]> git.proxmox.com Git - ovs.git/blame - README-lisp
netflow: Make thread safe.
[ovs.git] / README-lisp
CommitLineData
a6ae068b
LJ
1Using LISP tunneling
2====================
3
4LISP is a layer 3 tunneling mechanism, meaning that encapsulated packets do
5not carry Ethernet headers, and ARP requests shouldn't be sent over the
6tunnel. Because of this, there are some additional steps required for setting
7up LISP tunnels in Open vSwitch, until support for L3 tunnels will improve.
8
393231b2
LJ
9This guide assumes tunneling between two VMs connected to OVS bridges on
10different hypervisors reachable over IPv4. Of course, more than one VM may be
11connected to any of the hypervisors, and a hypervisor may communicate with
12several different hypervisors over the same lisp tunneling interface. A LISP
13"map-cache" can be implemented using flows, see example at the bottom of this
14file.
a6ae068b
LJ
15
16There are several scenarios:
17
18 1) the VMs have IP addresses in the same subnet and the hypervisors are also
19 in a single subnet (although one different from the VM's);
20 2) the VMs have IP addresses in the same subnet but the hypervisors are
21 separated by a router;
22 3) the VMs are in different subnets.
23
24In cases 1) and 3) ARP resolution can work as normal: ARP traffic is
25configured not to go through the LISP tunnel. For case 1) ARP is able to
26reach the other VM, if both OVS instances default to MAC address learning.
27Case 3) requires the hypervisor be configured as the default router for the
28VMs.
29
30In case 2) the VMs expect ARP replies from each other, but this is not
31possible over a layer 3 tunnel. One solution is to have static MAC address
32entries preconfigured on the VMs (e.g., `arp -f /etc/ethers` on startup on
33Unix based VMs), or have the hypervisor do proxy ARP.
34
35On the receiving side, the packet arrives without the original MAC header.
36The LISP tunneling code attaches a header with harcoded source and destination
ec9f40dc 37MAC address 02:00:00:00:00:00. This address has all bits set to 0, except the
a6ae068b
LJ
38locally administered bit, in order to avoid potential collisions with existing
39allocations. In order for packets to reach their intended destination, the
40destination MAC address needs to be rewritten. This can be done using the
41flow table.
42
43See below for an example setup, and the associated flow rules to enable LISP
44tunneling.
45
46 +---+ +---+
47 |VM1| |VM2|
48 +---+ +---+
49 | |
50 +--[tap0]--+ +--[tap0]---+
51 | | | |
52 [lisp0] OVS1 [eth0]-----------------[eth0] OVS2 [lisp0]
53 | | | |
54 +----------+ +-----------+
55
56On each hypervisor, interfaces tap0, eth0, and lisp0 are added to a single
57bridge instance, and become numbered 1, 2, and 3 respectively:
58
59 ovs-vsctl add-br br0
60 ovs-vsctl add-port br0 tap0
61 ovs-vsctl add-port br0 eth0
393231b2 62 ovs-vsctl add-port br0 lisp0 -- set Interface lisp0 type=lisp options:remote_ip=flow options:key=flow
a6ae068b
LJ
63
64Flows on br0 are configured as follows:
65
66 priority=3,dl_dst=02:00:00:00:00:00,action=mod_dl_dst:<VMx_MAC>,output:1
67 priority=2,in_port=1,dl_type=0x0806,action=NORMAL
393231b2 68 priority=1,in_port=1,dl_type=0x0800,vlan_tci=0,nw_src=<EID_prefix>,action=set_field:<OVSx_IP>->tun_dst,output:3
a6ae068b 69 priority=0,action=NORMAL
393231b2
LJ
70
71Optionally, if you want to use Instance ID in a flow, you can set it with
72"action=set_tunnel:<IID>".