Currently in Migration - Jason Edelman's Old Blog
  • Home
  • About
  • Contact

Network Overlays and Hardware - Do they go together?

6/3/2013

1 Comment

 
In my previous post, I closed with asking, “if you require certain hardware configurations and ASICs for your virtual network solutions, have you truly deployed network virtualization?” I didn’t touch upon where hardware does and does not make sense though.  I will expand on that here.
Where I don’t like hardware terminating overlays with Network Virtualization

The devices that terminate overlays within the network virtualization space are referred to as Virtual Tunnel Endpoints (VTEPs).  I don’t believe the Top of Rack, End of Row, or Core need to terminate overlay tunnels in a fully virtualized environment for VM to VM traffic.   Believe me, if my viewpoint changes, I’ll be the first to write about it. 

Where I do like hardware terminating overlays with Network Virtualization

But even with an end to end virtualized network, terminating overlays in hardware in other parts of the network may make sense.  Where?  I like WAN edge and integration into physical workloads as two examples. 

What if you deployed a great multi-tenant Private Cloud based on the latest and greatest technology and then needed to get a WAN router that resided in the same physical data center to communicate with a single tenant (maybe for a b2b connection or high speed WAN for a particular business application)?  You can do some cool stuff and peer using BGP, use your favorite IGP, create VRFs, and ultimately have a L3 gateway into the overlay network, or you can simply plug a WAN router into a physical switch and configure the port that the router plugs into to be part of the same VXLAN (overlay) segment.  This even allows you to put the router on the same subnet as the hosts if you wanted.  This can offer up high capacity routing or other services where needed for those that still refuse virtual services L3-L7.  But if you’re deploying a solution as described, I suppose you’ve succumbed to the flexibility L2 overlays, and L3+ are next anyway :).

Integration with a TOR switch also makes sense for physical servers.  If an application heartbeat is needed or if there is a P2V migration going on, having a TOR terminate an overlay makes sense.

So why don’t I like TORs or Core switches participating in a [general] NV solution?

It reminds me too much of what you can already do with VLANs, VRFs, and GRE.  That is deploy solid networks that take a team to setup that are very difficult to automate.  Remember locally connected routes that start communicating automagically too?  Not a good thing, hence needing a VLAN per VRF for some deployments.  As I said in previous posts, while overlays do give the ability to deploy many more than 4000 segments, one of the best side effects not often discussed, of a platform that uses overlays is that they are very easy (so I’ve heard) to automate using off the shelf tools and platforms. 

Would you rather automate the deployment of the endpoints or try and automate every device along the path?  I also feel like terminating overlays on all TORs or in the Core would be like trying to terminate IPSec with your local carrier, having them terminate IPSec to their remote device, which would finish with a peering to your remote device, all to setup a point to point VPN connection.  Imagine trying to automate that?  Isn't it easier to go from edge device to edge device using a control server (DMVPN/NHRP server) to do the setup?

Of course, this is only what I think...


Thanks,
Jason

Twitter: @jedelman8

1 Comment
Art Fewell
6/16/2013 03:05:57 am

Dead on. Great post Jason

Reply



Leave a Reply.

    Author

    Jason Edelman, Founder of Network to Code, focused on training and services for emerging network technologies. CCIE 15394.  VCDX-NV 167.


    Enter your email address:

    Delivered by FeedBurner


    Top Posts

    The Future of Networking and the Network Engineer

    OpenFlow, vPath, and SDN

    Network Virtualization vs. SDN

    Nexus 7000 FAQ

    Possibilities of OpenFlow/SDN Applications 

    Loved, Hated, but Never Ignored #OpenFlow #SDN

    Software Defined Networking: Cisco Domination to Market Education

    OpenFlow, SDN, and Meraki

    CAPWAP and OpenFlow - thinking outside the box

    Introduction to OpenFlow...for Network Engineers


    Categories

    All
    1cloudroad
    2011
    2960
    40gbe
    7000
    Arista
    Aruba
    Big Switch
    Brocade
    Capwap
    Christmas
    Cisco
    Controller
    Data Center
    Dell Force10
    Embrane
    Extreme
    Fex
    Hadoop
    Hp
    Ibm
    Isr G2
    Juniper
    Limited Lifetime Warranty
    Meraki
    Multicast
    N7k
    Nexus
    Nicira
    Ons
    Opendaylight
    Openflow
    Openstack
    Presidio
    Qsfp
    Quick Facts
    Routeflow
    Sdn
    Sdn Ecosystem
    Security
    Ucs


    Archives

    May 2015
    April 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    June 2014
    May 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013
    May 2013
    April 2013
    March 2013
    February 2013
    January 2013
    December 2012
    November 2012
    October 2012
    June 2012
    May 2012
    April 2012
    March 2012
    February 2012
    January 2012
    December 2011
    November 2011


    RSS Feed


    View my profile on LinkedIn
Photo used under Creative Commons from NASA Goddard Photo and Video