VMware Networking Community
amitbharti
Contributor
Contributor

L2VPN routing loop

Hello,

I have setup NSX L2VPN with on-premise with standalone client. The vms in stretch subnet are reachable from either sides over L2VPN tunnel. However on the L2VPN server site, if vms in stretch subnet are on same ESXi host then they are reachable from vms on on-prem. If vms are on different host then all the on-premise vms(in stretch subnet) does not reach the vms in server site.

All the ESXi(s) in the server site have dual pNICs. Teaming policy for trunk and the vm(stretch) port groups are "Route based on originating source port ID" and only one active uplink is set. Another uplink is set to standby.

Not sure why traffic is dropped when vms resides on separate host.

Any inputs please?

P.S. : ESXi 6.5U2 // NSX 6.4.0

Thanks,

AB

0 Kudos
5 Replies
Sreec
VMware Employee
VMware Employee

If I understand your scenario correctly , issue is specific to L2 VPN server side VM's ( Packet Drops when VM's  they reside on different hosts ) ?  If that is the case, issue has nothing to do with L2-VPN. I'm suspecting this could be a potential VLAN tagging issue on Host/Switch based on the design.  To rule out , can you double check if VLAN reachability is there for VM's when they reside on different hosts , keeping VPN aside ?  You have also mentioned "L2-VPN routing loop" , have you encountered any loops or it was an assumption ?

Cheers,
Sree | VCIX-5X| VCAP-5X| VExpert 7x|Cisco Certified Specialist
Please KUDO helpful posts and mark the thread as solved if answered
0 Kudos
amitbharti
Contributor
Contributor

Thanks for your response Sree and sorry for missing to mention one point in my initial post.

On the server site, when L2VPN Server ESG and the workload vms(stretch) are on the same host then stretch workloads on on-prem  can reach the remote vms. However when i separate the workload vms and L2VPN server ESG vm on the server site then within the site vms can reach each other however the vm which is on separate host cannot be reached by on-premise vm.

VMs which are still on the same host with L2VPN server ESG VM can still be reached from on-premise workload vms.

It is a collapsed cluster design so one cluster has everything i.e. workload vms and Edges. I tried to follow the below guide however not sure why it is not helping there. Please suggest.

L2VPN Options to Mitigate Looping

Thanks,

AB

0 Kudos
Sreec
VMware Employee
VMware Employee

However when i separate the workload vms and L2VPN server ESG vm on the server site then within the site vms can reach each other however the vm which is on separate host cannot be reached by on-premise vm

In the above case, can the workload VM reach L2-VPN server when they are on different server ?

Cheers,
Sree | VCIX-5X| VCAP-5X| VExpert 7x|Cisco Certified Specialist
Please KUDO helpful posts and mark the thread as solved if answered
0 Kudos
amitbharti
Contributor
Contributor

Hi Sree,

Thanks for the followup.

Short answer, No.

For details, below is the view.

Server Site:

-------------

ESXi-1

Workload VM2

L2VPN Server ESG VM(For testing purpose, configured Trunk NIC with one available ip assigned from the stretch subnet to the sub-interface)

ESXi2

Workload VM1

Client SIte(on-premise):

-------------

Workload VM3

Testing results:

1- VM3(on-prem) can reach VM2(Server site) and vice versa

2- VM3(on-prem) can reach L2VPN Server sub-interface(server site)

3- VM2(on-prem) can reach L2VPN Server sub-interface(server site)

4- VM2(Server site) can reach VM1(Server site) and vice versa 

--> This is only possible when Trunk port group has teaming policy as "Route based on original port ID" and with one active uplink.

Workload port group has the same load balance policy as Trunk PG however has two active uplinks. If i match the teaming policy of workload PG to Trunk PG even this communication stops. I am trying to follow the earlier link i posted for L2VPN routing loop mitigation.

5- VM1(Server site) can not reach L2VPN Server sub-interface(server site) based on the packet capture taken on the trunk interface of L2VPN Server.

--> Not sure why as VM1 can reach VM2 which is on the same host where L2VPN Server resides.

Please suggest.

Thanks,

AB

0 Kudos
Sreec
VMware Employee
VMware Employee

Thanks for the detailed explanation. Few more queries

1. L2 VPN Client side deployment is done on Standard/DVS ?

2. What type of port policies are we using here ?  Forged/Promiscuous or Sink port or combination of all ?

3. Instead of moving the VM's behind the L2 VPN server, if we migrate L2 VPN esg to another host, in that case  tunnel is going down ?

Cheers,
Sree | VCIX-5X| VCAP-5X| VExpert 7x|Cisco Certified Specialist
Please KUDO helpful posts and mark the thread as solved if answered
0 Kudos