CN105490884A - VXLAN tunnel detection method and apparatus - Google Patents

VXLAN tunnel detection method and apparatus Download PDF

Info

Publication number
CN105490884A
CN105490884A CN201510931765.1A CN201510931765A CN105490884A CN 105490884 A CN105490884 A CN 105490884A CN 201510931765 A CN201510931765 A CN 201510931765A CN 105490884 A CN105490884 A CN 105490884A
Authority
CN
China
Prior art keywords
tunnel
configuration information
address
equipment
virtual network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510931765.1A
Other languages
Chinese (zh)
Other versions
CN105490884B (en
Inventor
李金辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maipu Communication Technology Co Ltd
Original Assignee
Maipu Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maipu Communication Technology Co Ltd filed Critical Maipu Communication Technology Co Ltd
Priority to CN201510931765.1A priority Critical patent/CN105490884B/en
Publication of CN105490884A publication Critical patent/CN105490884A/en
Application granted granted Critical
Publication of CN105490884B publication Critical patent/CN105490884B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiments of the invention provide a VXLAN tunnel detection method and apparatus, and relate to the technical field of communication, for feeding back causes of VXLAN tunnel establishment failure and improving VXLAN tunnel establishment efficiency. The method comprises the following steps: a first device receiving second tunnel configuration information sent by a second device; matching the second tunnel configuration information with first tunnel configuration information on the first device; and when the first tunnel configuration information does not match the second tunnel configuration information, the first device sending a fault message to the second device, wherein tunnel configuration information comprises a mapping relation between an IP address of a destination end of a VXLAN tunnel and a virtual network identifier (VNID), and the tunnel configuration information is used for establishing a VXLAN tunnel for the first device and the second device. The method and apparatus provided by embodiments of the invention are applied to detection of the VXLAN tunnel.

Description

A kind of VXLAN tunnel detection method and device
Technical field
Embodiments of the invention relate to the communications field, particularly relate to a kind of method and device of VXLAN Tunnel testing.
Background technology
Virtual easily extensible local area network (LAN) (VirtualExtensibleLocalAreaNetwork, VXLAN) technology is virtual for extended network, the technology used to meet user with the virtual network obtaining sufficient amount.VXLAN technology is by setting up VXLAN tunnel, existing network framework creates a large amount of virtual easily extensible local area network (LAN)s, different virtual easily extensible local area network (LAN)s uses VNI (VXLANNetworkIdentifier, virtual easily extensible local net network identifier) to identify.
In prior art, the mode of setting up in VXLAN tunnel has two kinds: one adopts proprietary protocol to set up, and another kind sets up manually.But, when setting up VXLAN tunnel manually, need to rely on user's configuration or third party's proprietary protocol to complete, add the complexity of network, and when adopting proprietary protocol to set up VXLAN tunnel, likely because user's configuration at two ends, VXLAN tunnel is not mated and occurs that failed situation is set up in VXLAN tunnel, and when there is above situation, cannot determine that failed reason is set up in VXLAN tunnel, VXLAN tunnel is caused not set up in time, reduce VXLAN tunnel and set up efficiency, affect Consumer's Experience.
Summary of the invention
Embodiments of the invention provide a kind of method and device of VXLAN Tunnel testing, can set up failed reason and feed back, improve VXLAN tunnel and set up efficiency, improve Consumer's Experience VXLAN tunnel.
First aspect, embodiments provide a kind of VXLAN tunnel detection method, the method comprises: the first equipment receives the second tunnel configuration information that the second equipment sends; Second tunnel configuration information is mated with the first tunnel configuration information on the first equipment; When the first tunnel configuration information is not mated with the second tunnel configuration information, the first equipment sends fault message to the second equipment; First tunnel configuration information comprises the mapping relations of an IP address and virtual network instance identification VNID, and an IP address is the IP address setting up the destination in VXLAN tunnel with the first equipment; Second tunnel configuration information comprises the mapping relations of the 2nd IP address and virtual network instance identification VNID, 2nd IP address is the IP address setting up the destination in VXLAN tunnel with the second equipment, and wherein tunnel configuration information sets up VXLAN tunnel for the first equipment and the second equipment.
In the first possible implementation of first aspect, second tunnel configuration information is mated with the first tunnel configuration information on the first equipment, comprise: from the second tunnel configuration information, take out the first virtual network instance identification, wherein the first virtual network instance identification is arbitrary virtual network instance identification of the second tunnel configuration information; The two IP address corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information, and as the first source IP address, tunnel; An IP address corresponding with the first virtual network instance identification is obtained in the first tunnel configuration information, and as the first destination IP address, tunnel; When the first tunnel configuration information is not mated with the second tunnel configuration information, first equipment sends fault message to the second equipment, comprise: when the first source IP address, tunnel is identical with the first destination IP address, tunnel, the first equipment sends Fisrt fault message to the second equipment.
In conjunction with first aspect or the first possible implementation of first aspect, in the implementation that the second is possible, second tunnel configuration information is mated with the first tunnel configuration information on the first equipment, also comprise: the second tunnel configuration information is mated with the first tunnel configuration information on the first equipment, also comprises: from the second tunnel configuration information, take out a 2nd IP address as the second destination IP address, tunnel; The all virtual network instance identification corresponding with the second destination IP address, tunnel are obtained in the second tunnel configuration information, and as the second virtual network instance identification group; The tunnel destination IP address corresponding with each virtual network instance identification in the second virtual network instance identification group is obtained in the first tunnel configuration information; When the first tunnel configuration information is not mated with the second tunnel configuration information, first equipment sends fault message to the second equipment, comprise: when the destination IP address, tunnel that each virtual network instance identification in the second virtual network instance identification group is corresponding is not unique, the first equipment sends the second fault message to described second equipment.
In conjunction with first aspect, or any one possible implementation of first aspect the first to the second, in the implementation that the third is possible, the first equipment and the second equipment are bgp neighbor.
In conjunction with the third possible implementation of first aspect, in the 4th kind of possible implementation, fault message is that BGP notifies Notification message; After the second equipment receives fault message, the content according to fault message carries out miscue, and maintains bgp neighbor and be in established state.
Second aspect, embodiments provides a kind of VXLAN tunnel detector, is positioned at the first equipment, comprises: receiving element, for receiving the second tunnel configuration information that the second equipment sends; Processing unit, for mating the second tunnel configuration information with the first tunnel configuration information on the first equipment; Transmitting element, for when the first tunnel configuration information is not mated with the second tunnel configuration information, sends fault message to the second equipment; First tunnel configuration information comprises the mapping relations of an IP address and virtual network instance identification VNID, and an IP address is the IP address setting up the destination in VXLAN tunnel with the first equipment; Second tunnel configuration information comprises the mapping relations of the 2nd IP address and virtual network instance identification VNID, 2nd IP address is the IP address setting up the destination in VXLAN tunnel with the second equipment, and wherein tunnel configuration information sets up VXLAN tunnel for the first equipment and the second equipment.
In the first possible implementation of second aspect, processing unit also for: from the second tunnel configuration information, take out the first virtual network instance identification, wherein the first virtual network instance identification is arbitrary virtual network instance identification of the second tunnel configuration information; The two IP address corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information, and as the first source IP address, tunnel; An IP address corresponding with the first virtual network instance identification is obtained in the first tunnel configuration information, and as the first destination IP address, tunnel; Transmitting element also for: when the first source IP address, tunnel is identical with the first destination IP address, tunnel, send Fisrt fault message to the second equipment.
In conjunction with second aspect or the first possible implementation of second aspect, in the implementation that the second is possible, processing unit also for: from the second tunnel configuration information take out a 2nd IP address as the second destination IP address, tunnel; The all virtual network instance identification corresponding with the second destination IP address, tunnel are obtained in the second tunnel configuration information, and as the second virtual network instance identification group; The tunnel destination IP address corresponding with each virtual network instance identification in the second virtual network instance identification group is obtained in the first tunnel configuration information; Transmitting element also for: when destination IP address, tunnel corresponding to each virtual network instance identification in the second virtual network instance identification group is unique, send the second fault message to the second equipment.
In conjunction with second aspect, or any one possible implementation of second aspect the first to the second, in the implementation that the third is possible, the first equipment and the second equipment are bgp neighbor.
In conjunction with the third possible implementation of second aspect, in the 4th kind of possible implementation, fault message is that BGP notifies Notification message; After the second equipment receives fault message, the content according to fault message carries out miscue, and maintains bgp neighbor and be in established state.
A kind of VXLAN tunnel detection method that the embodiment of the present invention provides and device, comprising: first the first equipment receives the second tunnel configuration information that the second equipment sends; Secondly the second tunnel configuration information is mated with the first tunnel configuration information on the first equipment; Finally when the first tunnel configuration information is not mated with the second tunnel configuration information, the first equipment sends fault message to the second equipment; Wherein the first tunnel configuration information comprises the mapping relations of an IP address and virtual network instance identification VNID, one IP address is the IP address setting up the destination in VXLAN tunnel with the first equipment, second tunnel configuration information comprises the mapping relations of the 2nd IP address and virtual network instance identification VNID, 2nd IP address is the IP address setting up the destination in VXLAN tunnel with described second equipment, and tunnel configuration information is used for the first equipment and the second equipment sets up VXLAN tunnel.Therefore the VXLAN tunnel detection method that provides of above-described embodiment, for the VXLAN tunnel information configured in VXLAN network, by the second tunnel configuration information that the second equipment generates according to own configuration information, mate with configuration information i.e. the first tunnel configuration information on the first equipment required for detection second tunnel configuration information legitimacy, and judge that whether the second configuration information is legal according to matching result, as illegal in the second configuration information, fault message is sent to the second equipment, second equipment is learnt, and the configuration information that the second equipment is set up required for VXLAN tunnel is illegal, thus before setting up VXLAN tunnel, legitimacy detection is carried out to the configuration information will setting up VXLAN tunnel, when the configuration information of detected equipment is illegal, this error message is informed to this equipment, thus can feed back in time the failed reason of VXLAN tunnel foundation, improve VXLAN tunnel and set up efficiency, improve Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic diagram of VXLAN in prior art;
The schematic flow sheet of a kind of VXLAN tunnel detection method that Fig. 2 provides for embodiments of the invention;
The schematic flow sheet of a kind of VXLAN tunnel detection method that Fig. 3 provides for another embodiment of the present invention;
The schematic diagram of a kind of VXLAN tunnel detector that Fig. 4 provides for embodiments of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The term used in this application is only for the object describing specific embodiment, and not intended to be limiting the application.The term of the odd number shape used in the application and appended claims as " one ", " as described in " and " being somebody's turn to do " be also intended to comprise most form, unless context clearly represents other implications.It is also understood that simultaneously the term "and/or" used in the application refer to and comprise one or more project of listing be associated any or all may combine.
Term such as " first ", " second ", " the 3rd " etc. may be adopted although should be appreciated that to describe various information in the application, these information should not be limited to these terms, and above-mentioned term is only used for the information of same type to be distinguished from each other out.Exemplary, when not departing from the application's scope, the first information also can be called as the second information, similarly, second information also can be called as the first information, depend on linguistic context simultaneously, the word that uses in above-mentioned scene " if " can be construed as into " ... time " or " when ... time " or " in response to determining ".
As shown in Figure 1, virtual easily extensible local area network (LAN) VXLAN generally includes:
101, VXLAN endpoint of a tunnel (VXLANTunnelEndPoint, VTEP): VTEP is the edge device of VXLAN, the relevant treatment of VXLAN is all carried out on VTEP, such as identify the VXLAN belonging to ethernet data frame, based on VXLAN, two layers of forwarding, encapsulation/decapsulation message etc. are carried out to Frame, pass through three-layer network carry out data communication by setting up VXLAN tunnel between VTEP, VTEP can be the physical equipment of a platform independent, also can be to run the server having virtual machine.Wherein VXLAN is identified by VXLAN network identifier (VXLANNetworkIdentifier, VNI).
102, VXLAN tunnel: VXLAN tunnel is the logical tunnel of point-to-point between two VTEP.VTEP is after Frame packaging V XLAN head, UDP head, IP head, by VXLAN tunnel by encapsulation after message repeating to far-end VTEP, far-end VTEP carries out decapsulation to it.
When generating VXLAN tunnel when being set up VXLAN tunnel by proprietary protocol, need to carry out VXLAN relevant configuration on VTEP, wherein carry out on VTEP to generate the relevant configuration in VXLAN tunnel and comprise: the source IP address in VXLAN tunnel, the destination address in VXLAN tunnel, and the VNI of VXLAN of VXLAN tunnel-associated.Wherein a VXLAN tunnel can only have a source, and namely VXLAN tunnel can only the source address in a corresponding VXLAN tunnel.Simultaneously a VXLAN can associate many VXLAN tunnels, and a VXLAN tunnel can associate multiple VXLAN, and these VXLAN share this VXLAN tunnel, and namely VNI can corresponding many VXLAN tunnels, and a VXLAN tunnel also can corresponding multiple VNI.
For the above-mentioned VXLAN tunnel information configured in VXLAN network, with reference to shown in Fig. 2, embodiments of the invention provide a kind of VXLAN tunnel detection method, comprise the steps:
201, the first equipment receives the second tunnel configuration information that the second equipment sends.
Wherein the first equipment and the second equipment are VXLAN endpoint of a tunnel (VXLANTunnelEndPoint, VTEP), first equipment and the second equipment room route can reach, namely the first equipment sends data to the second equipment room, second equipment can receive the data that the first equipment sends, and sending feedback data to the first equipment, the first equipment can receive the feedback data that the second equipment sends.First equipment and the second equipment can be independently physical equipment, as router etc., and also can for running the server having virtual machine.
Second tunnel configuration information, be included in the first equipment and the second equipment room and set up configuration information required for VXLAN tunnel, second tunnel configuration information can comprise destination address, VXLAN tunnel i.e. the 2nd IP address ip TA, VNI with the VXLAN of VXLAN tunnel-associated, and the mapping relations of IPTA and VNI, wherein IPTA is with the address of VXLAN tunnel destination under the second equipment prerequisite that is VXLAN tunnel source.One of them IPTA can corresponding one or more VNI, and VNI only can occur in mapping relations wherein.Second tunnel configuration information can be generated according to own configuration information by the second equipment, also can for being stored in the configuration information in the second equipment in advance.
Exemplary, as shown in table 1, be a kind of specific implementation of the second tunnel configuration information.
Table 1
The destination address in VXLAN tunnel VXLAN network identifier
IPTA1 VNI1
IPTA2 VNI2、VNI3
IPTA3 VNI4、VNI5、VNI6
202, judge whether the second tunnel configuration information mates with the first tunnel configuration information on the first equipment
Wherein the first tunnel configuration information is positioned on the first equipment, first tunnel configuration information comprises the configuration information for the first equipment required for detecting in the legitimacy of the first equipment to the second tunnel configuration information, first tunnel configuration information can comprise destination address, a VXLAN tunnel i.e. IP address ip TB, VNI with the VXLAN of VXLAN tunnel-associated, and the mapping relations of IPTB and VNI, wherein IPTB is with the address of VXLAN tunnel destination under the first equipment prerequisite that is VXLAN tunnel source.One of them IPTB can corresponding one or more VNI, and VNI only can occur in mapping relations wherein.First tunnel configuration information can be generated according to own configuration information by the first equipment, also can for being stored in the configuration information in the first equipment in advance.
Exemplary, as shown in table 2, be a kind of specific implementation of the first tunnel configuration information.
Table 2
The destination address in VXLAN tunnel VXLAN network identifier
IPTB1 VNI1
IPTB2 VNI2、VNI3
IPTB3 VNI4
Second tunnel configuration information is mated with the first tunnel configuration information, can be take out a VNI from the second tunnel configuration information, and the IPTA corresponding with this VNI, IPTB corresponding with this VNI according to the first tunnel configuration acquisition of information again, when IPTA and IPTB is identical, the second tunnel configuration information is not mated with the first tunnel configuration information.Second tunnel configuration information is mated with the first tunnel configuration information, also can be take out an IPTA from the second tunnel configuration information, the all VNIs corresponding with this IPTA with the second tunnel configuration acquisition of information according to this IPTA, according to the first tunnel configuration acquisition of information and each self-corresponding IPTB of this all VNI, when obtained IPTB is not unique, the second tunnel configuration information is not mated with the first tunnel configuration information.
Exemplary: based on the first tunnel configuration information shown in the second tunnel configuration information shown in table 1 and table 2, when mating with the first tunnel configuration information the second tunnel configuration information:
VNI1 is taken out from the second configuration information, and the IPTA1 corresponding with VNI1, obtain the IPTB1 corresponding with VNI1 according to the first configuration information, as IPTA1=IPTB1, the second configuration information does not mate with the first configuration information.
203, when the second configuration information does not mate with the first configuration information, the first equipment sends fault message to the second equipment.
The wherein fault message that sends to the second equipment of the first equipment, can be expression second configuration information and the unmatched data of the first configuration information, also can be the data also comprising expression second configuration information and the concrete not match-type of the first configuration information, as long as to the second equipment, the first equipment can inform that the second configuration information is illegal by fault message.
A kind of VXLAN tunnel detection method that the embodiment of the present invention provides, comprising: first the first equipment receives the second tunnel configuration information that the second equipment sends; Secondly the second tunnel configuration information is mated with the first tunnel configuration information on the first equipment; Finally when the first tunnel configuration information is not mated with the second tunnel configuration information, the first equipment sends fault message to the second equipment; Wherein the first tunnel configuration information comprises the mapping relations of an IP address and virtual network instance identification VNID, one IP address is the IP address setting up the destination in VXLAN tunnel with the first equipment, second tunnel configuration information comprises the mapping relations of the 2nd IP address and virtual network instance identification VNID, 2nd IP address is the IP address setting up the destination in VXLAN tunnel with described second equipment, and tunnel configuration information is used for the first equipment and the second equipment sets up VXLAN tunnel.Therefore the VXLAN tunnel detection method that provides of above-described embodiment, for the VXLAN tunnel information configured in VXLAN network, by the second tunnel configuration information that the second equipment generates according to own configuration information, mate with configuration information i.e. the first tunnel configuration information on the first equipment required for detection second tunnel configuration information legitimacy, and judge that whether the second configuration information is legal according to matching result, as illegal in the second configuration information, fault message is sent to the second equipment, second equipment is learnt, and the configuration information that the second equipment is set up required for VXLAN tunnel is illegal, thus before setting up VXLAN tunnel, legitimacy detection is carried out to the configuration information will setting up VXLAN tunnel, when the configuration information of detected equipment is illegal, this error message is informed to this equipment, thus can feed back in time the failed reason of VXLAN tunnel foundation, improve VXLAN tunnel and set up efficiency, improve Consumer's Experience.
For the above-mentioned VXLAN tunnel information configured in VXLAN network, with reference to shown in Fig. 3, embodiments of the invention provide a kind of VXLAN tunnel detection method, comprise the steps:
301, the first equipment receives the second tunnel configuration information that the second equipment sends.
Concrete example, with reference to above-mentioned steps 201, repeats no more here.
It should be noted that, the first equipment and the second equipment can also for establishing the neighborhood (or claiming Correspondent Node/peer-entities) in Border Gateway Protocol (BorderGatewayProtocol is called for short BGP).
302, from the second tunnel configuration information, a virtual network instance identification is taken out as the first virtual network instance identification.
Wherein from the second tunnel configuration information, take out a virtual network instance identification, can for taking out any one virtual network instance identification and as the first virtual network instance identification from the second tunnel configuration information, exemplary, based on the second tunnel configuration information shown in table 1, VNI2 is taken out, as the first virtual network instance identification from the second tunnel configuration information.
303, in the second tunnel configuration information, the two IP address corresponding with the first virtual network instance identification is obtained, and as the first source IP address, tunnel, an IP address corresponding with the first virtual network instance identification is obtained in the first tunnel configuration information, and as the first destination IP address, tunnel.
Wherein in the second tunnel configuration information, obtain the two IP address corresponding with the first virtual network instance identification, and as the first source IP address, tunnel, be included in the second tunnel configuration information, obtain the 2nd IP address that there are mapping relations with the first virtual network instance identification, and as the first source IP address, tunnel.An IP address corresponding with the first virtual network instance identification is obtained in the first tunnel configuration information, and as the first destination IP address, tunnel, be included in the first tunnel configuration information, obtain the IP address that there are mapping relations with the first virtual network instance identification, and do the first destination IP address, tunnel.
Exemplary, based on the second tunnel configuration information shown in table 1, obtain the first source IP address, tunnel and comprise:
According to the VNI1 taken out in the second configuration information, in the second configuration information, obtain the IPTA1 mapped with VNI1, as the first source IP address, tunnel.
Based on the first tunnel configuration information shown in table 2, obtain the first destination IP address, tunnel and comprise:
According to the VNI1 taken out in the second tunnel configuration information, in the first configuration information, obtain the IPTB1 mapped with VNI1, as the first destination IP address, tunnel.
304, judge that whether the first source IP address, tunnel is identical with the first destination IP address, tunnel.
According to the first source IP address, tunnel obtained in step 303 and the first destination IP address, tunnel, judge whether it is same IP address.
According to the judged result of step 304, when the first source IP address, tunnel is identical with the first destination IP address, tunnel, then carry out following steps:
305, the first equipment sends Fisrt fault message to the second equipment.
Wherein Fisrt fault message comprises the illegal and concrete illegal content of the second tunnel configuration information, and namely the second tunnel configuration information is identical with destination IP address, tunnel to source IP address in tunnel in the configuration information in same VXLAN tunnel with the first tunnel configuration information pointer.Fisrt fault message can also comprise in above-mentioned illegal content the 2nd IP address occurring in the second tunnel configuration information overlapping.
First equipment sends Fisrt fault message to the second equipment, can be that illegal content illegal and concrete for the second tunnel configuration information is sent to the second equipment with the form of packet by the first equipment, also can be by BGP, illegal content illegal and concrete for the second tunnel configuration information is notified that the form of Notification message is sent to the second equipment by the first equipment.
According to the judged result of step 304, when the first source IP address, tunnel is different from the first destination IP address, tunnel, then carry out following steps:
306, from the second tunnel configuration information, a 2nd IP address is taken out as the second destination IP address, tunnel.
From the second tunnel configuration information, wherein take out a 2nd IP address as the second destination IP address, tunnel, can for taking out any one the 2nd IP address and as the second destination IP address, tunnel from the second tunnel configuration information, exemplary, based on the second tunnel configuration information shown in table 1, VNI4 is taken out, as the second destination IP address, tunnel from the second tunnel configuration information.
307, in the second tunnel configuration information, all virtual network instance identification corresponding with the second destination IP address, tunnel are obtained, and as the second virtual network instance identification group; The tunnel destination IP address corresponding with each virtual network instance identification in the second virtual network instance identification group is obtained in the first tunnel configuration information.
Wherein, the all virtual network instance identification corresponding with the second destination IP address, tunnel are obtained in the second tunnel configuration information, comprise in acquisition second tunnel configuration information and there are one or more virtual network instance identification of mapping relations with the second destination IP address, tunnel obtained within step 306, and using the set of obtained virtual network instance identification as the second virtual network instance identification group.
The tunnel destination IP address corresponding with each virtual network instance identification in the second virtual network instance identification group is obtained in the first tunnel configuration information, comprise an IP address corresponding respectively with virtual network instance identification all in the second virtual network instance identification group in acquisition first tunnel configuration information, and the IP address obtained is considered as the second source IP address, tunnel, the second source IP address, tunnel can comprise an one or more IP address.
308, judge that whether the destination IP address, tunnel that in the second virtual network instance identification group, each virtual network instance identification is corresponding is unique.
When the destination IP address, tunnel that each virtual network instance identification in the second virtual network instance identification group obtained in step 307 is corresponding is multiple IP addresses, then there is multiple second tunnel source IP address corresponding with the second destination IP address, tunnel in representative; When the second source IP address, tunnel obtained in step 307 is an IP address, then the second source IP address, tunnel that representative is corresponding with the second destination IP address, tunnel is unique.
According to the judged result of step 308, when the destination IP address, tunnel that each virtual network instance identification in the second virtual network instance identification group is corresponding is not unique, then carry out following steps:
309, the first equipment sends the second fault message to the second equipment.
Wherein the second fault message comprises the illegal and concrete illegal content of the second tunnel configuration information, and the second namely corresponding with the second destination IP address, tunnel source IP address, tunnel is not unique.
First equipment sends the second fault message to the second equipment, can be that illegal content illegal and concrete for the second tunnel configuration information is sent to the second equipment with the form of packet by the first equipment, also can be by BGP, illegal content illegal and concrete for the second tunnel configuration information is notified that the form of Notification message is sent to the second equipment by the first equipment.Second fault message can also comprise in above-mentioned illegal content with the first tunnel configuration information in as an IP address of the second destination IP address, tunnel, and as the 2nd IP address of the second source IP address, tunnel in the second tunnel configuration information.
Optionally, after step 305, also comprise:
S01, the second equipment carry out miscue according to the content of Fisrt fault message.
After the Fisrt fault message that second equipment is sent at first equipment that receives, the illegal content of the second tunnel configuration information comprised according to Fisrt fault message carries out miscue, the content of wherein carrying out showing can comprise the illegal concrete reason of the second tunnel configuration information, namely because the second tunnel configuration information overlaps with destination IP address, tunnel to source IP address in tunnel in the configuration information in same VXLAN tunnel with the first tunnel configuration information pointer, the content carrying out showing can also comprise in above-mentioned illegal content the 2nd IP address occurring in the second tunnel configuration information overlapping.Display herein, can be shown by the mode of log recording, also can be shown by the mode of print command.
Optionally, after step 309, also comprise:
S02, the second equipment carry out miscue according to the content of the second fault message.
After the second fault message that second equipment is sent at first equipment that receives, the illegal content of the second tunnel configuration information comprised according to the second fault message carries out miscue, the content of wherein carrying out showing can comprise the illegal concrete reason of the second tunnel configuration information, namely the second corresponding with the second destination IP address, tunnel source IP address, tunnel is not unique, the content carrying out showing can also comprise in above-mentioned illegal content with the first tunnel configuration information in as an IP address of the second destination IP address, tunnel, and second in tunnel configuration information as the 2nd IP address of the second source IP address, tunnel with the second tunnel destination IP address maps.Display herein, can be shown by the mode of log recording, also can be shown by the mode of print command.
A kind of VXLAN tunnel detection method that the embodiment of the present invention provides, comprising: first the first equipment receives the second tunnel configuration information that the second equipment sends; Secondly from the second tunnel configuration information, a virtual network instance identification is taken out as the first virtual network instance identification; The two IP address corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information, and as the first source IP address, tunnel, an IP address corresponding with the first virtual network instance identification is obtained in the first tunnel configuration information, and as the first destination IP address, tunnel; Judge that whether the first source IP address, tunnel is identical with the first destination IP address, tunnel, if identical first equipment sends Fisrt fault message to the second equipment; A the 2nd IP address is taken out as the second destination IP address, tunnel from the second tunnel configuration information; The all virtual network instance identification corresponding with the second destination IP address, tunnel are obtained in the second tunnel configuration information, and as the second virtual network instance identification group; The tunnel destination IP address corresponding with each virtual network instance identification in the second virtual network instance identification group is obtained in the first tunnel configuration information; Judge that whether destination IP address, tunnel i.e. the second source IP address, tunnel that in the second virtual network instance identification group, each virtual network instance identification is corresponding is unique, if not unique first equipment sends the second fault message to the second equipment.Therefore the VXLAN tunnel detection method that provides of above-described embodiment, for the VXLAN tunnel information configured in VXLAN network, by the second tunnel configuration information that the second equipment generates according to own configuration information, mate with configuration information i.e. the first tunnel configuration information on the first equipment required for detection second tunnel configuration information legitimacy, when during the second tunnel configuration information and the first tunnel configuration information pointer are to the configuration information in same VXLAN tunnel, source IP address, tunnel overlaps with destination IP address, tunnel, first equipment sends the Fisrt fault message comprising above-mentioned illegal content to the second equipment, when selecting an IP address as the second destination IP address, tunnel in the first tunnel configuration information, time not unique according to the second tunnel source IP address corresponding with the second destination IP address, tunnel of the second tunnel configuration acquisition of information, the first equipment sends the second fault message comprising above-mentioned illegal content to the second equipment.Thus before setting up VXLAN tunnel, legitimacy detection is carried out to the configuration information will setting up VXLAN tunnel, when the configuration information of detected equipment is illegal, the illegal content of configuration information that this configuration information is illegal and concrete is informed to this equipment, thus can feed back in time the failed reason of VXLAN tunnel foundation, improve VXLAN tunnel and set up efficiency, improve Consumer's Experience.
Embodiments of the invention provide a kind of VXLAN tunnel establishing method, use the VXLAN tunnel detection method in above-mentioned any embodiment to detect before setting up VXLAN tunnel.
Setting up in VXLAN tunneling process, a VNI is taken out from the second tunnel configuration information, the IP address mapped according to the first tunnel configuration acquisition of information and this VNI as tunnel source IP address, the 2nd IP address mapped according to the second tunnel configuration acquisition of information and this VNI is as object IP address, tunnel, and tunnel source IP address and object IP address, tunnel form a tunnel.The VNI that this tunnel carries is sought common ground by the VNI that the VNI that object IP address, tunnel is corresponding in the second tunnel configuration information is corresponding in the first tunnel configuration information with tunnel source IP address and obtains.
A kind of VXLAN tunnel establishing method that the embodiment of the present invention provides, is included in before setting up VXLAN tunnel and detects, comprising: first the first equipment receives the second tunnel configuration information that the second equipment sends; Secondly from the second tunnel configuration information, a virtual network instance identification is taken out as the first virtual network instance identification; The two IP address corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information, and as the first source IP address, tunnel, an IP address corresponding with the first virtual network instance identification is obtained in the first tunnel configuration information, and as the first destination IP address, tunnel; Judge that whether the first source IP address, tunnel is identical with the first destination IP address, tunnel, if identical first equipment sends Fisrt fault message to the second equipment; A the 2nd IP address is taken out as the second destination IP address, tunnel from the second tunnel configuration information; The all virtual network instance identification corresponding with the second destination IP address, tunnel are obtained in the second tunnel configuration information, and as the second virtual network instance identification group; The tunnel destination IP address corresponding with each virtual network instance identification in the second virtual network instance identification group is obtained in the first tunnel configuration information; Judge that whether the tunnel destination IP address corresponding with each virtual network instance identification in the second virtual network instance identification group be unique, if not unique first equipment sends the second fault message to the second equipment.Therefore the VXLAN tunnel detection method that provides of above-described embodiment, for the VXLAN tunnel information configured in VXLAN network, by the second tunnel configuration information that the second equipment generates according to own configuration information, mate with configuration information i.e. the first tunnel configuration information on the first equipment required for detection second tunnel configuration information legitimacy, when during the second tunnel configuration information and the first tunnel configuration information pointer are to the configuration information in same VXLAN tunnel, source IP address, tunnel overlaps with destination IP address, tunnel, first equipment sends the Fisrt fault message comprising above-mentioned illegal content to the second equipment, when selecting an IP address as the second destination IP address, tunnel in the first tunnel configuration information, time not unique according to the second tunnel source IP address corresponding with the second destination IP address, tunnel of the second tunnel configuration acquisition of information, the first equipment sends the second fault message comprising above-mentioned illegal content to the second equipment.Thus before setting up VXLAN tunnel, legitimacy detection is carried out to the configuration information will setting up VXLAN tunnel, when the configuration information of detected equipment is illegal, the illegal content of configuration information that this configuration information is illegal and concrete is informed to this equipment, thus can feed back in time the failed reason of VXLAN tunnel foundation, improve VXLAN tunnel and set up efficiency, improve Consumer's Experience.
With reference to shown in Fig. 4, embodiments of the invention provide a kind of VXLAN tunnel detector, comprising:
Receiving element 401, for the second tunnel configuration information sent when reception second equipment.
Wherein the first equipment and the second equipment are VXLAN endpoint of a tunnel (VXLANTunnelEndPoint, VTEP), first equipment and the second equipment room route can reach, namely the first equipment sends data to the second equipment room, second equipment can receive the data that the first equipment sends, and sending feedback data to the first equipment, the first equipment can receive the feedback data that the second equipment sends.First equipment and the second equipment can be independently physical equipment, as router etc., and also can for running the server having virtual machine.
Second tunnel configuration information, be included in the first equipment and the second equipment room and set up configuration information required for VXLAN tunnel, second tunnel configuration information can comprise destination address, VXLAN tunnel i.e. the 2nd IP address ip TA, VNI with the VXLAN of VXLAN tunnel-associated, and the mapping relations of IPTA and VNI, wherein IPTA is with the address of VXLAN tunnel destination under the second equipment prerequisite that is VXLAN tunnel source.One of them IPTA can corresponding one or more VNI, and VNI only can occur in mapping relations wherein.Second tunnel configuration information can be generated according to own configuration information by the second equipment, also can for being stored in the configuration information in the second equipment in advance.Exemplary, as shown in table 1, be a kind of specific implementation of the second tunnel configuration information.
Processing unit 402, for mating described second tunnel configuration information with the first tunnel configuration information on described first equipment.
Wherein the first tunnel configuration information is positioned on the first equipment, first tunnel configuration information comprises the configuration information for the first equipment required for detecting in the legitimacy of the first equipment to the second tunnel configuration information, first tunnel configuration information can comprise destination address, a VXLAN tunnel i.e. IP address ip TB, VNI with the VXLAN of VXLAN tunnel-associated, and the mapping relations of IPTB and VNI, wherein IPTB is with the address of VXLAN tunnel destination under the first equipment prerequisite that is VXLAN tunnel source.One of them IPTB can corresponding one or more VNI, and VNI only can occur in mapping relations wherein.First tunnel configuration information can be generated according to own configuration information by the first equipment, also can for being stored in the configuration information in the first equipment in advance.Exemplary, as shown in table 2, be a kind of specific implementation of the first tunnel configuration information.
Second tunnel configuration information is mated with the first tunnel configuration information, can be take out a VNI from the second tunnel configuration information, and the IPTA corresponding with this VNI, IPTB corresponding with this VNI according to the first tunnel configuration acquisition of information again, when IPTA and IPTB is identical, the second tunnel configuration information is not mated with the first tunnel configuration information.Second tunnel configuration information is mated with the first tunnel configuration information, also can be take out an IPTA from the second tunnel configuration information, the all VNIs corresponding with this IPTA with the second tunnel configuration acquisition of information according to this IPTA, according to the first tunnel configuration acquisition of information and each self-corresponding IPTB of this all VNI, when obtained IPTB is not unique, the second tunnel configuration information is not mated with the first tunnel configuration information.
Exemplary: based on the first tunnel configuration information shown in the second tunnel configuration information shown in table 1 and table 2, when mating with the first tunnel configuration information the second tunnel configuration information: take out VNI1 from the second configuration information, and the IPTA1 corresponding with VNI1, the IPTB1 corresponding with VNI1 is obtained according to the first configuration information, as IPTA1=IPTB1, the second configuration information does not mate with the first configuration information.
Transmitting element 403, for when described first tunnel configuration information is not mated with described second tunnel configuration information, sends fault message to described second equipment.
Wherein to the fault message that the second equipment sends, can be expression second configuration information and the unmatched data of the first configuration information, also can be the data also comprising expression second configuration information and the concrete not match-type of the first configuration information, as long as to the second equipment, the first equipment can inform that the second configuration information is illegal by fault message.
A kind of VXLAN tunnel detector that the embodiment of the present invention provides, comprising: first receive the second tunnel configuration information that the second equipment sends; Secondly the second tunnel configuration information is mated with the first tunnel configuration information on the first equipment; Finally when the first tunnel configuration information is not mated with the second tunnel configuration information, send fault message to the second equipment; Wherein the first tunnel configuration information comprises the mapping relations of an IP address and virtual network instance identification VNID, one IP address is the IP address setting up the destination in VXLAN tunnel with the first equipment, second tunnel configuration information comprises the mapping relations of the 2nd IP address and virtual network instance identification VNID, 2nd IP address is the IP address setting up the destination in VXLAN tunnel with described second equipment, and tunnel configuration information is used for the first equipment and the second equipment sets up VXLAN tunnel.Therefore the VXLAN tunnel detection method that provides of above-described embodiment, for the VXLAN tunnel information configured in VXLAN network, by the second tunnel configuration information that the second equipment generates according to own configuration information, mate with configuration information i.e. the first tunnel configuration information on the first equipment required for detection second tunnel configuration information legitimacy, and judge that whether the second configuration information is legal according to matching result, as illegal in the second configuration information, fault message is sent to the second equipment, second equipment is learnt, and the configuration information that the second equipment is set up required for VXLAN tunnel is illegal, thus before setting up VXLAN tunnel, legitimacy detection is carried out to the configuration information will setting up VXLAN tunnel, when the configuration information of detected equipment is illegal, this error message is informed to this equipment, thus can feed back in time the failed reason of VXLAN tunnel foundation, improve VXLAN tunnel and set up efficiency, improve Consumer's Experience.
Concrete, with reference to shown in Fig. 4, in the above-described embodiments, the first equipment and the second equipment can also for establishing the neighborhood (or claiming Correspondent Node/peer-entities) in Border Gateway Protocol (BorderGatewayProtocol is called for short BGP).
Processing unit 401 can also be used for:
A virtual network instance identification is taken out as the first virtual network instance identification from the second tunnel configuration information; The two IP address corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information, and as the first source IP address, tunnel, an IP address corresponding with the first virtual network instance identification is obtained in the first tunnel configuration information, and as the first destination IP address, tunnel; Wherein from the second tunnel configuration information, take out a virtual network instance identification, can for taking out any one virtual network instance identification and as the first virtual network instance identification from the second tunnel configuration information, exemplary: based on the second tunnel configuration information shown in table 1, VNI2 is taken out, as the first virtual network instance identification from the second tunnel configuration information.
Wherein in the second tunnel configuration information, obtain the two IP address corresponding with the first virtual network instance identification, and as the first source IP address, tunnel, be included in the second tunnel configuration information, obtain the 2nd IP address that there are mapping relations with the first virtual network instance identification, and as the first source IP address, tunnel.An IP address corresponding with the first virtual network instance identification is obtained in the first tunnel configuration information, and as the first destination IP address, tunnel, be included in the first tunnel configuration information, obtain the IP address that there are mapping relations with the first virtual network instance identification, and as the first destination IP address, tunnel.
Exemplary, based on the second tunnel configuration information shown in table 1, obtain the first source IP address, tunnel and comprise:
According to the VNI1 taken out in the second configuration information, in the second configuration information, obtain the IPTA1 mapped with VNI1, as the first source IP address, tunnel.
Based on the first tunnel configuration information shown in table 2, obtain the first destination IP address, tunnel and comprise:
According to the VNI1 taken out in the second tunnel configuration information, in the first configuration information, obtain the IPTB1 mapped with VNI1, as the first destination IP address, tunnel.
Transmitting element 403 can also be used for:
When the first source IP address, tunnel is identical with the first destination IP address, tunnel, send Fisrt fault message to the second equipment.
Wherein Fisrt fault message comprises the illegal and concrete illegal content of the second tunnel configuration information, and namely the second tunnel configuration information is identical with destination IP address, tunnel to source IP address in tunnel in the configuration information in same VXLAN tunnel with the first tunnel configuration information pointer.Fisrt fault message can also comprise in above-mentioned illegal content the 2nd IP address occurring in the second tunnel configuration information overlapping.
Fisrt fault message is sent to the second equipment, can be that illegal content illegal and concrete for the second tunnel configuration information is sent to the second equipment with the form of packet by the first equipment, also can be by BGP, illegal content illegal and concrete for the second tunnel configuration information is notified that the form of Notification message is sent to the second equipment by the first equipment.
Optionally, the second equipment, after receiving Fisrt fault message, carries out miscue according to described Fisrt fault message.
A kind of VXLAN tunnel detector that the embodiment of the present invention provides, comprising: first the first equipment receives the second tunnel configuration information that the second equipment sends, secondly from the second tunnel configuration information, a virtual network instance identification is taken out as the first virtual network instance identification, the two IP address corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information, and as the first source IP address, tunnel, an IP address corresponding with the first virtual network instance identification is obtained in the first tunnel configuration information, and as the first destination IP address, tunnel, judge that whether the first source IP address, tunnel is identical with the first destination IP address, tunnel, send Fisrt fault message if identical to the second equipment, therefore the VXLAN tunnel detection method that provides of above-described embodiment, for the VXLAN tunnel information configured in VXLAN network, by the second tunnel configuration information that the second equipment generates according to own configuration information, mate with configuration information i.e. the first tunnel configuration information on the first equipment required for detection second tunnel configuration information legitimacy, when during the second tunnel configuration information and the first tunnel configuration information pointer are to the configuration information in same VXLAN tunnel, source IP address, tunnel overlaps with destination IP address, tunnel, the Fisrt fault message comprising above-mentioned illegal content is sent to the second equipment.Thus before setting up VXLAN tunnel, legitimacy detection is carried out to the configuration information will setting up VXLAN tunnel, when the configuration information of detected equipment is illegal, the illegal content of configuration information that this configuration information is illegal and concrete is informed to this equipment, thus can feed back in time the failed reason of VXLAN tunnel foundation, improve VXLAN tunnel and set up efficiency, improve Consumer's Experience.
Concrete, with reference to shown in Fig. 4, in the above-described embodiments, processing unit 401 can also be used for:
A the 2nd IP address is taken out as the second destination IP address, tunnel from the second tunnel configuration information; The all virtual network instance identification corresponding with the second destination IP address, tunnel are obtained in the second tunnel configuration information, and as the second virtual network instance identification group; The tunnel destination IP address corresponding with each virtual network instance identification in the second virtual network instance identification group is obtained in the first tunnel configuration information.
From the second tunnel configuration information, wherein take out a 2nd IP address as the second destination IP address, tunnel, can for taking out any one the 2nd IP address and as the second destination IP address, tunnel from the second tunnel configuration information, exemplary, based on the second tunnel configuration information shown in table 1, VNI4 is taken out, as the second destination IP address, tunnel from the second tunnel configuration information.
The all virtual network instance identification corresponding with the second destination IP address, tunnel are obtained in the second tunnel configuration information, and as the second virtual network instance identification group, comprise in acquisition second tunnel configuration information and there are one or more virtual network instance identification of mapping relations with the second destination IP address, tunnel obtained within step 306, and using the set of obtained virtual network instance identification as the second virtual network instance identification group.
The tunnel destination IP address corresponding with each virtual network instance identification in the second virtual network instance identification group is obtained in the first tunnel configuration information, comprise an IP address corresponding respectively with virtual network instance identification all in the second virtual network instance identification group in acquisition first tunnel configuration information, and the IP address obtained is considered as the second source IP address, tunnel, the second source IP address, tunnel can comprise an one or more IP address.
Transmitting element 403 can also be used for:
When the second source IP address, tunnel is not unique, send the second fault message to the second equipment.
When the IP address corresponding respectively with all virtual network instance identification in the second virtual network instance identification group obtained in step 307 is greater than one, then representative exists and is greater than a second tunnel source IP address corresponding with the second destination IP address, tunnel; When the second source IP address, tunnel obtained in step 307 is an IP address, then the second source IP address, tunnel that representative is corresponding with the second destination IP address, tunnel is unique.
Wherein the second fault message comprises the illegal and concrete illegal content of the second tunnel configuration information, and the second namely corresponding with the second destination IP address, tunnel source IP address, tunnel is not unique.
The second fault message is sent to the second equipment, can for illegal content illegal and concrete for the second tunnel configuration information be sent to the second equipment with the form of packet, also can for illegal content illegal and concrete for the second tunnel configuration information be sent to the second equipment by the form of BGPNotification message.Second fault message can also comprise in above-mentioned illegal content with the first tunnel configuration information in as an IP address of the second destination IP address, tunnel, and as the 2nd IP address of the second source IP address, tunnel in the second tunnel configuration information.
Optionally, the second equipment, after receiving the second fault message, carries out miscue according to described second fault message.
A kind of VXLAN tunnel detector that the embodiment of the present invention provides, comprising: first the first equipment receives the second tunnel configuration information that the second equipment sends; First from the second tunnel configuration information, a 2nd IP address is taken out as the second destination IP address, tunnel; Secondly in the second tunnel configuration information, all virtual network instance identification corresponding with the second destination IP address, tunnel are obtained, and as the second virtual network instance identification group; The tunnel destination IP address corresponding with each virtual network instance identification in the second virtual network instance identification group is obtained in the first tunnel configuration information; Finally judge that whether destination IP address, tunnel i.e. the second source IP address, tunnel that in the second virtual network instance identification group, each virtual network instance identification is corresponding is unique, if not unique first equipment sends the second fault message to the second equipment.Therefore the VXLAN tunnel detection method that provides of above-described embodiment, for the VXLAN tunnel information configured in VXLAN network, by the second tunnel configuration information that the second equipment generates according to own configuration information, mate with configuration information i.e. the first tunnel configuration information on the first equipment required for detection second tunnel configuration information legitimacy, when selecting an IP address as the second destination IP address, tunnel in the first tunnel configuration information, time not unique according to the second tunnel source IP address corresponding with the second destination IP address, tunnel of the second tunnel configuration acquisition of information, the the second fault message comprising above-mentioned illegal content is sent to the second equipment.Thus before setting up VXLAN tunnel, legitimacy detection is carried out to the configuration information will setting up VXLAN tunnel, when the configuration information of detected equipment is illegal, the illegal content of configuration information that this configuration information is illegal and concrete is informed to this equipment, thus can feed back in time the failed reason of VXLAN tunnel foundation, improve VXLAN tunnel and set up efficiency, improve Consumer's Experience.
Wherein, it should be noted that, unit in the present embodiment can be the processor or transducer set up separately, also can be integrated in some processors or transducer and realize, in addition, also can be stored in the memory of touch point recognition device with the form of program code, called by processor and perform the function of above unit.Processor described here can be a central processing unit (English full name: CentralProcessingUnit, English abbreviation: CPU), or be configured to the one or more integrated circuits (English full name: IntegratedCircuit, English abbreviation: IC) implementing the embodiment of the present invention; Transducer can be an electronic component, or the circuit structure of multiple electronic component composition, or is configured to the one or more integrated circuits implementing the embodiment of the present invention.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (10)

1. a VXLAN tunnel detection method, is characterized in that, the method comprises:
First equipment receives the second tunnel configuration information that the second equipment sends;
Described second tunnel configuration information is mated with the first tunnel configuration information on described first equipment;
When described first tunnel configuration information is not mated with described second tunnel configuration information, described first equipment sends fault message to described second equipment;
Described first tunnel configuration information comprises the mapping relations of an IP address and virtual network instance identification VNID, and a described IP address is the IP address setting up the destination in VXLAN tunnel with described first equipment; Described second tunnel configuration information comprises the mapping relations of the 2nd IP address and virtual network instance identification VNID, described 2nd IP address is the IP address setting up the destination in VXLAN tunnel with described second equipment, and wherein tunnel configuration information sets up VXLAN tunnel for the first equipment and the second equipment.
2. VXLAN tunnel detection method according to claim 1, is characterized in that:
Described described second tunnel configuration information to be mated with the first tunnel configuration information on described first equipment, comprising:
From described second tunnel configuration information, take out the first virtual network instance identification, wherein said first virtual network instance identification is arbitrary virtual network instance identification of described second tunnel configuration information;
The two IP address corresponding with described first virtual network instance identification is obtained in described second tunnel configuration information, and as the first source IP address, tunnel;
An IP address corresponding with described first virtual network instance identification is obtained in described first tunnel configuration information, and as the first destination IP address, tunnel; And/or
Described when described first tunnel configuration information is not mated with described second tunnel configuration information, described first equipment sends fault message to described second equipment, comprising:
When described first source IP address, tunnel is identical with described first destination IP address, tunnel, described first equipment sends Fisrt fault message to described second equipment.
3. the VXLAN tunnel detection method according to any one of claim 1-2, is characterized in that:
Described described second tunnel configuration information to be mated with the first tunnel configuration information on described first equipment, also comprises:
A the 2nd IP address is taken out as the second destination IP address, tunnel from described second tunnel configuration information;
The all virtual network instance identification corresponding with described second destination IP address, tunnel are obtained in described second tunnel configuration information, and as the second virtual network instance identification group;
The tunnel destination IP address corresponding with each virtual network instance identification in described second virtual network instance identification group is obtained in described first tunnel configuration information; And/or
Described when described first tunnel configuration information is not mated with described second tunnel configuration information, described first equipment sends fault message to described second equipment, comprising:
When the destination IP address, tunnel that each virtual network instance identification in described second virtual network instance identification group is corresponding is not unique, described first equipment sends the second fault message to described second equipment.
4., according to the arbitrary described VXLAN tunnel detection method of claim 1-3, it is characterized in that, described first equipment and described second equipment are bgp neighbor.
5. VXLAN tunnel detection method according to claim 4, is characterized in that, described fault message is that BGP notifies Notification message;
After described second equipment receives described fault message, the content according to fault message carries out miscue, and maintains described bgp neighbor and be in established state.
6. a VXLAN tunnel detector, is positioned at the first equipment, it is characterized in that, comprising:
Receiving element, for receiving the second tunnel configuration information that the second equipment sends;
Processing unit, for mating described second tunnel configuration information with the first tunnel configuration information on described first equipment;
Transmitting element, for when described first tunnel configuration information is not mated with described second tunnel configuration information, sends fault message to described second equipment;
Described first tunnel configuration information comprises the mapping relations of an IP address and virtual network instance identification VNID, and a described IP address is the IP address setting up the destination in VXLAN tunnel with described first equipment; Described second tunnel configuration information comprises the mapping relations of the 2nd IP address and virtual network instance identification VNID, described 2nd IP address is the IP address setting up the destination in VXLAN tunnel with described second equipment, and wherein said tunnel configuration information is used for the first equipment and the second equipment sets up VXLAN tunnel.
7. VXLAN tunnel detector according to claim 6, is characterized in that, described processing unit also for:
From described second tunnel configuration information, take out the first virtual network instance identification, wherein said first virtual network instance identification is arbitrary virtual network instance identification of described second tunnel configuration information;
The two IP address corresponding with described first virtual network instance identification is obtained in described second tunnel configuration information, and as the first source IP address, tunnel;
An IP address corresponding with described first virtual network instance identification is obtained in described first tunnel configuration information, and as the first destination IP address, tunnel; And/or
Described transmitting element also for:
When described first source IP address, tunnel is identical with described first destination IP address, tunnel, send Fisrt fault message to described second equipment.
8. the VXLAN tunnel detector according to any one of claim 6-7, is characterized in that, described processing unit also for:
A the 2nd IP address is taken out as the second destination IP address, tunnel from described second tunnel configuration information;
The all virtual network instance identification corresponding with described second destination IP address, tunnel are obtained in described second tunnel configuration information, and as the second virtual network instance identification group;
The tunnel destination IP address corresponding with each virtual network instance identification in described second virtual network instance identification group is obtained in described first tunnel configuration information; And/or
Described transmitting element also for:
When the destination IP address, tunnel that each virtual network instance identification in described second virtual network instance identification group is corresponding is not unique, send the second fault message to described second equipment.
9. the VXLAN tunnel detector according to any one of claim 6-8, is characterized in that, described first equipment and described second equipment are bgp neighbor.
10. VXLAN tunnel detector according to claim 9, is characterized in that, described fault message is that BGP notifies Notification message;
After described second equipment receives described fault message, the content according to fault message carries out miscue, and maintains described bgp neighbor and be in established state.
CN201510931765.1A 2015-12-14 2015-12-14 A kind of VXLAN tunnel detection method and device Active CN105490884B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510931765.1A CN105490884B (en) 2015-12-14 2015-12-14 A kind of VXLAN tunnel detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510931765.1A CN105490884B (en) 2015-12-14 2015-12-14 A kind of VXLAN tunnel detection method and device

Publications (2)

Publication Number Publication Date
CN105490884A true CN105490884A (en) 2016-04-13
CN105490884B CN105490884B (en) 2019-04-02

Family

ID=55677625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510931765.1A Active CN105490884B (en) 2015-12-14 2015-12-14 A kind of VXLAN tunnel detection method and device

Country Status (1)

Country Link
CN (1) CN105490884B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107171966A (en) * 2017-07-27 2017-09-15 迈普通信技术股份有限公司 A kind of VXLAN file transmitting methods, VTEP and VXLAN systems
CN108123864A (en) * 2016-11-30 2018-06-05 新华三技术有限公司 EVPN tunnel monitoring method and apparatus
WO2018103613A1 (en) * 2016-12-05 2018-06-14 大唐移动通信设备有限公司 Service data processing method and apparatus
CN111130978A (en) * 2019-12-03 2020-05-08 杭州迪普科技股份有限公司 Network traffic forwarding method and device, electronic equipment and machine-readable storage medium
WO2020103718A1 (en) * 2018-11-23 2020-05-28 中兴通讯股份有限公司 Connection establishment method, packet transmission method, device, and storage medium
CN112187611A (en) * 2020-09-30 2021-01-05 瑞斯康达科技发展股份有限公司 Method, storage medium and device for establishing service tunnel
CN112583690A (en) * 2019-09-27 2021-03-30 华为技术有限公司 Tunnel configuration method, device, system, equipment and storage medium
CN112887185A (en) * 2019-11-29 2021-06-01 华为技术有限公司 Communication method and device of overlay network
CN113746715A (en) * 2021-07-16 2021-12-03 北京华三通信技术有限公司 Communication method and device
CN113923075A (en) * 2020-07-09 2022-01-11 华为技术有限公司 Data transmission method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7373660B1 (en) * 2003-08-26 2008-05-13 Cisco Technology, Inc. Methods and apparatus to distribute policy information
CN102822835A (en) * 2010-01-20 2012-12-12 先行有限公司 Personal portable secured network access system
US20130170490A1 (en) * 2011-12-30 2013-07-04 Cisco Technology, Inc. System and method for discovering multipoint endpoints in a network environment
CN103580980A (en) * 2012-07-24 2014-02-12 中兴通讯股份有限公司 Automatic searching and automatic configuration method and device of VN
CN104243268A (en) * 2014-09-19 2014-12-24 杭州华三通信技术有限公司 Association method and device between virtual extensible local area networks (VXLAN) and tunnel
US8954601B1 (en) * 2007-06-15 2015-02-10 Juniper Networks, Inc. Authentication and encryption of routing protocol traffic
CN104468394A (en) * 2014-12-04 2015-03-25 杭州华三通信技术有限公司 Method and device for forwarding messages in VXLAN network
CN104767666A (en) * 2015-04-15 2015-07-08 杭州华三通信技术有限公司 Virtual extensible local area network tunnel terminal tunnel building method and equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7373660B1 (en) * 2003-08-26 2008-05-13 Cisco Technology, Inc. Methods and apparatus to distribute policy information
US8954601B1 (en) * 2007-06-15 2015-02-10 Juniper Networks, Inc. Authentication and encryption of routing protocol traffic
CN102822835A (en) * 2010-01-20 2012-12-12 先行有限公司 Personal portable secured network access system
US20130170490A1 (en) * 2011-12-30 2013-07-04 Cisco Technology, Inc. System and method for discovering multipoint endpoints in a network environment
CN103580980A (en) * 2012-07-24 2014-02-12 中兴通讯股份有限公司 Automatic searching and automatic configuration method and device of VN
CN104243268A (en) * 2014-09-19 2014-12-24 杭州华三通信技术有限公司 Association method and device between virtual extensible local area networks (VXLAN) and tunnel
CN104468394A (en) * 2014-12-04 2015-03-25 杭州华三通信技术有限公司 Method and device for forwarding messages in VXLAN network
CN104767666A (en) * 2015-04-15 2015-07-08 杭州华三通信技术有限公司 Virtual extensible local area network tunnel terminal tunnel building method and equipment

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108123864B (en) * 2016-11-30 2020-09-25 新华三技术有限公司 EVPN tunnel monitoring method and device
CN108123864A (en) * 2016-11-30 2018-06-05 新华三技术有限公司 EVPN tunnel monitoring method and apparatus
CN108617008B (en) * 2016-12-05 2019-09-17 大唐移动通信设备有限公司 A kind of method and apparatus of business data processing
US10819537B2 (en) 2016-12-05 2020-10-27 Datang Mobile Communications Equipment Co., Ltd. Method and apparatus for processing service data
CN108617008A (en) * 2016-12-05 2018-10-02 大唐移动通信设备有限公司 A kind of method and apparatus of business data processing
WO2018103613A1 (en) * 2016-12-05 2018-06-14 大唐移动通信设备有限公司 Service data processing method and apparatus
CN107171966B (en) * 2017-07-27 2019-11-26 迈普通信技术股份有限公司 A kind of VXLAN file transmitting method, VTEP and VXLAN system
CN107171966A (en) * 2017-07-27 2017-09-15 迈普通信技术股份有限公司 A kind of VXLAN file transmitting methods, VTEP and VXLAN systems
WO2020103718A1 (en) * 2018-11-23 2020-05-28 中兴通讯股份有限公司 Connection establishment method, packet transmission method, device, and storage medium
WO2021057962A1 (en) * 2019-09-27 2021-04-01 华为技术有限公司 Tunnel configuration method, apparatus and system, and device and storage medium
CN112583690A (en) * 2019-09-27 2021-03-30 华为技术有限公司 Tunnel configuration method, device, system, equipment and storage medium
CN112887185A (en) * 2019-11-29 2021-06-01 华为技术有限公司 Communication method and device of overlay network
CN112887185B (en) * 2019-11-29 2024-03-15 华为云计算技术有限公司 Communication method and device of overlay network
CN111130978A (en) * 2019-12-03 2020-05-08 杭州迪普科技股份有限公司 Network traffic forwarding method and device, electronic equipment and machine-readable storage medium
CN111130978B (en) * 2019-12-03 2021-11-23 杭州迪普科技股份有限公司 Network traffic forwarding method and device, electronic equipment and machine-readable storage medium
WO2022007749A1 (en) * 2020-07-09 2022-01-13 华为技术有限公司 Data transmission method and apparatus
CN113923075A (en) * 2020-07-09 2022-01-11 华为技术有限公司 Data transmission method and device
CN112187611A (en) * 2020-09-30 2021-01-05 瑞斯康达科技发展股份有限公司 Method, storage medium and device for establishing service tunnel
CN112187611B (en) * 2020-09-30 2022-03-25 瑞斯康达科技发展股份有限公司 Method, storage medium and device for establishing service tunnel
CN113746715A (en) * 2021-07-16 2021-12-03 北京华三通信技术有限公司 Communication method and device

Also Published As

Publication number Publication date
CN105490884B (en) 2019-04-02

Similar Documents

Publication Publication Date Title
CN105490884A (en) VXLAN tunnel detection method and apparatus
US10938627B2 (en) Packet processing method, device, and network system
CN113595897B (en) Path detection method and device
CN106559292A (en) A kind of broad band access method and device
CN104660469B (en) A kind of method for detecting connectivity and relevant device of double layer network
CN108718269B (en) Message processing method and device
US10574570B2 (en) Communication processing method and apparatus
CN109379241B (en) Path information determination method and device
CN105472049B (en) CGN backup protection method and device for carrier-grade network address conversion
US11711243B2 (en) Packet processing method and gateway device
CN110011941B (en) Message forwarding method and device
CN110875855A (en) Method for detecting network link state and network equipment
JP2017041747A (en) Information processing device, information processing device control program, control method, and information processing system
CN108075969A (en) Message forwarding method and device
CN107623757A (en) Entry updating method and apparatus
CN112152920B (en) Method and device for realizing table entry backup
CN102739462B (en) Test message sending method and device
CN102857421A (en) VLL fault detection method and device
CN109218176B (en) Message processing method and device
KR20210093787A (en) Message generation method and apparatus, and message processing method and apparatus
WO2018040940A1 (en) Two-layer network, and loopback detection method of two-layer network
CN114866470A (en) Method, device, system and storage medium for sending message
CN109412851B (en) Link layer path detection method, device and system
CN108282404B (en) Route generation method, device and system
CN110572326A (en) Method, device, network equipment and system for establishing forwarding path

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant