A solution is provided to enable cloud service provider customers/users to offer physical network services to virtualized workloads that use overlay technologies, such as a virtual Extensible local area network (VXLAN). For a virtual workload that uses an overlay technology, an identifier is received of a logical network to which the virtual workload connects and a policy for the logical network. Based on the identifier of the logical network and the policy, a gateway is configured to connect traffic for the virtual workload on the logical network to a particular virtual local area network (vlan) interface of the physical network service equipment on which the policy is configured.
|
1. A method comprising:
receiving an identifier of a logical network to which a virtual workload connects and a policy for the logical network, wherein the virtual workload is associated with an overlay technology; and
configuring, based on the identifier of the logical network and the policy, a gateway to connect traffic for the virtual workload on the logical network to a particular virtual local area network (vlan) interface of physical network service equipment on which the policy is configured, wherein the physical network service equipment is provisioned with a service context for each of a plurality of tenants.
8. One or more non-transitory computer readable storage media encoded with computer executable instructions that, when executed by a processor, cause the processor to:
receive an identifier of a logical network to which a virtual workload connects and a policy for the logical network, wherein the virtual workload is associated with an overlay technology; and
configure, based on the identifier of the logical network and the policy, a gateway to connect traffic for the virtual workload on the logical network to a particular virtual local area network (vlan) interface of physical network service equipment on which the policy is configured, wherein the physical network service equipment is provisioned with a service context for each of a plurality of tenants.
15. An apparatus comprising:
a network interface unit configured to enable network communications; and
a memory;
a processor coupled to the network interface unit and the memory, wherein the processor is configured to:
process a received identifier of a logical network to which a virtual workload connects and a policy for the logical network, wherein the virtual workload is associated with an overlay technology; and
configure, based on the identifier of the logical network and the policy, a gateway to connect traffic for the virtual workload on the logical network to a particular virtual local area network (vlan) interface of physical network service equipment on which the policy is configured, wherein the physical network service equipment is provisioned with a service context for each of a plurality of tenants.
0. 39. An apparatus comprising:
a network interface unit configured to enable network communications; and
a memory;
a processor coupled to the network interface unit and the memory, wherein the processor is configured to:
process a received identifier of a logical network to which a virtual workload connects and a policy for the logical network, wherein the virtual workload is associated with an overlay technology; and
configure, based on the identifier of the logical network and the policy, a gateway to connect traffic for the virtual workload on the logical network to a particular virtual local area network (vlan) interface of physical network service equipment on which the policy is configured, wherein the physical network service equipment is provisioned with a service context for each of a plurality of tenants,
wherein the gateway is a logical network to virtual network gateway, and the apparatus is configured to:
receive an overlay segment identifier;
configure the gateway to connect traffic for the identified overlay segment of the logical network to a particular vlan, identified by a vlan identifier; and
use the gateway to connect traffic between the logical network and a physical network connected to the physical network service equipment in accord with the policy, wherein the traffic in the logical network is isolated in part using the overlay segment identifier, and the traffic in the physical network is isolated in part using the vlan identifier.
2. The method of
3. The method of
publishing information pertaining to the policies preconfigured on the physical network service equipment and corresponding vlan identifiers to a cloud management platform;
configuring a pool of VXLAN-based networks for each tenant in the cloud management platform; and
selecting a policy when a network is allocated from a particular tenant's pool of networks and generating information comprising a VXLAN segment identifier and a policy identifier;
wherein configuring the gateway is based on the VXLAN segment identifier and the policy identifier.
4. The method of
creating a tenant context on the physical network service equipment when a tenant is provisioned in a cloud management platform;
configuring a pool of VXLAN-based networks for each tenant in the cloud management platform;
generating information comprising a policy, VXLAN segment identifier and tenant identifier based on the pool of VXLAN-based networks configured;
allocating a vlan for a newly instantiated tenant network and creating a vlan interface on the physical network service equipment;
configuring the policy obtained from the cloud management platform on the vlan interface in the physical network service equipment within a tenant context based on the tenant identifier; and
wherein configuring the gateway comprises configuring a VXLAN/vlan gateway to connect the VXLAN-based tenant network to the vlan interface on the physical network service equipment based on the VXLAN segment identifier.
5. The method of
provisioning the physical network service equipment with the service context for each tenant; and
configuring the physical network service equipment with multiple policies, each policy within a service context for a particular tenant and having a policy identifier, and one vlan being associated with each policy.
6. The method of
7. The method of
9. The non-transitory computer readable storage media of
10. The non-transitory computer readable storage media of
publish information pertaining to the policies preconfigured on the physical network service equipment and corresponding vlan identifiers to a cloud management platform;
configure a pool of VXLAN-based networks for each tenant in the cloud management platform; and
select a policy when a network is allocated from a particular tenant's pool of networks and generating information comprising a VXLAN segment identifier and a policy identifier;
wherein the instructions that cause the processor to configure comprise instructions that cause the processor to configure the gateway based on the VXLAN segment identifier and the policy identifier.
11. The non-transitory computer readable storage media of
create a tenant context on the physical network service equipment when a tenant is provisioned in a cloud management platform;
configure a pool of VXLAN-based networks for each tenant in the cloud management platform;
generate information comprising a policy, VXLAN segment identifier and tenant identifier based on the pool of VXLAN-based networks configured;
allocate a vlan for a newly instantiated tenant network and creating a vlan interface on the physical network service equipment; and
configure the policy obtained from the cloud management platform on the vlan interface in the physical network service equipment within a tenant context based on the tenant identifier; and
wherein the instructions operable to configure the gateway comprises instructions operable to configure a VXLAN/vlan gateway to connect the VXLAN-based tenant network to the vlan interface on the physical network service equipment based on the VXLAN segment identifier.
12. The non-transitory computer readable storage media of
provision the physical network service equipment with the service context for each tenant; and
configure the physical network service equipment with multiple policies, each policy within a service context for a particular tenant and having a policy identifier, and one vlan being associated with each policy.
13. The non-transitory computer readable storage media of
14. The non-transitory computer readable storage media of
16. The apparatus of
17. The apparatus of
publish information pertaining to the policies preconfigured on the physical network service equipment and corresponding vlan identifiers to a cloud management platform; configure a pool of VXLAN-based networks for each tenant in the cloud management platform;
select a policy when a network is allocated from a particular tenant's pool of networks and generating information comprising a VXLAN segment identifier and a policy identifier; and
configure the gateway based on the VXLAN segment identifier and the policy identifier.
18. The apparatus of
create a tenant context on the physical network service equipment when a tenant is provisioned in a cloud management platform;
configure a pool of VXLAN-based networks for each tenant in the cloud management platform;
generate information comprising a policy, VXLAN segment identifier and tenant identifier based on the pool of VXLAN-based networks configured;
allocate a vlan for a newly instantiated tenant network and creating a vlan interface on the physical network service equipment;
configure the policy obtained from the cloud management platform on the vlan interface in the physical network service equipment within a tenant context based on the tenant identifier; and
configure a VXLAN/vlan gateway to connect the VXLAN-based tenant network to the vlan interface on the physical network service equipment based on the VXLAN segment identifier.
19. The apparatus of
provision the physical network service equipment with the service context for each tenant; and
configure the physical network service equipment with multiple policies, each policy within a service context for a particular tenant and having a policy identifier, and one vlan being associated with each policy.
20. The apparatus of
0. 21. The method of claim 1, wherein receiving an identifier of a logical network includes receiving an overlay segment identifier;
wherein the gateway is a logical network to virtual network gateway and configuring includes configuring the gateway to connect traffic for the identified overlay segment of the logical network to a particular vlan, identified by a vlan identifier; and
using the gateway to connect traffic between the logical network and a physical network connected to the physical network service equipment in accord with the policy, wherein the traffic in the logical network is isolated in part using the overlay segment identifier, and the traffic in the physical network is isolated in part using the vlan identifier.
0. 22. The method of claim 21, wherein the policy is applied to the physical network service equipment, and wherein the physical network service equipment includes at least one of firewall equipment, load balancer equipment, or a switch.
0. 23. The method of claim 22, wherein the policy applied for a first tenant in the plurality of tenants differs from the policy applied for a second tenant in the plurality of tenants.
0. 24. The method of claim 22, wherein a single vlan is associated with a tenant.
0. 25. The method of claim 22, wherein multiple vlans are associated with a tenant.
0. 26. The method of claim 22, wherein multiple virtual network segments are associated with a tenant.
0. 27. The method of claim 21, further comprising:
creating a tenant context on the physical network service equipment when a tenant is provisioned in a cloud management platform;
configuring at least one overlay-based virtual network for the tenant in the cloud management platform;
generating the policy as a generated policy to be applied to the physical network service equipment, wherein the physical network service equipment includes at least one of firewall equipment, load balancer equipment, or a switch;
creating a vlan interface on the physical network service equipment;
connecting the vlan interface to the overlay-based virtual network identified by the overlay segment identifier; and
configuring the physical network service equipment to act according to the generated policy when connecting traffic between the virtual and the physical network.
0. 28. The method of claim 21, further comprising:
provisioning the physical network service equipment with the service context for each tenant; and
configuring the physical network service equipment with multiple policies, each policy within a service context for a particular tenant.
0. 29. The method of claim 28, further comprising, through a cloud management platform, defining a policy for each logical network to which virtual machines within a service context connect.
0. 30. The non-transitory computer readable storage media of claim 8, wherein the instructions that cause the processor to receive an identifier of a logical network include instructions that cause the processor to receive an overlay segment identifier;
wherein the gateway is a logical network to virtual network gateway and the instructions that cause the processor to configure include instructions that cause the processor to configure the gateway to connect traffic for the identified overlay segment of the logical network to a particular vlan, identified by a vlan identifier; and
wherein the instructions are configured to cause the processor to use the gateway to connect traffic between the logical network and a physical network connected to the physical network service equipment in accord with the policy, wherein the traffic in the logical network is isolated in part using the overlay segment identifier, and the traffic in the physical network is isolated in part using the vlan identifier.
0. 31. The non-transitory computer readable storage media of claim 30, wherein the policy is applied to the physical network service equipment, and wherein the physical network service equipment includes at least one of firewall equipment, load balancer equipment, or a switch.
0. 32. The non-transitory computer readable storage media of claim 31, wherein the policy applied for a first tenant in the plurality of tenants differs from the policy applied for a second tenant in the plurality of tenants.
0. 33. The non-transitory computer readable storage media of claim 31, wherein a single vlan is associated with a tenant.
0. 34. The non-transitory computer readable storage media of claim 31, wherein multiple vlans are associated with a tenant.
0. 35. The non-transitory computer readable storage media of claim 31, wherein multiple virtual network segments are associated with a tenant.
0. 36. The non-transitory computer readable storage media of claim 30, wherein the instructions further cause the processor to:
create a tenant context on the physical network service equipment when a tenant is provisioned in a cloud management platform;
configure at least one overlay-based virtual network for the tenant in the cloud management platform;
generating the policy as a generated policy to be applied to the physical network service equipment, wherein the physical network service equipment includes at least one of firewall equipment, load balancer equipment, or a switch;
create a vlan interface on the physical network service equipment;
connect the vlan interface to the overlay-based virtual network identified by the overlay segment identifier; and
configure the physical network service equipment to act according to the generated policy when connecting traffic between the virtual and the physical network.
0. 37. The non-transitory computer readable storage media of claim 30, wherein the instructions further cause the processor to:
provision the physical network service equipment with the service context for each tenant; and
configure the physical network service equipment with multiple policies, each policy within a service context for a particular tenant.
0. 38. The non-transitory computer readable storage media of claim 37, wherein the instructions further cause the processor to, through a cloud management platform, define a policy for each logical network to which virtual machines within a service context connect.
0. 40. The apparatus of claim 39, wherein the policy is applied to the physical network service equipment, and wherein the physical network service equipment includes at least one of firewall equipment, load balancer equipment, or a switch.
0. 41. The apparatus of claim 40, wherein the policy applied for a first tenant in the plurality of tenants differs from the policy applied for a second tenant in the plurality of tenants.
0. 42. The apparatus of claim 40, wherein a single vlan is associated with a tenant.
0. 43. The apparatus of claim 40, wherein multiple vlans are associated with a tenant.
0. 44. The apparatus of claim 40, wherein multiple virtual network segments are associated with a tenant.
0. 45. The apparatus of claim 39, wherein the processor is further configured to:
create a tenant context on the physical network service equipment when a tenant is provisioned in a cloud management platform;
configure at least one overlay-based virtual network for the tenant in the cloud management platform;
generate the policy as a generated policy to be applied to the physical network service equipment, wherein the physical network service equipment includes at least one of firewall equipment, load balancer equipment, or a switch;
create a vlan interface on the physical network service equipment;
connect the vlan interface to the overlay-based virtual network identified by the overlay segment identifier; and
configure the physical network service equipment to act according to the generated policy when connecting traffic between the virtual and the physical network.
0. 46. The apparatus of claim 39, wherein the processor is further configured to:
provision the physical network service equipment with the service context for each tenant; and
configure the physical network service equipment with multiple policies, each policy within a service context for a particular tenant.
0. 47. The apparatus of claim 46, wherein the processor is configured to, through a cloud management platform, define a policy for each logical network to which virtual machines within a service context connect.
|
This application is a continuation of U.S. patent application Ser. No. 13/789,721, filed Mar. 8, 2013, which claims priority to U.S. Provisional Application No. 61/736,577, filed Dec. 13, 2012. The entirety of these applications is incorporated herein by reference.
The present disclosure relates to virtual switches that use overlay technologies.
Virtualization of workloads has become pervasive and there is a need for customers to be able to use the existing installed base of physical network services (such as firewalls, load balancers etc.) to offer network service capability to the virtualized workloads in the same way as in the physical environment, in an on-demand, dynamic fashion, particularly in cloud service provider environments.
In the physical (baremetal) environment, application traffic is assigned to a specific virtual local area network (VLAN) to be sent to the firewall and the traffic from the firewall is sent on another VLAN for ultimate transmission to the network service. To satisfy the needs of large scale multi-tenancy requirements, overlay technologies such as Virtual Extensible LANs (VXLANs) are becoming popular. However, there is no easy way to offer physical network services (such as firewall services) for virtualized workloads using an overlay technology.
A solution is provided to enable cloud service provider customers/users to offer physical network services to virtualized workloads that use overlay technologies, such as a Virtual Extensible Local Area Network (VXLAN). For a virtual workload that uses an overlay technology, an identifier is received of a logical network to which the virtual workload connects and a policy for the logical network. Based on the identifier of the logical network and the policy, a gateway is configured to connect traffic for the virtual workload on the logical network to a particular virtual local area network (VLAN) interface of the physical network service equipment on which the policy is configured.
A solution is presented herein that configures a gateway entity and one or more physical networking services so as to extend the physical networking services to virtualized network endpoints.
Reference is first made to
On the left side of the diagram, there is a virtual switch 30 running in a hypervisor 40 in a data center. The data center and its supporting equipment are not shown in
VXLAN is a technology to allow for “floating” virtual domains on top of a common networking and virtualization infrastructure. By leveraging industry-standard Ethernet technology, large numbers of virtual domains can be created, which can be isolated from each other and the underlying network. VXLAN provides the capability to create isolated, multi-tenant broadcast domains across data center fabrics, allowing for the creation of logical networks that span physical network boundaries.
VXLAN can be used to abstract a network into a generalized pool of network capacity. The use of these services can be separated from the underlying physical infrastructure. This pool can span physical boundaries, optimizing compute resource utilization across clusters, pods and even geographically separated datacenters. The pool of network capacity can be segmented into logical networks directly associated with specific applications.
VXLAN operates by creating Layer 2 logical networks that are encapsulated in standard Layer 3 IP packets. A “Segment ID” in every frame differentiates the individual logical networks (VXLANs) from each other. Numerous isolated Layer 2 VXLAN networks can therefore co-exist on a common Layer 3 infrastructure.
An example of another overlay technology that may be used, as an alternative to VXLAN, is Network Virtualization using Generic Routing Encapsulation (NVGRE).
A virtual service 70 is in communication with the virtual switch 30. Examples of a virtual service 70 include a Virtual Security Gateway (VSG) that serves as a virtual firewall appliance providing trusted access to virtual data center and cloud environments, a Virtual Wide Area Application Services (vWAAS) for application acceleration in private and public cloud environments, and a cloud router. There are virtual workloads, e.g., virtual machines, shown at reference numeral 80 in
The arrangement shown in
Reference is now made to
A tie-in is built between the VXLAN segment_id that a virtual machine (VM) is using with the VLAN that is needed to transport the traffic to the appropriate context that is configured in the physical network service equipment, e.g., a firewall context in the case where the physical network service equipment is a firewall.
Turning now to
Each VM is created within a tenant container. At step 120, through the physical services manager 94, a customer provisions the physical network service equipment 20 with a context for each tenant. Tenant VM policies are configured within each context. One or more VLANs may be associated with each context. Thus, each context contains multiple VLAN interfaces, each with its own policy configuration.
At 130, using the CMP 90, a user/customer acting on behalf of a tenant, defines a policy for each logical network (e.g., VXLAN) to which VMs connect. This policy is to be enforced by the physical network service equipment 20.
At 140, the CMP 90 sends the logical network identifier, tenant_id and policy information (VXLAN segment_id, tenant_id, policy) to the physical services manager 94. At 150, the physical services manager 94 configures the VXLAN/VLAN gateway 50 to connect the VXLAN segment to the VLAN_id on which the policy will be applied. At 160, the physical services manager 94 defines the policy on the physical network service equipment 20 within the given tenant's service context and instructs it to apply it on the VLAN_id to which the VXLAN segment is connected. The VXLAN/VLAN gateway 50 bridges traffic between a particular VXLAN segment_id (e.g. VXLAN 5500) and a VLAN_id (e.g. VLAN-55). In this example, VLAN 55 belongs to a particular context. The contexts and the associated security policies may be pre-provisioned in the physical network service equipment 20.
The CMP 90 will send this information (VXLAN segment_id, VLAN_id, context_name) to the physical services manager 94 which in turn configures the VXLAN/VLAN gateway 50 (for the VXLAN to VLAN mapping) and the physical services network equipment 20 for the VLAN to the context-name mapping.
Once this is setup, the VMs that connect to the network will send their traffic on that specific VXLAN segment-id through the virtual switch and to the VXLAN/VLAN gateway 50. The VXLAN/VLAN gateway 50 will bridge that traffic to the correct VLAN as defined in the mapping. The physical network service equipment 20 will apply the appropriate policy to the traffic as defined in the VLAN-context mapping. This process does not require any changes to the existing physical network service equipment 20.
Reference is now made to
Turning now to
The memory 420 may comprise read only memory (ROM), random access memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. Thus, in general, the memory 420 may comprise one or more tangible (non-transitory) computer readable storage media (e.g., a memory device) encoded with software comprising computer executable instructions and when the software is executed (by the processor 410) it is operable to perform the operations described herein. More specifically, stored/encoded in memory 420 are instructions for physical services manager process logic 500, that when executed by processor 410, cause the processor 410 to perform the operations described herein for the CMP 90, virtual services manager 92 and physical services manager 94 in connection with
In summary, the foregoing solution provides for automated on-demand provisioning to leverage the installed base of physical network services. From a method perspective, a method is providing in which, for a virtual workload that uses an overlay technology, receiving an identifier of a logical network to which the virtual workload connects and a policy for the logical network; and based on the identifier of the logical network and the policy, configuring a gateway to connect traffic for the virtual workload on the logical network to a particular VLAN interface of the physical network service equipment on which the policy is configured.
This method may be embodied or implemented by computer executable instructions stored or encoded in a computer readable storage media, wherein the instructions are operable to: for a virtual workload that uses an overlay technology, receive an identifier of a logical network to which the virtual workload connects and a policy for the logical network; and based on the identifier of the logical network and the policy, configure a gateway to connect traffic for the virtual workload on the logical network to a particular VLAN interface of the physical network service equipment on which the policy is configured.
Further still, an apparatus, such as a computing apparatus, may be configured to perform these techniques. The apparatus comprises a network interface unit configured to enable network communications; a memory; and a processor coupled to the network interface unit and the memory, wherein the processor is configured to: for a virtual workload that uses an overlay technology, receive an identifier of a logical network to which the virtual workload connects and a policy for the logical network; and based on the identifier of the logical network and the policy, configure a gateway to connect traffic for the virtual workload on the logical network to a particular VLAN interface of the physical network service equipment on which the policy is configured.
The above description is intended by way of example only.
Sanzgiri, Ajit, Rajendran, Saravankumar
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
6735198, | Dec 21 1999 | Cisco Technology, Inc. | Method and apparatus for updating and synchronizing forwarding tables in a distributed network switch |
6807172, | Dec 21 1999 | Cisco Technology, Inc. | Method and apparatus for learning and switching frames in a distributed network switch |
7558960, | Oct 16 2003 | Cisco Technology, Inc. | Network infrastructure validation of network management frames |
7987272, | Dec 06 2004 | Cisco Technology, Inc. | Performing message payload processing functions in a network element on behalf of an application |
8037180, | Aug 27 2008 | Cisco Technology, Inc | Centralized control plane appliance for virtual infrastructure |
8274973, | Mar 24 2010 | Cisco Technology, Inc. | Virtual service domains |
8966035, | Apr 01 2009 | NICIRA, INC | Method and apparatus for implementing and managing distributed virtual switches in several hosts and physical forwarding elements |
9049115, | Dec 13 2012 | Cisco Technology, Inc. | Enabling virtual workloads using overlay technologies to interoperate with physical network services |
9069599, | Jun 19 2008 | VIDEOLABS, INC | System and method for a cloud computing abstraction layer with security zone facilities |
20070258464, | |||
20120281708, | |||
20120317136, | |||
20130044629, | |||
20130268643, | |||
20130297768, | |||
20130332982, | |||
20140016501, | |||
20140071983, | |||
20140096183, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 05 2013 | RAJENDRAN, SARAVANKUMAR | Cisco Technology, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 055445 | /0314 | |
Mar 05 2013 | SANZGIRI, AJIT | Cisco Technology, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 055445 | /0314 | |
Jan 17 2020 | Cisco Technology, Inc. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Jan 17 2020 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Apr 04 2024 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Apr 04 2024 | M1555: 7.5 yr surcharge - late pmt w/in 6 mo, Large Entity. |
Date | Maintenance Schedule |
Apr 12 2025 | 4 years fee payment window open |
Oct 12 2025 | 6 months grace period start (w surcharge) |
Apr 12 2026 | patent expiry (for year 4) |
Apr 12 2028 | 2 years to revive unintentionally abandoned end. (for year 4) |
Apr 12 2029 | 8 years fee payment window open |
Oct 12 2029 | 6 months grace period start (w surcharge) |
Apr 12 2030 | patent expiry (for year 8) |
Apr 12 2032 | 2 years to revive unintentionally abandoned end. (for year 8) |
Apr 12 2033 | 12 years fee payment window open |
Oct 12 2033 | 6 months grace period start (w surcharge) |
Apr 12 2034 | patent expiry (for year 12) |
Apr 12 2036 | 2 years to revive unintentionally abandoned end. (for year 12) |