From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id 5A0F562221 for ; Fri, 11 Feb 2022 10:34:20 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 35E8A26D8C for ; Fri, 11 Feb 2022 10:34:19 +0100 (CET) Received: from bastionodiso.odiso.net (bastionodiso.odiso.net [IPv6:2a0a:1580:2000::2d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS id 0EA2026D26 for ; Fri, 11 Feb 2022 10:34:18 +0100 (CET) Received: from kvmformation3.odiso.net (formationkvm3.odiso.net [10.3.94.12]) by bastionodiso.odiso.net (Postfix) with ESMTP id DADC816ACDB; Fri, 11 Feb 2022 10:34:17 +0100 (CET) Received: by kvmformation3.odiso.net (Postfix, from userid 0) id D7C511294F4; Fri, 11 Feb 2022 10:34:17 +0100 (CET) From: Alexandre Derumier To: pve-devel@lists.proxmox.com Date: Fri, 11 Feb 2022 10:34:17 +0100 Message-Id: <20220211093417.610806-2-aderumier@odiso.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220211093417.610806-1-aderumier@odiso.com> References: <20220211093417.610806-1-aderumier@odiso.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 0 AWL 0.001 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% HEADER_FROM_DIFFERENT_DOMAINS 0.248 From and EnvelopeFrom 2nd level mail domains are different KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment KAM_LAZY_DOMAIN_SECURITY 1 Sending domain does not have any anti-forgery methods NO_DNS_FOR_FROM 0.001 Envelope sender has no MX or A DNS records SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_NONE 0.001 SPF: sender does not publish an SPF Record T_SCC_BODY_TEXT_LINE -0.01 - Subject: [pve-devel] [PATCH pve-docs 1/1] sdn: update bgp/evpn documentation X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 11 Feb 2022 09:34:20 -0000 Signed-off-by: Alexandre Derumier --- pvesdn.adoc | 22 ++++++++++++++++++---- 1 file changed, 18 insertions(+), 4 deletions(-) diff --git a/pvesdn.adoc b/pvesdn.adoc index 223ba6d..1f32a8e 100644 --- a/pvesdn.adoc +++ b/pvesdn.adoc @@ -229,18 +229,30 @@ plugins section) VNet MAC address:: A unique anycast MAC address for all VNets in this zone. Will be auto-generated if not defined. -Exit Nodes:: This is used if you want to define some proxmox nodes, as exit +Exit Nodes:: Optionnal. This is used if you want to define some proxmox nodes, as exit gateway from evpn network through real network. The configured nodes will announce a default route in the EVPN network. +Primary Exit Node:: Optionnal. If you use multiple exit-nodes, this force traffic + to a primary exit-node instead loadbalancing on all nodes. + This is required if you want to use Snat or if your upstream router don't support + ecmp. + +Exit Nodes local routing:: Optional. This is a special option if you need to + reach a vm/ct service from an exit node. (By default, the exit nodes only + allow forwarding traffic between real network and evpn network). + Advertise Subnets:: Optional. If you have silent vms/CT (for example, multiples ips by interfaces, and the anycast gateway don't see traffic from theses ips, the ips addresses won't be able to be reach inside the evpn network). This option will announce the full subnet in the evpn network in this case. -Exit Nodes local routing:: Optional. This is a special option if you need to - reach a vm/ct service from an exit node. (By default, the exit nodes only - allow forwarding traffic between real network and evpn network). +Disable Arp-Nd Suppression:: Optional. Don't suppression arp or nd packets. + This is required if you use moving virtual ip in your guests vm. + (Ip is moving but mac address change) + +Route-target import:: Optional. Allow to import a list of external evpn route-targets. + For Cross-DC or differents evpn networks interconnect. MTU:: because VXLAN encapsulation use 50 bytes, the MTU needs to be 50 bytes lower than the maximal MTU of the outgoing physical interface. @@ -357,6 +369,8 @@ loopback:: If you want to use a loopback or dummy interface as source for the ebgp-mutltihop:: if the peers are not directly connected or use loopback, you can increase the number of hops to reach them. +bgp-multipath-as-path-relax:: Allow to do ECMP if your peers have differents ASN. + [[pvesdn_config_ipam]] IPAMs ----- -- 2.30.2