VxLAN | Part 2 - Header Format and Encapsulation

แชร์
ฝัง
  • เผยแพร่เมื่อ 2 พ.ย. 2024

ความคิดเห็น • 130

  • @jbazzari6332
    @jbazzari6332 6 ปีที่แล้ว +19

    PERFECT , NEVER SEEN ANYONE DESCRIBED VXLAN BETTER THAN IN THIS SERIES A+++

  • @NetworkDirection
    @NetworkDirection  6 ปีที่แล้ว +14

    Welcome to part 2! I hope you enjoy it.
    I've moved up the schedule, so a new episode of VxLAN every week.
    Next week, the spine/leaf topology

    • @nabilnettour3880
      @nabilnettour3880 6 ปีที่แล้ว +1

      Good presenter, good video. Thank you.

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว

      Thank you Nabil, I appreciate that

    • @johnny-mnemonic13
      @johnny-mnemonic13 6 ปีที่แล้ว +1

      Hi, i just found your channel! I finally get VxLAN! We are implementing this new technology in our company and I've never really grasped it... until now! I will let all my co-workers know about your channel.

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว

      Thanks! Glad you like it!

  • @incrediblestevrhymz2260
    @incrediblestevrhymz2260 2 ปีที่แล้ว

    Cisco ACI brought me here...Excellent explanation

  • @mateuszsmendowski2677
    @mateuszsmendowski2677 4 ปีที่แล้ว +4

    Incredibly professional and concise. Definitely, the best network channel I've ever seen!

  • @saimkhan89
    @saimkhan89 5 ปีที่แล้ว +2

    The best explanation of VXLAN on the internet. Great animations. We need more videos like this for other topics in the TCP/IP stack which are difficult to understand.

  • @anonwolf2230
    @anonwolf2230 2 ปีที่แล้ว +1

    Awesome video , very descriptive and easy to understand

  • @Aheffernan09
    @Aheffernan09 6 ปีที่แล้ว +1

    Fresh approach and straight to the point, Excellent work.

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว

      Thanks Aaron, I tried to take a different approach, as when I learned VXLAN, I found most resources were overly complicated. I hope I've made it simple

  • @mrflorida55
    @mrflorida55 2 ปีที่แล้ว

    Great simple to understand format no BS! Same issue with vxlan as with tunnel solutions with MTU and fragmentation. It is possible to reduce MTU on end station to eliminate net fragmentation, however its more difficult to manage.

  • @nissan5563
    @nissan5563 3 ปีที่แล้ว

    You are really awesome! You visualize everything so perfectly which makes us understand so easily.

  • @henrybernard2591
    @henrybernard2591 6 ปีที่แล้ว +2

    I spent hours reading Cisco doc when I put this together on some Nexus 9ks. Wish this was out then!! Thanks!

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว

      I know your pain!
      I also spent hours reading the docs and watching the Cisco Live videos... Worth it in the end though.

  • @andaluspc
    @andaluspc 5 ปีที่แล้ว +4

    Nice work editing the video. nice animation and nice explanation. Way to go Network Direction.

    • @NetworkDirection
      @NetworkDirection  5 ปีที่แล้ว +1

      Thanks. Took a lot of editing, that's for sure!

  • @simorwimu8357
    @simorwimu8357 ปีที่แล้ว +1

    Excellent, thank you for this information 🤩

  • @sliderkb2
    @sliderkb2 3 ปีที่แล้ว

    About to do a presentation on VxLAN EVPN Multisite and this was an amazing overview. Thanks for doing these!

    • @NetworkDirection
      @NetworkDirection  3 ปีที่แล้ว

      You're welcome, glad to be of assistance

  • @pielectro7253
    @pielectro7253 6 ปีที่แล้ว +1

    Very nice tutorial, looking forward the next episodes.

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว

      Good news Atanas, part 3 is now available
      th-cam.com/video/x1F-RCW9fqo/w-d-xo.html

  • @samanthayiu9300
    @samanthayiu9300 6 ปีที่แล้ว +1

    One of the best videos on VXLAN! Wow!

  • @anilkpat
    @anilkpat 3 ปีที่แล้ว +1

    Good Series...I like it. Thanks Network Direction.

  • @trclamar
    @trclamar 3 ปีที่แล้ว +1

    great video!

  • @moy2549
    @moy2549 3 ปีที่แล้ว +1

    Great content!

  • @rohitt21
    @rohitt21 ปีที่แล้ว

    Sir, thank you, very helpful explanation.

  • @JuanPereyra24
    @JuanPereyra24 6 ปีที่แล้ว +2

    Thank you for explaining! Awesome Videos.

  • @alitravel1001
    @alitravel1001 6 ปีที่แล้ว +1

    Fantastic Videos. Great job and many thanks.

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว

      Glad you like it, thanks for the feedback!

  • @chrischeng500
    @chrischeng500 2 ปีที่แล้ว

    excellent video...conducive voice for learning

  • @radouaneadnane8248
    @radouaneadnane8248 ปีที่แล้ว

    Thank you for those good explanations

  • @danet1212
    @danet1212 6 ปีที่แล้ว +5

    Hands down, it's awesome!

  • @ОлексійЗамша
    @ОлексійЗамша 2 ปีที่แล้ว

    perfect video about vxlan!

  • @viinodgehlot8260
    @viinodgehlot8260 5 ปีที่แล้ว

    Best way to explain I found, very helpful

  • @vincentvlk8289
    @vincentvlk8289 2 ปีที่แล้ว

    Great video series, thank you very much, for your hard work 🙂

  • @rs9196
    @rs9196 5 ปีที่แล้ว +1

    Amazing work and animation. Keep 'me coming!!

  • @harryh5582
    @harryh5582 2 ปีที่แล้ว +1

    PERFECT EXPLANATION!!!!!!!!!!! THX

  • @subhanazeem7549
    @subhanazeem7549 5 ปีที่แล้ว

    Amazing Work . . . Hats off to Network direction (L)

  • @antonstepbystep
    @antonstepbystep 2 ปีที่แล้ว +1

    perfect explanation

  • @vijaykrbansal5995
    @vijaykrbansal5995 ปีที่แล้ว

    Thanks for the excellent explanation. I have a couple of queries here: 02:43: With the help of dest VTEP IP address, the packet can reach the destination VTEP but how would it attach the same VLAN id which was stripped off during encapsulation? And, Since the Dest MAC address in inside the inner Data Frame, how would the packet reach the correct machine?

  • @mitrhitesh84
    @mitrhitesh84 4 ปีที่แล้ว

    Thanks a lot for Such Nice Explaination.

  • @vetri10
    @vetri10 3 ปีที่แล้ว

    Excellent 👌👌👌👌 thanks

  • @pdabin
    @pdabin 5 ปีที่แล้ว

    Awesome series so far !!

  • @eddieogorman4482
    @eddieogorman4482 3 ปีที่แล้ว

    Nice video, just need to point out a small error. At 1:18, you show the vtep adding an IP header and then a UDP header, the order should be reversed, UDP first followed by IP. You have this correct later on, just thought I'd mention it. :-)

  • @CheezyDibbles
    @CheezyDibbles 5 ปีที่แล้ว +1

    i dont subscribe easily but i love your channel...

  • @69owi
    @69owi 6 ปีที่แล้ว +1

    It was very well explained.

  • @manou_vitch875
    @manou_vitch875 6 ปีที่แล้ว +1

    I liked the presentation please, we need the following parts if it is possible, tnkhs

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว

      Thanks for your feedback! The remainaing parts are on the way, but they're just not all available yet.
      They're coming out each week. Next one is on the 15/16th of Feb.
      To see when they come out, the best option is to subscribe and click the notification button
      Or, you can look at the playlist below. They'll be added there when they're ready.
      th-cam.com/play/PLDQaRcbiSnqFe6pyaSy-Hwj8XRFPgZ5h8.html

  • @amansyal7161
    @amansyal7161 4 ปีที่แล้ว

    What an amazing video, loved it!

  • @shridhantpati5599
    @shridhantpati5599 6 ปีที่แล้ว +1

    have to say very good explanation .

  • @lucasfigueroa6165
    @lucasfigueroa6165 ปีที่แล้ว

    Excelent Series.

  • @m-electronics5977
    @m-electronics5977 ปีที่แล้ว

    Cool Videos about this topic

  • @NicoDeclerckBelgium
    @NicoDeclerckBelgium 4 ปีที่แล้ว

    I like the way this is explained, I just don't why I would need jumbo frames. I'd think (like with other overlay networks, GRE, IPsec, ...) it would be better to lower the mtu?

  • @2428dle
    @2428dle 6 ปีที่แล้ว +1

    Very nice done.

  • @sandeepsuresh2006
    @sandeepsuresh2006 5 ปีที่แล้ว +1

    Great video

  • @summir7291
    @summir7291 3 ปีที่แล้ว +1

    Perfect sir

  • @NetworkDirection
    @NetworkDirection  6 ปีที่แล้ว +1

    For more details, see: networkdirection.net/VxLAN+Frames
    The book (affiliate): click.linksynergy.com/link?id=RL4E*8CmbSY&offerid=145238.2463561&type=2&murl=http%3A%2F%2Fwww.ciscopress.com%2Ftitle%2F9781587144677

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว

      I have recently learned that some of those reserved bits are used for Cisco ACI. I guess other vendors do something similar

  • @emmanuelleumali7351
    @emmanuelleumali7351 6 ปีที่แล้ว +1

    Say i have two datacenters with vxlan and my isp is providing dual homed l2 leased circuit for redundancy. Will vxlan know about the looped topology and still employ stp on interconnects with the isp?

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว

      Good question! VXLAN is just an overlay, so loop prevention is based on the underlay network you employ.
      Generally, you would use BGP with EVPN in the underlay (see how this is configured in part 6). In this case, loop prevention is based on BGP.
      I should mention though, that the original design of VXLAN was designed to be in a single site. There is now support for EVPN Multi-Site, which you should probably check out. Low latency and stability in you underlay (the provider circuits in this case) are key.

    • @emmanuelleumali7351
      @emmanuelleumali7351 6 ปีที่แล้ว

      ______ ()____________
      | |
      | |
      | X (STP Block?) | forward
      | |
      DC#1--------VXLAN on OSPF with dedicated fiber ------ DC#2

    • @emmanuelleumali7351
      @emmanuelleumali7351 6 ปีที่แล้ว +1

      does that mean VXLAN dont carry the BPDUs?

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว

      I haven't tried to get VXLAN to carry BPDU's, so I'm not certain, but as far as I know, VXLAN does not carry BPDU's.
      By employing layer-3 in the underlay, layer-2 loop prevention (that is, spanning tree) is not required

  • @MamaliFeshFesh
    @MamaliFeshFesh 3 ปีที่แล้ว

    Hi I was wondering what lab environment you use for these videos as well as drawing the network diagrams.. Thanks.

    • @NetworkDirection
      @NetworkDirection  3 ปีที่แล้ว +1

      In this particular series, I used real hardware, but in many others I use CML
      Network diagrams are usually in Visio/Powerpoint, but in this one I think I used Fusion for 3d. It's been a while, so I don't remember exactly for this video

  • @techdemoz3
    @techdemoz3 5 ปีที่แล้ว

    Good work done Sir

  • @MB_72282
    @MB_72282 7 หลายเดือนก่อน

    Awesome! thanks.

  • @tigreshs
    @tigreshs 6 ปีที่แล้ว +2

    thanks for sharing

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว

      You are very welcome! I'm glad you like the channel

  • @LanWanNinja
    @LanWanNinja 6 ปีที่แล้ว +1

    I agree, great video and presenter.

  • @bestsaurabh
    @bestsaurabh 3 ปีที่แล้ว +1

    Regarding reserved bits in VxLAN header.
    Source: cumulusnetworks.com/lp/evpn-data-center-oreilly/
    Book by Dinesh Dutt - who designed VxLAN primarily.
    "I already had over-the-top virtualization (OTV-a proprietary precursor to EVPN) and LISP protocols to support. I wanted VXLAN to look like OTV and for both to resemble LISP, given that LISP was already being discussed in the standards bodies. But there were already existing OTV and LISP deployments, so whatever header I constructed had to be backward-compatible. Thus I made the VNI 24 bits because many L2 virtual networks already supported 24-bit VNIs, and I didn’t want to build stateful gateways just to keep VNI mappings between different tunneling protocols. The reserved bits and the always 1 bit are there because those bits mean something else in the case of LISP and OTV. In other words, the rest of the header format is a consequence of trying to preserve back‐ ward compatibility. The result is the VXLAN header you see."

  • @elenaluminitasima6440
    @elenaluminitasima6440 5 ปีที่แล้ว +1

    The reserved bits can be used for QoS to prioritise one VNI prior to another?It makes sense ?

    • @NetworkDirection
      @NetworkDirection  5 ปีที่แล้ว

      I've been trying to find some information on this, but I haven't been able to yet 🙁

  • @terae77
    @terae77 4 ปีที่แล้ว

    Thank you so much

  • @rambhupal4614
    @rambhupal4614 3 ปีที่แล้ว

    Nice

  • @robingoolsby6024
    @robingoolsby6024 หลายเดือนก่อน

    Thanks!

  • @brade1208
    @brade1208 4 ปีที่แล้ว

    Is enabling jumbo frame on every device's interface a pain? I'm guessing not so much with automation these days, but some companies have not moved that way yet.

  • @prashantkamble2393
    @prashantkamble2393 6 ปีที่แล้ว +1

    thanks for video

  • @yassineyassine9504
    @yassineyassine9504 2 ปีที่แล้ว +1

    very niiiice

  • @billjones3353
    @billjones3353 6 ปีที่แล้ว +1

    Jumbo frames? What if the XVLAN goes over the Internet as the underlay network? I think limiting the MTU would be required.

    • @NetworkDirection
      @NetworkDirection  6 ปีที่แล้ว +2

      Good question.
      You wouldn't use the internet as an underlay. VxLAN was primarily meant to be within a single site. There are other technologies that it can integrate with if you want to use it across sites, such as OTV and the newer EVPN Multi-Site. Having said that, I've seen it running across DCI links without these technologies and it's fine.
      I definitely wouldn't run it over the internet though. If you want an overlay over the internet, perhaps DMVPN with MPLS would be a better option.

  • @mohitbhongade1387
    @mohitbhongade1387 4 ปีที่แล้ว

    Please create more video and share with us.

  • @BattousaiHBr
    @BattousaiHBr 3 ปีที่แล้ว

    4:31 what if i don't have admin access to the underlay network? (for example, the internet)

    • @NetworkDirection
      @NetworkDirection  3 ปีที่แล้ว

      The underlay is created by you and is private. It's a collection of your switches connected together, it's not over the internet

  • @trial000000000000001
    @trial000000000000001 2 ปีที่แล้ว

    Cisco's iVXLAN uses some of the reserved bits I believe.

  • @garrettwilliamson1585
    @garrettwilliamson1585 4 ปีที่แล้ว

    Arrested Development! Hahaa! Amazing. Also very informative, thanks!

    • @NetworkDirection
      @NetworkDirection  4 ปีที่แล้ว

      I wonder how many people know that's arrested development!

  • @aniruddhamalkar4981
    @aniruddhamalkar4981 4 ปีที่แล้ว

    Why source and destination IP is different at source and destination VTEP ??

  • @anshul161987
    @anshul161987 4 ปีที่แล้ว

    I need to know that what is the use of VNI ( even if they are in millions ) as ultimately we are mapping 1 VNI to 1 VLAN , so indirectly we cannot map more than 4096 VNI.
    So how we can use other VNI on one site ? as we cannot use more than 4096 VNI. Please explain.

    • @bestsaurabh
      @bestsaurabh 3 ปีที่แล้ว

      Leaf1 4094 vlans are mapped to vni 1-4094, next leaf will have vlan 1-4094 mapped to some other vni ( say 4097- 8000). The point is VLAN has local significance ( limited to that swicth) while VNI has global significance ( across the fabric). Hope it helped!

    • @anshul161987
      @anshul161987 3 ปีที่แล้ว

      @@bestsaurabh But what we would achieve from this as same site this much number of VLANS are not required ? Even on next leaf, you can map the same as VLANS with VNI's as well for any communication. I do not see the real use case of this one.

  • @Kau093
    @Kau093 5 ปีที่แล้ว +2

    So where are you actually from?

    • @NetworkDirection
      @NetworkDirection  5 ปีที่แล้ว +1

      Hi Kaushik, thanks for visiting our channel! We live just outside of Sydney, Australia 😀

  • @chaiwatamornhirunwong659
    @chaiwatamornhirunwong659 6 ปีที่แล้ว +1

    Thank you very much.