Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Create the Overlay Networks

SUMMARY In this section, you are creating the overlay segmented networks on top of the physical fabric underlay.

Explanation of Procedure

With the fabric onboarded, you can route traffic from any device to any device, which is what you want for the physical network. You are now ready to create the logical networks that ride on top of this physical network. These are the overlay segmented networks that dictate which endpoint device can communicate with which other endpoint device. For example, you may want to create a segmented network for your finance department, another for your regular employee intranet, and yet another for your third-party contractors.

Creating overlay segmented networks, however, can be confusing especially if you’re working with CLIs that don’t explicitly distinguish between underlay and overlay parameters. Running the same routing protocols in both the underlay and the overlay, as is common in many data centers, can certainly add to the confusion.

Although you still need to know the difference between the underlay and the overlay, Contrail Command provides you with a simple user interface to create overlay segmented networks without requiring you to work with the corresponding underlay and overlay CLI commands. As with the underlay fabric, you work with the overlay segmented network as a whole rather than with each individual switch.

In order to minimize confusion between underlay (physical) and overlay (logical) terminology, Contrail Networking uses different terms for the overlay (Table 1).

Note:

This document refers to a segmented network as a segregated network in general and not necessarily as a single LAN segment or VLAN. In other words, a segmented network can consist of multiple VLANs and multiple subnets. A segmented network can only communicate with another segmented network through a security policy.

Note:

Contrail Networking was designed to serve both the enterprise (single-tenant) and service provider (multi-tenant) markets. To a new user of Contrail Networking, this flexibility can sometimes be confusing. To minimize confusion, this table explains the terminology in the context of a single-tenant network. The application of these concepts to multi-tenant networks may differ. In other words, Contrail Networking is a tool that allows you to abstract your network in different ways. How you abstract an enterprise network may be different from how you abstract a service provider network.

Table 1: Overlay Definitions for a Single-Tenant Network

Overlay Term

Meaning

Virtual network

A virtual network is an overlay bridged network.

An endpoint device attached to a virtual network has layer 2 reachability to any other endpoint device attached to the same virtual network regardless of which physical (underlay) LAN the device resides on.

Typically, a virtual network has a single subnet, but Contrail Networking allows you to define a virtual network with multiple subnets, which is akin to having a physical LAN or VLAN supporting secondary IP addressing.

Logical router

A logical router is analogous to a VRF or routing instance and performs routing for a single segmented network. A segmented network consists of one or more virtual networks. In other words, a logical router can bridge and route within and between the virtual networks it is connected to. It cannot route to unconnected virtual networks, which are other segmented networks. You will learn how to route between segmented networks in a later step.

The segmented network can have a single subnet or multiple subnets depending on whether you configure the logical router to route for one or more virtual networks.

The same logical router is instantiated on every physical device that acts as a router in the overlay. In a centrally-routed model, these are the spine switches. In an edge-routed model, these are the leaf switches.

Virtual port group

A virtual port group allows you to multi-home your BMS or VM endpoints and consists of one or more switch ports grouped together and presented to the virtual network as a single entity, similar to a LAG or MC-LAG.

For consistency, Contrail Networking requires an endpoint BMS or VM to attach to the virtual network through a virtual port group even if the attachment point is a single port, in which case the virtual port group consists of a single member.

Figure 1 shows the relationship between logical routers and virtual networks for a single-tenant network. A physical router can have multiple logical routers. Each logical router contains routes for a single segmented network, which is represented by one or more virtual networks. Each virtual network has a single subnet (typically) and attaches to endpoint devices through virtual port groups.

Figure 1: Logical Routers and Virtual Networks in a Single-Tenant NetworkLogical Routers and Virtual Networks in a Single-Tenant Network

Figure 2 shows the relationship between virtual port groups and physical interfaces. A virtual port group consists of one or more associations with physical interfaces and can be defined with VLANs.

Figure 2: Virtual Port GroupsVirtual Port Groups

A number of observations can be made from the relationships shown for a single-tenant network:

  • Endpoint devices (attached to a virtual port group) in virtual network 1 can freely communicate with endpoint devices in virtual network 2 because both of these virtual networks are connected to the same logical router. However, endpoint devices in virtual network 1 cannot communicate with endpoint devices in virtual network i unless you explicitly allow it because these virtual networks are connected to different logical routers.

  • While a logical router can connect to multiple virtual networks, the reverse is not true. Just as a LAN can only belong to a single VRF, a virtual network can only connect to a single logical router. In the hierarchy above, since virtual network 1 is connected to logical router 1, it cannot also be connected to logical router 2.

  • Furthermore, Contrail Networking allows you to define the scope of your VLANs and IP addresses. For enterprises, it is common for your VLANs and IP addresses to have enterprise-wide significance. For example, all devices using VLAN ID 100 are on the same VLAN even if they attach to different virtual port groups, and all IP addresses are unique even if they belong to different logical routers (routing instances).

Finally, when you create the overlay segmented networks, you have the option of defining a centrally-routed architecture or an edge-routed architecture:

  • In a centrally-routed architecture, the spine switches perform the VXLAN routing. All user traffic is encapsulated and sent through VXLAN tunnels that terminate on the spine switches. The spine switches decapsulate and route packets based on the inner overlay IP header.

  • In an edge-routed architecture, the leaf switches perform the VXLAN routing. The leaf switches decapsulate and route packets based on the inner overlay IP header.

To illustrate these concepts, this use case creates two overlay segmented networks and uses a centrally-routed model where each spine switch performs the routing. To do this, you define two virtual networks, one for each segmented network. Next, you define the logical routers that connect to these virtual networks and instantiate the logical routers onto the physical spine switches. Each spine switch therefore has two logical routers, with each logical router responsible for its own segmented network. You then create virtual port groups that you attach to the virtual networks.

Create Virtual Networks

  1. Select OVERLAY>Virtual Networks and click Create.

    The Create Virtual Network window appears.

  2. Create the first virtual network (Web-Net) using the settings in Table 2. Leave all other settings at their default values.
    Table 2: Settings for Web-Net

    Field

    Meaning

    Setting in this Example

    Name

    The name that you want to call this virtual network.

    Web-Net

    Subnets>Network IPAM

    The IP address allocation instance to use.

    default-domain:default:default-project:default-network-ipam

    This is the default IPAM instance.

    Subnets>CIDR

    The virtual network subnets.

    10.1.1.0/24

    Click Create.

  3. Create the second virtual network (DB-Net) using the settings in Table 3. Leave all other settings at their default values.
    Table 3: Settings for DB-Net

    Field

    Meaning

    Setting in this Example

    Name

    The name that you want to call this virtual network.

    DB-Net

    Subnets>Network IPAM

    The IP address allocation instance to use.

    default-domain:default:default-project:default-network-ipam

    This is the default IPAM instance. By using the same IPAM instance for both networks, all IP addresses have global scope within the enterprise.

    Subnets>CIDR

    The virtual network subnets.

    10.1.3.0/24

    Click Create.

  4. Optionally, go to MONITORING>Jobs to bring up the Jobs page and click on a job to see details on the configuration being pushed to the device for that job.

You have now created the two virtual networks, each with a single subnet (Figure 3). These virtual networks are not associated with any physical devices yet.

Figure 3: Virtual NetworksVirtual Networks

Create Logical Routers

  1. Select OVERLAY>Logical Routers to bring up the Logical Routers page and click Create.

    The Create Logical Router window appears.

  2. Create the first logical router (Web-LR) using the settings in Table 4. Leave all other settings at their default values.
    Table 4: Settings for Web-LR

    Field

    Meaning

    Setting in this Example

    Name

    The name you want to call this logical router.

    Web-LR

    Logical Router Type

    The type of routing you want this logical router to perform.

    VXLAN Routing

    Choose Fabric

    DC1-Fabric

    Connected networks

    The virtual network you want to connect to this logical router.

    Web-Net

    Extend to Physical Router

    The actual physical routers where you want to instantiate this logical router.

    DC1-Border-Spine-1

    DC1-Border-Spine-2

    Click Create.

  3. Create the second logical router (DB-LR) using the settings in Table 5. Leave all other settings at their default values..
    Table 5: Settings for DB-LR

    Field

    Meaning

    Setting in this Example

    Name

    The name you want to call this logical router.

    DB-LR

    Logical Router Type

    The type of routing you want this logical router to perform.

    VXLAN Routing

    Choose Fabric

    DC1-Fabric

    Connected networks

    The virtual network you want to connect to this logical router.

    DB-Net

    Extend to Physical Router

    The actual physical routers where you want to instantiate this logical router.

    DC1-Border-Spine-1

    DC1-Border-Spine-2

    Click Create.

  4. Optionally, go to MONITORING>Jobs to bring up the Jobs page and click on a job to see details on the configuration being pushed to the device for that job.

You have now created two logical routers and instantiated them on both border spine routers. You have also associated each logical router with one of the virtual networks you created in the previous procedure. Figure 4 shows logical router Web-LR instantiated on both spine switches and providing routing for the Web-Net virtual network and logical router DB-LR instantiated on both spine switches and providing routing for the DB-Net virtual network.

Figure 4: Logical RoutersLogical Routers

Create Virtual Port Groups

A virtual port group is a network entity (not a server entity) and is the sole means by which you attach a port to a virtual network. It provides a consistent attachment point regardless of whether you are attaching a single port or a port group. Members of the group can be from the same switch or from across switches such as in a multi-homed configuration.

  1. Select OVERLAY>Virtual Port Group to bring up the Virtual Port Group page and click Create.

    The Create Virtual Port Group page appears.

  2. Configure the first virtual port group (VPG-1-Web) using the settings in Table 6. Leave all other settings at their default values.
    Table 6: Settings for VPG-1-Web

    Field

    Meaning

    Setting in this Example

    Virtual Port Group Name

    The name you want to call this virtual port group.

    VPG-1-Web

    Fabric name

    The fabric where this virtual port group resides.

    DC1-Fabric

    Physical Interface

    The interface members of this virtual port group.

    The Available Physical Interface panel lists all the physical interfaces in the network that are available for assignment. Search for the interfaces using the case-insensitive search box and use the “>” at the end of the row to assign an interface to the group.

    xe-0/0/2 on DC1-Access-Leaf-1

    xe-0/0/2 on DC1-Access-Leaf-2

    VLAN>Network

    The virtual network to which you want to attach the virtual port group.

    Web-Net

    VLAN>VLAN ID

    The VLAN ID to use for the specified virtual network.

    If this is the first time you are attaching any virtual port group to the specified virtual network, you need to specify the VLAN ID you want use. Each subsequent time you attach any other virtual port group to this same virtual network, Contrail Networking automatically assigns the same VLAN ID.

    11

    Click Create.

  3. Configure the second virtual port group (VPG-3-DB) using the settings in Table 7. Leave all other settings at their default values.
    Table 7: Settings for VPG-3-DB

    Field

    Meaning

    Setting in this Example

    Virtual Port Group Name

    The name you want to call this virtual port group.

    VPG-3-DB

    Fabric name

    The fabric where this virtual port group resides.

    DC1-Fabric

    Physical Interface

    The physical interfaces that you want to assign to this virtual port group.

    The Available Physical Interface panel lists all the physical interfaces in the network that are available for assignment. Search for the interfaces using the case-insensitive search box and use the “>” at the end of the row to assign an interface to the group.

    xe-0/0/3 on DC1-Access-Leaf-2

    xe-0/0/3 on DC1-Access-Leaf-3

    Network

    The virtual network to which you want to attach the virtual port group.

    DB-Net

    VLAN ID

    The VLAN ID to use for the specified virtual network.

    If this is the first time you are attaching any virtual port group to the specified virtual network, you need to specify the VLAN ID you want use. Each subsequent time you attach any other virtual port group to this same virtual network, Contrail Networking automatically assigns the same VLAN ID.

    13

    Click Create.

  4. Optionally, go to MONITORING>Jobs to bring up the Jobs page and click on a job to see details on the configuration being pushed to the device for that job.
  5. Optionally, ping the 10.1.1.1 gateway from your 10.1.1.0/24 device and ping the 10.1.3.1 gateway from your 10.1.3.0/24 device.

You have now created two virtual port groups, one connecting to each virtual network.

Figure 5 and Figure 6 show the VPGs from the physical and logical perspective respectively. For context, these figures show the endpoint servers (compute devices), which have been configured outside of this use case.

Figure 5: Virtual Port Groups Physical ViewVirtual Port Groups Physical View
Figure 6: Virtual Port Groups Logical ViewVirtual Port Groups Logical View

Now that you have created both segmented networks, endpoints on each segmented network have full connectivity within their respective network, but no connectivity to endpoints on the other segmented network. If that meets your needs, then you are done. If, however, you want to allow communication between the two segmented networks, then you need to set up a PNF service chain, which is the next step in this use case.

Verify Routing Tables on the Spine Switch (Optional)

  1. Log in to DC1-Border-Spine-1 using your favorite SSH client.
  2. Look at the routing table summaries.

    You can see a routing table for each overlay segmented network, with routes for 10.1.1.0/24 and 10.1.3.0/24 directed out irb.11 and irb.12 respectively.

  3. Look at the individual overlay routing tables:

You can see how the overlay routes (10.1.1.0/24 and 10.1.3.0/24) map onto the underlay (192.168.11.13, 192.168.11.17, 192.168.11.21).