Solved

VXLAN- NEXUX 1000 VTEP

Posted on 2013-01-22
3
520 Views
Last Modified: 2013-01-30
I am having trouble visualizing how the VMKernel or VTEP interface is situated within the nexus 1000v architecture.    How do the packets get directed.   The  VM connects to a VXLan port profile and is then directed out the interface that connects to the physical interface.  How and where does the  VTEP fit into this equation?
0
Comment
Question by:sectel
  • 2
3 Comments
 
LVL 11

Expert Comment

by:rharland2009
ID: 38806900
http://blogs.cisco.com/datacenter/digging-deeper-into-vxlan/

Based on the above blog, here's how I read it.

The VTEP is an entity with layer 2 on one side and layer 3 on the other. It collects info about the local layer 2 stuff, and uses its layer 3 side to pass that long to other VTEPs.
Not sure if that answers your question, but it makes sense!
0
 

Accepted Solution

by:
sectel earned 0 total points
ID: 38809953
I think I have the solution.

I found a good article that explaine the coding,

http://cirrusly.wordpress.com/2012/02/08/basic-vxlan-configuration/ 

Effectively there is five phases of configuration.

1) create a port profile for the external interface, this is a ethernet profile

2) create a VMKNIC profile.  This profile will be employed by the VMKernel NIC that will be used to provide a souse and destination to the VXLAN encapsulated packed.  Also, this interface has to be configured as VXLan capable.

3)On VCenter, create a Vmkernel nic and affix the profile listed above to this profile.  Provide an IP address to the Vmkernel interface

4)Globally turn on Segmentation and then create a Bridge-domain profile.  This profile is where the segment ID and multicast IP are created.

5)Create a port-profile to attach to the actual VM.   Map the bridge domain in (4) above to this port profile.

I am still a little confused as to where the Vmkernel nic created in phase 2 and 3 above logically fits within the design.  I am assuming that is must somehow logically get tied to the port profile created in phase 5 above but nothing I have read identifies the logical order.
0
 

Author Closing Comment

by:sectel
ID: 38834522
I provided the most accurate response
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is a guide to configure bridging on Cisco Routers.  This is something I never knew was possible until after making a few phone calls to Cisco.  Using bridging saved our company money by not requiring us to purchase a new switch.  Bridgi…
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now