configure VLANIF interfaces, loopback interfaces, VTEP IP addresses, and routes on border and edge nodes. If all devices on the VXLAN fabric are managed by the controller, you can enable automatic configuration of routing domains when creating the VXLAN fabric so that the controller will automatically perform the preceding configurations.
  • To implement the authentication function on a VXLAN fabric, configure an authentication template and apply the template to authentication control points configured on the access management page.

License Requirements

To obtain the iMaster NCE-Campus License Usage Guide, perform the following steps:

Table 9-559 Deduction rules for virtual network automation licenses in different scenarios

License Item

Deduction Trigger Condition

Measurement Unit

Subscription License in the Huawei Public Cloud Scenario

Subscription License in the MSP-owned Cloud Scenario

Perpetual License + SnS in the On-Premises Scenario

Start Version

Virtual network automation

A fabric device role is set for a core or an aggregation device.

Per device

Not supported

Supported (not for sale)

Supported

V300R003C10

VXLAN Fabric Resource Planning

Configuring a VXLAN Fabric Global Resource Pool

Fundamentals

Before creating virtual networks (VNs), you need to configure global resources, including the resource pools of VLANs, VXLAN Network Identifiers (VNIs), and bridge domains (BDs). When you create a VN, iMaster NCE-Campus automatically allocates resources from these resource pools.

The following figure shows the layers where VLANs, VNIs, and BDs are located on the network and the relationships among these resources.

Feature Requirements

Configure a service VLAN pool when you need to configure VLANs for interconnection with external gateways and network service resources, management VLANs for policy association, and access VLANs for virtual network access. When planning VLANs, ensure that the desired VLANs are not used by non-VXLAN fabric services. For example, the VLAN ID of the planned management VLAN cannot be included in the VLAN resource pool. Otherwise, services may be interrupted.

Procedure

  1. Choose Design > Basic Network Design > Network Settings and click the VXLAN Fabric Global Resource Pool tab.
  2. Set parameters and click to make the settings take effect.

    Configuration example: For the VLAN resource pool, enter 3000 - 4000 and 4012 - 4012. After each input, click for the setting to take effect. Then, set Bridge Domain (BD) to the default value (1 - 4095) and VXLAN Network Identifier (VNI) to the default value (1 - 4095).

Related Operations

  • Select the resource to be deleted and click to delete the resource.
  • Click to refresh resources displayed on the page.

Parameters Description

Table 9-560 Parameters for configuring the VXLAN fabric global resource pool

Parameter

Description

VLAN

Meaning: Service VLAN resource pool. VLANs in this pool will be configured as interconnection VLANs for external gateways, interconnection VLANs for network service resources, CAPWAP management VLANs, and VLANs for VN access, if these configurations are required.

For example, enter 3000 - 4000 and 4012 - 4012. After each input, click for the setting to take effect.

Bridge Domain (BD)

Meaning: VLANs are used to divide broadcast domains on a traditional network. Similarly, BDs are used to divide broadcast domains on a VXLAN network. On a VXLAN network, VNIs must be mapped to BDs in 1:1 mode. A BD represents a broadcast domain. Users in the same BD can communicate with each other at Layer 2.

For example, enter 3000 - 4000 and 4012 - 4012. After each input, click for the setting to take effect.

Default value: 1 to 4095

VXLAN Network Identifier (VNI)

Meaning: A VNI, similar to a VLAN ID, identifies a VXLAN segment. Tenants on different VXLAN segments cannot communicate at Layer 2. One tenant may have one or more VNIs. A VNI consists of 24 bits and supports up to 16 million tenants.

For example, enter 3000 - 4000 and 4012 - 4012. After each input, click for the setting to take effect.

Default value: 1 to 4095

Configuring an Underlay Automation Resource Pool

Fundamentals

When you create VXLAN fabric networks, you can enable automated underlay routing domain orchestration. This implements automatic deployment of the underlay network. After this function is enabled, iMaster NCE-Campus automatically provisions configurations using resources in the underlay automation resource pool, such as VLANIF interfaces, loopback interfaces, VTEP IP addresses, and routes, required for BGP-EVPN to devices on VXLAN fabric networks.

The hierarchy and relationship of loopback interface IP addresses, interconnection VLANs, and interconnection IP addresses in the network are shown in the figure below:

Feature Requirements

If multi-layer aggregation devices are deployed on the network, underlay automation is supported only for a single domain.

Application Scenario

Automated underlay routing domain orchestration supports automatic deployment of routes between border and edge nodes on VXLAN fabrics. The system configures interconnection links between border nodes and between border nodes and edge nodes to ensure that the VTEPs on the entire network are reachable to each other through OSPF routes.

  • Recommended scenario: A VXLAN fabric has one site with core, aggregation, and access devices.
    Figure 9-176 Three-layer VXLAN fabric networking 1

    Choose Design > Site Agile Deployment > Device Management from the main menu, configure the border node as Core, edge nodes as Aggregation, and access nodes as Access.

  • Other networking scenarios: If transparent transmission devices are deployed on the underlay network under a fabric network, it is recommended that the device role of border nodes be set to Core, that of edge nodes be set to Aggregation, that of transparent transmission devices (deployed on the fabric network) between border nodes and edge nodes be set to Regional aggregation. Currently, transparent transmission devices can be deployed only between border nodes and edge nodes. When a VXLAN fabric network spans multiple sites, ensure that device roles are set correctly and there are reachable OSPF routes between these sites.
    • Scenario 1: A VXLAN fabric network spans multiple sites, and only one site has a border node, as shown in the following figure.
      Figure 9-177 Multi-site scenario

      Perform the following operations to configure automatic underlay deployment:

      1. Choose Design > Site Agile Deployment > Device Management from the main menu and set the role of edge node 2 to Core.
      2. Check the OSPF areas automatically configured for the border node, choose Provision > Physical Network > Site Configuration from the main menu, choose Switch > Route from the navigation pane, and click the Interface OSPF tab, and manually configure routes for interconnection interfaces on the border node and Edge 2 to ensure that there are reachable routes between their interconnection interfaces.
    • Scenario 2: A VXLAN fabric network has three layers of devices, including a border node, edge nodes, and an access device, as shown in the following figure.
      Figure 9-178 Three-layer VXLAN fabric networking 2

      Perform the following operations to configure automatic underlay deployment:

      1. Choose Design > Site Agile Deployment > Device Management from the main menu and set the role of edge node 2 to Aggregation.
      2. Set the role of the access device on the VXLAN fabric network to an extended node.
    • Scenario 3: A VXLAN fabric network has multiple border nodes that form a ring network with downlink devices, as shown in the following figure.
      Figure 9-179 Multi-border ring networking

      Perform the following operations to configure automatic underlay deployment:

      1. Choose Design > Site Agile Deployment > Device Management, set the role of transparent transmission devices 1 and 2 to Regional aggregation.
      2. Choose Design > Site Agile Deployment > Device Management and set the role of edge nodes 1 and 2 to Aggregation.

Procedure

  1. Choose Design > Basic Network Design > Network Settings and click the Underlay Automation Resource Pool tab.
  2. Set parameters and click to make the settings take effect.

    Configuration example: For the interconnection VLAN resource pool, enter 100 - 200. After the input, click for the setting to take effect. Then set Interworking IP to 192.168.1.0 - 192.168.2.0/24 and Loopback interface IP to 192.168.3.0 - 192.168.4.0/24.

Related Operations

  • Select the resource to be deleted and click to delete the resource.
  • Click to refresh resources displayed on the page.

Parameters

Table 9-561 Parameters for configuring the underlay automation resource pool

Parameter

Description

Interconnection VLAN

Meaning: VLAN resource pool for interconnection between border and edge nodes. The system automatically selects a VLAN as the interconnection VLAN if border and edge nodes need to be interconnected on the underlay networks of VXLAN fabrics.

Example: Enter 3000 - 4000 and 4012 - 4012. After each input, click for the setting to take effect.

Interworking IP address

Meaning: IP address resource pool for interconnection between border and edge nodes. The system automatically selects an IP address as the interworking IP address if border and edge nodes need to be interconnected on the underlay networks of VXLAN fabrics.

Example: Set 192.168.1.0 and 192.168.2.0/24 as the start and end addresses. After input, click for the settings to take effect.

Constraints: The addresses planned on the underlay network cannot overlap with those planned on the WAN. Otherwise, unexpected network problems may occur.

Loopback interface IP address

Meaning: IP address resource pool for loopback interfaces. The system automatically selects IP addresses for loopback interfaces if routing domains need to be automatically configured on VXLAN fabrics.

Example: Set 192.168.1.0 and 192.168.2.0/24 as the start and end IP addresses. After input, click for the settings to take effect.

Constraints: The addresses planned on the underlay network cannot overlap with those planned on the WAN. Otherwise, unexpected network problems may occur.

Configuring an Authentication Template

Application Scenario

By delivering and applying authentication templates to authentication points, the system can implement user access control. A RADIUS server template and a user access template must be bound to a user authentication template, and the authentication mode must be specified.

Feature Requirements

A RADIUS server template and a Portal server template have been created.

Procedure

  1. Choose Design > Basic Network Design > Template Management, from the main menu and click Policy Template. Choose Authentication Template from the navigation pane.
  2. Click Create and set the template name to Authen1. In this template, set the user authentication mode to Portal, MAC, or 802.1X, select the RADIUS server template iMaster_RADIUS, select the Portal server template iMaster_Portal, set the user domain to which the template is applied to Default, retain the default setting of dynamic RADIUS authorization, and select the most suitable bypass policy. If IP phones are connected to the authentication point where this authentication template applies, enable IP phone authentication in the authentication template. Click OK.

Parameter Description

Table 9-562 Policy Template (authentication)

Parameter

Description

Name

Name of an authentication template.

Authentication mode

Value range: The options include Portal, MAC, and 802.1X. You can set this parameter as needed.

Constraints: If Portal authentication with dynamic VLAN authorization is required, select both Portal and MAC.

MAC address bypass authentication

This function can be configured when both MAC and 802.1X are selected for Authentication mode.

Authentication protocol

Meaning: This function can be configured when MAC is selected for Authentication mode.

Value range:

  • CHAP
  • PAP

Carry URL parameters for redirection after authorization

Meaning: In multi-network Portal authentication scenarios, this function needs to be enabled when Portal 2.0 is selected.

RADIUS server template

Select a RADIUS server template.

Primary Portal server template/Secondary Portal server template

Select a Portal server template. This parameter is configurable only when Portal is selected for Authentication mode.

IPv6 terminal authentication

Enable this function if IPv6 terminals need to be authenticated. After this function is enabled, configure an IPv6 URL to be pushed by the Portal server, and disable pushing of IPv4 Portal pages.

Domain

You can use the default value.

IP Phone Authentication

Value range:

  • Enable: If access terminals include IP phones, you need to enable this function.
  • Disable

RADIUS dynamic authorization

Value range:

  • Default
  • Custom

RADIUS dynamic server address

Dynamic RADIUS server IP address. This parameter is configurable only when RADIUS dynamic authorization is set to Custom.

Key

Key for RADIUS dynamic authorization. This parameter is configurable only when RADIUS dynamic authorization is set to Custom.

User access mode

Meaning: User access mode of the interface.

Value range:

  • multi-authen: This is the default mode. The interface allows multiple users to go online. In this mode, the device authenticates each access user. If users pass authentication, the users are given individual network access rights. After a user goes offline, other users are not affected.
  • single-voice-with-data: The interface allows only one data user and one voice user to go online. This mode is used when a data user accesses the network through a voice terminal.
  • single-terminal: The interface allows only one user to go online.

RADIUS bypass policy

Set the RADIUS bypass policy and specify the VLAN or bypass policy template used by users to bypass.

VLAN

Bypass policy

Automatic re-authentication

Meaning: Whether to re-authenticate a terminal if the terminal failed to be authenticated. If this function is enabled, after the time period specified by Re-authentication interval, iMaster NCE-Campus re-authenticates terminals that failed to be authenticated previously.

Value range: The re-authentication interval is in the range from 30 to 7200, in seconds.

Configuring an IGMP Snooping Template

Fundamentals

Internet Group Management Protocol Snooping (IGMP snooping) is an IPv4 Layer 2 multicast protocol. With IGMP snooping, a Layer 2 multicast device analyzes IGMP messages exchanged between an upstream router and user hosts to create and maintain a Layer 2 multicast forwarding table. The device uses then these entries to control multicast packet forwarding. In this way, it prevents multicast data from being broadcast on Layer 2 networks. This not only saves network bandwidth, but also ensures network security. To configure IGMP snooping in VNs, you need to define and deploy an IGMP snooping template.

IGMP snooping is a basic Layer 2 multicast function that forwards and controls multicast traffic at the data link layer. IGMP snooping runs on a Layer 2 device and analyzes IGMP messages exchanged between a Layer 3 device and hosts to create and maintain a Layer 2 multicast forwarding table. Based on this table, the Layer 2 device forwards multicast packets at the data link layer.

In the following figure, after receiving multicast packets from a Layer 3 multicast device (Router), a Layer 2 multicast device (Switch) at the edge of the access layer forwards the multicast packets to receiver hosts, so that the receivers can watch the ordered programs. If Switch does not run IGMP snooping, it broadcasts multicast packets at Layer 2. After IGMP snooping is configured, Switch forwards multicast packets only to specified hosts.

With IGMP snooping configured, Switch listens to IGMP messages exchanged between hosts and the upstream Layer 3 device. It analyzes packet information (such as the packet type, group address, and receiving interface) to set up and maintain a Layer 2 multicast forwarding table, based on which it forwards multicast packets at the data link layer.

Figure 9-180 Multicast packet forwarding before and after IGMP snooping is configured on a Layer 2 device

Procedure

  1. Choose Design > Basic Network Design > Template Management, from the main menu and click Policy Template. Choose IGMP Snooping Profile from the navigation pane.
  2. Click Create to create an IGMP snooping profile. Set the profile name to iMaster_IGMP_Snooping, enable Discard unknown multicast packets and Fast leave, set Aging time of dynamic router interfaces (s) to 180, set Query message sending interval (s) to 125, set IGMP robustness variable to 2, and set Maximum response time (s) to 10. Click OK.

Parameter Description

Table 9-563 Policy Template (IGMP snooping)

Parameter

Description

Name

Meaning: Name of an IGMP snooping profile.

Constraints:

  • The value is a character string.
  • The value can contain 1 to 32 characters.
  • The value can contain letters, digits, underscores (_), hyphens (-), at signs (@), and periods (.).

IGMP version

Meaning: Version of IGMP messages that can be processed.

  • Version 1: Only IGMPv1 messages can be processed.

  • Version 2: Both IGMPv1 and IGMPv2 messages can be processed.

  • Version 3: IGMPv1, IGMPv2, and IGMPv3 messages can be processed.

Discard unknown multicast packets

Meaning:

  • If this function is enabled, the device will discard unknown multicast packets upon receipt.
  • If this function is disabled, the device will broadcast unknown multicast packets upon receipt.

Fast leave

Meaning: Whether to allow member interfaces in a VLAN or BD to fast leave multicast groups.

The fast leave function enables the switch to delete the multicast forwarding entry of a multicast group from an interface immediately after the interface receives an IGMP Leave message for the group. This function saves bandwidth and system resources because the switch does not need to wait until the aging timer of the interface expires.

Suppress Report and Leave messages

Meaning: Whether to enable suppression of IGMP Report and Leave messages in a VLAN or BD.

Default setting: The default IGMP message suppression period is 10 seconds.

After this function is enabled on a Layer 2 device, during the suppression period, the device forwards only one IGMP Membership Report message to the upstream device in the following scenarios: When the first member joins a multicast group or a host sends a Report message in response to an IGMP Query message, the Layer 2 device forwards a Report message to the upstream device. When the last member of a multicast group leaves the group, the Layer 2 device forwards a Leave message to the upstream device. This reduces the number of IGMP messages on the network.

Router-Alert option check

Meaning: Whether to enable the device to check messages for the Router-Alert option and discard IGMP messages without the Router-Alert option.

The Router-Alert option identifies the protocol messages that need to be processed by upper-layer routing protocols.

Disable users from dynamically joining multicast groups

Meaning: Whether to disable devices from forwarding IGMP Report and Leave messages that are received in a VLAN or BD and contain a static group address to upstream Layer 3 devices configured with the static group address.

Constraints: If the upstream device is a non-Huawei device and has static multicast groups configured on interfaces, multicast users are not allowed to dynamically join or leave multicast groups. In this case, disable the Layer 2 device from sending IGMP Report and Leave messages carrying static group addresses to the upstream device.

Aging time of dynamic router interfaces (s)

Meaning: Aging time of dynamic routed interfaces in a VLAN or BD.

Value range: The value is an integer in the range from 1 to 1000, in seconds.

Query message sending interval (s)

Interval for sending IGMP General Query messages in a VLAN or BD. The value is an integer in the range from 1 to 65535, in seconds.

IGMP robustness variable

Meaning: IGMP robustness variable in a VLAN or BD, which indicates how many times IGMP Query messages are sent.

Value range: The value is an integer in the range from 2 to 5.

Maximum response time (s)

Meaning: Maximum response time for a host to respond to an IGMP General Query message.

Value range: The value is an integer in the range from 1 to 25, in seconds.

Default setting: 10 seconds

VXLAN Fabric Management

Configuring a VXLAN Fabric Network

Context

A VXLAN fabric network consists of a group of interconnected border, transparent, edge, and access nodes to provide non-differentiated access capabilities. In this way, an access device can access different network services at the same time. This reduces costs and improves network device utilization.

A virtualized campus network uses the VXLAN technology to create multiple virtual networks (overlay network) on the same underlay network and allow flexible service deployment.

Feature Requirements

  • If the switch to be added has been registered with iMaster NCE-Campus using NETCONF but has been deleted from iMaster NCE-Campus, before you add this switch to iMaster NCE-Campus again, run the reset netconf db-configuration command on the switch to clear the residual data in the NAAS database. After this command is executed, the switch will restart. Otherwise, iMaster NCE-Campus may fail to deliver services to the switch or even disconnect it.
  • When the system is upgraded, for example, from V300R019C00 to the latest version, if an error message is displayed indicating a configuration conflict when you enable Report terminal identification information during VXLAN fabric network creation, set DHCP snooping to Snooping on the Switch > Interface > Physical Interface page under Provision > Physical Network > Site Configuration.
  • By default, the ports for device interconnection are trunk ports. After the VXLAN fabric service configuration is deleted from the ports, the ports remain as trunk ports. In addition, devices using manually configured trunk ports for interconnection may be disconnected from the controller.

Prerequisites

  • Devices are already online on iMaster NCE-Campus and under the management of the current tenant.
  • The license of the VN type has been imported into the system.

Fundamentals

  • VXLAN fabric network with a centralized gateway
    • Only one device functions as the centralized Layer 3 gateway. All extranet and intranet access traffic are forwarded through this gateway, implementing centralized traffic management. Hosts in different BDs cannot directly communicate with each other at Layer 2. A Layer 3 VXLAN gateway is required to implement Layer 3 communication between the hosts. In this scenario, only a border node can function as the gateway.
    • VNs of the Layer 3 VXLAN, Layer 2 VXLAN, Layer 3 VLAN, and Layer 2 VLAN types are supported.
  • VXLAN fabric network with distributed gateways
    • In distributed gateway mode, Layer 2 and Layer 3 gateways are deployed on the same device. VTEP devices function as Layer 2 VXLAN gateways and connect to hosts, allowing tenants to access VNs on VXLAN networks. They also function as Layer 3 VXLAN gateways, allowing for inter-subnet communication and external network access. On a VXLAN fabric network with distributed gateways, both border and edge nodes can function as user gateways.
    • VNs of the Layer 3 VXLAN and Layer 2 VXLAN types are supported. VNs of the Layer 3 VLAN and Layer 2 VLAN types are not supported.

Procedure

  1. Create a VXLAN fabric network and select a fabric networking type.

    1. Choose Provision > Virtual Network > VXLAN Fabric Management, and then click Create Fabric. On the Create VXLAN Fabric page, set Name to Tenant_Fabric, Networking type to Centralized gateway, and Wireless authentication device to Border, enable Automatic routing domain configuration, and set AS number to 100.

    2. Click the Advanced drop-down arrow. Set storm suppression parameters for the VXLAN fabric network, and enable the function of reporting terminal identification information. Click Apply.

      You are advised to set the storm suppression thresholds of the VXLAN fabric network to 1% of the tunnel-side uplink rate of the edge node. Set the thresholds based on the actual network situation, for example, the user access status and access interface capacity in a broadcast domain.

  2. Add devices to the VXLAN fabric network, and configure automatic underlay route orchestration and BGP EVPN.

    1. Click the Network Management tab of Tenant_Fabric and click Add Device. In the Add Device window, select the devices to be added, and set core switches to Border, aggregation switches to Trans, and access switches to Edge. Enable the route reflector function for the core switches. After setting the parameters, click Next.

      Devices of the following models cannot function as border or edge nodes on fabric networks with distributed gateways, and cannot function as border nodes on fabric networks with the centralized gateway, either.

      S6720-30C-EI-24S-AC, S6720-30C-EI-24S-DC, S6720-54C-EI-48S-AC, S6720-54C-EI-48S-DC,S6720S-26Q-EI-24S-DC, S6720S-26Q-EI-24S-AC, S6735-S48X6C, S6735S-S48X6C-A, S6735S-S24X6C-A, S6735-S24X6C

    2. Enable automatic underlay route orchestration and set related parameters.
      • Set the OSPF area to Multiple areas. When there are fewer than 100 switches in a network area where routes need to be deployed on the underlay network, single-area orchestration is recommended. When there are more than 100 switches in a network area where routes need to be deployed on the underlay network, multi-area orchestration is recommended.
      • Set the network type to P2P.
      • Select the OSPF packet encryption mode, and set the key and password.
      • Enable OSPF GR.

      Routing domains cannot be automatically configured if border and edge nodes are not at the same site. To configure routing domains to implement site interconnection, configure routes on the Provision > Physical Network > Site Configuration > Site Configuration > Switch > Route > Interface OSPF page.

    3. Configure BGP EVPN. Click OK. After the configuration is complete, you are advised to click Configuration Status to check whether the configuration is successfully delivered.

Follow-up Procedure

  • After services on the VXLAN fabric network are configured, if a link needs to be changed due to a port fault or capacity expansion is needed, you can click in the upper left corner next to a VXLAN fabric network name to display the VXLAN fabric list and click on the right of the specified VXLAN fabric network name to update links on the network. You can also click in the topology mode to update links on a specified VXLAN fabric network. Link changes are supported only in the following scenarios:
    • Port fault: The port at one end fails or ports at both end fail.
    • Bandwidth expansion: Member interfaces are added to an existing Eth-Trunk for capacity expansion. Link changes will be automatically deployed in this scenario. When a physical interface is configured as an Eth-Trunk interface, a link change needs to be deployed. If services have been configured on the original physical interface, after the link change, another physical interface is configured as an Eth-Trunk interface and services are migrated to the Eth-Trunk interface.

      Link changes can be deployed only when corresponding ports are changed. When devices on both sides of a link are changed, for example, a device is replaced or faulty, link changes cannot be deployed.

      If a port is faulty or the link capacity is expanded, click to update links on the VXLAN fabric network and then adjust VXLAN fabric service configurations.

  • View the configuration status.

    Select the VXLAN fabric to be modified and click under the VXLAN fabric, or click Configuration Status to view the configuration status. If the configuration status is Failed, see Troubleshooting.

  • View a VXLAN fabric network.

    Select a VXLAN fabric and click under the network to view its information.

  • Change links on a VXLAN fabric network.

    Select a VXLAN fabric and click under the network to change links on the network.

  • Modify a VXLAN fabric network.

    Select a VXLAN fabric network and click under the network to modify it.

  • Delete a VXLAN fabric network.

    Select a VXLAN fabric network and click under the network to delete it.

Parameters

Table 9-564 Parameters for configuring a VXLAN fabric network

Parameter

Description

Name

Meaning:

VXLAN fabric name.

Constraints:

Under a tenant, each VXLAN fabric name must be unique.

Networking type

A VXLAN fabric network can be set up in either of the following mode:

  • Centralized gateway: Traffic transmitted from the external network to the internal network and transmitted in the internal network passes through the centralized gateway on the VXLAN fabric. In this case, only the border node can function as the user gateway.
  • Distributed gateway: Traffic transmitted from the external network to the internal network and transmitted in the internal network passes through different gateways on the VXLAN fabric. In this case, edge and border nodes can function as user gateways.

Wireless WAC location

Location and type of the authentication device for wireless users on the network. Currently, the following modes are supported:

  • Edge: The native WACs on edge nodes act as authentication points for wireless users.
  • Border: The native WACs on border nodes act as authentication points for wireless users.
  • Standalone WAC: Standalone WACs that connect to border nodes in off-path mode act as authentication points for wireless users.

Automatic routing domain configuration

Meaning: After this function is enabled, the underlay network is automatically configured. You can specify the sites where routing domains are automatically configured and specify OSPF route parameters.

Currently, the following parameters are supported:

Area: In the single-area scenario, all devices belong to Area 0. In the multi-area scenario, border nodes belong to Area 0, and each edge node and its connected border node belong to an area. If there are transparent nodes on the network, each transparent node and its connected border node belong to the same area. The areas to which edge nodes belong start from 1 in ascending order. The network with multi-layer aggregation devices supports only the single-area mode.

Network type: You can set the OSPF network type to broadcast, P2MP, or P2P.

Encryption: You can set the encryption mode between adjacent devices to HMAC-SHA256, MD5, or none.

NOTE:

HMAC-SHA256 is recommended, because it is more secure than MD5.

Key: It refers to the authentication key ID used for ciphertext authentication on an interface, and must be consistent with that of the peer device. The value is an integer in the range from 1 to 255.

Password: It specifies the ciphertext authentication key. The value is a string of 8 to 255 characters and cannot contain spaces.

Confirm password: You need to enter the ciphertext authentication key again for confirmation.

OSPF GR: Whether to enable OSPF graceful restart (GR).

BFD: Whether to enable BFD for OSPF. This function helps rapidly detect link status.

FRR: Whether to enable OSPF IP FRR. With this function enabled, OSPF can generate a loop-free backup link.

AS number

Meaning: BGP AS number on the VXLAN fabric.

Constraints: If BGP has been configured on a device, the AS number set here must be the same as the BGP AS number set on the device.

RR cluster ID

Meaning: Cluster ID of an RR.

Usage: If multiple RRs need to be configured, configure an RR cluster ID to prevent BGP routing loops. If multiple RRs are deployed on a VXLAN fabric, for example, two RRs are deployed on a dual-border VXLAN fabric, the RR cluster ID needs to be specified to prevent BGP routing loops.

Value range: The value is an integer ranging from 1 to 4294967295 or an IPv4 address.

Traffic forwarding path

Meaning:

Mode in which border nodes on a VXLAN fabric forward traffic.

Value range:

  • Load balancing: Traffic is load balanced among multiple border nodes. A maximum of eight border nodes can be deployed on a VXLAN fabric.
  • Device-level active/standby: Border nodes work in active/standby mode to forward traffic based on egress devices. A maximum of two active egress devices can be configured. In this mode, you need to set the default egress device. Specially, select one or more edge nodes on the Network Management page in list mode and choose More > Set Default Egress Device.
  • Service-level active/standby: Border nodes work in active/standby mode to forward traffic based on services. A maximum of two active egress devices can be configured. In this mode, you need to configure the active egress device on the External Network > Route Configuration > Static route page.

Constraints:

This parameter is supported only in the distributed gateway scenario.

Storm Suppression on VXLAN Fabric

Type of the traffic to be suppressed in a BD:
  • Broadcast: Enables broadcast traffic suppression in a BD.
  • Multicast: Enables multicast traffic suppression in a BD.
  • Unknown unicast: Enables unknown unicast traffic suppression in a BD.

Broadcast CIR/Broadcast CBS

Committed information rate (CIR) and committed burst size (CBS) of broadcast traffic.

Multicast CIR/Multicast CBS

CIR and CBS of multicast traffic.

Unknown Unicast CIR/Unknown Unicast CBS

CIR and CBS of unknown unicast traffic.

Layer 2 Isolation

Meaning:

When Layer 2 isolation is enabled, the RR does not reflect client routes.

Constraints:

  • This parameter is configurable in the centralized gateway scenario.
  • When Layer 2 isolation is enabled, only a border node can function as an RR.
  • This setting cannot be modified once VNs are configured on the VXLAN fabric.

Report terminal identification information

Meaning:

Whether to enable terminal identification channels for devices on a VXLAN fabric, including DHCP Option, HTTP User Agent, and multicast DNS channels.

Constraints:

  • The default report interval is 30 minutes.
  • The function of reporting terminal information in the VXLAN fabric configuration and that in the monitoring configuration cannot both be enabled.

BGP graceful restart

Application scenario:

A BGP restart causes traffic interruption. To prevent traffic interruption, enable graceful restart (GR) for BGP on devices, so that the devices can assist other GR-enabled devices to perform GR. This prevents service interruptions when BGP restarts.

Constraints:

  • This function is enabled by default and cannot be configured.
  • In versions earlier than V300R020C00, this function is disabled by default. In V300R020C00 and later versions, administrators can enable this function.

Domain name-supported policy

Application scenario:

When free mobility policies based on domain names are deployed on edge nodes, you need to enable this function.

VLAN networking

Constraints:

This parameter is configurable in the centralized gateway scenario.

Application scenario:

This function must be enabled when logical networks are set up based on the traditional VLAN technology.

Configuring an External Network

Application Scenario

iMaster NCE-Campus supports external networks of three egress types in VXLAN scenarios.

Table 9-565 Application scenarios of different egress types

Egress Type

Description

Application Scenario

Layer 3 shared egress

When different VNs access an external network through border nodes, service traffic of different VNs is forwarded from the shared VRF to the external network. The shared VRF is a public VRF or a specific VPN instance. An external network of the shared egress type can be connected to multiple VNs, and one VN can be bound to multiple external networks of the shared egress type.

The user gateway is located on the fabric network. Multiple VNs on the fabric network can access an external network through the Layer 3 shared egress.

It is applicable to a scenario where campus services are directly transmitted from the border egress without passing through the firewall.

L3 exclusive egress

  • When users in a VN access an external network, the VRF of the VN is used as the egress VRF. Different VNs use their own VRFs for external network access.
  • When an external network of the Layer 3 exclusive egress type is created, the controller does not immediately deploy the external network on devices, but deploys it on devices in a VN only when the VN is bound to this external network.
  • An external network of the Layer 3 exclusive egress type can be bound to only one VN.
  • Static routing and dynamic routing (BGP/OSPF) are supported.

It is applicable to a scenario where a firewall is connected to a core device in bypass mode and traffic in the VN is diverted to the firewall.

Layer 2 shared egress

When users access an external network through the interface on a core device, Layer 2 egress is used. In this case, no user gateway is deployed in the fabric, and Layer 2 VXLAN network is deployed.

It is applicable to a scenario where no user gateway is deployed on the fabric and the campus network needs to transparently transmit packets to the user gateway at Layer 2. For example, the ME60 functions as the gateway in the Layer 2 campus network.

Layer 3 Shared Egress Application Scenario

Figure 9-181 Customized VRF networking

DC access: In a large or midsize enterprise, if employees in both R&D and marketing departments are allowed to access applications in the data center, an external network of the shared egress type can be configured. In this scenario, there is no need to create a separate VRF instance for each VN on the PE. Only local and remote interconnection IP addresses need to be configured for the shared VRF on the border node, which simplifies the route configuration on the PE. As such, when the DC access traffic from R&D and marketing departments arrives at the PE, the traffic enters the VRF for communication with the DC.

Figure 9-182 Public VRF networking

Internet access: For a higher education institution, if both the student network (VN 1) and teacher network (VN 2) need to access the Internet, an external network of the shared egress type can be configured. In this scenario, the controller delivers a default route with the next hop of 192.168.1.2 to the VRF instances of VN 1 and VN 2 (vn1_vrf and vn2_vrf in the preceding figure) on the border node, and delivers static routes destined for the VRF instances of VN 1 and VN 2 to the PE and the public VRF on the border node.

Although this solution saves resources and simplifies configuration, the student network and teacher network can communicate with each other through routes on the PE/FW. To meet high security requirements, you can configure policies on the PE/FW to control inter-VN communication, or configure an external network of the Layer 3 exclusive egress type.

Layer 3 Exclusive Egress Application Scenario

Figure 9-183 External network of the exclusive egress type
  1. Firewall interconnection: For an enterprise, the R&D and marketing departments each have one VN configured, and the two VNs are allowed to communicate only through the corresponding vFW on the FW. Policies and routes are configured for the vFWs to control inter-VN communication. In this situation, an external network of the Layer 3 exclusive egress type is required to implement VRF communication between the border node and FW.
  2. PE interconnection: For a higher education institution that uses MPLS VPN to connect networks in different campuses, for example, connecting student or teacher networks in campuses A and B, an external network of the Layer 3 exclusive egress type is required to implement VRF communication between the border node and PE.

If VNs and VRF instances or vFWs on the PE/FW connected to the border node are one-to-one mapped, you need to configure external networks of the Layer 3 exclusive egress type.

Feature Requirements

  • In dual-border networking, you cannot configure multiple external gateways in one external network with a Layer 3 shared egress. Instead, you need to configure multiple external networks.
  • If you need to use static routes to implement load balancing between the two border nodes, you need to configure static route manually. External service IP Address cannot fulfill this requirement.

Prerequisites

When a tenant needs to access an external network, the connection between the border node and external network and an external gateway need to be configured for service provisioning. The following conditions must be met:

  • The interface, IP address, and VLAN for interconnection with the border node have been set on the external gateway.
  • A VXLAN fabric has been created and a border node has been configured on the network.
  • The gateway location has been determined.
    • If the gateway needs to be deployed inside the VXLAN fabric network, create an external gateway of the Layer 3 type to connect the gateway to the egress device.
    • If the gateway needs to be deployed outside the VXLAN fabric network, the gateway needs to connect to the egress device through a Layer 2 interface. In this case, you need to create an external gateway of the Layer 2 type to connect the gateway to the egress device.

Procedure

  1. Select the egress type for the VXLAN fabric network to connect to an external network.

    Choose Provision > Virtual Network > VXLAN Fabric Management. On the Network Management tab page of Tenant_Fabric, click the edit button next to External Network and then click Create.

    In the Create External Network window, select L3 Exclusive Egress and click OK.

  2. Configure basic information for communication between the VXLAN fabric and external networks.

    For example, to create an external network for RD_VN, set Name to RD_Outer, Outbound interface type to VLANIF, and Egress routing mode to Static route, enable Internet connection, and click Next.

    Enabling Internet connection automatically generates a default static route for the VXLAN fabric network to communicate with the external network.

  3. Configure the ports and IP addresses for the VXLAN fabric network to connect to the external network.

    Select Core for Core device, and click Add to configure the interconnection port (Table 9-566 describes the parameters). Click OK and then Next.

    Table 9-566 Parameters for configuring the interconnection ports between the border node and firewall

    Parameter

    Description

    Name

    In this example, the interconnection port corresponding to the external network RD_Outer is set to RD_Int. The interconnection VLAN is VLAN 3950, the local IP address is 192.168.5.3, and the peer IP address is 192.168.5.254 (VRRP virtual IP address of the firewall).

    Port

    Port that connects the core switch to the firewall. Select Eth-Trunk 3 and Eth-Trunk 4 as planned.

    VLAN

    VLAN for connecting the core switch to the firewall. Select a VLAN from the VXLAN fabric global resource pool. You can click on the right to view the VLAN resource usage. Set this parameter to VLAN 3950 as planned.

    IP address type

    This example selects IPv4.

    Local IPv4 IP address

    Set this parameter to 192.168.5.3 as planned.

    Peer IPv4 address

    Set this parameter to the VRRP virtual IP address of the firewall (192.168.5.254) as planned.

    IPv4 Mask

    Set this parameter to 24 as planned.

  4. Configure a route from the VXLAN fabric network to the external network.

    The static route can be a default route or a specific route manually created. Then click Apply. After the configuration is complete, you are advised to click Configuration Status to check whether the configuration is successfully delivered.

  5. Repeat steps 1 to 4 to create the external network egress Market_Outer for the marketing department.

Parameter Description

Table 9-567 Parameters for configuring an external network

Parameter

Description

Name

Name of an external network.

External network type

Type of the egress connecting the tenant network to an external network. The options are as follows:

  • L3 shared egress: The border node connects to and accesses the external network via a Layer 3 interface. Through the shared VRF egress, the public network or private network specified by another site can be accessed, or service traffic can be diverted to the firewall. When configuring a dual-border VXLAN fabric, you can add two border nodes in one external network.
  • L3 exclusive egress: The border node connects to and accesses the external network via a Layer 3 interface. If the traffic from a user to the external network needs to carry the VPN attribute, the service VRF can be used as the egress VRF of the external gateway. The user traffic is directly sent out through the service VRF. Multiple external networks need to be configured on a dual-border VXLAN fabric.
  • L2 shared egress: The border node connects to the egress router through a Layer 2 interface, and a user gateway is deployed on the egress router to access the external network.

Use default VRF

Meaning: Whether to bind the default VRF (VPN instance) to the VLANIF interface for interconnection with an external network.

By default, this parameter is disabled. In this case, you need to configure a user-defined VRF.

Customized VRF name

Meaning: VPN instance name on the device.

Constraints: If you do not set this parameter when creating an external network, the controller automatically generates a VRF name.

Outbound interface type

The egress interface can be a VLANIF interface or a VBDIF interface:

  • On a VXLAN fabric network with two border nodes, if firewalls are deployed in a square looped topology and have VRRP configured, configure a VBDIF interface as the egress interface.
  • In other scenarios, configure a VLANIF interface as the egress interface.

Egress routing mode

Routing mode of the egress interface. The options include

  • Static routing
  • Dynamic routing

Connecting to the Internet

Whether to allow access to external networks through default routes.

External service IP Address

Meaning: IP address of the remote network connected to the current egress, which is used by the controller to automatically deliver static routes destined to the remote network.

Constraints: This parameter needs to be set only when External network type is set to L3.

Core device

Border node to be connected to the remote network.

Port

Meaning: Port connecting the border node to the egress device and port description.

The description is a string of 1 to 80 case-sensitive characters. The value can contain spaces.

Description.

VLAN

Meaning: VLAN for interconnection between the border node and PE.

Constraints: This parameter needs to be set only when External network type is set to L3.

IP address type

IP address type of the interconnection port:

  • IPv4
  • IPv6

Local IPv4 address/Local IPv6 address

Meaning: IP address of the port on the border node for connecting to the egress device. This address will be delivered by iMaster NCE-Campus to the border node.

Constraints: This parameter needs to be set only when External network type is set to L3.

Peer IPv4 address/Peer IPv6 address

Meaning: IP address of the port on the egress device for connecting to the border node.

Constraints:

  • The IP address must be the same as that of the PE.
  • This parameter needs to be set only when External network type is set to L3.

IPv4 Mask/IPv6 Mask

Meaning: IP address mask of the ports connecting the border node and egress device.

Constraints: This parameter needs to be set only when External network type is set to L3.

Static route

Meaning: Static route destined to the remote network.

Constraints:

  • This parameter needs to be set only when External network type is set to L3.
  • When Egress forwarding mode is set to Active/standby egress services during the creation of a VXLAN fabric, you need to configure two static routes and specify the active egress device.

Input route

Whether to enable the border node to import static routes from the IP routing table to the BGP routing table and advertise these routes to peers.

Aggregated route

Whether to enable the border node to suppress the advertisement of specific routes of summary routes and advertises only summary routes.

BGP peer

BGP peer information of the border node:

  • Peer AS number
  • Peer IP address
  • Active time/Hold time (s)
  • Authentication type
  • Keychain name: The keychain name on the local device must be the same as that on the peer device. The keychain name on the local device is delivered by iMaster NCE-Campus.

OSPF

OSPF process information of the border node.

  • Process ID: OSPF process ID. OSPF processes can be created based on service types.
  • Import static routes: indicates whether to import static routes into OSPF.
  • Import direct routes: indicates whether to import direct routes into OSPF.
  • Do not set the DN bit of Summary LSA
  • Do not set the DN bit of AS-external LSA
  • Do not set the DN bit of NSSA LSA
    NOTE:

    OSPF multi-instance processes use a bit flag called the DN bit to prevent routing loops.

    The DN bit configuration applies only to the following scenarios:

    • In a VPN Option A scenario, the local PE imports BGP routes to generate LSAs and advertise the generated LSAs to the peer PE. Due to the DN bit setting restriction defined in RFC 4577, the peer PE fails to calculate routes. You can configure or cancel the DN bit setting on the local PE.
    • When a PE is connected to an MCE, the MCE needs to calculate some routes advertised by the PE. By default, the MCE does not check the DN bit. You can configure or cancel the DN bit setting on the local PE.

Area

OSPF area information of the border node.

  • Area ID: OSPF area ID.
  • Network Type: Broadcast, P2MP, or P2P.
  • Authentication Type: authentication mode configured for the OSPF area. The options are simple mode, security mode, and none.
  • Key-ID: authentication key ID of the interface's cipher authentication. Both ends must have the same Key ID. The value is an integer in the range from 1 to 255. This parameter is configurable only when Authentication Type is set to Security mode.
  • Encryption algorithm: HMAC_SHA256, MD5, or HMAC_MD5. This parameter is configurable only when Authentication Type is set to Security mode.
    NOTE:

    HMAC-SHA256 is recommended, because it is more secure than MD5 and HMAC-MD5.

  • Password type: plaintext or ciphertext type. This parameter is configurable only when Authentication Type is set to Security mode or Simple mode.
    NOTE:

    The Plain text password has security risks. You are advised to use ciphertext passwords encrypted by HMAC-SHA256 in security mode.

  • Password: plaintext or ciphertext password. The value is a string of case-sensitive characters without spaces, and contains digits and letters. This parameter is configurable only when Authentication Type is set to Security mode or Simple mode.
    • In Simple mode, a password is a string of 1 to 8 characters.
    • In Security mode, a password is a string of 1 to 255 characters.
  • Confirm Password: This parameter is configurable only when Authentication Type is set to Security mode or Simple mode.
  • Neighbor interface: neighbor interface to which the border node connects through OSPF.
  • Network: network segment in the OSPF area. The value is in the format of IP prefix/mask.

Configuring a Network Service Resource

Fundamentals

The DHCP server processes requests for address assignment, address lease renewal, and address release from clients or relay agents, and assigns IP addresses and other network configurations to clients. When the gateway of a Layer 3 VN needs to use the DHCP service, the system automatically delivers related configurations based on the DHCP server configuration. For a Layer 2 VN, no DHCP group needs to be configured.

The traffic for accessing a DHCP server is forwarded as follows:

  1. When a user terminal goes online for the first time, the terminal needs to be authenticated before communication. Before the authentication, the terminal needs to access the default VN through the default VLAN to access the DHCP VN. Then the terminal obtains a temporary IP address through the DHCP process. After obtaining the temporary IP address, the terminal initiates an authentication process and accesses the authentication server through the default VN.
  2. After the authentication is successful, the terminal accesses the service virtual network VN-VRF through the authorized VLAN.

Application Scenario

A border node can connect to a DHCP server in the following methods:

  • Directly connect to a server: The border node directly connects to the network service resource server.
  • Directly connect to a switch: The border node connects to the network service resource server through a switch.
  • Connect to a remote server: The border node connects to the DHCP server through an external network.

End users access a Portal server, RADIUS server, or a DNS server through a border node. You need to configure interconnection information between the border node and servers for service provisioning.

Procedure

  1. Set the network service resource types for the VXLAN fabric and the corresponding IP addresses to be accessed.

    In this example, to simplify route planning between the border node and the gateway in the network management zone, the DHCP server and authentication server in the network management zone need to be configured as a single network service source for communication with the VXLAN fabric. In addition, if a user needs to access a server to download an 802.1X client or update the antivirus database before authentication, consider the server IP address when configuring network service resources.

    Choose Provision > Virtual Network > VXLAN Fabric Management. On the Network Management tab page of Tenant_Fabric, click the edit button next to Network Service Resources and then click Create. For the parameters, see Table 9-568. After setting the parameters, click Next.

    Table 9-568 Parameters for creating a network service resource

    Parameter

    Description

    Name

    This example sets the network service resource name to Dserver_and_Aserver.

    VRF

    User-defined VRF name. If this parameter is not specified, iMaster NCE-Campus automatically generates a VRF that corresponds to the network service resource. In this example, the user-defined VRF name of the network service resource is DA_VRF.

    Server type

    This example selects DHCP and Other. That is to allow the fabric to connect to a DHCP server and the built-in authentication server of iMaster NCE-Campus.

    DHCP server

    Set this parameter to the IP address of the DHCP server, that is, 172.16.8.101.

    Other server

    Set this parameter to the network segment where the iMaster NCE-Campus southbound IP address resides, that is, 172.16.2.0/24.

  2. Configure the port and IP address for the VXLAN fabric to connect to the external network resource. For the parameters, see Table 9-569. Then click Complete. After the configuration is complete, you are advised to click Configuration Status to check whether the configuration is successfully delivered.

    Table 9-569 Parameters for configuring the port for the border node to connect to the gateway in the network management zone

    Parameter

    Description

    Scenario

    Mode for interconnection between the border node and external servers. The following modes are supported. In this example, the core switch is directly connected to the gateway in the network management zone. Therefore, Directly connected to a switch is selected.

    • Directly connect to a server: The border node directly connects to a network service resource server.
    • Directly connect to a switch: The border node connects to a network service resource server through a switch.
    • Connect to a remote server: The border node connects to a DHCP server through an external network.

    Interconnection device

    Device that connects the VXLAN fabric to the gateway in the network management zone. This example selects Core, the border node.

    External Port

    Port that connects the core switch to the gateway in the network management zone. Select Eth-Trunk 5 as planned.

    VLAN

    VLAN for connecting the core switch to the gateway in the network management zone. This resource is from the VXLAN fabric global resource pool. You can click on the right to view the VLAN resource usage. Set this parameter to VLAN 4012 as planned.

    Interconnection IPv4 address

    Set this parameter to 172.16.12.254 as planned.

    Peer IPv4 address

    Set this parameter to 172.16.12.1 as planned.

    IPv4 Mask

    Set this parameter to 24 as planned.

    If the DHCP server is deployed remotely and connects to the campus network from an external network, you need to plan an independent network service resource. In this case, set the server type to DHCP and Scenario to Connect to a remote server. In this scenario, iMaster NCE-Campus only needs to deliver DHCP relay configurations to the user gateway. The communication between the user subnet and the DHCP server depends on the routes destined for the external network, which are delivered during external network configuration.

Parameter Description

Table 9-570 Parameters for configuring a network service resource

Parameter

Description

Name

Name of a network service resource group.

VRF

User-defined VRF name, which is the VPN instance name delivered to the device. If you do not set this parameter when creating an external network, iMaster NCE-Campus automatically generates a VRF name.

Server Type

Currently, the following four types of servers are supported:

  • DHCP: If this option is selected, you need to set the address of a DHCP server. A maximum of 20 DHCP servers can be configured, among which at most eight DHCPv6 servers can be configured. The DHCP server addresses can be changed after being set.
  • Third-party RADIUS server: If this option is selected, you need to select a RADIUS server template.
  • Third-party portal server: If this option is selected, you need to select a Portal server template and specify the URL pushed by the Portal server.
  • Other: If this option is selected, you need to specify the IP address and mask of a server, such as an FTP server and a DNS server.

DHCP server

DHCP server address.

Constraints:

  • A maximum of 20 DHCP servers can be configured, among which a maximum of eight DHCPv6 servers can be configured.
  • When DHCPv6 servers are configured, you need to set Server interconnection address pool.

Server interconnection address pool

IP address used by a border or an edge node to communicate with third-party servers.

Loopback interface number

Meaning: Number of the loopback interface whose address is used for interconnection with servers.

Constraints: If this parameter is not set when a DHCPv6 server, a Portal server, or a RADIUS server is configured, the system automatically sets and delivers a loopback interface number. You are advised to set a loopback interface number to avoid conflicts with the value manually set on devices.

Scenario

Mode for interconnection between the border node and servers which provide network service resources. The following scenarios are available:

  • Directly connect to a server: The border node directly connects to a network service resource server.
  • Directly connect to a switch: The border node connects to a network service resource server through a switch.
  • Connect to a remote server: The border node connects to a DHCP server through an external network.

Interconnection device

Device connected to the peer end.

Interconnection Port

Meaning: Physical interface connected to the peer end.

Constraints:

When the border node is connected to a switch, the type of the interconnection port on the border node is set to trunk by default. The interconnection port on the switch must be of the same type as that on the border node.

Interconnection IPv4/IPv6 address

IP address and mask of the border node's VLANIF interface connected to the peer end.

Mask

Peer IPv4/IPv6 address

Meaning: IP address and mask of the peer switch when the border node is directly connected to a switch.

Constraints:

  • If the switch directly connected to the border node acts as the server gateway, set this parameter to the address of the interconnection port connecting the switch to the border node.
  • When the border node acts as the server gateway, you do not need to set this parameter.

Mask

Interconnection VLAN

Meaning: VLAN to which the physical interface connecting the border node to the peer end belongs and VLAN description.

The description is a string of 0 to 255 case-sensitive characters. The value can contain spaces.

Description

Configuring Access Management

Fundamentals

iMaster NCE-Campus uses policy association between wired and wireless devices to implement unified authentication for wired and wireless users and support free mobility.

Wired User Authentication

There are two networking scenarios for wired user access:

  • VXLAN is deployed at the edge (terminals are directly connected to the ports of edge nodes):
    • Terminals are directly connected to the ports of edge nodes, and no forwarding device is deployed between them. Policy association is not used for wired user access authentication.
    • 802.1X authentication or MAC address authentication can be configured on interfaces. After a user is authenticated successfully, the user is authorized with a specific VLAN and is added to the corresponding VXLAN based on the authorized VLAN.
    • Terminals can access edge nodes through static VLANs, dynamic VLANs, and VLAN pools.

  • VXLAN is deployed on edge nodes (terminals are directly connected to the ports of extended nodes or edge nodes):
    • 802.1X authentication and MAC address authentication are supported.
    • A Control and Provisioning of Wireless Access Points (CAPWAP) tunnel is established between an edge node and an extended access node for policy association. After a terminal user accesses the network through the extended access device, authentication packets are sent to the edge node through the CAPWAP tunnel and then forwarded to the authentication server. After the user is authenticated successfully, the authentication server delivers the authorized VLAN to the edge node. Then the edge node forwards the authorized VLAN to the extended access device through the CAPWAP tunnel.
    • Terminals can access extended nodes through static VLANs, dynamic VLANs, and VLAN pools.
    • VXLAN encapsulation is not performed on packets at the access layer. Packets are forwarded using traditional VLAN technology and transmitted to the corresponding bridge domain (BD) based on the VLAN and are VXLAN encapsulated by edge nodes.

      Currently, only two layers of extended nodes are supported.

Wireless User Authentication

Wireless user authentication supports three networking scenarios: authentication control points on edge nodes (native WAC+Fit AP), authentication control points on border nodes (native WAC+Fit AP), and authentication control points on standalone WACs (standalone WAC+Fit AP).

Wireless traffic can be transmitted in tunnel forwarding or local forwarding mode.

  1. Tunnel forwarding
    1. Switches with native WAC or standalone WACs function as authentication control points and support 802.1X authentication and MAC address authentication. Fit APs function as authentication enforcement points.
    2. An authentication packet is sent to an authentication control point through a CAPWAP tunnel and then forwarded to the authentication and authorization server. After authentication is complete, authorized VLAN information is sent to the authentication control point, which then forwards the information to the AP through a CAPWAP tunnel.
    3. After a terminal goes online on the AP, the service packets of the terminal are encapsulated in the CAPWAP tunnel on the AP and forwarded to the authentication control point. The authentication control point then decapsulates the CAPWAP-encapsulated packets.
    4. The access device connected to the wireless terminal through a CAPWAP tunnel forwards the packets to a specific BD based on the service VLAN of the SSID or authorized VLAN.

  2. Local forwarding
    1. Switches with native WAC or standalone WACs function as authentication control points, and support 802.1X authentication and MAC address authentication. Fit APs function as authentication enforcement points.
    2. An authentication packet is sent to an authentication control point through a CAPWAP tunnel and then forwarded to the authentication and authorization server. After authentication is complete, authorized VLAN information is sent to the authentication control point, which then forwards the information to the AP through a CAPWAP tunnel.
    3. After a terminal goes online on the AP, the service traffic of the terminal is transmitted upstream as VLAN packets on the AP and arrives at an access switch as VLAN tagged packets.
    4. The access device connected to the wireless terminal forwards the packets to a specific BD based on the VLAN information in the packets.
      1. Solution 1 is recommended.
      2. Currently, the configurations of native WAC and Fit AP need to be delivered through the CLI or the web system.

Application Scenario

To authenticate users in different authentication modes, the fabric network needs to communicate with the authentication server. When configuring this, you need to select authentication control points and bind authentication templates to them. In the centralized gateway scenario:

  • If VXLAN across the core and access layers is deployed (that is, there is no extended node under the edge node), the authentication control point for wired user access is typically deployed on the edge node (that is, an access switch). Binding an authentication profile to the interface of an authentication control point on the wired side is performed on the Access Management tab page of the fabric.
  • If VXLAN across the core and aggregation layers is deployed (that is, there are extended nodes under the edge node), the authentication control point needs to be deployed on the edge node for wired user access authentication. In addition, the extended node needs to be specified as the authentication enforcement point through the controller, and the extended node needs to be configured as the authentication enforcement point through the controller. The preceding configurations are performed on the Access Management tab page of the fabric.
  • The authentication control point for wireless user access is deployed on the WAC, that is, the core switch.

Feature Requirements

  • Only the transparent nodes that have been added to a VXLAN fabric network can be deployed between authentication control points and enforcement points. Otherwise, downstream access switches, which are authentication enforcement points, connected to the transparent nodes cannot be identified by the authentication control points.
  • To configure ports in batches, you need to select the target ports and then click the corresponding buttons on the top of the port list.
  • When an authentication template is configured on an interface of an authentication control point, either IPv4 or IPv6 portal server can be configured.
  • If the authentication control point is a border gateway and Set Connected Device Type is set to VXLAN fabric extended AP, you need to configure routes from the border gateway to edge devices to ensure that iMaster NCE-Campus can access the AP management network. The routes can be automatically learned through dynamic routing protocols or configured as static routes. When a static route is configured through the device CLI or delivered with site configurations from iMaster NCE-Campus, the destination address of the static route must be set to the management IP address of CAPWAP, and the next hop must be set to the VTEP IP address of an edge node.

Prerequisites

  • You have configured authentication templates for extended nodes to access VNs. For details about how to configure an authentication template, see Customizing a LAN Policy Template. In addition, you have enabled the built-in RADIUS server or Portal server in the authentication template. That is, you have enabled iMaster NCE-Campus to function as the RADIUS server or portal server. Alternatively, you have specified a third-party authentication server in the authentication template. In this case, ensure that you have configured network service resources for VXLAN fabric networks.
  • You have performed admission configuration, including configuring user accounts, authentication rules, authorization rules, and authentication results. For details, see Admission Management.
  • For a VXLAN fabric network with distributed gateways, edge nodes have been configured. For a VXLAN fabric network with a centralized gateway, edge and border nodes have been configured.

Procedure

  1. Choose Provision > Virtual Network > VXLAN Fabric Management, and click the Access Management tab.
  2. Select the target VXLAN fabric network on the left, and select an authentication control point. Configure the extended parameters of the authentication control point.

  3. Configure interfaces on of the authentication control point.

    In the interface list, click next to an interface, set the Connected Device Type and Authentication Template parameters of the interface, and click . For details about how to configure an authentication template, see Customizing Policy Template.

  4. (Optional) Configure the policy for each interface on the authentication enforcement point connected to the authentication control point.

    Before the configuration, click Refresh Execution Point Device List to refresh status of the authentication enforcement point.

  5. (Optional) Associate a wireless authentication SSID with the desired authentication template. Perform this step if iMaster NCE-Campus functions as an authentication server. Wireless access is configurable only on switches that support the native WAC function. SSIDs need to be configured on the switch's web system and SSID names must be the same as VAP profile names.

    In wireless scenarios, Portal authentication and 802.1X authentication cannot be configured together. Therefore, the authentication template bound to an SSID cannot be configured with both Portal authentication and 802.1X authentication.

  6. Click Apply.
  7. (Optional) When a third-party device needs to be configured as an admission device or portal authentication-free needs to be configured on VXLAN fabric networks, choose Admission > Admission Policy > Online User Control > User Control Policy from the main menu.

    1. On the page that is displayed, click the Portal Authentication-Free Policy tab and click Create to create a Portal authentication-free policy. This Portal authentication-free policy takes effect only when an admission device serves as the authentication point and in VXLAN fabric scenarios.

    2. After the Portal authentication-free policy is configured, click to apply the policy to a user group or user. A user group or user can be bound to only one Portal authentication-free policy. If Portal authentication-free extension is enabled on the Advanced Parameters tab page under Admission > Admission Policy > Admission Settings, this function takes effect in the portal address authentication-free control policy. That is, the portal address authentication-free validity period is extended as configured.

Follow-up Procedure

  • Modify the access management configuration.

    Select the target authentication control point to be modified from the authentication control point list and modify related parameters. To make the modification take effect, click Apply. To cancel the modification, click Cancel.

  • Delete the access management configuration.

    To delete all access management configurations, click Reset.

Parameters

Table 9-571 Parameters on the Access Management page

Parameter

Description

Authentication Control Point

On a VXLAN fabric with distributed gateways, only edge nodes can act as authentication control points. Multiple edge nodes can be configured as authentication control points.

On a VXLAN fabric with a centralized gateway, both edge and border nodes can act as authentication control points.

  • Multiple edge nodes can be configured as authentication control points. Authenticated user access is supported on VXLAN and VLAN networks. Edge nodes must support free mobility. For details about the device models that can function as authentication control points, see Table 9-572.
  • When a border node functions as an authentication control point, only one authentication control point can be configured. Authenticated user access is supported on VLAN networks only, and is unavailable on VXLAN networks. In this case, edge nodes must support VXLAN. For edge nodes that cannot be deployed as enforcement points for policy association, the peer device type cannot be set to Terminal (PC, phone, dumb terminal, non-VXLAN fabric extended switch/AP).

Number of execution point devices

Maximum number of enforcement points can be connected to the selected authentication control point.

Management VLAN of CAPWAP

Meaning: VLAN and IP address used by an authentication control point (an edge or a border node) manages its connected enforcement points (edge or extended nodes).

Constraints:

  • The two parameters are mandatory only when Connected Device Type is set to VXLAN fabric extended AP or VXLAN fabric extended access switch on authentication control points.
  • The two parameters must be set or not set at the same time.

Management IP address of CAPWAP

Authentication-free rule

Authentication-free network accessible to users before successful authentication.

Constraints:

Only some switch models support authentication-free rules defined based on ACLs, and the models supporting IPv4 ACLs and IPv6 ACLs are different. For details, see the corresponding switch product documentation.

Configure the RADIUS/Portal source IP or source interface

Meaning: Source IP address or source interface used by the authentication control point to communicate with a RADIUS or Portal server.

Constraints:

  • This parameter does not take effect if a third-party RADIUS or Portal server is configured as a network service resource to be connected.
  • This parameter is required when the built-in RADIUS server or Portal server is used and the authentication component is used for authentication.

Connected Device Type

Meaning: Type of the device connected to a port of the authentication control point.

Value range:

  • VXLAN fabric extended AP: Huawei Fit APs that can be managed by iMaster NCE-Campus
  • VXLAN fabric extended access switch: Huawei switches that can be managed by iMaster NCE-Campus
  • Terminal (PC, dumb terminal, and non-VXLAN fabric extended switch/AP): The client can be a terminal, a switch or an AP that cannot be managed by iMaster NCE-Campus. It can also be a switch managed by iMaster NCE-Campus but not added to the VXLAN fabric.

Authentication Template

Meaning: Template that specifies the authentication mode used by a port on the authentication control point.

Constraints:

When a bypass policy template with an IPv6 ACL defined is configured in an authentication template, the configuration will fail to be delivered if the authentication control point that uses the authentication template does not support IPv6 ACLs. For details about the switch models that support IPv6 ACLs, see the corresponding switch product documentation.

Authentication Mode

Set Uplink Port

Constraints: If the control point is not directly connected to its upper-level device, you need to manually specify the uplink port.

Inherit Authentication Template on Control Point Port

After this parameter is enabled, ports of enforcement point devices connected to a control point device inherit the authentication profile of the connected control point device port.

SSID

SSID used for wireless authentication.

Authentication profile

Authentication profile to be bound to the SSID for wireless authentication.

Supported Device Types

The following table lists the models of the devices that can be configured as authentication control points and enforcement points.

Table 9-572 Device models

Device Function

Device Type

Device Model

Authentication control point

S12700

S12704

S12708

S12712

S12710

S12700E

S12700E-4

S12700E-8

S12700E-12

S7700

S7703

S7706

S7710

S7712

S5700

S5720HI

S5730-HI

S5731-H

S5731-H-K

S5731S-H

S5732-H

S5732-H-K

S6700

S6720-HI

S6730-H

S6730-H-K

S6730S-H

S6730-S

S6730S-S

S6720S-SI

S6720-SI

S6720-EI

S6720S-S

Authentication enforcement point

S1700

S1730S-H

S2700

S2720-EI

S5700

S5720-LI

S5735-L

S5735S-L

S5735S-L-M

S5720S-LI

S5720-SI

S5735-S

S5735S-S

S5735-S-I

S5730-SI

S5730S-EI

S5720-EI

S5730-HI

S5731-H

S5731-H-K

S5731-S

S5731S-H

S5731S-S

S5732-H

S5732-H-K

S5720I-SI

S6700

S6720-LI

S6720S-LI

S6720-SI

S6720S-SI

S6720-EI

S6720S-EI

S6730-H

S6730-H-K

S6730S-H

S6730-S

S6730S-S

S600-E

S600-E

Managing VXLAN Fabric Networks in List Mode

Prerequisites

A VXLAN fabric network has been created.

Context

In the VXLAN fabric list mode, you can view basic device information, change network links, set device roles, add or delete devices, and set the default egress device on VXLAN fabric networks.

Procedure

  1. Choose Provision > Virtual Network > VXLAN Fabric Management, and click the Network Management tab.
  2. Click in the upper right corner to enter the list mode.

    Click Add Device. Select devices to be added and set the related parameters as planned.

    For an online device, you can click the device name to view the device status. In addition, you can also lock the device's configuration, reboot the device, and log in to the device CLI.

    • The web UI display varies according to devices.
    • You can log in to the web system only of firewalls, ARs, WACs, and switches with native WACs through iMaster NCE-Campus. A maximum of 20 device's web systems can be opened together.
    • If a user opens the web system of a device through the Device Configuration function and then opens the web system of another device, the session information of the first device will be overwritten and the user will be logged out from the web system of the first device when the user opens the web system of the second device. This is because different devices use the same IP address to forward sessions using SSH. If you need to open the web system of two devices at the same time, open a non-trace page or use another browser to log in to iMaster NCE-Campus, and then log in to the web system of the devices.

  3. Delete devices.

    Select one or more devices to be deleted and click Delete. Alternatively, to delete a device, click next to the device.

    A device cannot be deleted if the device has been deployed with services, such as extended access, network service resource, external gateway, and VN services. Before deleting a device, delete the network services deployed on the device in the following sequence: VN interworking > VN > network service resource > external network > access management service.

  4. Change the role of a device to border, trans, edge, or access.

    Select one or more devices to be modified, click Set Role, and select a value from the drop-down list box.

    The role of a device cannot be changed if the device has been deployed with services, such as extended access, network service resource, external gateway, and VN services.

    On a VXLAN fabric network with a centralized gateway, only one border node can be deployed, along with multiple extended and edge nodes. On a VXLAN fabric network with distributed gateways, a maximum of eight border nodes can be deployed, along with multiple extended, transparent, and edge nodes.

  5. Configure source interfaces for sending BGP packets.

    Select one or more devices to be modified and click Set BGP Source Interface. In the displayed dialog box, select the connection interface type (loopback or VLANIF interface), enter the interface number, and click OK.

    After automatic orchestration of routing domains is enabled, the source interfaces for sending BGP packets cannot be set.

    The source interface cannot be changed if the device has been deployed with services, such as extended access, network service resource, external gateway, and VN services.

  6. Configure the default egress device.

    Select one or more edge nodes and choose More > Set Default Egress Device. In the dialog box that is displayed, select a border node as the default egress device and click OK. With multiple border nodes deployed on a VXLAN fabric network, if you want to configure active and standby egresses for the network, you need to set the default egress device and set the forwarding mode to Active/standby egress devices when creating a VXLAN fabric network.

  7. Change the RR.

    To enable or disable the RR function, click the RR icon corresponding to the device.

    • On a VXLAN fabric network with a centralized gateway, only one device can be configured as an RR. On a VXLAN fabric network with distributed gateways, a maximum of two devices can be configured as RRs. In both scenarios, the role of RRs cannot be set to access.
    • If the RR is disabled, all basic BGP configurations will be deleted from the device, and administrators need to perform re-configurations using command lines.

  8. Redeliver configurations.

    If Domain Name-Supported Policy Configuration Status, BGP Pre-configuration Status, or Configuration Status of the Terminal Identification Channel of a device does not display success, select the device and click Redeliver to redeliver configurations.

  9. Change a link.

    After VXLAN fabric services are deployed, if physical links change (for example, a port is faulty or the network plan is adjusted), you can click Change Link in the upper left corner to change the links or click to display the VXLAN fabric list, and click on the right of the desired VXLAN fabric name to update the VXLAN fabric links. Alternatively, you can click in the topology view to update links in a VXLAN fabric. The controller supports automatic update of physical networks and services on VXLAN fabric networks as well. Link changes are supported only in the following scenarios.

    • Port fault: The ports at one end or both ends of the link change.
    • Bandwidth expansion: Member interfaces are added to an existing Eth-Trunk for capacity expansion. Links automatically change in this scenario. You do not need to manually change links. When a physical interface is added to an Eth-Trunk interface, a link change needs to be deployed. If services have been configured on this physical interface, after the link change, another physical interface is used to set up an Eth-Trunk interface and services are migrated to the Eth-Trunk interface.

      The link change function is supported only in the port change scenario. When devices on both sides of a link are changed, for example, a device is replaced or faulty, the link change function is unavailable.

      If a port is faulty or the capacity of a link is expanded, click to update links on the VXLAN fabric network and then configure VXLAN fabric services as needed.

Managing VXLAN Fabric Networks in Topology Mode

Application Scenario

iMaster NCE-Campus can display a VXLAN fabric network in a topology. Users can add devices, change links, set device roles, and view the following information: configuration status, dynamic routes, external networks, network service resources, NQA test instances, multicast information, device interfaces, and network services.

Feature Requirements

  • Currently, two devices can be connected through only one logical link.
  • In some scenarios, to increase the bandwidth between two devices or increase the reliability, you need to connect two devices through more than one physical link. In this case, you need to add the interfaces on the local device to an Eth-Trunk interface, and those on the peer device to another Eth-Trunk interface, and set up an Eth-Trunk between the two devices.
  • After interfaces on the local and peer device are added to an Eth-Trunk interface, respectively, if the devices are online, you can click the device names to go to the device details page, and perform interface configuration synchronization and link discovery on the interface list page and link management page, respectively.

Context

In a topology, you can obtain the icon meanings on the right. Pay attention to the following:

  • A device with in the lower right corner of the device icon is displayed on the current page. If there are a large number of devices in a VXLAN fabric network, the devices are displayed on multiple pages in the topology. By default, a maximum of 20 devices and their upper-level devices can be displayed on a single page. You can change the maximum number of devices that can be displayed per page as needed.
  • If an AP is directly connected to a device, is displayed in the upper left corner of the device icon, and the number in the circle indicates the number of directly connected APs.
  • In a VXLAN fabric network, the switches that can be managed include physical switches and stacks. A stack combines multiple stacking-capable switches into a logical switch. Stacking technology provides high network reliability and forwarding performance, and simplifies network management.
  • You can tune the topology structure as required, and then click on the right to save the modification.

Prerequisites

A VXLAN fabric network has been created and devices have been added to the VXLAN fabric network.

Procedure

  1. Choose Provision > Virtual Network > VXLAN Fabric Management, click to select a VXLAN fabric network from the drop-down list box, and click the Network Management tab.
  2. Click in the upper right corner to enter the topology mode.
  3. Click Add Device. Select devices to be added and set the related parameters as planned.
  4. Change the device role.

    Right-click the device to be configured and choose Set as Core, Set as Trans, Set as Edge, or Set as Extended from the shortcut menu.

  5. Create an NQA test instance.

    • Currently, an NQA test instance can be created only in the default VRF to probe public addresses.
    • If an NQA test instance is started, the NQA configuration cannot be modified.
    • Ensure that the NQA license of the related device has been activated. Some devices may require additional NQA licenses.
    When configuring an NQA test instance, you need to configure a separate probe path for this instance by creating an external network that uses a Layer 3 shared egress and the default VRF.
    1. Select the egress type for the fabric network to connect to an external network.

      Choose Provision > Virtual Network > VXLAN Fabric Management. On the Network Management tab page of Tenant_Fabric, click the edit button next to External Network and then click Create.

      In the Create External Network page that is displayed, select L3 shared egress and click OK.

    2. Configure basic information for interconnection between the fabric and the external network.

      In this example, set Name, toggle on Use default VRF, and click Next.

    3. Configure the port and IP address for the fabric network to connect to the external network.

      Click Add next to Interconnection port and configure an interconnection port. After the configuration is complete, click OK and then Next.

    4. Configure a route from the fabric network to the external network.

      Click Create and specify the destination IP address and the next-hop IP address.

      Set Association Type to NQA, click , and click Create to create an NQA test instance. In the Create NQA page that is displayed, set Destination IP to the IP address to be detected and set Next-hop IP Address to the peer address of the interconnection port configured for the external network. Click OK.

      Click OK.

    5. Create a VN and bind it to the created external network.

      Choose Provision > Virtual Network > VXLAN Virtual Network. On the VN Configuration tab page, click Create to create a VN and bind it to an external network. For details, see Configuring a VN.

  6. Configure a route monitoring group.

    When there are two or more egresses on a network, if the active egress fails, all traffic can be transmitted through the standby egress with a lower priority. To implement network backup, you can associate routes with NQA test instances and route monitoring groups to quickly detect link faults. After an NQA instance detects a link fault, the corresponding routes will be deleted from the IP routing tables on the devices bound to the NQA instance. Then, service traffic is switched to a route without a link fault, preventing lengthy service interruptions.

    Choose Provision > Virtual Network > VXLAN Fabric Management, click to select a VXLAN fabric from the Fabric drop-down list box, and click on the right of Route Monitoring. On the Route Monitoring page that is displayed, click the Route Monitoring Group tab and click Create. Set related parameters and select the created NQA test instance. After the configuration is complete, click OK.

    IPv6 NQA test instances cannot be associated with route monitoring groups.

Related Operations

  1. Check interface information and network configuration of devices on a VXLAN fabric network.

    In the topology view, click the desired device and click the Interface Information tab. The interface information and network configuration of the selected device is then displayed, including the authentication mode, VLAN, and logical network settings. Currently, interface and multicast information about transparent nodes cannot be displayed.

  2. Check multicast information about a device on a VXLAN fabric.

    Click the desired device and click the Multicast Information tab. The multicast information about the selected device is then displayed, including multicast member ports, multicast router ports, and multicast statistics.

    • Click Start to obtain all multicast information about the selected device.
      • Multicast information can be obtained only when Report performance data is enabled. This function is enabled by default. To enable this function, choose Monitoring > Monitoring Settings > Monitoring Settings > HTTP, select Switch, and enable Report performance data next to CloudCampus.
      • After you click Start to obtain multicast information from a device, if complete information is not displayed after six minutes, the obtaining request times out.
      • Multicast information about a device can be obtained only once at a time. You can obtain multicast information about a maximum of two devices under a tenant at the same time. When the system is collecting either multicast member port information, multicast router port information, or multicast statistics from a single device, you are not allowed to operate the device. The reset operation is not allowed on a device when the system is obtaining multicast information from the device.
      • Multicast information on devices may be different from that obtained by the controller. If this occurs, compare information on the devices and controller to figure out the differences.

    • Click Filter under Multicast Group Member Port to filter multicast group member ports by VLAN or BD. You can also query multicast member ports by the Group-address field.

    • Click Filter under Multicast Router Port to filter multicast router ports by VLAN or BD.

    • Click Filter under Multicast Statistics to filter multicast statistics by VLAN or BD.

    • Click Reset All under Multicast Statistics to clear multicast statistics in all VLANs or BDs from the selected device. Alternatively, click to clear multicast statistics in a specific VLAN or BD. To obtain the latest multicast statistics, click Start.

      After you click Reset All, the existing multicast statistics on the device are cleared and cannot be restored. Therefore, exercise caution when performing this operation.

  3. View the AP list of an access device.

    In the topology view, right-click an access device and choose View AP from the shortcut menu to view the APs connected to the selected access device

  4. Set device roles.

    In the topology view, you can right-click a device and set a role for the selected device.

  5. View dynamic routes.

    In the topology view, you can right-click a device and choose View Dynamic Routes from the shortcut menu to view dynamic routes of the device.

Parameters

Table 9-573 Route monitoring parameters

Parameter

Description

NQA

Device

Device on which an NQA test instance is configured.

Name

Name of the NQA test instance.

IP type

IP address type on the network. Both IPv4 and IPv6 addresses are supported.

Destination IP

Destination IP address of the NQA test instance.

Next hop IP

Next hop IP address of the NQA test instance.

Number of sent packets

Number of probes to be sent each time for an NQA test instance. The value is an integer in the range from 1 to 15. The default value is 3.

Packet sending interval (s)

Interval at which packets are sent in an NQA test instance. The value is an integer that ranges from 1 to 60. The unit is second. The default value is 4.

Timeout(s)

Timeout period of a probe for an NQA test instance. The value is an integer in the range from 1 to Interval of sent packets, in seconds. The default value is 3.

Probe frequency (s)

Interval at which an NQA test instance is automatically executed. The value is an integer in the range from ((Number of sent packets - 1) x Packet sending interval + Timeout interval + 1) to 604800, in seconds. The default value is 15.

Route Monitor Group

Device

Device on which a route monitoring group is configured.

Name

Name of the route monitoring group.

Description.

Description of the route monitoring group. The value is a string of 0 to 80 characters and can contain letters, digits, spaces, underscores (_), ampersands (&), number signs (#), asterisks (*), left parenthesis ((), right parenthesis ()), colons (:), at signs (@), tildes (~), plus signs (+), equal signs (=), and hyphens (-).

NQA

NQA test instance bound to the route monitoring group.

NOTE:

IPv6 NQA instances are not supported.

Routing relationship

Relationship between the NQA test instances to be tracked. The relationship can be:

OR: A link switchover is performed only when all links monitored by NQA test instances in a route monitoring group fail.

AND: If the link monitored by an NQA test instance in a route monitoring group fails, a link switchover is performed.

Handover delay (second)

Delay in switching traffic from the faulty link to the backup link. The value is an integer in the range from 0 to 1000, in seconds. The default value is 0.

Switchback delay (second)

Delay time for a traffic switchback after a fault is rectified. The value is an integer in the range from 0 to 1000, in seconds. The default value is 5.

VXLAN Virtual Network Configuration

Configuring the Default VN

Application Scenario

Unauthenticated users can access the default VN temporarily in the following scenarios:

  • Before authentication, an end user accesses the default VN to apply for a temporary IP address. During portal authentication, the authentication server needs to obtain the user's temporary IP address to push the Portal page to the user. After the authentication succeeds, the end user is connected to a service VN.
  • Pre-authentication resources need to be deployed together with the authentication-free function. For example, resources such as the FTP server for downloading 802.1X clients can be deployed in the default VN to ensure that unauthenticated users can access the FTP server.

Prerequisites

  • Before managing the default VN, you must have the corresponding management permission. The permission can be assigned when a tenant administrator is created, and can be modified after the role is created. The permission assigned for a tenant administrator can be either of the following:
    • Permission to manage all sites in the system
    • Permission to manage a specific default VN

    The default tenant administrator is the first tenant administrator created in the system and has the permission to manage all VNs.

  • A VXLAN fabric network has been created and related configurations have been performed.

Context

  • A VXLAN fabric network supports only one default VN.
  • The default VN supports the following network types:
    • VXLAN fabric network with a centralized gateway: Virtualized VXLAN and traditional VLAN
    • VXLAN fabric network with distributed gateways: Virtualized VXLAN
  • You can set the service gateway location in the default VN to Outside the VXLAN fabric based on the users' requirements of Layer 2 VN access before authentication.
  • You can set the service gateway location in the default VN to Inside the VXLAN fabric based on the users' requirements of Layer 3 VN access before authentication.

Procedure

  1. Choose Provision > Virtual Network > Logical Network and click the VN Configuration tab.
  2. Select a VXLAN fabric network on the left and click next to Default VN. Then, modify VN parameters on the page that is displayed.
  3. Configure the network type of the default VN.

    In the centralized gateway scenario, if VLAN networking is toggled on when you create a fabric network, the Network technology parameter is available on the current page and you can set this parameter to Virtualized VXLAN or Traditional VLAN as needed.

  4. (Optional) Set External network. To create, modify, or delete an external gateway, click .
  5. (Optional) Set Network service resources. To create, modify, or delete a network service resource, click .
  6. Click Next and configure the user gateway.

    Click Manually Specified and set subnet parameters. Determine whether to enable the DHCP snooping, mDNS snooping, IPSG, and DAI functions. After the configuration is complete, click OK.

    • For the VLAN type of the default VN, only static VLANs are supported.
    • The default VN configuration will be delivered to the access interfaces configured with authentication and their uplink authentication control points. The authentication mode on access interfaces is configured on the Access Management page.

  7. Click Apply.

Parameters

Table 9-574 Default VN parameters

Parameter

Description

Network technology

Network type of the default VN. Virtualized VXLAN and Traditional VLAN are available only on VXLAN fabric networks with a centralized gateway.

User gateway location

Service gateway of the default VN.

  • To allow Layer 2 VN access, set this parameter to Outside the VXLAN fabric.
  • To allow Layer 3 VN access, set this parameter to Inside the VXLAN fabric.

User-defined VRF name

The user-defined VRF name is the name of the VPN instance delivered to the device. If this parameter is not set, iMaster NCE-Campus automatically generates a value.

External network

External gateway of the default VN. This parameter needs to be set if the users within the VN need to access the external network.

Network service resources

Network service resources accessible to the default VN. This parameter needs to be set if users in the VN need to use resources such as a DHCP service or RADIUS server.

This parameter needs to be set only when the tenant network is a Layer 3 network.

User gateway

Name

Name of the user gateway.

VLAN Type

Currently, only Static VLAN is supported.

VLAN

Set a VLAN ID.

IP Type

Type of an IP address. The value can be IPv4 or IPv6.

IPv4 subnet (when the IP address type is IPv4)

Subnet IP address and mask.

IPv4 gateway address (when the IP address type is IPv4)

Gateway IP address of a subnet.

IPv6 subnet (when the IP address type is IPv6)

Subnet IP address and mask.

IPv6 gateway address (when the IP address type is IPv6)

Gateway IP address of the subnet.

DHCP

Mode in which the DHCP server assigns IP addresses to users in a subnet.

  • When the network type is set to L3 VXLAN, the DHCP mode can be DHCP relay.
  • When the network type is set to L3 VLAN, the DHCP mode can be DHCP server or DHCP relay.

DHCP Snooping

Whether to enable DHCP snooping for BDs or VLANs on the subnet. This function applies only to wired access users and allows users to go online only on user-side devices, not on tunnel-side devices. After DHCP snooping is enabled, a DHCP client can obtain an IP address from a valid DHCP server. In addition, DHCP snooping-enabled devices record mappings between IP addresses and MAC addresses of DHCP clients, and generate a DHCP snooping binding table to prevent DHCP attacks. This function needs to be enabled if terminal identification is required.

mDNS Snooping

Whether to enable mDNS snooping for BDs or VLANs on the subnet. This function needs to be enabled if terminal identification is required.

ND Snooping

Whether to enable ND snooping for BDs or VLANs on the subnet. This function can effectively defend against ND attacks.

IPSG

Whether to enable IPSG. IPSG can be enabled only after DHCP snooping is enabled. After IPSG is enabled, devices can check IP packets based on the DHCP snooping binding table to defend against attacks such as IP spoofing and MAC spoofing attacks.

DAI

Whether to enable Dynamic ARP inspection (DAI). DAI can be enabled only after DHCP snooping is enabled. After DAI is enabled, the device compares the source IP address, source MAC address, interface number, BD, and VLAN ID of an ARP packet with entries in the DHCP snooping binding table. If the ARP packet matches a binding entry, the device considers the ARP packet valid and allows the packet to pass through. Otherwise, the device considers the ARP packet invalid and discards the packet.

Description

Description of a VLAN.

Configuring a VN

Fundamentals

VXLAN enables a virtual network to provide access services for numerous tenants, and allows tenants to plan their own virtual networks, not limited by the physical network IP addresses or broadcast domains. As a result, network management is greatly simplified.

The VXLAN technology may be used to construct a Layer 2 virtual network on an existing Layer 3 network to implement Layer 2 communication between VMs. The following figure shows communication on a VXLAN network.

Application Scenario

iMaster NCE-Campus allows administrators to create VNs on a VXLAN fabric network. Different VNs carry different tenant services, thereby implementing service isolation between tenants. For example, if the tenant is a university, VNs can be created for the faculty of computer and the faculty of finance and economics of the university, respectively.

Prerequisites

  • Before managing the default VN, you must have the corresponding management permission. You can assign rights to a tenant administrator when creating the account, or modify the rights of a tenant administrator after the account is created. Administrators can have either of the following rights:
    • Permission to manage all sites
    • Permission to manage a specific VN

    The default tenant administrator is the first tenant administrator created in the system and has the permission to manage all VNs.

  • A VXLAN fabric network has been created and related configurations have been performed.
  • Before performing extended access configuration for a VXLAN Fabric, if the VXLAN fabric contains a device port whose authentication profile uses portal authentication or customers are allowed access to network resources before being authenticated, you need to configure a default VN.

Feature Constraints and Limitations

  • A single tenant supports a maximum of 4000 VLAN pools. A single VXLAN fabric network supports a maximum of 1000 VLAN pools. A single VN supports a maximum of 32 VLAN pools. A single VLAN pool supports a maximum of 128 VLANs.
  • VNs support the following network types:
    • VXLAN Fabric network with a centralized gateway: Virtualized VXLAN and traditional VLAN
    • VXLAN Fabric network with distributed gateways: Virtualized VXLAN
  • You can set the gateway location in the default VN to Outside the VXLAN Fabric based on the users' requirements of Layer 2 VN access before authentication.
  • You can set the gateway location in the default VN to Inside the VXLAN Fabric based on the users' requirements of Layer 3 VN access before authentication.
  • To connect a dual-border VXLAN fabric network to an external network of the Layer 3 exclusive egress type, you need to configure two VNs and bind them to two external gateways.

Procedure

  1. Choose Provision > Virtual Network > VXLAN Virtual Network and click the VN Configuration tab.
  2. Select the target VXLAN fabric network on the left and click Create.
  3. In the Create area, set the VN name.
  4. Configure the network type of the VN.

    Figure 9-184 Configuring a VN on a VXLAN fabric network with a centralized gateway
    Figure 9-185 Configuring a VN on a VXLAN fabric network with distributed gateways

  5. (Optional) Set Network service resources. To create, modify, or delete a network service resource, click .
  6. (Optional) Set External network. To create, modify, or delete an external network, click .
  7. Click Next and configure the user gateway.

    • Automatic creation: Click Automatic, and enter the number of subnets, subnet mask, and start IP address. Click OK.
      • Only VN subnets can be automatically created.
      • If a VN is assigned to a voice VLAN, the CDP function is enabled by default on the devices in the VN. If you need to configure interfaces that have joined in the voice VLAN on the devices, choose Provision > Physical Network > Site Configuration from the main menu and choose Switch > Interface > Physical Interface from the navigation pane to enable the CDP function on the iMaster NCE-Campus web UI.
      • If a VN is assigned to a VLAN pool, enter or set VLAN Pool Name. A single VN supports a maximum of 32 VLAN pools. In the VN Configuration tab, click VLAN Pool Management create VLAN pool or modify VLAN pool parameters.
    • Manual creation: Click Manual and set parameters. Click .

  8. Configure wired client access.

    1. Click .
    2. Set the service name, service access type, and the site involved in the service. A maximum of 50 devices can be added to a service group, and a maximum of 2000 ports can be configured in batches at a time.
    3. Under Port List, set the authorization mode of service access ports.
    4. Click OK.

  9. Configure wireless client access.

    1. Click Create.
    2. Select the site involved in the service.
    3. Under Port List, select the devices to be added to the VN.
    4. Click OK.

    If the VXLAN fabric configuration conflicts with the device configuration in the site configuration, the VXLAN fabric network may fail to be deployed. For details about the conflicting devices and conflict causes, see the conflicting device and conflicting path in the prompt information.

  10. Click Apply.

Follow-up Procedure

  • Check the topology of a VN.

    Move the cursor over the icon of the target VN and click to view the VN topology.

  • Check VN details.

    Move the cursor over the icon of the target VN and click to view the configuration details.

  • Modify a VN.

    Move the cursor over the icon of the VN to be modified, click , and modify VN parameters on the page that is displayed.

  • Delete a VN.

    Move the cursor over the icon of the VN to be deleted and click to delete it.

  • VLAN pool management

    Click VLAN Pool Management to create or modify a VLAN pool.

Parameters

Table 9-575 VN parameters

Parameter

Description

Name

VN name.

User gateway location

Service gateway of the VN.

  • To allow Layer 2 VN access, set this parameter to Outside the VXLAN fabric.
  • To allow Layer 3 VN access, set this parameter to Inside the VXLAN fabric.

User-defined VRF name

VRF name of a VN. The value is a string of 1 to 31 case-sensitive characters. It cannot contain spaces or question marks (?).

External network

External gateway of a VN. This parameter needs to be set if the users within the VN need to access the external network.

Network service resources

Network service resources of a VN. This parameter is configurable when users in the VN need to use the DHCP service or other servers. Multiple network service resources can be selected. However, two or more DHCP servers cannot be selected simultaneously.

User gateway (Automatic Allocation)

Name

When a subnet is automatically created, the rule for generating the subnet name is as follows:

  • IPv4:user_V4_dyn_192_192_192_192
  • IPv6:user_V6_dyn_FC00_0000_130F_0000_0000_09C0_876A_130B
  • IPv4&IPv6:user_V4&V6_dyn_192_192_192_192

In the preceding information, dyn indicates the VLAN type, and 192_192_192_192 and FC00_0000_130F_0000_0000_09C0_876A_130B indicate the gateway address.

Number of subnets

Number of subnets to be automatically created. After you set the number of subnets to create, subnet mask, and start address, iMaster NCE-Campus will automatically deliver the subnet configuration.

IP Type

Type of an IP address. The value can be IPv4 or IPv6.

IPv4/IPv6 subnet mask

Subnet mask.

Start IPv4 address/Start IPv6 address

Start IP address of a subnet.

VLAN type

VLAN type. The options include:
  • VLAN Pool: A VLAN pool is a set of VLANs designed to simplify network deployment. This option applies to user authentication and authorization. The administrator plans VLANs for users in a VN as a VLAN pool. After users are successfully authenticated and authorized, switches allocate VLANs to the users from the VLAN pool.
  • Dynamic VLAN: VLANs are dynamically allocated to users. This option applies to user authentication and authorization. Dynamic VLANs will not be statically allocated to device interfaces to which users connect.
  • Static VLAN: VLANs are assigned based on interfaces. Users access a VXLAN fabric through untagged or tagged VLANs. Only this option can be used when standalone WACs are deployed or in local forwarding scenarios.
  • Voice VLAN: Voice VLANs are used exclusively to forward voice packets.
  • Dynamic voice VLAN: Voice VLANs are dynamically allocated to users. This option applies to user authentication and authorization. Dynamic voice VLANs will not be statically allocated to device interfaces to which users connect.

VLAN pool name

This parameter needs to be set when VLAN type is set to VLAN Pool.

Start VLAN ID

Start VLAN ID of a subnet.

DHCP

Mode in which the DHCP server automatically assigns IP addresses to users on the subnet. When the service gateway is inside the VXLAN fabric:

  • The DHCP mode can be DHCP relay if Network technology is set to Virtualized VXLAN.
  • The DHCP mode can be DHCP server or DHCP relay if Network technology is set to Traditional VLAN.

DHCP Snooping

Whether to enable DHCP snooping for BDs or VLANs on the subnet. This function applies only to wired access users and allows users to go online only on user-side devices, not on tunnel-side devices. After DHCP snooping is enabled, a DHCP client can obtain an IP address from a valid DHCP server. In addition, DHCP snooping-enabled devices record mappings between IP addresses and MAC addresses of DHCP clients, and generate a DHCP snooping binding table to prevent DHCP attacks. This function needs to be enabled if terminal identification is required.

mDNS Snooping

Whether to enable mDNS snooping for BDs or VLANs on the subnet. This function needs to be enabled if terminal identification is required.

ND Snooping

This function can be enabled only when the IP address type is set to IPv6. Whether to enable ND snooping for BDs or VLANs on the subnet. This function can effectively defend against ND attacks.

IPSG

Whether to enable IPSG. IPSG can be enabled only after DHCP snooping is enabled. After IPSG is enabled, devices can check IP packets based on the DHCP snooping binding table to defend against attacks such as IP spoofing and MAC spoofing attacks.

DAI

Whether to enable Dynamic ARP inspection (DAI). DAI can be enabled only after DHCP snooping is enabled. After DAI is enabled, the device compares the source IP address, source MAC address, interface number, BD, and VLAN ID of an ARP packet with entries in the DHCP snooping binding table. If the ARP packet matches a binding entry, the device considers the ARP packet valid and allows the packet to pass through. Otherwise, the device considers the ARP packet invalid and discards the packet.

VLAN redistribution

The VLAN redistribution function can be enabled only after DHCP snooping is enabled. After the VLAN redistribution function is enabled, the VLANs in the VLAN pool can be reallocated.

User gateway (Manually Specified)

Name

Subnet name. When you create a subnet manually, the value is a string of 1 to 128 case-sensitive characters without spaces and question marks (?).

VLAN Type

VLAN type.
  • VLAN pool: A VLAN pool is a set of VLANs designed to simplify network deployment. This option applies to user authentication and authorization. The administrator plans VLANs for users in a VN as a VLAN pool. After users are successfully authenticated and authorized, switches allocate VLANs to users from the VLAN pool.
  • Dynamic VLAN: VLANs are dynamically allocated to users. This option applies to user authentication and authorization. Dynamic VLANs will not be statically allocated to device interfaces to which users connect.
  • Static VLAN: VLANs are assigned based on interfaces. Users access a VXLAN fabric through untagged or tagged VLANs. Only this option can be used when standalone WACs are deployed or in local forwarding scenarios.
  • Voice VLAN: Voice VLANs are used exclusively to forward voice packets.
  • Dynamic voice VLAN: Voice VLANs are dynamically allocated to users. This option applies to user authentication and authorization. Dynamic voice VLANs will not be statically allocated to device interfaces to which users connect.

VLAN pool name

This parameter needs to be set when VLAN type is set to VLAN Pool.

VLAN

VLAN ID of a subnet.

IP Type

Type of an IP address. The value can be IPv4 or IPv6.

IPv4 subnet/IPv6 subnet

Subnet IP address and mask.

IPv4 gateway address/IPv6 gateway address

Gateway IP address of a subnet.

DHCP

Mode in which the DHCP server assigns IP addresses to users in a subnet. When the service gateway is inside the VXLAN fabric:

  • When the network technology is Virtualized VXLAN, the DHCP mode can be DHCP relay.
  • When the network technology is Traditional VLAN, the DHCP mode can be DHCP server or DHCP relay.

DHCP Snooping

Whether to enable DHCP snooping for BDs or VLANs on the subnet. This function applies only to wired access users and allows users to go online only on user-side devices, not on tunnel-side devices. After DHCP snooping is enabled, a DHCP client can obtain an IP address from a valid DHCP server. In addition, DHCP snooping-enabled devices record mappings between IP addresses and MAC addresses of DHCP clients, and generate a DHCP snooping binding table to prevent DHCP attacks. This function needs to be enabled if terminal identification is required.

mDNS Snooping

Whether to enable mDNS snooping for BDs or VLANs on the subnet. This function needs to be enabled if terminal identification is required.

ND Snooping

This function can be enabled only when the IP address type is set to IPv6. Whether to enable ND snooping for BDs or VLANs on the subnet. This function can effectively defend against ND attacks.

IPSG

Whether to enable IPSG. IPSG can be enabled only after DHCP snooping is enabled. After IPSG is enabled, devices can check IP packets based on the DHCP snooping binding table to defend against attacks such as IP spoofing and MAC spoofing attacks.

DAI

Whether to enable Dynamic ARP inspection (DAI). DAI can be enabled only after DHCP snooping is enabled. After DAI is enabled, the device compares the source IP address, source MAC address, interface number, BD, and VLAN ID of an ARP packet with entries in the DHCP snooping binding table. If the ARP packet matches a binding entry, the device considers the ARP packet valid and allows the packet to pass through. Otherwise, the device considers the ARP packet invalid and discards the packet.

Description

Description of a VLAN. When the standalone WAC or local forwarding mode is used on a wireless network, user gateways only of the static VLAN type can be configured.

L2 Network

VLAN Type

VLAN type:
  • VLAN pool: A VLAN pool is a set of VLANs designed to simplify network deployment. This option applies to user authentication and authorization. The administrator plans VLANs for users in a VN as a VLAN pool. After users are successfully authenticated and authorized, switches allocate VLANs to users from the VLAN pool.
  • Dynamic VLAN: VLANs are dynamically allocated to users. This option applies to user authentication and authorization. Dynamic VLANs will not be statically allocated to device interfaces to which users connect.
  • Static VLAN: VLANs are assigned based on interfaces. Users access a VXLAN fabric network through untagged or tagged VLANs. Only this option can be used when standalone WACs are deployed or in local forwarding scenarios.
  • Voice VLAN: Voice VLANs are used exclusively to forward voice packets.
  • Dynamic voice VLAN: Voice VLANs are used exclusively to forward voice packets. This option applies to user authentication and authorization. Dynamic voice VLANs will not be statically allocated to device interfaces to which users connect.

VLAN pool name

This parameter needs to be set when VLAN type is set to VLAN Pool.

VLAN

VLAN ID of a Layer 2 network.

DHCP Snooping

Whether to enable DHCP snooping for BDs or VLANs on the subnet. This function applies only to wired access users and allows users to go online only on user-side devices, not on tunnel-side devices. After DHCP snooping is enabled, a DHCP client can obtain an IP address from a valid DHCP server. In addition, DHCP snooping-enabled devices record mappings between IP addresses and MAC addresses of DHCP clients, and generate a DHCP snooping binding table to prevent DHCP attacks. This function needs to be enabled if terminal identification is required.

mDNS Snooping

Whether to enable mDNS snooping for BDs or VLANs on the subnet. This function needs to be enabled if terminal identification is required.

IPSG

Whether to enable IPSG. IPSG can be enabled only after DHCP snooping is enabled. After IPSG is enabled, devices can check IP packets based on the DHCP snooping binding table to defend against attacks such as MAC spoofing attacks.

DAI

Whether to enable Dynamic ARP inspection (DAI). DAI can be enabled only after DHCP snooping is enabled. After DAI is enabled, the device compares the source MAC address, interface number, BD, and VLAN ID of an ARP packet with entries in the DHCP snooping binding table. If the ARP packet matches a binding entry, the device considers the ARP packet valid and allows the packet to pass through. Otherwise, the device considers the ARP packet invalid and discards the packet.

     

Wired Access

Name

Name of the authentication point.

Site

Name of the site where the service is to be deployed.

Port

User access port.

Authentication Mode

Authentication mode of the port.

Service VLAN

Untagged service VLAN used by a terminal, such as a PC, camera, and printer, directly connected to a switch to access the VXLAN network.

Voice VLAN

Voice VLAN used by an IP phone directly connected to a switch to access the VXLAN network.

Tagged VLAN

Tagged VLAN of the interface connecting the authentication device to a switch which is directly connected to terminals with packets transparently transmitted. You need to configure a tagged VLAN to allow packets to pass through this interface. Multiple tagged VLANs can be configured.

Wireless access

Site

Site where the service needs to be deployed.

Device name

Wireless access device where the service needs to be deployed.

Configuring Layer 2 Multicast

Fundamentals

Internet Group Management Protocol Snooping (IGMP snooping) is an IPv4 Layer 2 multicast protocol. With IGMP snooping, a Layer 2 multicast device analyzes IGMP messages exchanged between an upstream router and user hosts to create and maintain a Layer 2 multicast forwarding table. The device uses then these entries to control multicast packet forwarding. In this way, it prevents multicast data from being broadcast on Layer 2 networks. This not only saves network bandwidth, but also ensures network security. To configure IGMP snooping in VNs, you need to define and deploy an IGMP snooping template.

IGMP snooping is a basic Layer 2 multicast function that forwards and controls multicast traffic at the data link layer. IGMP snooping runs on a Layer 2 device and analyzes IGMP messages exchanged between a Layer 3 device and hosts to create and maintain a Layer 2 multicast forwarding table. Based on this table, the Layer 2 device forwards multicast packets at the data link layer.

In the following figure, after receiving multicast packets from a Layer 3 multicast device (Router), a Layer 2 multicast device (Switch) at the edge of the access layer forwards the multicast packets to receiver hosts, so that the receivers can watch the ordered programs. If Switch does not run IGMP snooping, it broadcasts multicast packets at Layer 2. After IGMP snooping is configured, Switch forwards multicast packets only to specified hosts.

With IGMP snooping configured, Switch listens to IGMP messages exchanged between hosts and the upstream Layer 3 device. It analyzes packet information (such as the packet type, group address, and receiving interface) to set up and maintain a Layer 2 multicast forwarding table, based on which it forwards multicast packets at the data link layer.

Figure 9-186 Multicast packet forwarding before and after IGMP snooping is configured on a Layer 2 device

Feature Requirements

If the multicast source is inside a VXLAN fabric network, only subnets of the static VLAN type can be selected when you configure Layer 2 multicast.

Prerequisites

An IGMP snooping profile has been configured. For details, see IGMP Snooping Profile.

Procedure

  1. Choose Provision > Virtual Network > VXLAN Virtual Network and click the Layer 2 multicast tab.
  2. Select a VXLAN fabric network on the left, click next to the VN where Layer 2 multicast needs to be configured, and click Create.

Parameter Description

Table 9-576 Description of Layer 2 multicast parameters

Parameter

Description

Subnet name

Meaning: Subnet where IGMP snooping needs to be configured.

Constraints:

The subnets whose VLAN type is voice VLAN or dynamic voice VLAN along with IPv6 subnets do not support IGMP snooping.

IGMP snooping profile

IGMP snooping profile bound to the subnet. The profile is used to set IGMP snooping parameters. You can choose Design > Basic Network Design > Template Management to configure an IGMP snooping profile.

Multicast source outside the VXLAN fabric

If the multicast source is not on the VXLAN fabric network, configure the device and port used to communicate with the multicast source.

IGMP querier location

Meaning: Select a device to act as the IGMP querier. A querier is responsible for sending IGMP Query messages to hosts and receiving IGMP Report messages and Leave messages from hosts. A querier can then learn which multicast group has receivers on the network segment connected to the interface receiving such messages.

Constraints: Only one IGMP querier can be configured for a network segment.

(Optional) Configuring VN Interconnection at Layer 3

Fundamentals

By default, devices in different VNs cannot communicate with each other. However, if VNs need to communicate and the security requirement is not high, you can configure the border node to allow communication between Layer 3 VNs.

Communication Between VXLAN Networks with a Centralized Gateway

Hosts in different BDs cannot directly communicate with each other at Layer 2. A Layer 3 VXLAN gateway is required to implement Layer 3 communication between the hosts.

In this gateway deployment mode, Layer 3 gateways are deployed on a single device. For example, on the network shown in the following figure, traffic across subnets is forwarded through Layer 3 gateways to implement centralized traffic management.

Figure 9-187 Communication between VXLAN networks with a centralized gateway

Communication Between VXLAN Networks with Distributed Gateways

In distributed gateway mode, Layer 2 and Layer 3 gateways are deployed on the same device. As shown in the following figure, the VTEPs on the VXLAN network function as Layer 2 gateways to connect to hosts, and also function as Layer 3 gateways to implement inter-subnet communication and external network access. This gateway deployment mode is supported only when VXLAN networks are deployed using BGP-EVPN.

Figure 9-188 Communication between VXLAN networks with distributed gateways

Feature Requirements

  • When configuring VN interconnection at Layer 3, note the following:
    • On a VXLAN fabric network with distributed gateways, ensure that Network technology of both the source VN and destination VN is set to Virtualized VXLAN, and User gateway location of both VNs is set to Inside the VXLAN fabric.
    • On a VXLAN fabric network with a centralized gateway, ensure that User gateway location of both the source VN and destination VN is set to Inside the VXLAN fabric.
    • The default VN cannot be configured to communicate with other VNs.
  • Interconnection between Layer 3 VNs cannot be transmitted. For example, if interconnection between VN 1 and VN 2 and between VN 2 and VN 3 is configured, VN 1 and VN 3 cannot communicate with each other. Interconnection between VN 1 and VN 3 needs to be configured separately.

Prerequisites

  • The VNs that need to access each other have been created.
  • An external gateway has been configured.

Procedure

  1. Choose Provision > Virtual Network > Logical Network and click the VN Configuration tab page.
  2. Select a specified VXLAN fabric network on the left and click VN Interwork in the upper right corner.
  3. Click Add and set parameters as needed.

Related Operations

  • Modifying VN interconnection configurations

    Select the VN interconnection configuration to be modified and click .

  • Delete a VN interconnection configuration.

    Select the VN interconnection configuration to be deleted and click .

Parameters

Table 9-577 Description of parameters for VN interworking

Parameter

Description

Name

Name of VN interworking.

Interworking Device

Border node to which static routes for VN communication are delivered. In a multi-border node scenario, you can select multiple border nodes to which static routes for VN communication are delivered.

Interworking Mode

It is used to configure whether all VNs between the source VN and destination VN can communicate with each other or only some subnets can communicate with each other.

IP address type

Type of an IP address. The value can be IPv4 or IPv6.

Source VN

Source and destination VNs that can interwork with each other.

Destination VN

Source IP Prefix

When the value of Interworking Mode is set to Partial Interwork, you can manually specify the subnets that can communicate with each other.

If the subnets represented by the IP prefixes of source and destination VNs cannot meet configuration requirements, you can manually enter the customized subnet IP prefixes.

Destination IP Prefix

Checking the Configuration Status

After the service configuration is complete, you can query the service configuration status.

Procedure

  1. Choose Provision > Virtual Network > VXLAN Fabric Management, click to select a VXLAN fabric network from the drop-down list box, and click the Network Management tab.
  2. Click next to the VXLAN fabric name to expand the VXLAN fabric list. Click in the row that contains the desired VXLAN fabric or Configuration Status to view the VXLAN fabric configuration result.

  3. Choose Provision > Virtual Network > Logic Network.
  4. Click next to the VXLAN fabric to view its configuration result.

Troubleshooting

If Failed is displayed in the Configuration Status column, click to redeliver the configuration. If the fault persists, click to redeliver full configurations to rectify the fault.

  • During configuration delivery, the service card of the device is not registered.
  • The device does not respond with any acknowledgement packet. As a result, iMaster NCE-Campus considers that the configuration delivery times out on the device after a period of time.
  • An exception, for example, a database fault, occurs on iMaster NCE-Campus when it processes the response from the device. As a result, iMaster NCE-Campus fails to update the configuration status of the device.
  • During VN deletion and modification, online or per-authenticated users may exist on VN subnets. In this case, you need to redeliver the deletion or modification data after these users go offline.
  • If there are site configurations that fail to be delivered, you need to restore site configurations before redelivering the VXLAN fabric configuration by clicking . Otherwise, the VXLAN fabric configuration cannot be redelivered.