Patent classifications
H04L12/4675
SYSTEMS AND METHOD FOR PROPAGATING ROUTE INFORMATION
Techniques disclosed herein provide a method and systems for installing routes by a route reflect (RR) device when the tunnel RIB of the RR device does not include any tunnel labels definitions. The unicast routing information base (RIB) of route reflector (RR) device is configured to include a next hop associated with a first network device. When the RR device receives a route from the first network device that comprises a tunnel label for reaching the second network device, the RR device resolves the next hop of the received route using the unicast RIB of the RR device. In response to the resolving, the RR device forwards the route to a third network device (e.g., identified by an export route target of the RR device).
INTERNET GROUP MANAGEMENT PROTOCOL (IGMP) OF A LAYER-2 NETWORK IN A VIRTUALIZED CLOUD ENVIRONMENT
Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. IGMP configuration is distributed to the L2 virtual switches.
LAYER-2 NETWORKING SPAN PORT IN A VIRTUALIZED CLOUD ENVIRONMENT
Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. Span port information applicable to the L2 port is sent to a network virtualization device that hosts the L2 virtual network interface.
LAYER-2 NETWORKING INFORMATION IN A VIRTUALIZED CLOUD ENVIRONMENT
Techniques are described for communications in an L2 virtual network of a customer. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. Information associated with the L2 virtual switches is collected and provided to the customer.
FAST CONVERGENCE IN ACCESS NETWORKS
In some embodiments, a first provider edge (PE) router is coupled to a first customer edge (CE) router; a second CE router; and a second PE router. The second PE router is coupled to the first CE router and the second CE router. The first PE router is configured with a primary label comprising a primary next hop of the first CE router and a backup next hop of the second PE router and a secondary label comprising a primary next hop of the first CE router and a backup next hop of the second CE router. The second PE router is configured with a primary label comprising a primary next hop of the first CE router and a backup next hop of the first PE router and a secondary label comprising a primary next hop of the first CE router and a backup next hop of the second CE router.
Automated connectivity to cloud resources
The present technology pertains to receiving a tag associating at least one routing domain in an on-premises site with at least one virtual network in a cloud environment associated with a cloud service provider. The present technology also pertains to the automation of populating route and propagation tables with the cloud service provider.
System and method for preventing switch loops in layer-2 networks
Described herein are systems and methods for preventing switch loops in a layer 2 network. A method can provide, at a computer including a microprocessor, two or more virtual local area networks (VLANs), each VLAN comprising a number of bridges, a plurality of end nodes connected to the two or more VLANs via a plurality of network interface cards (NICs). The method can connect two of the plurality of nodes to two of the VLANs via two or more tunnels. The method can receive a first instance of a broadcast packet at a bridge of a VLAN, and then receive a second instance of the broadcast packet is the bridge of the VLAN. Upon the second instance of the broadcast packet being received within a configured time period, the method can drop the second instance of the broadcast packet.
LAYER-2 NETWORKING STORM CONTROL IN A VIRTUALIZED CLOUD ENVIRONMENT
Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. Storm control information applicable to the L2 port is sent to a network virtualization device that hosts the L2 virtual network interface.
Enabling virtual workloads using overlay technologies to interoperate with physical network services
A solution is provided to enable cloud service provider customers/users to offer physical network services to virtualized workloads that use overlay technologies, such as a Virtual Extensible Local Area Network (VXLAN). For a virtual workload that uses an overlay technology, an identifier is received of a logical network to which the virtual workload connects and a policy for the logical network. Based on the identifier of the logical network and the policy, a gateway is configured to connect traffic for the virtual workload on the logical network to a particular virtual local area network (VLAN) interface of the physical network service equipment on which the policy is configured.
Provider edge device and method implemented thereon for ethernet virtual private network
Provided are a provider edge (PE) device and a method for Ethernet virtual private network (EVPN). A first PE device performs label assignment procedure with a second PE device such that the first and second PE devices share an Ethernet segment identifier (ESI)-excluded label and know a correspondence between the ESI-excluded label and a label combination of an ESI label and a VPN label. The first PE device encapsulates a packet of broadcast, unknown unicast or multicast (BUM) traffic, with the ESI-excluded label instead of the label combination. The first PE device sends the encapsulated packet to the second PE device.