From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id 2264D78479 for ; Thu, 29 Apr 2021 23:58:45 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 113FC21EF4 for ; Thu, 29 Apr 2021 23:58:45 +0200 (CEST) Received: from kvmformation3.odiso.net (globalOdiso.M6Lille.odiso.net [89.248.211.242]) by firstgate.proxmox.com (Proxmox) with ESMTP id 5FCFB21EE9 for ; Thu, 29 Apr 2021 23:58:41 +0200 (CEST) Received: by kvmformation3.odiso.net (Postfix, from userid 0) id 2B3EA92176; Thu, 29 Apr 2021 23:58:41 +0200 (CEST) From: Alexandre Derumier To: pve-devel@lists.proxmox.com Date: Thu, 29 Apr 2021 23:58:40 +0200 Message-Id: <20210429215840.2107592-1-aderumier@odiso.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 1 AWL -0.164 Adjusted score from AWL reputation of From: address HEADER_FROM_DIFFERENT_DOMAINS 0.25 From and EnvelopeFrom 2nd level mail domains are different KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment KAM_LAZY_DOMAIN_SECURITY 1 Sending domain does not have any anti-forgery methods KHOP_HELO_FCRDNS 0.399 Relay HELO differs from its IP's reverse DNS NO_DNS_FOR_FROM 0.379 Envelope sender has no MX or A DNS records SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_NONE 0.001 SPF: sender does not publish an SPF Record Subject: [pve-devel] [PATCH pve-docs] update sdn doc X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Apr 2021 21:58:45 -0000 Signed-off-by: Alexandre Derumier --- pvesdn.adoc | 23 ++++++++++++++--------- 1 file changed, 14 insertions(+), 9 deletions(-) diff --git a/pvesdn.adoc b/pvesdn.adoc index ccd0303..ecf0d25 100644 --- a/pvesdn.adoc +++ b/pvesdn.adoc @@ -182,6 +182,8 @@ bridge:: A local VLAN-aware bridge already configured on each local node service vlan:: The main VLAN tag of this zone +service vlan protocol:: allow to define a 802.1q (default) or 802.1ad service vlan type. + mtu:: Due to the double stacking of tags you need 4 more bytes for QinQ VLANs. For example, you reduce the MTU to `1496` if you physical interface MTU is `1500`. @@ -228,6 +230,8 @@ it must be different than VXLAN-id of VNets controller:: an EVPN-controller need to be defined first (see controller plugins section) +Vnet Mac Address:: An unique, anycast macaddress for all vnets in this zone. + Auto-generated if you don't define it. Exit Nodes:: This is used if you want to defined some proxmox nodes, as exit gateway from evpn network through real network. This nodes @@ -331,6 +335,8 @@ For BGP-evpn, it can be use to define a different ASN by node, so doing EBGP. Configuration options: +node:: The node of this BGP controller + asn:: A unique BGP ASN number. It's highly recommended to use private ASN number from the range (64512 - 65534) or (4200000000 - 4294967294), as else you could end up breaking, or get broken, by global routing by mistake. @@ -340,11 +346,11 @@ peers:: An IP list of peers you want to communicate with for the underlying ebgp:: If your peer's remote-AS is different, it's enabling EBGP. -node:: The node of this BGP controller - loopback:: If you want to use a loopback or dummy interface as source for the evpn network. (for multipath) +ebgp-mutltihop:: if the peers are not directly connected or use loopback, you can increase the + number of hops to reach them. [[pvesdn_config_ipam]] IPAMs @@ -811,6 +817,7 @@ id: myevpnzone vrf vxlan tag: 10000 controller: myevpnctl mtu: 1450 +vnet mac address: 32:F4:05:FE:6C:0A exitnodes: node1,node2 ---- @@ -819,28 +826,26 @@ Create the first VNet named `myvnet1' using the EVPN zone `myevpnzone'. id: myvnet1 zone: myevpnzone tag: 11000 -mac address: 8C:73:B2:7B:F9:60 #random generate mac address ---- -Create a subnet 10.0.1.0/24 with 10.0.1.1 as gateway +Create a subnet 10.0.1.0/24 with 10.0.1.1 as gateway on vnet1 ---- -id: 10.0.1.0/24 +subnet: 10.0.1.0/24 gateway: 10.0.1.1 ---- Create the second VNet named `myvnet2' using the same EVPN zone `myevpnzone', a -different IPv4 CIDR network and a different random MAC address than `myvnet1'. +different IPv4 CIDR network. ---- id: myvnet2 zone: myevpnzone tag: 12000 -mac address: 8C:73:B2:7B:F9:61 #random mac, need to be different on each vnet ---- -Create a different subnet 10.0.2.0/24 with 10.0.2.1 as gateway +Create a different subnet 10.0.2.0/24 with 10.0.2.1 as gateway on vnet2 ---- -id: 10.0.2.0/24 +subnet: 10.0.2.0/24 gateway: 10.0.2.1 ---- -- 2.20.1