How to create a V(x)LAN

Find out how to create VLANs (vRack) and VxLANs (NSX)

Last updated 12th October 2020

Objective

In a Hosted Private Cloud infrastructure, you have a base of 10 VxLANs provided by NSX, and 11 VLANs provided with the vRack.

This guide shows how to create additional V(x)LANs.

Requirements

  • access to the vSphere Web client (HTML5)

Instructions

In the Hosted Private Cloud solutions, you get two virtual distributed switches (vDS).

These vDS have several different portGroups, each with their own purpose.

The first vDS common to both solutions has two portGroup types:

  • The VMnetwork that enables communication to the internet
  • VxLANs managed by NSX, allowing private communications to be isolated within the Hosted Private Cloud.

The second vDS has only one type of portGroup:

  • VLANs that can be used to isolate private communications within the Hosted Private Cloud, and between different OVHcloud services that are vRack-compatible (Dedicated Server, Public Cloud, etc.).

VxLan - NSX

In the Hosted Private Cloud solutions, you get a first virtual switch.

On this switch, 10 VxLANs are created as standard. By giving the NSX permission in the users management tab of your Control Panel, you can access the NSX interface and thus create additional VxLANs.

First, go to the Networking and security view of your vSphere client, then click Logical Switches.

Click the + button to start the creation:

create vxlan

The first step is to name your portGroup:

vxlan name

Then choose the transport zone:

transport area

The transport area controls which hosts a logical switch can reach. In a Hosted Private Cloud infrastructure, OVHcloud creates a transport zone per virtual data centre. You can create a common transport zone for different virtual data centres, or you can extend existing data centres.

The control plan mode for a transport area is unicast, allowing communication between hosts to be managed using NSX controllers.

IP address discovery limits the saturation of ARP traffic in individual VxLAN segments, that is, between virtual machines connected to the same logical switch.

MAC learning builds a VLAN/MAC learning table on each vNIC. This table is stored with dvfilter data. In vMotion, dvfilter saves and restores the table to the new location. Then, the switch generates RARPs for all VLAN/MAC entries in the table. You may want to enable MAC learning if you are using virtual network adapters that are performing VLAN trunking.

OVHcloud recommends using only IP address discovery.

Once you have entered all of this information, you can confirm that you want to create it:

confirm creation

Your portGroup is now created and functional, you will find it in the Logical Switches view:

portgroup created

But also in the Networking view

portgroup created

VLAN - vRack

You also have an additional virtual distributed switch (vDS).

On this switch, 11 VLANs are created as standard (VLAN10 to VLAN20). By giving the administrator right on Access to the V(x)LAN in the users management tab of your Control Panel, you can create additional VLANs.

First, go to your vSphere client's networking view. Deploy the vrack folder then right-click on the dVS ending in -vrack and finally click on New Distributed Port Group.

vRack

New Distributed Port Group

The next step is to name your PortGroup:

nominate portgroup

Then configure the settings recommended by OVHcloud:

  • Port binding: Static (reserving and assigning the port to a virtual machine)
  • Port allocation: Elastic (Allows the number of ports to be hot-wired)
  • Number of ports: 24
  • VLAN type: VLAN (The others are PVLAN and Trunk)
  • VLAN ID: 21 (Knowing that the ID can be configured from 1 to 4096)
  • Check the option Customize default policies configuration.

portgroup configuration

You have 3 security settings that can be activated according to your need:

  • Promiscuous mode: Eliminates any filtering that the VM adapter can perform so that the guest operating system receives all observed traffic on the network.
  • MAC address changes: When set to Accept, ESXi will accept requests to change the effective MAC address to an address other than the initial MAC address.
  • Forged transmits: Affects traffic transmitted from a virtual machine. When set to Accept, ESXi does not compare the source and effective MAC addresses.

The most frequent use of these 3 parameters is the CARP, especially used on pfSense.

security settings

We leave Traffic shaping disabled.

traffic shaping

In terms of load balancing, select Route Based on IP hash, which is the best method for redundancy and load balancing.

Be careful when configuring the failover order: It is necessary to set the lag1 uplink to Active (connection between the virtual network and the physical network), otherwise no communication between the hosts will be possible.

load balancing

The NetFlow is disabled (traffic flow activity report).

netflow

Leave the Block All Ports value at "No".

portgroup finalisation

You will then be presented with a summary of the changes. Click Finish to confirm the creation.

portgroup finalisation

Here we can see that VLAN21 is available and functional.

vlan created

Go further

Join our community of users on https://community.ovh.com/en/.


Did you find this guide useful?

Please feel free to give any suggestions in order to improve this documentation.

Whether your feedback is about images, content, or structure, please share it, so that we can improve it together.

Your support requests will not be processed via this form. To do this, please use the "Create a ticket" form.

Thank you. Your feedback has been received.


These guides might also interest you...

OVHcloud Community

Access your community space. Ask questions, search for information, post content, and interact with other OVHcloud Community members.

Discuss with the OVHcloud community

In accordance with the 2006/112/CE Directive, modified on 01/01/2015, prices incl. VAT may vary according to the customer's country of residence
(by default, the prices displayed are inclusive of the UK VAT in force).