EP4078935A1 - Facilitating distributed snat service - Google Patents

Facilitating distributed snat service

Info

Publication number
EP4078935A1
EP4078935A1 EP21727683.1A EP21727683A EP4078935A1 EP 4078935 A1 EP4078935 A1 EP 4078935A1 EP 21727683 A EP21727683 A EP 21727683A EP 4078935 A1 EP4078935 A1 EP 4078935A1
Authority
EP
European Patent Office
Prior art keywords
address
dsnat
middlebox service
ipv6
destination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP21727683.1A
Other languages
German (de)
French (fr)
Inventor
Sami Boutros
Mani Kancherla
Jayant Jain
Anirban Sengupta
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VMware LLC
Original Assignee
VMware LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US16/931,196 external-priority patent/US11616755B2/en
Priority claimed from US16/931,207 external-priority patent/US11606294B2/en
Application filed by VMware LLC filed Critical VMware LLC
Publication of EP4078935A1 publication Critical patent/EP4078935A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2521Translation architectures other than single NAT servers
    • H04L61/2532Clique of NAT servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1023Server selection for load balancing based on a hash applied to IP addresses or costs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2517Translation of Internet protocol [IP] addresses using port numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2592Translation of Internet protocol [IP] addresses using tunnelling or encapsulation

Definitions

  • SNAT source network address translation
  • Some embodiments of the invention provide novel methods for facilitating a distributed middlebox service operation (e.g., a distributed SNAT (dSNAT) or distributed load balancing (dLB) middlebox service) for a first network at a host computer in the first network on which the middlebox service operation is performed and a gateway device between the first network and a second network.
  • a distributed middlebox service operation e.g., a distributed SNAT (dSNAT) or distributed load balancing (dLB) middlebox service
  • dSNAT distributed SNAT
  • dLB distributed load balancing
  • the novel methods enable a distributed middlebox service (e.g., dSNAT or dLB) that provides a stateful middlebox service at multiple host computers, thus avoiding the bottleneck problem associated with providing stateful middlebox services at gateways and also significantly reduces the need to redirect packets received at the wrong host by using a capacity of off-the-shelf gateway devices to perform IPv6 encapsulation for IPv4 packets and assigning locally unique IPv6 addresses to each host executing a distributed middlebox service instance.
  • dSNAT distributed middlebox service
  • the method configures the gateway device to receive packets destined for a distributed middlebox service and identify, based on a destination internet protocol version 4 (IPv4) address and a port specified in an IPv4 header of the received packet, an IP version 6 (IPv6) address to use to forward the received packet to a particular host computer on which a middlebox service instance associated with the destination IPv4 address executes.
  • IPv4 address is an IPv4 VIP address associated with a dLB middlebox service or an IPv4 address used by a dSNAT as a source address for packets going from the first network to external networks.
  • the gateway device then encapsulates the packet with an IPv6 header using the identified IPv6 address and forwards the encapsulated packet based on an IPv6 routing table of the gateway device.
  • the host computer is configured to receive encapsulated packets destined to the identified IPv6 address from the gateway device and remove the encapsulation to provide the inner IPv4 packet to a middlebox service instance executing on the host computer based on the IPv4 address in a header of the inner IPv4 packet.
  • the middlebox service instance performs an address replacement operation (e.g., a lookup in a connection tracker that associates translated IP addresses and ports into original IP addresses and ports, or replaces a VIP destination address and port with a workload IP address and port) to replace the IP address and port number in the IPv4 header with an IPv4 address and port used by a source machine in the first network.
  • the middlebox service instance executing on the host computer is assigned a range of port numbers for performing the middlebox service operation for packets going from the first network to external networks, in the case of dSNAT or, in the case of dLB, is assigned a range of port numbers for which to receive packets.
  • the host computer in some embodiments, is configured to advertise the availability of an IPv6 address prefix that is based on the IPv4 used by the middlebox service instance as a source address for packets going from the first network to external networks and the range of port numbers assigned to the middlebox service instance.
  • the advertised IPv6 address prefix begins with 16 bits that are not assigned to be globally unique in IPv6 (e.g., FC00) followed by the IPv4 address used by the middlebox service and then followed by the set of bits in the 16-bit port address that are common to the range of port numbers assigned to the middlebox service instance executing on the host computer (e.g., the first 6 bits common to a range of 1024 assigned port numbers).
  • Packets processed by the middlebox service instance executing on a host computer that are destined for an external network are sent from the host without encapsulation in an IPv6 header using the advertised IPv6 address as a source IP address. While the IPv6 address associated with the middlebox service instance is not used in encapsulating the packet, in some embodiments, other encapsulation may be used to reach the gateway device.
  • the advertisement in some embodiments, is made by a border gateway protocol
  • the advertisement is made to a route reflector (e.g., a route server) that advertises the availability of the IPv6 address prefix at the host computer to other network elements including the gateway device or set of gateway devices.
  • the advertisement includes an instruction to the gateway device to identify the IPv6 address based on an IPv4 address and port number of packets received at the gateway device and encapsulate the IPv4 packets with the identified IPv6 address.
  • the advertised IPv6 address is based on existing functions of a hardware gateway device for handling IPv6 encapsulation of IPv4 packets.
  • a controller computer cluster i.e., a set of one or more controller computers of the first network provides configuration information to network elements to facilitate the distributed middlebox service operation for the first network.
  • the configuration information includes a set of middlebox service records and IPv6 routing table entries provided to a gateway device.
  • the middlebox service records map combinations of the IPv4 used by a particular middlebox service operation and destination port number to an IPv6 destination address.
  • the middlebox service record is a policy-based routing (PBR) rule that defines an algorithm for generating an IPv6 address from an IPv4 destination address and a port number included in an IPv4 header and specifies an IPv4 destination address for which the algorithm should be applied.
  • PBR policy-based routing
  • the IPv6 routing table entries in some embodiments, each identify an IPv6 address prefix associated with a particular host computer in a set of multiple host computers that each execute a middlebox service instance and a next hop towards the particular host computer.
  • the controller computer cluster configures the middlebox service instances to use a particular IPv4 address when performing the middlebox service operation and assigns, to each middlebox service instance of a particular middlebox service, a non-overlapping range of port numbers to use.
  • the IPv4 address and port number range are provided to the host computer (e.g., an MFE of the host computer) to identify the IPv6 address prefix that corresponds to the IPv4 address and range of assigned port numbers and to advertise the availability of the identified IPv6 address at the host computer.
  • the size of the port number ranges assigned to the middlebox service instances are fixed by an administrator based on a maximum number of expected middlebox service instances (e.g., for an expected maximum of 64 middlebox service instances, creating 64 different port number ranges each including 1024 ports that are each assigned to a middlebox service instance on startup). In other embodiments, the size of the port number ranges is dynamic and may change based on the number of active middlebox service instances. The port number ranges may also vary in size between middlebox service instances.
  • a larger port number range is assigned to a first middlebox service instance executing on a host computer executing a larger number of workload machines using the middlebox service than a second middlebox service instance executing on a host computer executing a smaller number of workload machines using the middlebox service.
  • Figure 1 illustrates an exemplary network in which the novel method for facilitating the provision of a distributed SNAT middlebox service operation for a first network is performed.
  • Figure 2 conceptually illustrates a process performed by a gateway device to process a received packet that is destined to a particular middlebox service instance.
  • Figure 3A illustrates packet processing at a gateway device as depicted in Figure
  • Figure 3B illustrates packet processing at a gateway device as depicted in Figure
  • Figure 4 illustrates packet processing at a gateway device as depicted in Figure 1 for a subsequent packet in a particular packet flow destined to an LB VIP for which a packet was previously received from the external network.
  • Figure 5 conceptually illustrates a process performed at a host computer for processing a received IPv6 packet destined for a middlebox service instance executing on the host computer.
  • Figure 6 illustrates a packet being sent from an external machine to a guest machine in an internal network.
  • Figure 7 conceptually illustrates a process performed by a NAT instance processing a first packet in a packet flow destined for a destination machine in an external network.
  • Figure 8 illustrates a first packet in a packet flow being sent from a GM and processed by the NAT instance executing on the same host computer.
  • Figure 9 conceptually illustrates a process for generating configuration data for different network elements that provide the middlebox service and facilitate the provision of the middlebox service.
  • Figure 10 illustrates a computer controller cluster in a datacenter sending different types of configuration data to different network elements.
  • Figure 11 conceptually illustrates a process performed by a gateway device to facilitate the provision of the middlebox service based on received configuration data.
  • Figure 12 conceptually illustrates a process for configuring a host computer to execute a distributed middlebox service instance and advertise the IPv6 address prefix associated with the middlebox service instance executing on the host computer.
  • Figure 13 illustrates three different exemplary advertised IPv6 address prefixes that are used in different embodiments to advertise the availability of the service at the host computer and corresponding exemplary destination IPv6 addresses generated by a gateway device to use in an IPv6 encapsulation header to forward a packet to the particular service instance executing on the host computer making the advertisement.
  • Figure 14 conceptually illustrates a set of data exchanges between network elements to migrate a compute node.
  • Figure 15 conceptually illustrates a computer system with which some embodiments of the invention are implemented.
  • Some embodiments of the invention provide novel methods for facilitating a distributed middlebox service operation (e.g., a distributed SNAT (dSNAT) or distributed load balancing (dLB) middlebox service) for a first network at a host computer in the first network on which the middlebox service operation is performed and a gateway device between the first network and a second network.
  • a distributed middlebox service operation e.g., a distributed SNAT (dSNAT) or distributed load balancing (dLB) middlebox service
  • dSNAT distributed SNAT
  • dLB distributed load balancing
  • the novel methods enable a distributed middlebox service (e.g., dSNAT or dLB) that provides a stateful middlebox service at multiple host computers, thus avoiding the bottleneck problem associated with providing stateful middlebox services at gateways and also significantly reduces the need to redirect packets received at the wrong host by using a capacity of off-the-shelf gateway devices to perform IPv6 encapsulation for IPv4 packets and assigning locally unique IPv6 addresses to each host executing a distributed middlebox service instance.
  • dSNAT and dLB middlebox service focuses on a dSNAT and dLB middlebox service, however one of ordinary skill in the art will appreciate that the methods discussed can be applied to a any distributed, stateful middlebox service using a same IP address at multiple host computers.
  • the method configures the gateway device to receive packets destined for an IPv4
  • IPv6 IP version 6
  • packet refers to a collection of bits in a particular format sent across a network.
  • a packet in some embodiments, is referred to as a data message.
  • packet is used in this document to refer to various formatted collections of bits that are sent across a network.
  • the formatting of these bits can be specified by standardized protocols or non-standardized protocols. Examples of packets following standardized protocols include Ethernet frames, IP packets, TCP segments, UDP datagrams, etc.
  • references to L2, L3, L4, and L7 layers are references respectively to the second data link layer, the third network layer, the fourth transport layer, and the seventh application layer of the OSI (Open System Interconnection) layer model.
  • OSI Open System Interconnection
  • the term managed forwarding element refers to software forwarding elements or hardware forwarding elements that are configured by a controller computer cluster (i.e., a set of one or more controller computers that provide configuration data to network elements) to implement a logical network comprising a set of logical forwarding elements (LFEs).
  • each LFE is a distributed forwarding element that is implemented by configuring multiple MFEs on multiple host computers.
  • each MFE or a module associated with the MFE in some embodiments is configured to encapsulate the data messages of the LFE with an overlay network header that contains a virtual network identifier (VNI) associated with the overlay network.
  • VNI virtual network identifier
  • the LFEs also span, in some embodiments, configured hardware forwarding elements (e.g., top of rack switches).
  • the set of LFEs includes a logical switch that is implemented by configuring multiple software switches or related modules on multiple host computers.
  • the LFEs can be other types of forwarding elements (e.g., logical routers), or any combination of forwarding elements (e.g., logical switches and/or logical routers) that form logical networks or portions thereof.
  • Figure 1 illustrates an exemplary network 100 in which the novel method for facilitating the provision of a distributed SNAT operation for a first network is performed.
  • Figure 1 illustrates a network 100 comprising an external network 101 connecting a set of machines 102 outside of a datacenter 105 with guest machines (GMs) 126 executing on a number of hosts 120 in the datacenter 105 (e.g., a public cloud datacenter or set of datacenters).
  • the gateway devices 110 execute between the internal network and the external network 101 and are configured, as discussed below in relation to Figure 11, to facilitate the provision of the distributed middlebox service for communications between the external machines 102 and the internal compute nodes (e.g., GMs 126).
  • the gateway device 110 includes a cache 111 that stores information regarding forwarding decisions made for previously received packets and a set of pre-routing rules 112 that, in some embodiments, includes policy-based routing rules based on IP (either IPv4 or IPv6) addresses. After performing a lookup in the cache 111 and performing a lookup in the set of pre routing rules 112, packets may be routed using an IPv4 routing table, or an IPv6 routing table, or may be sent to an IPv6 encapsulator to be encapsulated in an IPv6 header and then routed based on the IPv6 routing table.
  • IP IP
  • the system 100 also includes a set of controller computers 140 that provide configuration information to the set of host computers 120 to implement a set of logical forwarding elements (e.g., using the MFEs 121), an IPv6 processing module 122 that processes received IPv6 packets, a routing machine (RM) 123 that acts as a BGP instance to interact with the set of route servers 130, a distributed middlebox service instance 124 (e.g., the SNAT instances 124 that, in the illustrated embodiment, provide a dSNAT middlebox service), and a set of compute nodes (e.g., the GMs 126).
  • a set of controller computers 140 that provide configuration information to the set of host computers 120 to implement a set of logical forwarding elements (e.g., using the MFEs 121), an IPv6 processing module 122 that processes received IPv6 packets, a routing machine (RM) 123 that acts as a BGP instance to interact with the set of route servers 130, a distributed middlebox service instance 124 (e.g
  • the host computers 120 also include a set of NAT records 125 that, in some embodiments, are caches recording associations between internal IP address/port pairs and ports selected by the SNAT instance 124 as external ports for each IP address/port pair.
  • the cache records also store an IP address of the external machine along with the port selected by the SNAT instance 124 to allow the SNAT instance 124 to use a same port for multiple data message flows established with different external machines using different IP addresses.
  • the system 100 also includes a set of route servers 130 (also referred to as route reflectors) that each receive routing information from multiple network elements and provides the routing information to other network elements to simplify the exchange of routing information. For example, instead of using a full mesh connecting each BGP instance (e.g., RM 123), each BGP instance interacts with the route servers 130 to reduce the number of advertisements made by each BGP instance.
  • the datacenter 105 also includes the intervening fabric 150 that provides the physical connections between the illustrated network elements.
  • FIG. 2 conceptually illustrates a process 200 performed by a gateway device (e.g., the gateway device 110) to process a received packet that is destined to a particular middlebox service instance (e.g., SNAT instance 124a).
  • the gateway device is an off-the-shelf gateway device with the capability to encapsulate an IPv4 packet in an IPv6 packet and to generate the IPv6 header of the IPv6 packet using either a set of rules or a set of records specifying IPv6 headers to use based on IPv4 header values.
  • the gateway device is a fully programmable forwarding element that is programmed to carry out the operations of process 200.
  • process 200 can be performed for packets destined for an IPv4 address associated with any of a dSNAT middlebox service, a dLB middlebox service for a set of load balanced set of workload compute nodes, or any distributed middlebox service using a same IP address at multiple middlebox service instances executing on multiple host computers.
  • the process 200 begins by receiving (at 210) an IPv4 packet destined to a particular middlebox service instance (e.g., SNAT instance 124a) executing on a particular host computer (e.g., host computer 120a) with a destination address that is associated with the middlebox service (i.e., all the middlebox service instances).
  • the IPv4 header identifies the source machine in the external network by a source IP address and identifies a destination IP address and port that is a source IP address and port used by the SNAT instance that processes packets for the communication session (also referred to as a packet flow or connection) between the external machine and the internal compute node serviced by the middlebox service instance.
  • the process determines (at 220) that the IPv4 packet requires encapsulation in an IPv6 packet.
  • the determination for a first packet in a particular flow of packets received from an external machine is made based on a middlebox service record.
  • the middlebox service record in some embodiments is an IPv4 routing table entry for the IPv4 destination address that indicates that the packet requires encapsulation in an IPv6 packet.
  • the IPv4 routing entry also indicates either (1) a specific IPv6 destination address to use for encapsulating the IPv4 packet based on the IPv4 header values (e.g., an IPv4 destination address and destination port (for SNAT) or source port (for LB)) or (2) an algorithm for generating an IPv6 destination address to use in the IPv6 encapsulation header.
  • the middlebox service record is a policy based routing (PBR) rule that specifies encapsulation for all packets destined to the IPv4 address associated with the middlebox service. As with the IPv4 routing entry the PBR rule can either specify an IPv6 destination address or a method for generating the IPv6 destination address.
  • PBR policy based routing
  • PBR rule is included in the pre routing rules 112. After the first received packet for a particular flow of packets from an external machine, in some embodiments, the determination for subsequent packets of the particular flow is made based on a cache record that includes the determination made for the first packet of the particular flow and that is stored in cache 111.
  • the process 200 identifies (at 230) the IPv6 destination address to use in the IPv6 encapsulation header based on the IPv4 header values (e.g., a destination IPv4 address and a destination port (for dSNAT) or a source port (for dLB)).
  • the identification is based on an IPv6 destination address specified in the middlebox service record for the IPv4 destination address and port pair. In other embodiments, the identification is based on an algorithm or other programmatic method of generating an IPv6 destination address from IPv4 headers.
  • the algorithm in some embodiments takes an IPv6 prefix that is used for locally unique addresses (e.g., FC00::/8) and appends the IPv4 destination address and the destination (or source) port followed by zeros (zeros are used for simplicity but any set of trailing bits would work in some embodiments).
  • IPv6 prefix that is used for locally unique addresses (e.g., FC00::/8) and appends the IPv4 destination address and the destination (or source) port followed by zeros (zeros are used for simplicity but any set of trailing bits would work in some embodiments).
  • the IPv4 packet is encapsulated (at 240) with an IPv6 header using the identified IPv6 address as a destination address.
  • the encapsulation is done by an IPv6 encapsulation module (e.g., IPv6 encapsulator 114).
  • the destination port in some embodiments, is the IPv4 destination port but, in other embodiments, may be any port.
  • the source IPv6 address and port in some embodiments, are an IPv6 address and port associated with the gateway device.
  • the process 200 then performs (at 250) a lookup in an IPv6 routing table (e.g., IPv6 routing table 115) to identify the next hop for the encapsulated date message.
  • the gateway device is configured with a set of IPv6 routes (i.e., routing table entries) for each of a set of IPv6 address prefixes associated with a set of host computers that executes middlebox service instances that indicate the next hop for each IPv6 address prefix.
  • the IPv6 address prefixes are provided by a controller computer (e.g., as static routes).
  • the host computers e.g., BGP instances executing on the host computers
  • each middlebox service instance is assigned a range of port numbers that can be used to generate a unique IPv6 address prefix based on the algorithm described above for generating the IPv6 destination address.
  • the process 200 forwards (at 260) the IPv6 packet to the identified next hop towards the middlebox service instance and the process ends.
  • the packet is forwarded over an intervening network fabric (e.g., intervening fabric 150).
  • the forwarding elements in the intervening fabric learn the next hop for the destination IPv6 address using standard protocols such as any or all of BGP, IGP, ARP, or any of the other route learning mechanisms known to one of ordinary skill in the art.
  • Figure 3A illustrates packet processing at a gateway device 110 as depicted in Figure 1 for a first packet 320a in a particular packet flow received from the external network 101.
  • packet 320a is received from a machine 102 in the external network 101 destined for the NAT IP address and Port N (i.e., the port selected by the SNAT as a source port).
  • the packet is first compared to cache entries in cache 111 which does not yet include cache record 111a.
  • a lookup is performed in the set of pre-routing rules 112, and in the illustrated embodiment, a pre routing rule 112a is identified as applying to the packet based on the destination IP (i.e., NAT IP). Based on identifying pre-routing rule 112a as applying to the packet, a cache record 11 la is created in cache 111.
  • the cache record 111a identifies the result of the lookup in the pre-routing rules, however one of ordinary skill in the art will appreciate that the cache record, in other embodiments, identifies the specific IPv6 address used to encapsulate the packets in the flow based on the rule or the IPv6 encapsulation address and a next hop.
  • the packet is passed to the IPv6 packet encapsulator 114 for encapsulation instead of being passed to IPv4 routing table 113 for forwarding based on the IPv4 header values.
  • the pre-routing rule 112a identifies an encapsulation rule stored by the IPv6 encapsulator that would be identified, as part of passing the packet, to the IPv6 encapsulator 114 to perform the encapsulation.
  • passing the packet to IPv6 encapsulator 114 comprises sending a rule (e.g., an algorithm) for generating the encapsulation header values.
  • the IPv6 encapsulator 114 then encapsulates the packet with an IPv6 header packet based on the identified rule (i.e., rule 114a).
  • the destination IPv6 address is generated by using an FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the destination port (Port N) followed by 0’s.
  • FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the destination port (Port N) followed by 0’s.
  • Other prefixes or filler bits are used in other embodiments, and one of ordinary skill in the art will recognize that this is just one of many possible algorithms for generating the IPv6 destination address that has been selected for simplicity.
  • the IPv6 destination port, source IPv6 address, and IPv6 source port are, the original destination port, a source IPv6 address associated with the gateway device 110 and a randomly selected IPv6 source port.
  • IPv6 routing table 115 An IPv6 forwarding operation represented by IPv6 routing table 115.
  • a lookup in IPv6 routing table 115 identifies a matching routing table entry 115a that includes a next hop (i.e., next hop 3) interface that is used to forward the packet to its destination.
  • the IPv6 routing table entries for the NAT IP are dynamic routes learned based on advertisements from the BGP instances on the host machines, while in other embodiments the routing table entries are static routes received from a controller computer in a set of controller computers (e.g., controller computer cluster 140).
  • the IPv6 packet 330a is then forwarded to the destination host based on the IPv6 destination address (i.e., FC00:NAT IP:PortN::).
  • Figure 3B illustrates packet processing at a gateway device 110 as depicted in
  • FIG 1 for a subsequent packet 320b in the particular packet flow for which packet 320a was the first packet received from the external network 101.
  • packet 320b is received from a machine 102 in the external network 101 destined for the NAT IP address and Port N (i.e., the port selected by the SNAT as a source port).
  • the packet is first compared to cache entries in cache 111 which includes cache record 111a based on the first packet 320a received from the external network 101.
  • the cache record 111a indicates that the packet 320b should be encapsulated in an IPv6 header according to a particular encapsulation rule (i.e., “IPv6 Encap Rule 1”).
  • the packet and the rule identifier are passed, in some embodiments, to the IPv6 encapsulator 114, bypassing pre-routing rules 112.
  • the cache record identifies the specific IPv6 address used to encapsulate the packets in the flow based on the rule or the IPv6 encapsulation address and a next hop.
  • the IPv6 encapsulator 114 then encapsulates the packet with an IPv6 header packet based on the identified rule (i.e., rule 114a).
  • the destination IPv6 address is generated by using an FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the destination port (Port N) followed by 0’s.
  • FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the destination port (Port N) followed by 0’s.
  • Other prefixes or filler bits are used in other embodiments, and one of ordinary skill in the art will recognize that this is just one of many possible algorithms for generating the IPv6 destination address that has been selected for simplicity.
  • the IPv6 destination port, source IPv6 address, and IPv6 source port in some embodiments, are, the original destination port, a source IPv6 address associated with the gateway device 110 and a randomly selected IPv6 source port for the particular flow.
  • other destination ports and source IPv6 address and port are used in other embodiments without affecting the routing of the packet to the particular host and dSNAT instance.
  • IPv6 routing table 115 identifies a matching routing table entry 115a that includes a next hop (i.e., next hop 3) interface that is used to forward the packet to its destination.
  • the lookup in IPv6 routing table 115 is not performed if the cache record 111a identifies the next hop interface to use after encapsulation.
  • the IPv6 routing table entries for the NAT IP are dynamic routes learned based on advertisements from the BGP instances on the host machines, while in other embodiments the routing table entries are static routes received from a controller computer in the set of controller computers 140.
  • the IPv6 packet 330b is then forwarded to the destination host based on the IPv6 destination address (i.e., FC00:NAT IP:PortN::).
  • Figure 4 illustrates packet processing at a gateway device 110 as depicted in Figure
  • packet 420 is received from a machine 102 in the external network 101 destined for the LB VIP address and Port B (i.e., a port associated with the VIP).
  • the packet is first compared to cache entries in cache 111 which includes cache record 111b based on the first packet received from the external network 101 for the particular packet flow destined to the LB VIP.
  • the cache record 111b indicates that the packet 420 should be encapsulated in an IPv6 header according to a particular encapsulation rule (i.e., “IPv6 Encap Rule 2”).
  • the packet and the rule identifier are passed, in some embodiments, to the IPv6 encapsulator 114, bypassing pre-routing rules 112.
  • the cache record identifies the specific IPv6 address used to encapsulate the packets in the flow based on the rule or the IPv6 encapsulation address and a next hop.
  • the IPv6 encapsulator 114 then encapsulates the packet with an IPv6 header packet based on the identified rule (i.e., rule 114b).
  • the destination IPv6 address is generated by using an FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the source port (Port Z) followed by 0’s.
  • the source port is used instead of the destination port, in some embodiments, because it is randomly selected from the possible port values when initiating a flow (e.g., a session or connection) and is then constant for the lifetime of the packet. This allows the flows to be distributed among multiple LB instances based on different source port ranges assigned to each LB instance while at the same time ensuring that the same LB instance that maintains state information for providing the LB service to a particular flow receives packets of that flow.
  • the LB VIP may be associated with servers listening on a specific port or ports such that the destination port will not allow for identifying a specific LB instance.
  • the rule will be the same as that used for the NAT IP of Figure 3.
  • Other prefixes or filler bits are used in other embodiments, and one of ordinary skill in the art will recognize that this is just one of many possible algorithms for generating the IPv6 destination address that has been selected for simplicity.
  • the IPv6 destination port, source IPv6 address, and IPv6 source port are, the original destination port, a source IPv6 address associated with the gateway device 110 and a randomly selected IPv6 source port for the particular flow.
  • IPv6 destination port, source IPv6 address, and IPv6 source port are, the original destination port, a source IPv6 address associated with the gateway device 110 and a randomly selected IPv6 source port for the particular flow.
  • destination ports and source IPv6 address and port are used in other embodiments without affecting the routing of the packet to the particular host and dLB instance.
  • a stateful distributed load balancing service for distributing requests received from clients in external networks relies on a set of gateways of the availability zone (AZ) to consistently send a same flow to a same host computer providing the distributed load balancing based on an equal cost multipathing (ECMP) operation performed at the gateway devices of the A Z across the host computers providing the distributed load balancing service.
  • AZ availability zone
  • ECMP equal cost multipathing
  • the routing machine on each host executing a distributed load balancer instance advertises the same VIP address as being available and the gateway devices of the A Z record the multiple advertised next hop addresses as being associated with the VIP as possible next hops.
  • a gateway device of the AZ selects a particular next hop using an ECMP operation.
  • an acceptable number of redirection operations may be required upon a change in the number of host computers providing the distributed load balancing service such that it is not worth the effort to ensure that different host computers can be deterministically identified for each flow (or data message).
  • IPv6 routing table 115 identifies a next hop (i.e., next hop 3) interface that is used to forward the packet to its destination.
  • the lookup in IPv6 routing table 115 is not performed if the cache record 111b identifies the next hop interface to use after encapsulation.
  • the IPv6 routing table entries for the LB IP are dynamic routes learned based on advertisements from the BGP instances on the host machines, while in other embodiments the routing table entries are static routes received from a controller computer in the set of controller computers 140.
  • the IPv6 packet 430 is then forwarded to the destination host based on the IPv6 destination address (i.e., FC00:LB IP:PortZ::).
  • the gateway device Once the gateway device has encapsulated and forwarded the packet, it will reach the host computer on which the destination distributed middlebox instance executes.
  • the host computer is configured to receive encapsulated packets destined to the identified IPv6 address from the gateway device and remove the encapsulation to provide the inner IPv4 packet to a middlebox service instance executing on the host computer based on the IPv4 address in a header of the inner IPv4 packet.
  • Figure 5 conceptually illustrates a process 500 performed at a host computer for processing a received IPv6 packet destined for a middlebox service instance executing on the host computer. In some embodiments, the process 500 is performed by a host computer on which the middlebox service instance executes.
  • the host computer performs the process 500 using an MFE (e.g., MFE 121a), a software routing element (e.g., routing machine 123a), an IPv6 processing module (e.g., IPv6 processing module 122a), a distributed middlebox instance (e.g., SNAT 124a), and a storage (e.g., NAT Records 125a) storing records for doing an IPv4 translation operation, executing on the host computer.
  • MFE e.g., MFE 121a
  • a software routing element e.g., routing machine 123a
  • an IPv6 processing module e.g., IPv6 processing module 122a
  • a distributed middlebox instance e.g., SNAT 124a
  • a storage e.g., NAT Records 125a
  • some of the elements are combined (e.g., the MFE implements (or is) the software routing element and contains IPv6 packet processing instructions, while the distributed middlebox service instance includes the records used
  • the process 500 then removes (at 520) the IPv6 encapsulation header and performs a lookup in a routing table to identify the next hop for the inner IPv4 packet.
  • the received packet is passed to an IPv6 processing module (e.g., 122) that is programmed with IPv6 routing rules and tables.
  • the routing rules include a rule identifying IPv6 packets destined to a middlebox service instance as requiring removal of an IPv6 encapsulation header and being passed to an IPv4 routing table lookup (e.g., performed by an MFE or routing module).
  • the rule identifies a next hop and that the IPv6 encapsulation should be removed before forwarding the packet.
  • the lookup is performed in an IPv4 routing table after removing the IPv6 encapsulation to identify the next hop towards the middlebox service instance.
  • the IPv6 processing module is an IPv6 stack of a dual stack routing element (an MFE or routing module) instead of an independent module.
  • the lookup in some embodiments, is performed in a first virtual routing and forwarding (VRF) context for a first logical network or tenant associated with the middlebox service instance.
  • VRF virtual routing and forwarding
  • a virtual tunnel end point (VTEP) receives the encapsulated packet based on an IPv6 address of the encapsulated packet.
  • the VTEP is then responsible for decapsulating the packet and identifying a next hop based on a virtual network identifier and IPv4 address associated with the received IPv6 packet.
  • the packet is then forwarded (at 530) towards the middlebox service instance with the IPv4 header, using the IPv4 header values in the packet received at the gateway device through the identified next hop interface.
  • the distributed middlebox service instance receives the packet and identifies (at
  • identifying the destination IPv4 internal header values includes performing a lookup in a middlebox service record storage (e.g., a cache) that maintains associations between ports used to replace source ports for outgoing packets and source IPv4 addresses and ports.
  • the ports used to replace the source port for outgoing packets belong to a range of port numbers assigned to the middlebox service instance executing on the host computer (e.g., for the middlebox service instance to use to replace the source port of outgoing packets, or source ports that will be directed to the middlebox service instance).
  • the destination port is used, in some embodiments, to perform the lookup in (e.g., query) the middlebox service record storage to identify an internal IPv4 address and port to replace a current (external) destination IPv4 address and port for forwarding the packet to the correct destination machine (e.g., a virtual machine, container, pod, etc.).
  • the correct destination machine e.g., a virtual machine, container, pod, etc.
  • identifying the destination internal IPv4 address includes, for a first packet of a particular flow, performing a load balancing operation to select a destination machine (either on the same host computer or on a different host computer).
  • the load balancing operation in some embodiments, preferentially selects local compute nodes to provide the service associated with the VIP in order to reduce redirection, but based on the load balancing algorithm or method can select any compute node executing on any host computer and selects at least one compute node on at least one other host computer for at least one flow.
  • the distributed LB instance creates a record in the middlebox service record storage to identify the destination IPv4 header values for subsequent packets of the particular flow. For subsequent packets in a flow destined to the LB VIP, the lookup in the middlebox service record storage is based on a set of at least one other IPv4 header values (e.g., source IP, source port, source IP/port, etc.).
  • IPv4 header values e.g., source IP, source port, source IP/port, etc.
  • the distributed middlebox service replaces (at 550) the external IPv4 address and port with the identified internal IPv4 address and port.
  • the packet is then forwarded (at 560) to the destination machine based on the internal IPv4 address and port.
  • the packet is forwarded (at 560) through a logical switch that connects the destination machine to the distributed middlebox service instance.
  • the identified IPv4 destination connected to the logical switch in some embodiments, is a compute node executing on another host computer that also implements the logical switch (i.e., is within the span of the logical switch).
  • Figure 6 illustrates a packet being sent from an external machine 102 to a guest machine (GM) 126 in an internal network.
  • the original data message is sent with an IP header 650a that specifies a destination IP (DIP) address associated with the dSNAT middlebox service and a destination port (Dport) that is within the range assigned to a particular dSNAT middlebox service instance 124a.
  • the source IP address (SIP, Ext IP1) and port (Sport, Port Y) are associated with the external machine 102.
  • the IPv4 packet i.e., inner packet 670
  • the resulting packet has a destination IPv6 address associated with host 120a (e.g., FC00:NAT IP:PortN::) and NAT instance 124a and is sent to the host 120 through the intervening fabric 150.
  • IPv6 encapsulated packet is then received at the managed forwarding element
  • IPv6 processing is performed in an IPv6 stack in a dual stack MFE or routing machine 123a.
  • the IPv6 processing includes removing the IPv6 encapsulation and returning the IPv4 packet to the MFE 121a.
  • the IPv6 processing includes identifying the NAT instance 124a based on the IPv6 header values and removing the encapsulation.
  • the MFE 121a identifies the NAT instance 124a as the destination of the inner packet 670 based on the IPv4 header.
  • the NAT 124a instance receives the original (or inner) IPv4 packet and performs a lookup in NAT records storage 127a.
  • the NAT records 127a includes a record 680 that associates a port number used to replace the source port and the replaced source port and replaced source IPv4 address.
  • the port number used to replace the source port is also associated with an IP address of the external machine so that a same port number can be reused for connections to different external machines.
  • the lookup in some embodiments, is based on a destination port of the IPv4 packet.
  • the result of the lookup in the NAT records 127a is then provided to the NAT instance 124a to be used to replace the destination IPv4 address and port number.
  • the IPv4 packet with the translated address i.e., having IPv4 header 650b
  • FIG. 7 conceptually illustrates a process 700 performed by a NAT instance (e.g.,
  • NAT instance 124a processing a first packet in a packet flow destined for a destination machine 102 in an external network 101.
  • the discussion of Figure 7 will reference elements of Figure 8 to provide examples of the operations of Figure 7.
  • Figure 8 illustrates a first packet in a packet flow being sent from a GM and processed by the NAT instance executing on the same host computer.
  • the process 700 begins by receiving (at 710) a packet destined to a machine in an external network.
  • the received packet has a source IPv4 address associated with a source machine in an internal network and a source port selected by the source machine.
  • packet 831 received at NAT instance 124a from GM 126a is destined to an external IP (i.e., Ext IP1) and destination port (i.e., Port X) and has a source IP address of a GM 126a (i.e., GM IP) and a source port (i.e., Port Y).
  • the source port of packet 831 is randomly selected from the entire range of source ports (0-65535).
  • the process selects (at 720) a source port number (e.g., Port N) from a range of available port numbers allocated to the NAT instance.
  • the available port numbers are port numbers in an assigned range of port numbers that have not been selected for a currently-active connection.
  • the range of port numbers is allocated by a controller computer cluster.
  • the range of port numbers in some embodiments, is a range of port numbers that share a first set of common bits that are not shared by port numbers allocated to other NAT instances on other host computers. For example, each port number in a range of 1024 port numbers from 0-1023 or 2048-3071 each share a different common set of 6 initial bits in a 16-bit port address. Larger or smaller allocated ranges will have fewer or greater numbers of common bits respectively.
  • the process 700 creates (at 730) a connection tracking record (e.g., a NAT record) in a connection tracker (e.g., NAT records 127) that associates the selected port number with the source IP address and source port of the packet for which the port number is selected.
  • a connection tracking record e.g., a NAT record
  • a connection tracker e.g., NAT records 1257
  • the NAT record 841 associates the selected port, Port N, with the source IP address, GM IP, and the source port, Port Y, of the received packet 831.
  • the port number used to replace the source port is also associated with an IP address of the external machine so that a same port number can be reused for connections to different external machines.
  • connection tracking record is used, as described above, to translate a NAT IP and port number of a packet received from an external network back to the internal IP and port number of the original connection associated with the destination port number of the received packet.
  • forwarding the serviced packet to the destination includes forwarding the serviced packet to an MFE (e.g., MFE 121a) to be forwarded to the external destination.
  • MFE Mobility Fidelity
  • Packets processed by the middlebox service instance executing on a host computer that are destined for an external network are sent from the host without encapsulation in an IPv6 header using the advertised IPv6 address as a source IP address. While the IPv6 address prefix associated with the middlebox service instance is not used in encapsulating the packet, in some embodiments, other encapsulation may be used to reach the gateway device or the external destination machine. In some embodiments, the packets processed by the middlebox service instance are encapsulated in an IPv6 header using an IPv6 source address associated with the middlebox service instance.
  • Figure 8 illustrates the serviced packet 832 being encapsulated in overlay encapsulation header 870 to be sent over an overlay network (e.g., using an overlay network identifier such as a virtual network identifier (VNI)) to which the GM 126a and NAT instance 124a belong.
  • An MFE or virtual tunnel end point (VTEP) performs the encapsulation of the serviced packet 832 to produce the encapsulated packet 833.
  • a controller computer cluster i.e., a set of one or more controller computers of the first network provides configuration information to network elements to facilitate the middlebox service operation for the first network.
  • Figure 9 conceptually illustrates a process 900 for generating configuration data for different network elements that provide a middlebox service or facilitate the provision of the middlebox service.
  • process 900 is performed by a controller computer or a controller computer cluster.
  • the process 900 is performed each time a new middlebox service instance is spun up.
  • Process 900 begins by identifying (at 910) the middlebox service instances in the first network.
  • identifying the middlebox service instances includes identifying (1) active middlebox service instances and (2) middlebox service instances that have been requested to be activated (e.g., spun up).
  • Identifying the middlebox service instances includes identifying the number of end machines (e.g., workload VMs, containers, etc.) that each middlebox service instance supports (i.e., provides the middlebox service for).
  • identifying the middlebox service instances includes identifying either or both of (1) a total number of connections being handled by the distributed middlebox service (i.e., a sum over all the distributed middlebox instances) and (2) a number of connections being handled by each middlebox service instance.
  • the process 900 determines (at 920) a number of port ranges or a size of port ranges that will be available for assignment. In some embodiments, the number of port ranges or the size of the port ranges is determined based on input from a user (e.g., an administrator) of the first network or a logical network within the first network.
  • the input from the user may be based on a maximum amount of resources that the user desires a middlebox service instance to consume in providing the middlebox service.
  • the user input specifies any or all of (1) a maximum number of middlebox service instances that can be instantiated, (2) a maximum number of ports that can be assigned to a single middlebox service instance, or (3) policies for determining the number of ports assigned to particular middlebox service instances.
  • the policies are based on any or all of (1) a number of active middlebox service instances, (2) a number of compute nodes for which each active middlebox service instance provides the distributed middlebox service, (3) a number of connections being handled by the distributed middlebox service, and (4) the number of connections being handled by each middlebox service instance.
  • a policy may specify that a division of the entire range of possible port numbers be divided into a power of two that is at least twice as large as (or as large as) the number of middlebox service instances and that the port number ranges are adjusted based on the policy as the number of middlebox service instances increases or decreases (e.g., going from 4 to 5 middlebox service instances causes each of 8 port ranges to be divided into two smaller port number ranges, or going from 17 to 16 middlebox instances causing 64 port number ranges to be consolidated into 32 port number ranges).
  • the policy specifies that each middlebox service instance be assigned non-adjacent port number ranges (e.g., 0-8191 assigned to a first middlebox service instance, 16384-2475 for the second middlebox service instance, etc.). Such a policy allows for increasing and decreasing the number of hosts without having to reassign port number ranges as often.
  • the policy may specify that (1) when a particular middlebox service instance uses a fraction of the port numbers assigned to the middlebox service instance above a threshold fraction (e.g., .8 or .9) an adjacent available range will be assigned, workload compute nodes will be migrated from the host computer on which the middlebox service instance executes, or a new middlebox service instance will be spun up (e.g., activated on another host computer), (2) when a particular middlebox service instance uses a fraction of the port numbers assigned to the middlebox service instance below a threshold fraction (e.g., .3 or .2) the range of port numbers assigned will be reduced or additional end machines will be migrated to the host computer on which the middlebox service instance executes (e.g., from a host computer executing a middlebox service instance that is using a greater fraction of its assigned port numbers), and (3) when the total number of connections being handled by the middlebox service instances is below a certain threshold fraction of the capacity based on the number of middlebox service instances and assigned port range
  • a threshold fraction e
  • policies may specify assigning port ranges based on a number of workload compute nodes that are provided the middlebox service by the middlebox service instance (e.g., for 0-10 workload compute nodes, 256 port numbers are assigned; for 11-20 workload compute nodes, 512 port numbers are assigned; etc.).
  • a number of workload compute nodes that are provided the middlebox service by the middlebox service instance (e.g., for 0-10 workload compute nodes, 256 port numbers are assigned; for 11-20 workload compute nodes, 512 port numbers are assigned; etc.).
  • the process 900 selects (at 930) at least one port range to assign to each middlebox service instance.
  • an initial port range assignment in some embodiments, assigns each middlebox service instance a non-adjacent, non-overlapping, port range.
  • Subsequent assignments in some embodiments, assign at least one additional port number range to particular middlebox service instances that use a number of port numbers above a threshold fraction of the assigned port numbers.
  • Other subsequent assignments in some embodiments, remove a portion of a range of port numbers from an initial assignment to a particular middlebox service instance that uses less than a threshold number of port numbers in the initially assigned port number range.
  • the size of the port number ranges assigned to the middlebox service instances are fixed by an administrator based on a maximum number of expected middlebox service instances (e.g., for an expected maximum of 64 middlebox service instances, creating 64 different port number ranges each including 1024 ports that are each assigned to a middlebox service instance on startup).
  • the size of the port number ranges is dynamic and may change based on the number of active middlebox service instances, active connections, or workload compute nodes using the middlebox service.
  • the port number ranges may also vary in size between middlebox service instances.
  • a larger port number range is assigned to a first middlebox service instance executing on a host computer executing a larger number of workload compute nodes using the middlebox service than a second middlebox service instance executing on a host computer executing a smaller number of workload compute nodes using the middlebox service and may change as the number of workload compute nodes changes.
  • the process 900 After selecting (at 930) the range of port numbers for each middlebox service instance to use, the process 900 generates (at 940) configuration data for implementing the desired middlebox service instances.
  • the configuration data includes multiple sets of configuration data for different network elements (e.g., host computers, gateway devices) and for different purposes.
  • Figure 10 illustrates a computer controller cluster 1040 in a datacenter 1005 sending different types of configuration data to different network elements. The elements of Figure 10 are generally the same as those discussed in Figure 1 with the addition of a local controller 1028 that receives configuration data from controller cluster 1040.
  • Figure 10 illustrates a set of configuration data 1029 for each host computer 1020 (received at local controller 1028).
  • the configuration data 1029 includes configuration information for (1) configuring the middlebox service instance to provide the middlebox service, (2) configuring other network elements executing on the host computer (e.g., GMs 1026 and MFE 1021) to communicate with the middlebox service instance (e.g., 1024), (3) configuring an MFE or BGP instance executing on a host computer to advertise the IPv6 address associated with a middlebox service instance executing on the host computer.
  • the local controller 1028 receives the configuration data and identifies the configuration data for each module executing on the host computer 1020 as will be explained in relation to Figure 12.
  • the controller computer cluster 1040 also sends configuration data 1019 to the set of gateway devices for configuring a gateway device to perform an IPv4 to IPv6 encapsulation and, in some embodiments, for configuring the gateway device with IPv6 routing table entries.
  • the configuration data (e.g., configuration data 1029) includes configuration data for configuring at least one middlebox service instance executing on at least one host computer to provide the middlebox service using an assigned range of port numbers.
  • Configuration data for initializing a new middlebox service instance on a host computer includes, in some embodiments, an IPv4 address associated with the middlebox service used in performing the middlebox service operation (e.g., replacing source IP addresses of packets going from the first network to an external network) and an assigned port number range.
  • Additional configuration information (e.g., logical overlay network elements to which the middlebox instance connects) is sent, in some embodiments, to the host computer to configure other elements of the host to communicate with the new middlebox service instance as will be appreciated by one of ordinary skill in the art.
  • the additional configuration data sent to the host computer includes configuration data sent to the host computer to configure the host computer (or an MFE or BGP instance executing on the host computer) to identify and advertise the IPv6 address prefix associated with the middlebox service instance as described in relation to Figure 12.
  • the configuration data in some embodiments, also includes information used internally to the host computer to address the middlebox service instance and configure machines executing on the host computer to use the middlebox service instance for particular packets (e.g., packets destined for external networks).
  • the generated configuration data includes configuration data
  • the gateway devices are partially- or fully-programmable gateway devices that can be programmed by the controller computer cluster to implement the IPv4 to IPv6 translation and encapsulation based on PBR rules specified based on IPv4 address and destination port in an IPv4 header.
  • the gateway devices are off-the shelf-gateway devices (e.g., dual stack routers) that are capable of simple programming sufficient to configure the gateway device to implement the IPv4 to IPv6 encapsulation.
  • the configuration data includes what will be referred to as a set of middlebox service records and IPv6 routing table entries.
  • the middlebox service records map combinations of the IPv4 address used by a particular middlebox service operation and destination port number to an IPv6 destination address.
  • the middlebox service records in some embodiments, are provided as a lookup table and an instruction to use the lookup table to route data messages using the IPv4 address used by a distributed middlebox service.
  • the middlebox service record is a PBR rule (or similar rule or policy) that defines an algorithm for generating an IPv6 address from an IPv4 destination address and port number.
  • the PBR rule specifies an IPv4 destination address for which the algorithm should be applied, while in other embodiments, both an IPv4 address and port number are specified.
  • the middlebox service record in some embodiments, is an instruction to configure an off-the-shelf gateway device to perform IPv6 encapsulation according to a specified algorithm for IPv4 packets destined to the IPv4 used by a particular middlebox service operation.
  • the instruction is based on a functionality provided by the off-the-shelf gateway device (e.g., an exposed API).
  • the IPv6 routing table entries each identify an IPv6 address prefix associated with a particular host computer in a set of multiple host computers that each execute a middlebox service instance and a next hop interface to use to reach the particular host computer.
  • the IPv6 address prefix specified in the IPv6 routing entry for a particular host computer is based on the IPv4 address associated with the distributed middlebox service and a port number range assigned to the distributed middlebox service instance executing on the host computer. If multiple non-adjacent port ranges are assigned to a particular host computer, the set of IPv6 routing table entries includes multiple entries for the particular host computer.
  • the configuration data generated for each network element is forwarded (at 950) to the appropriate network element to be used to configure the network element as described in relation to Figures 12 and 11.
  • the configuration data in some embodiments, is received at the host computers by a local controller (e.g., local controller 1028) or a local controller agent that communicates with the controller computer cluster using control plane messages.
  • the local controller then provides the configuration data or configures the elements on the host computer to implement the middlebox service (e.g., instantiate a middlebox service instance, configure GMs to use the middlebox service instance, and configure an MFE to advertise the IPv6 address prefix associated with the middlebox service instance, etc.).
  • the middlebox service e.g., instantiate a middlebox service instance, configure GMs to use the middlebox service instance, and configure an MFE to advertise the IPv6 address prefix associated with the middlebox service instance, etc.
  • the configuration data generated for the gateway device is forwarded to the gateway device to configure the gateway device to identify particular host machines associated with particular received packets (e.g., by using the provided IPv6 routing table entries). After forwarding (at 950) the configuration data, the process ends.
  • process 900 is performed for each distributed middlebox service that uses a same IPv4 address as a source address for outgoing packets at each of multiple distributed middlebox service instances.
  • the controller computer cluster monitors the load on the middlebox service instances and the middlebox service in the aggregate periodically or based on a schedule. In some embodiments, the monitoring is based on a program executing on the same host computers as the middlebox service instances.
  • the program in some embodiments, monitors a set of metrics associated with the middlebox service instance (e.g., latency, number of connections handled, number of packets per second, number of end machines using the middlebox service instance, etc.).
  • operations 910 and 920 are performed whenever a new middlebox service instance or workload machine is requested to be initialized.
  • the operations 910 and 920 are also performed periodically or based on a schedule set by an administrator, in some embodiments, to determine if the monitoring information indicates that there has been a change requiring reallocation of port number ranges or the size of any port number ranges. If such a change occurs, operations 930-950 are then performed to update the allocation of port ranges and provide updated configuration data to the network elements.
  • FIG 11 conceptually illustrates a process 1100 performed by a gateway device to facilitate the provision of the middlebox service based on received configuration data.
  • the process 1100 begins by receiving (at 1110) configuration data for facilitating the provision of the middlebox service in an internal network.
  • the configuration data in some embodiments is received from a controller computer cluster (e.g., configuration data 1019) or as an advertisement of the availability of an IPv6 address prefix (e.g., advertisement 1039).
  • the controller cluster provides a portion of the configuration data while the advertisement includes a different portion of the configuration data.
  • the controller computer in some embodiments provides configuration data relating to the middlebox service records as described in relation to Figure 9, while the IPv6 routing table entry configuration data is received from host computers through advertisements of IPv6 address prefixes available at the host computers as described in relation to Figure 12.
  • the gateway device receives additional configuration information in the form of additional advertisements for the IPv6 address prefixes of the new middlebox service instances.
  • the gateway device Based on the configuration data received (at 1110) the gateway device creates (at 1110)
  • the routing table entries are static entries provided by the controller computer cluster that can be updated by the controller computer cluster as the configuration data changes.
  • the routing table entries are dynamic routing table entries that are created based on BGP or other route learning protocols known to one of ordinary skill in the art.
  • the process 1100 also creates (at 1130) middlebox service records based on the configuration data.
  • the middlebox service records may be any type of record or rule that identifies packets destined to the IPv4 address associated with the middlebox service as requiring IPv6 encapsulation and enable the gateway device to identify the correct IPv6 destination address to use to reach the middlebox service instance associated with the packet.
  • the middlebox service record in some embodiments, is any of (1) a PBR rule that identifies packets destined for the IPv4 address associated with the middlebox service as requiring IPv6 encapsulation and specifying the method for producing the IPv6 destination, (2) a set of records for a lookup table that identifies IPv6 destination addresses for a set of combinations of IPv4 address and destination port, or (3) an API instruction for an API exposed by an off-the-shelf gateway device to enable the programmatic encapsulation of the IPv4 packets destined for the IPv4 address associated with the middlebox service into an IPv6 packet.
  • routing table entries at 1120
  • middlebox service records at 1130
  • process 1100 is performed each time new configuration data is received at the gateway device. For example, each advertisement of a new IPv6 address prefix by a host computer will lead to the creation of a new IPv6 routing table entry in the gateway device.
  • the host computer in some embodiments, is configured to advertise the availability of an IPv6 address prefix that is based on the IPv4 used by the middlebox service instance as a source address for packets going from the first network to external networks and the range of port numbers assigned to the middlebox service instance.
  • Figure 12 conceptually illustrates a process 1200 for configuring a host computer to execute a distributed middlebox service instance and advertise the IPv6 address prefix associated with the middlebox service instance executing on the host computer.
  • the process 1200 in some embodiments, is performed by a host computer (e.g., host computer 1020) executing a local controller (e.g., local controller 1028) and a BGP instance (e.g. either MFE 1021 or routing machine 1023).
  • Process 1200 begins by receiving (at 1210) configuration information relating to a middlebox service instance executing on the host computer.
  • the configuration information relating to the middlebox service instance includes (1) the IPv4 address used by the middlebox service to replace the source address of packets sent from within the first network to machines in external networks and (2) the range of port addresses assigned to the middlebox service instance executing on the host computer.
  • the configuration information also includes information used internally to route packets to the middlebox service instance such as IP and MAC addresses or next hop interfaces used to forward packets to the middlebox service instance.
  • An IPv6 address associated with the middlebox service instance is also included in the configuration information, in some embodiments.
  • the configuration information in some embodiments, is received from a controller computer in a controller computer cluster that configures the elements of the first network.
  • the process 1200 After receiving (at 1210) the configuration information, the process 1200 identifies
  • configuration data for configuring different components (e.g., machines, MFEs, filters, containers, pods, etc.) executing on the host computer.
  • the middlebox service instance requires configuration data including the external IP address associated with the middlebox service, a range of ports assigned to the middlebox service instance and, in some embodiments, IP and media access control (MAC) addresses associated with the middlebox service instance.
  • a BGP instance e.g., MFE 1021 or routing machine 1023
  • the BGP instance is provided with the IPv6 address prefix to advertise.
  • the middlebox service instance with the IP address and port range associated with the middlebox service instance. If the middlebox service instance is being configured for a first time (i.e., is being instantiated) the configuration data includes additional information such as IP and MAC addresses associated with the middlebox service instance. In some embodiments, the configuration data only includes the IP address associated with the middlebox service when a middlebox service instance is instantiated and subsequent updates include only an updated port range.
  • the process 1200 After configuring (at 1230) the middlebox service instance, the process 1200 provides (at 1240), to a BGP instance executing on the host computer, an IPv6 address prefix identified as being associated with a middlebox service instance based on the configuration information.
  • the identified IPv6 address prefix in some embodiments, is based on the IPv4 address used by the middlebox service included in the configuration information, and the range of port numbers assigned to the middlebox service instance.
  • the assigned range of port numbers in some embodiments, is a range of port numbers that share a common set of leftmost bits.
  • assigned ranges of 1024 port numbers are numbers that share the 6 leftmost bits of the port number in common, while assigned ranges of 512 port numbers are numbers that share the 7 leftmost bits in common.
  • the IPv6 address prefix associated with the middlebox service instance in such embodiments is then identified as an IPv6 address prefix with the rightmost significant bits being the common set of bits in the port numbers assigned to the middlebox service instance.
  • the advertised IPv6 address is based on existing functions of a hardware gateway device for handling IPv6 encapsulation of IPv4 packets.
  • Figure 13 illustrates three different exemplary advertised IPv6 address prefixes
  • FIG. 13 illustrates a set of identified IPv6 address prefixes 1331-1333 that are in the FC00::/8 address block based on a configuration of a middlebox service instance. Other IPv6 prefixes are used, in some embodiments, for other address blocks such as the FD00::/8 address block.
  • the illustrated IPv6 includes the IPv4 address 1310 used by the middlebox service and the common bits (i.e., in the illustrated example the first 6 bits) of the range of port numbers 1315.
  • the illustrated example is for a middlebox service using an IPv4 address 1310 of 192.168.32.1 (or, in hexadecimal, C6A8:2001) and a port range 1315 of 0-1023 (with 6 “0” bits in common).
  • the example also illustrates a user-configured prefix 1320 (e.g., F462:5D1C:A451:2BD6) that, in some embodiments, is used to distinguish packets received for different tenants or logical network implemented in the same datacenter.
  • the user-configured 64-bit prefix is randomly generated such that common prefixes generated for different tenants are highly unlikely to be the same.
  • Exemplary IPv6 prefix 1331 is generated using the first 8 bits of the FC00: :/8 prefix followed by the 32 bits of the service IPv4 address 1310 and finally the port range prefix common to all the port numbers in the port range 1315 (i.e., FCC6:A820:0100::/46 ).
  • IPv6 prefix 1332 is generated using the first 16 bits of the FD00: :/8 prefix followed by the 32 bits of the service IPv4 address 1310 and finally the port range prefix common to all the port numbers in the port range 1315 (i.e., FD00:C6A8:2001::/54).
  • the IPv6 prefix 1333 is generated using the first 16 bits of the FC00: :/8 prefix followed by the user-configured 64-bit prefix 1320 followed by the 32 bits of the service IPv4 address 1310 and finally the port range prefix common to all the port numbers in the port range 1315 (i.e., FC00: ⁇ user-configured 64-bit prefix>:C6A8:2001::/118).
  • FIG. 13 shows IPv6 destination addresses 1341-1343 for an exemplary received packet having header values 1302 corresponding to advertisedIPv6 prefixes 1331-1333.
  • Exemplary IPv6 destination address 1341 is generated by a gateway device using the first 8 bits of the FC00::/8 prefix followed by the 32 bits of the destination IPv4 address 1350 and finally the destination port number 1355 (i.e., FCC6:A820:0100:0000:01:::).
  • IPv6 destination address 1342 is generated using the first 16 bits of the FD00::/8 prefix followed by the 32 bits of the destination IPv4 address 1350 and finally the destination port number 1355 (i.e., FD00:C6A8:2001:0000:0001::).
  • the IPv6 destination address 1343 is generated using the first 16 bits of the FC00::/8 prefix followed by the user-configured 64-bit prefix 1320 followed by the 32 bits of the destination IPv4 address 1350 and finally the destination port number 1355 (i.e., FC00:F462:5D1C:A451:2BD6:C6A8:2001::01:0000:0000).
  • the BGP instance then advertises the provided IPv6 address prefix associated with the middlebox service instance to a gateway device as being available at the host computer.
  • the advertisement includes an instruction to the gateway device to identify the IPv6 address based on an IPv4 address and port number of packets received at the gateway device and encapsulate the IPv4 packets with the identified IPv6 address.
  • the advertised IPv6 address is (1) based on existing functions of a hardware gateway device for handling IPv6 encapsulation of IPv4 packets, or (2) based on a central controller cluster separately configuring the gateway device to perform the IPv6 encapsulation based on the IPv4 address and port number.
  • the advertisement uses a border gateway protocol (BGP).
  • BGP border gateway protocol
  • other proprietary or non-proprietary (IS-IS, OSPF, FRR etc.) route advertisement protocols or methods are used that inform other routers of the availability of particular network addresses at the host computer.
  • the advertisement in some embodiments, is made to a route server (or route reflector) that identifies the advertised IPv6 address as being available at the host computer to the gateway device as well as other forwarding elements of the internal network.
  • the route server in some embodiments, also uses a BGP advertisement to identify the advertised IPv6 address as being available at the host computer and is used to simplify the exchange of routing information in the network by minimizing the number of peerings between different network elements necessary to propagate routing information in a full mesh configuration.
  • BGP advertisement to identify the advertised IPv6 address as being available at the host computer and is used to simplify the exchange of routing information in the network by minimizing the number of peerings between different network elements necessary to propagate routing information in a full mesh configuration.
  • BGP advertisement to identify the advertised IPv6 address as being available at the host computer and is used to simplify the exchange of routing information in the network by minimizing the number of peerings between different network elements necessary to propagate routing information in a full mesh configuration.
  • BGP instances and BGP protocols is merely one example or a protocol for advertising routing information and is used here merely as an example.
  • Process 1200 then continues to configure (at 1250) the other components (e.g., machines, MFEs, filters, containers, pods, etc.) executing on the host computer based on the received configuration data.
  • the other components are configured to direct traffic to the middlebox service instance based on policies included in the configuration data identifying traffic destined for an external network.
  • the order of configuring the components presented above is not the only possible order and that, in other embodiments, components are configured in parallel (e.g., simultaneously) or in a different order than the order presented above.
  • Figure 14 conceptually illustrates a set of data exchanges between network elements to migrate a VM (e.g., a guest virtual machine (GVM)) in communication with an external machine using a dSNAT middlebox service.
  • a controller computer 1440 that initiates the VM migration, a source host computer 1420a on which the VM originally executes, a destination host computer 1420b to which the VM is migrated, and a route server 1430 that is used by host computers as a central BGP server to disseminate routing information (e.g., IP address prefixes available at each host computer).
  • a VM e.g., a guest virtual machine (GVM)
  • GVM guest virtual machine
  • the data exchange begins (at 1410) with the controller computer initiating a VM migration by sending configuration data to each of the source host computer 1420a and the destination host computer 1420b to identify the VM being migrated.
  • the source host computer then identifies (at 1411) a set of ports for a set of middlebox services used by active connections of the migrated VM to inform the destination host computer 1420b of the migrated ports.
  • the set of ports identified to the destination host computer 1420b includes NAT records associating the identified ports with the internal IPv4 address and port used by the migrated VM.
  • the identified ports are put in a list of ports at the source host computer 1420a not to use until they are freed by the migrated VM (e.g., when the active connections using the identified ports end).
  • the source host computer 1420a also adds the port numbers to a redirection table to redirect any packets received for that port number to the destination host computer 1420b.
  • the redirection instruction specifies the specific communications destined to the migrated VM instead of redirecting all packets using a specific port number.
  • the destination host computer Based on the identified port numbers, the destination host computer, in some embodiments, advertises (at 1412) a set of IPv6 address for the specific migrated port numbers (e.g., an IP address prefix that is FC00:IPv4 address:port::/64) that will be the longest matching prefix at the gateway device and supersede the existing prefix (e.g., a /54 prefix) originally advertised by the source host computer 1420a without requiring further advertisement by the source host computer 1420a.
  • a set of IPv6 address for the specific migrated port numbers e.g., an IP address prefix that is FC00:IPv4 address:port::/64
  • FC00:IPv4 address:port::/64 FC00:IPv4 address:port::/64
  • the host computer to which the VM is migrated will not make the advertisement and will instead rely on the redirection at the host computer from which the VM was migrated.
  • the destination host computer 1420b informs (at 1413) the source host computer 1420a that the port has been freed and can be used by the source host computer 1420a for new connections.
  • the source host computer in some embodiments, then removes the freed port from the list of ports not to use.
  • the destination host computer also advertises (at 1413) that the specific IPv6 address prefix (e.g., the /64 prefix) is no longer available at the destination host computer 1420b.
  • the source host computer 1420a additionally advertises (at 1414) that the specific IPv6 address prefix (e.g., the /64 prefix) is available at the source host computer 1420a.
  • the specific IPv6 address prefix e.g., the /64 prefix
  • the source host computer 1420a omits advertising the IPv6 /64 address prefix associated with the freed port (at 1414) and relies on the IPv6 address prefix (e.g., a /54 prefix associated with the assigned range of port numbers) covering the specific IPv6 address to direct packets to the source host computer 1420a once the IPv6 /64 address is withdrawn by the destination host computer 1420b.
  • Destination host computer 1420b in some embodiments sends information and advertises the unavailability related to a freed port for each freed port as a connection using the port ends.
  • VM migration was used as an example but the above set of data exchanges could be used to migrate any similar compute node (e.g., container, pod, etc.).
  • the term “software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor. Also, in some embodiments, multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions. In some embodiments, multiple software inventions can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software invention described here is within the scope of the invention. In some embodiments, the software programs, when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
  • FIG. 15 conceptually illustrates a computer system 1500 with which some embodiments of the invention are implemented.
  • the computer system 1500 can be used to implement any of the above-described hosts, controllers, and managers. As such, it can be used to execute any of the above described processes.
  • This computer system includes various types of non-transitory machine readable media and interfaces for various other types of machine readable media.
  • Computer system 1500 includes a bus 1505, processing unit(s) 1510, a system memory 1525, a read-only memory 1530, a permanent storage device 1535, input devices 1540, and output devices 1545.
  • the bus 1505 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the computer system 1500.
  • the bus 1505 communicatively connects the processing unit(s) 1510 with the read-only memory 1530, the system memory 1525, and the permanent storage device 1535.
  • the processing unit(s) 1510 retrieve instructions to execute and data to process in order to execute the processes of the invention.
  • the processing unit(s) may be a single processor or a multi-core processor in different embodiments.
  • the read only-memory (ROM) 1530 stores static data and instructions that are needed by the processing unit(s) 1510 and other modules of the computer system.
  • the permanent storage device 1535 is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the computer system 1500 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 1535.
  • the system memory 1525 is a read-and-write memory device. However, unlike storage device 1535, the system memory is a volatile read-and-write memory, such a random access memory.
  • the system memory stores some of the instructions and data that the processor needs at runtime.
  • the invention’s processes are stored in the system memory 1525, the permanent storage device 1535, and/or the read-only memory 1530. From these various memory units, the processing unit(s) 1510 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.
  • the bus 1505 also connects to the input and output devices 1540 and 1545.
  • the input devices enable the user to communicate information and select commands to the computer system.
  • the input devices 1540 include alphanumeric keyboards and pointing devices (also called “cursor control devices”).
  • the output devices 1545 display images generated by the computer system.
  • the output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as a touchscreen that function as both input and output devices.
  • bus 1505 also couples computer system 1500 to a network 1565 through a network adapter (not shown).
  • the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet, or a network of networks, such as the Internet. Any or all components of computer system 1500 may be used in conjunction with the invention.
  • Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer- readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
  • electronic components such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer- readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
  • Such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra-density optical discs, any other optical or magnetic media, and floppy disks.
  • RAM random access memory
  • ROM read-only compact discs
  • CD-R recordable compact discs
  • CD-RW rewritable compact discs
  • read-only digital versatile discs e.g., DVD-ROM, dual-layer DVD-ROM
  • flash memory e.g., SD
  • the computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations.
  • Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
  • ASICs application specific integrated circuits
  • FPGAs field programmable gate arrays
  • integrated circuits execute instructions that are stored on the circuit itself.
  • memory all refer to electronic or other technological devices. These terms exclude people or groups of people.
  • display or displaying means displaying on an electronic device.
  • computer readable medium As used in this specification, the terms “computer readable medium,” “computer readable media,” and “machine readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral or transitory signals.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Some embodiments of the invention provide novel methods for facilitating a distributed SNAT (dSNAT) middled ox service operation for a first network at a host computer in the first network on which the dSNAT middled ox service operation is performed and a gateway device between the first network and a second network. The novel methods enable dSNAT that provides stateful SNAT at multiple host computers, thus avoiding the bottleneck problem associated with providing stateful SNAT at gateways and also significantly reduces the need to redirect packets received at the wrong host by using a capacity of off-the-shelf gateway devices to perform IPv6 encapsulation for IPv4 packets and assigning locally unique IPv6 addresses to each host executing a dSNAT middlebox service instance that are used by the gateway device.

Description

FACILITATING DISTRIBUTED SNAT SERVICE
BACKGROUND
[0001] Many networks rely on the use of source network address translation (SNAT) to translate addresses in an address space used within the network to addresses that are globally unique when communicating with external networks. Because SNAT is a stateful service, some networks provide SNAT at centralized locations (e.g., an SNAT server). However, providing centralized SNAT can lead to bottlenecks as all traffic using SNAT must traverse the centralized SNAT provider. To solve this bottleneck problem, some networks use a distributed SNAT architecture. However, a distributed SNAT architecture has its own challenges. For example, since the SNAT operation performed by each instance of the distributed SNAT uses a same IP address, traffic traversing a provider gateway device in some cases will be forwarded to a randomly selected SNAT instance which for a system with “N” distributed SNAT instances will lead to a packet being directed to a distributed SNAT instance that does not store the state information for the packet (N-l) out of N times.
[0002] Similarly, stateful load balancing operations for a set of workload compute nodes executing on multiple host computers available at a shared virtual internet protocol (VIP) suffer from the same issues. Accordingly, a solution that simultaneously solves the bottleneck and misdirection issues for providing middlebox services such as SNAT and stateful load balancing is required.
BRIEF SUMMARY
[0003] Some embodiments of the invention provide novel methods for facilitating a distributed middlebox service operation (e.g., a distributed SNAT (dSNAT) or distributed load balancing (dLB) middlebox service) for a first network at a host computer in the first network on which the middlebox service operation is performed and a gateway device between the first network and a second network. The novel methods enable a distributed middlebox service (e.g., dSNAT or dLB) that provides a stateful middlebox service at multiple host computers, thus avoiding the bottleneck problem associated with providing stateful middlebox services at gateways and also significantly reduces the need to redirect packets received at the wrong host by using a capacity of off-the-shelf gateway devices to perform IPv6 encapsulation for IPv4 packets and assigning locally unique IPv6 addresses to each host executing a distributed middlebox service instance.
[0004] The method configures the gateway device to receive packets destined for a distributed middlebox service and identify, based on a destination internet protocol version 4 (IPv4) address and a port specified in an IPv4 header of the received packet, an IP version 6 (IPv6) address to use to forward the received packet to a particular host computer on which a middlebox service instance associated with the destination IPv4 address executes. In some instances, the destination IPv4 address is an IPv4 VIP address associated with a dLB middlebox service or an IPv4 address used by a dSNAT as a source address for packets going from the first network to external networks. The gateway device then encapsulates the packet with an IPv6 header using the identified IPv6 address and forwards the encapsulated packet based on an IPv6 routing table of the gateway device.
[0005] The host computer is configured to receive encapsulated packets destined to the identified IPv6 address from the gateway device and remove the encapsulation to provide the inner IPv4 packet to a middlebox service instance executing on the host computer based on the IPv4 address in a header of the inner IPv4 packet. The middlebox service instance performs an address replacement operation (e.g., a lookup in a connection tracker that associates translated IP addresses and ports into original IP addresses and ports, or replaces a VIP destination address and port with a workload IP address and port) to replace the IP address and port number in the IPv4 header with an IPv4 address and port used by a source machine in the first network. In some embodiments, the middlebox service instance executing on the host computer is assigned a range of port numbers for performing the middlebox service operation for packets going from the first network to external networks, in the case of dSNAT or, in the case of dLB, is assigned a range of port numbers for which to receive packets.
[0006] The host computer, in some embodiments, is configured to advertise the availability of an IPv6 address prefix that is based on the IPv4 used by the middlebox service instance as a source address for packets going from the first network to external networks and the range of port numbers assigned to the middlebox service instance. In some embodiments, the advertised IPv6 address prefix begins with 16 bits that are not assigned to be globally unique in IPv6 (e.g., FC00) followed by the IPv4 address used by the middlebox service and then followed by the set of bits in the 16-bit port address that are common to the range of port numbers assigned to the middlebox service instance executing on the host computer (e.g., the first 6 bits common to a range of 1024 assigned port numbers). Packets processed by the middlebox service instance executing on a host computer that are destined for an external network, in some embodiments, are sent from the host without encapsulation in an IPv6 header using the advertised IPv6 address as a source IP address. While the IPv6 address associated with the middlebox service instance is not used in encapsulating the packet, in some embodiments, other encapsulation may be used to reach the gateway device. [0007] The advertisement, in some embodiments, is made by a border gateway protocol
(BGP) instance executing on the host computer (e.g., a managed forwarding element). In some embodiments, the advertisement is made to a route reflector (e.g., a route server) that advertises the availability of the IPv6 address prefix at the host computer to other network elements including the gateway device or set of gateway devices. The advertisement, in some embodiments, includes an instruction to the gateway device to identify the IPv6 address based on an IPv4 address and port number of packets received at the gateway device and encapsulate the IPv4 packets with the identified IPv6 address. In other embodiments, the advertised IPv6 address is based on existing functions of a hardware gateway device for handling IPv6 encapsulation of IPv4 packets.
[0008] In some embodiments, a controller computer cluster (i.e., a set of one or more controller computers) of the first network provides configuration information to network elements to facilitate the distributed middlebox service operation for the first network. The configuration information, in some embodiments, includes a set of middlebox service records and IPv6 routing table entries provided to a gateway device. The middlebox service records map combinations of the IPv4 used by a particular middlebox service operation and destination port number to an IPv6 destination address. In some embodiments, the middlebox service record is a policy-based routing (PBR) rule that defines an algorithm for generating an IPv6 address from an IPv4 destination address and a port number included in an IPv4 header and specifies an IPv4 destination address for which the algorithm should be applied. The IPv6 routing table entries, in some embodiments, each identify an IPv6 address prefix associated with a particular host computer in a set of multiple host computers that each execute a middlebox service instance and a next hop towards the particular host computer.
[0009] The controller computer cluster configures the middlebox service instances to use a particular IPv4 address when performing the middlebox service operation and assigns, to each middlebox service instance of a particular middlebox service, a non-overlapping range of port numbers to use. In some embodiments, the IPv4 address and port number range are provided to the host computer (e.g., an MFE of the host computer) to identify the IPv6 address prefix that corresponds to the IPv4 address and range of assigned port numbers and to advertise the availability of the identified IPv6 address at the host computer. The size of the port number ranges assigned to the middlebox service instances, in some embodiments, are fixed by an administrator based on a maximum number of expected middlebox service instances (e.g., for an expected maximum of 64 middlebox service instances, creating 64 different port number ranges each including 1024 ports that are each assigned to a middlebox service instance on startup). In other embodiments, the size of the port number ranges is dynamic and may change based on the number of active middlebox service instances. The port number ranges may also vary in size between middlebox service instances. For example, a larger port number range is assigned to a first middlebox service instance executing on a host computer executing a larger number of workload machines using the middlebox service than a second middlebox service instance executing on a host computer executing a smaller number of workload machines using the middlebox service. [0010] The preceding Summary is intended to serve as a brief introduction to some embodiments of the invention. It is not meant to be an introduction or overview of all inventive subject matter disclosed in this document. The Detailed Description that follows and the Drawings that are referred to in the Detailed Description will further describe the embodiments described in the Summary as well as other embodiments. Accordingly, to understand all the embodiments described by this document, a full review of the Summary, Detailed Description, the Drawings, and the Claims is needed. Moreover, the claimed subject matters are not to be limited by the illustrative details in the Summary, Detailed Description, and the Drawing.
BRIEF DESCRIPTION OF THE DRAWINGS [0011] The novel features of the invention are set forth in the appended claims. However, for purposes of explanation, several embodiments of the invention are set forth in the following figures.
[0012] Figure 1 illustrates an exemplary network in which the novel method for facilitating the provision of a distributed SNAT middlebox service operation for a first network is performed.
[0013] Figure 2 conceptually illustrates a process performed by a gateway device to process a received packet that is destined to a particular middlebox service instance.
[0014] Figure 3A illustrates packet processing at a gateway device as depicted in Figure
1 for a first packet in a particular packet flow received from the external network.
[0015] Figure 3B illustrates packet processing at a gateway device as depicted in Figure
1 for a subsequent packet in the particular packet flow for which the packet depicted in Figure 3A was the first packet received from the external network.
[0016] Figure 4 illustrates packet processing at a gateway device as depicted in Figure 1 for a subsequent packet in a particular packet flow destined to an LB VIP for which a packet was previously received from the external network.
[0017] Figure 5 conceptually illustrates a process performed at a host computer for processing a received IPv6 packet destined for a middlebox service instance executing on the host computer.
[0018] Figure 6 illustrates a packet being sent from an external machine to a guest machine in an internal network.
[0019] Figure 7 conceptually illustrates a process performed by a NAT instance processing a first packet in a packet flow destined for a destination machine in an external network. [0020] Figure 8 illustrates a first packet in a packet flow being sent from a GM and processed by the NAT instance executing on the same host computer.
[0021] Figure 9 conceptually illustrates a process for generating configuration data for different network elements that provide the middlebox service and facilitate the provision of the middlebox service.
[0022] Figure 10 illustrates a computer controller cluster in a datacenter sending different types of configuration data to different network elements. [0023] Figure 11 conceptually illustrates a process performed by a gateway device to facilitate the provision of the middlebox service based on received configuration data.
[0024] Figure 12 conceptually illustrates a process for configuring a host computer to execute a distributed middlebox service instance and advertise the IPv6 address prefix associated with the middlebox service instance executing on the host computer.
[0025] Figure 13 illustrates three different exemplary advertised IPv6 address prefixes that are used in different embodiments to advertise the availability of the service at the host computer and corresponding exemplary destination IPv6 addresses generated by a gateway device to use in an IPv6 encapsulation header to forward a packet to the particular service instance executing on the host computer making the advertisement.
[0026] Figure 14 conceptually illustrates a set of data exchanges between network elements to migrate a compute node.
[0027] Figure 15 conceptually illustrates a computer system with which some embodiments of the invention are implemented.
DETAILED DESCRIPTION
[0028] In the following detailed description of the invention, numerous details, examples, and embodiments of the invention are set forth and described. However, it will be clear and apparent to one skilled in the art that the invention is not limited to the embodiments set forth and that the invention may be practiced without some of the specific details and examples discussed. [0029] Some embodiments of the invention provide novel methods for facilitating a distributed middlebox service operation (e.g., a distributed SNAT (dSNAT) or distributed load balancing (dLB) middlebox service) for a first network at a host computer in the first network on which the middlebox service operation is performed and a gateway device between the first network and a second network. The novel methods enable a distributed middlebox service (e.g., dSNAT or dLB) that provides a stateful middlebox service at multiple host computers, thus avoiding the bottleneck problem associated with providing stateful middlebox services at gateways and also significantly reduces the need to redirect packets received at the wrong host by using a capacity of off-the-shelf gateway devices to perform IPv6 encapsulation for IPv4 packets and assigning locally unique IPv6 addresses to each host executing a distributed middlebox service instance. The discussion below, in part, focuses on a dSNAT and dLB middlebox service, however one of ordinary skill in the art will appreciate that the methods discussed can be applied to a any distributed, stateful middlebox service using a same IP address at multiple host computers.
[0030] The method configures the gateway device to receive packets destined for an IPv4
VIP of the dLB service or an IPv4 address used by the dSNAT service as a source address for packets going from the first network to external networks and identify, based on an IPv4 destination address and a port specified in an IPv4 header of the received packet, an IP version 6 (IPv6) address to use to forward the received packet to the host computer on which the dSNAT operation was performed. The gateway device then encapsulates the packet with an IPv6 header using the identified IPv6 address and forwards the encapsulated packet based on an IPv6 routing table of the gateway device.
[0031] As used in this document, packet refers to a collection of bits in a particular format sent across a network. A packet, in some embodiments, is referred to as a data message. One of ordinary skill in the art will recognize that the term packet is used in this document to refer to various formatted collections of bits that are sent across a network. The formatting of these bits can be specified by standardized protocols or non-standardized protocols. Examples of packets following standardized protocols include Ethernet frames, IP packets, TCP segments, UDP datagrams, etc. Also, as used in this document, references to L2, L3, L4, and L7 layers (or layer 2, layer 3, layer 4, and layer 7) are references respectively to the second data link layer, the third network layer, the fourth transport layer, and the seventh application layer of the OSI (Open System Interconnection) layer model.
[0032] Also, in this example, the term managed forwarding element (MFE) refers to software forwarding elements or hardware forwarding elements that are configured by a controller computer cluster (i.e., a set of one or more controller computers that provide configuration data to network elements) to implement a logical network comprising a set of logical forwarding elements (LFEs). In some embodiments, each LFE is a distributed forwarding element that is implemented by configuring multiple MFEs on multiple host computers. To do this, each MFE or a module associated with the MFE in some embodiments is configured to encapsulate the data messages of the LFE with an overlay network header that contains a virtual network identifier (VNI) associated with the overlay network. As such, the LFEs are said to be overlay network constructs that span multiple host computers in the discussion below.
[0033] The LFEs also span, in some embodiments, configured hardware forwarding elements (e.g., top of rack switches). In some embodiments, the set of LFEs includes a logical switch that is implemented by configuring multiple software switches or related modules on multiple host computers. In other embodiments, the LFEs can be other types of forwarding elements (e.g., logical routers), or any combination of forwarding elements (e.g., logical switches and/or logical routers) that form logical networks or portions thereof. Many examples of LFEs, logical switches, logical routers and logical networks exist today, including those provided by VMware’s NSX network and service virtualization platform.
[0034] Figure 1 illustrates an exemplary network 100 in which the novel method for facilitating the provision of a distributed SNAT operation for a first network is performed. Figure 1 illustrates a network 100 comprising an external network 101 connecting a set of machines 102 outside of a datacenter 105 with guest machines (GMs) 126 executing on a number of hosts 120 in the datacenter 105 (e.g., a public cloud datacenter or set of datacenters). The gateway devices 110 execute between the internal network and the external network 101 and are configured, as discussed below in relation to Figure 11, to facilitate the provision of the distributed middlebox service for communications between the external machines 102 and the internal compute nodes (e.g., GMs 126). The gateway device 110 includes a cache 111 that stores information regarding forwarding decisions made for previously received packets and a set of pre-routing rules 112 that, in some embodiments, includes policy-based routing rules based on IP (either IPv4 or IPv6) addresses. After performing a lookup in the cache 111 and performing a lookup in the set of pre routing rules 112, packets may be routed using an IPv4 routing table, or an IPv6 routing table, or may be sent to an IPv6 encapsulator to be encapsulated in an IPv6 header and then routed based on the IPv6 routing table.
[0035] The system 100 also includes a set of controller computers 140 that provide configuration information to the set of host computers 120 to implement a set of logical forwarding elements (e.g., using the MFEs 121), an IPv6 processing module 122 that processes received IPv6 packets, a routing machine (RM) 123 that acts as a BGP instance to interact with the set of route servers 130, a distributed middlebox service instance 124 (e.g., the SNAT instances 124 that, in the illustrated embodiment, provide a dSNAT middlebox service), and a set of compute nodes (e.g., the GMs 126). The host computers 120 also include a set of NAT records 125 that, in some embodiments, are caches recording associations between internal IP address/port pairs and ports selected by the SNAT instance 124 as external ports for each IP address/port pair. In some embodiments, the cache records also store an IP address of the external machine along with the port selected by the SNAT instance 124 to allow the SNAT instance 124 to use a same port for multiple data message flows established with different external machines using different IP addresses.
[0036] The system 100 also includes a set of route servers 130 (also referred to as route reflectors) that each receive routing information from multiple network elements and provides the routing information to other network elements to simplify the exchange of routing information. For example, instead of using a full mesh connecting each BGP instance (e.g., RM 123), each BGP instance interacts with the route servers 130 to reduce the number of advertisements made by each BGP instance. The datacenter 105 also includes the intervening fabric 150 that provides the physical connections between the illustrated network elements.
[0037] The function of the various elements of Figure 1 will be discussed in more detail in relation to Figures 2-4. Figure 2 conceptually illustrates a process 200 performed by a gateway device (e.g., the gateway device 110) to process a received packet that is destined to a particular middlebox service instance (e.g., SNAT instance 124a). In some embodiments, the gateway device is an off-the-shelf gateway device with the capability to encapsulate an IPv4 packet in an IPv6 packet and to generate the IPv6 header of the IPv6 packet using either a set of rules or a set of records specifying IPv6 headers to use based on IPv4 header values. In other embodiments, the gateway device is a fully programmable forwarding element that is programmed to carry out the operations of process 200. One of ordinary skill in the art will appreciate that process 200 can be performed for packets destined for an IPv4 address associated with any of a dSNAT middlebox service, a dLB middlebox service for a set of load balanced set of workload compute nodes, or any distributed middlebox service using a same IP address at multiple middlebox service instances executing on multiple host computers.
[0038] The process 200 begins by receiving (at 210) an IPv4 packet destined to a particular middlebox service instance (e.g., SNAT instance 124a) executing on a particular host computer (e.g., host computer 120a) with a destination address that is associated with the middlebox service (i.e., all the middlebox service instances). The IPv4 header identifies the source machine in the external network by a source IP address and identifies a destination IP address and port that is a source IP address and port used by the SNAT instance that processes packets for the communication session (also referred to as a packet flow or connection) between the external machine and the internal compute node serviced by the middlebox service instance.
[0039] The process then determines (at 220) that the IPv4 packet requires encapsulation in an IPv6 packet. In some embodiments, the determination for a first packet in a particular flow of packets received from an external machine is made based on a middlebox service record. The middlebox service record, in some embodiments is an IPv4 routing table entry for the IPv4 destination address that indicates that the packet requires encapsulation in an IPv6 packet. In some embodiments, the IPv4 routing entry also indicates either (1) a specific IPv6 destination address to use for encapsulating the IPv4 packet based on the IPv4 header values (e.g., an IPv4 destination address and destination port (for SNAT) or source port (for LB)) or (2) an algorithm for generating an IPv6 destination address to use in the IPv6 encapsulation header. In some embodiments, the middlebox service record is a policy based routing (PBR) rule that specifies encapsulation for all packets destined to the IPv4 address associated with the middlebox service. As with the IPv4 routing entry the PBR rule can either specify an IPv6 destination address or a method for generating the IPv6 destination address. In some embodiments, PBR rule is included in the pre routing rules 112. After the first received packet for a particular flow of packets from an external machine, in some embodiments, the determination for subsequent packets of the particular flow is made based on a cache record that includes the determination made for the first packet of the particular flow and that is stored in cache 111.
[0040] After determining (at 220) that the IPv4 packet requires encapsulation in an IPv6 packet, the process 200 identifies (at 230) the IPv6 destination address to use in the IPv6 encapsulation header based on the IPv4 header values (e.g., a destination IPv4 address and a destination port (for dSNAT) or a source port (for dLB)). In some embodiments, the identification is based on an IPv6 destination address specified in the middlebox service record for the IPv4 destination address and port pair. In other embodiments, the identification is based on an algorithm or other programmatic method of generating an IPv6 destination address from IPv4 headers. The algorithm in some embodiments takes an IPv6 prefix that is used for locally unique addresses (e.g., FC00::/8) and appends the IPv4 destination address and the destination (or source) port followed by zeros (zeros are used for simplicity but any set of trailing bits would work in some embodiments).
[0041] After identifying (at 230) the IPv6 destination address, the IPv4 packet is encapsulated (at 240) with an IPv6 header using the identified IPv6 address as a destination address. In some embodiments, the encapsulation is done by an IPv6 encapsulation module (e.g., IPv6 encapsulator 114). The destination port, in some embodiments, is the IPv4 destination port but, in other embodiments, may be any port. The source IPv6 address and port, in some embodiments, are an IPv6 address and port associated with the gateway device. The process 200 then performs (at 250) a lookup in an IPv6 routing table (e.g., IPv6 routing table 115) to identify the next hop for the encapsulated date message. As will be discussed in more detail below, the gateway device is configured with a set of IPv6 routes (i.e., routing table entries) for each of a set of IPv6 address prefixes associated with a set of host computers that executes middlebox service instances that indicate the next hop for each IPv6 address prefix. In some embodiments, the IPv6 address prefixes are provided by a controller computer (e.g., as static routes). In other embodiments, the host computers (e.g., BGP instances executing on the host computers) advertise the IPv6 address prefixes as being available at the host computer. As will be discussed in more detail below, each middlebox service instance is assigned a range of port numbers that can be used to generate a unique IPv6 address prefix based on the algorithm described above for generating the IPv6 destination address. [0042] Finally, the process 200 forwards (at 260) the IPv6 packet to the identified next hop towards the middlebox service instance and the process ends. In some embodiments, the packet is forwarded over an intervening network fabric (e.g., intervening fabric 150). The forwarding elements in the intervening fabric, in some embodiments, learn the next hop for the destination IPv6 address using standard protocols such as any or all of BGP, IGP, ARP, or any of the other route learning mechanisms known to one of ordinary skill in the art.
[0043] Examples of packet processing for first and subsequent packets in a particular flow for different distributed middlebox services are illustrated in Figures 3A, 3B and 4. Figure 3A illustrates packet processing at a gateway device 110 as depicted in Figure 1 for a first packet 320a in a particular packet flow received from the external network 101. As shown packet 320a is received from a machine 102 in the external network 101 destined for the NAT IP address and Port N (i.e., the port selected by the SNAT as a source port). The packet is first compared to cache entries in cache 111 which does not yet include cache record 111a. Since no cache record is found, a lookup is performed in the set of pre-routing rules 112, and in the illustrated embodiment, a pre routing rule 112a is identified as applying to the packet based on the destination IP (i.e., NAT IP). Based on identifying pre-routing rule 112a as applying to the packet, a cache record 11 la is created in cache 111. In the illustrated embodiment, the cache record 111a identifies the result of the lookup in the pre-routing rules, however one of ordinary skill in the art will appreciate that the cache record, in other embodiments, identifies the specific IPv6 address used to encapsulate the packets in the flow based on the rule or the IPv6 encapsulation address and a next hop.
[0044] Based on the pre-routing rule 112a identified based on the destination IPv4 address
(i.e., the IPv4 address associated with the dSNAT service (NAT IP)), the packet is passed to the IPv6 packet encapsulator 114 for encapsulation instead of being passed to IPv4 routing table 113 for forwarding based on the IPv4 header values. In the illustrated embodiment, the pre-routing rule 112a identifies an encapsulation rule stored by the IPv6 encapsulator that would be identified, as part of passing the packet, to the IPv6 encapsulator 114 to perform the encapsulation. In other embodiments, passing the packet to IPv6 encapsulator 114 comprises sending a rule (e.g., an algorithm) for generating the encapsulation header values. The IPv6 encapsulator 114 then encapsulates the packet with an IPv6 header packet based on the identified rule (i.e., rule 114a). [0045] In the illustrated embodiment, the destination IPv6 address is generated by using an FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the destination port (Port N) followed by 0’s. Other prefixes or filler bits are used in other embodiments, and one of ordinary skill in the art will recognize that this is just one of many possible algorithms for generating the IPv6 destination address that has been selected for simplicity. The IPv6 destination port, source IPv6 address, and IPv6 source port, in some embodiments, are, the original destination port, a source IPv6 address associated with the gateway device 110 and a randomly selected IPv6 source port. However, one of ordinary skill in the art will appreciate that other destination ports and source IPv6 address and port are used in other embodiments without affecting the routing of the packet to the particular host and dSNAT instance. [0046] Once the packet is encapsulated in an IPv6 header including the generated IPv6 address, it is passed to an IPv6 forwarding operation represented by IPv6 routing table 115. A lookup in IPv6 routing table 115 identifies a matching routing table entry 115a that includes a next hop (i.e., next hop 3) interface that is used to forward the packet to its destination. In some embodiments, the IPv6 routing table entries for the NAT IP (and LB IP) are dynamic routes learned based on advertisements from the BGP instances on the host machines, while in other embodiments the routing table entries are static routes received from a controller computer in a set of controller computers (e.g., controller computer cluster 140). The IPv6 packet 330a is then forwarded to the destination host based on the IPv6 destination address (i.e., FC00:NAT IP:PortN::).
[0047] Figure 3B illustrates packet processing at a gateway device 110 as depicted in
Figure 1 for a subsequent packet 320b in the particular packet flow for which packet 320a was the first packet received from the external network 101. As shown packet 320b is received from a machine 102 in the external network 101 destined for the NAT IP address and Port N (i.e., the port selected by the SNAT as a source port). The packet is first compared to cache entries in cache 111 which includes cache record 111a based on the first packet 320a received from the external network 101. The cache record 111a indicates that the packet 320b should be encapsulated in an IPv6 header according to a particular encapsulation rule (i.e., “IPv6 Encap Rule 1”). The packet and the rule identifier are passed, in some embodiments, to the IPv6 encapsulator 114, bypassing pre-routing rules 112. However, one of ordinary skill in the art will appreciate that the cache record, in other embodiments, identifies the specific IPv6 address used to encapsulate the packets in the flow based on the rule or the IPv6 encapsulation address and a next hop. The IPv6 encapsulator 114 then encapsulates the packet with an IPv6 header packet based on the identified rule (i.e., rule 114a).
[0048] In the illustrated embodiment, the destination IPv6 address is generated by using an FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the destination port (Port N) followed by 0’s. Other prefixes or filler bits are used in other embodiments, and one of ordinary skill in the art will recognize that this is just one of many possible algorithms for generating the IPv6 destination address that has been selected for simplicity. The IPv6 destination port, source IPv6 address, and IPv6 source port, in some embodiments, are, the original destination port, a source IPv6 address associated with the gateway device 110 and a randomly selected IPv6 source port for the particular flow. However, one of ordinary skill in the art will appreciate that other destination ports and source IPv6 address and port are used in other embodiments without affecting the routing of the packet to the particular host and dSNAT instance.
[0049] Once the packet is encapsulated in an IPv6 header including the generated IPv6 address it is passed to an IPv6 forwarding operation represented by IPv6 routing table 115. A lookup in IPv6 routing table 115 identifies a matching routing table entry 115a that includes a next hop (i.e., next hop 3) interface that is used to forward the packet to its destination. The lookup in IPv6 routing table 115, in some embodiments, is not performed if the cache record 111a identifies the next hop interface to use after encapsulation. In some embodiments, the IPv6 routing table entries for the NAT IP (and LB IP) are dynamic routes learned based on advertisements from the BGP instances on the host machines, while in other embodiments the routing table entries are static routes received from a controller computer in the set of controller computers 140. The IPv6 packet 330b is then forwarded to the destination host based on the IPv6 destination address (i.e., FC00:NAT IP:PortN::).
[0050] Figure 4 illustrates packet processing at a gateway device 110 as depicted in Figure
1 for a subsequent packet 420 in a particular packet flow destined to the LB VIP for which a packet was previously received from the external network 101. As shown packet 420 is received from a machine 102 in the external network 101 destined for the LB VIP address and Port B (i.e., a port associated with the VIP). The packet is first compared to cache entries in cache 111 which includes cache record 111b based on the first packet received from the external network 101 for the particular packet flow destined to the LB VIP. The cache record 111b indicates that the packet 420 should be encapsulated in an IPv6 header according to a particular encapsulation rule (i.e., “IPv6 Encap Rule 2”). The packet and the rule identifier are passed, in some embodiments, to the IPv6 encapsulator 114, bypassing pre-routing rules 112. However, one of ordinary skill in the art will appreciate that the cache record, in other embodiments, identifies the specific IPv6 address used to encapsulate the packets in the flow based on the rule or the IPv6 encapsulation address and a next hop. The IPv6 encapsulator 114 then encapsulates the packet with an IPv6 header packet based on the identified rule (i.e., rule 114b).
[0051] In the illustrated embodiment, the destination IPv6 address is generated by using an FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the source port (Port Z) followed by 0’s. The source port is used instead of the destination port, in some embodiments, because it is randomly selected from the possible port values when initiating a flow (e.g., a session or connection) and is then constant for the lifetime of the packet. This allows the flows to be distributed among multiple LB instances based on different source port ranges assigned to each LB instance while at the same time ensuring that the same LB instance that maintains state information for providing the LB service to a particular flow receives packets of that flow. On the other hand, if the destination port was used, in some instances, the LB VIP may be associated with servers listening on a specific port or ports such that the destination port will not allow for identifying a specific LB instance. In other embodiments, in which the destination port can be used to differentiate different hosts, the rule will be the same as that used for the NAT IP of Figure 3. Other prefixes or filler bits are used in other embodiments, and one of ordinary skill in the art will recognize that this is just one of many possible algorithms for generating the IPv6 destination address that has been selected for simplicity. The IPv6 destination port, source IPv6 address, and IPv6 source port, in some embodiments, are, the original destination port, a source IPv6 address associated with the gateway device 110 and a randomly selected IPv6 source port for the particular flow. However, one of ordinary skill in the art will appreciate that other destination ports and source IPv6 address and port are used in other embodiments without affecting the routing of the packet to the particular host and dLB instance.
[0052] In some embodiments, even some stateful distributed services are advertised as being available at each host computer using a same network address. For example, a stateful distributed load balancing service for distributing requests received from clients in external networks, in some embodiments, relies on a set of gateways of the availability zone (AZ) to consistently send a same flow to a same host computer providing the distributed load balancing based on an equal cost multipathing (ECMP) operation performed at the gateway devices of the A Z across the host computers providing the distributed load balancing service. To enable this ECMP operation, in some embodiments, the routing machine on each host executing a distributed load balancer instance advertises the same VIP address as being available and the gateway devices of the A Z record the multiple advertised next hop addresses as being associated with the VIP as possible next hops. For received data messages addressed to the VIP, a gateway device of the AZ selects a particular next hop using an ECMP operation. In such embodiments, an acceptable number of redirection operations may be required upon a change in the number of host computers providing the distributed load balancing service such that it is not worth the effort to ensure that different host computers can be deterministically identified for each flow (or data message). [0053] Once the packet is encapsulated in an IPv6 header including the generated IPv6 address it is passed to an IPv6 forwarding operation represented by IPv6 routing table 115. A lookup in IPv6 routing table 115 identifies a next hop (i.e., next hop 3) interface that is used to forward the packet to its destination. The lookup in IPv6 routing table 115, in some embodiments, is not performed if the cache record 111b identifies the next hop interface to use after encapsulation. In some embodiments, the IPv6 routing table entries for the LB IP (and NAT IP) are dynamic routes learned based on advertisements from the BGP instances on the host machines, while in other embodiments the routing table entries are static routes received from a controller computer in the set of controller computers 140. The IPv6 packet 430 is then forwarded to the destination host based on the IPv6 destination address (i.e., FC00:LB IP:PortZ::).
[0054] Once the gateway device has encapsulated and forwarded the packet, it will reach the host computer on which the destination distributed middlebox instance executes. The host computer is configured to receive encapsulated packets destined to the identified IPv6 address from the gateway device and remove the encapsulation to provide the inner IPv4 packet to a middlebox service instance executing on the host computer based on the IPv4 address in a header of the inner IPv4 packet. Figure 5 conceptually illustrates a process 500 performed at a host computer for processing a received IPv6 packet destined for a middlebox service instance executing on the host computer. In some embodiments, the process 500 is performed by a host computer on which the middlebox service instance executes. In some embodiments, the host computer performs the process 500 using an MFE (e.g., MFE 121a), a software routing element (e.g., routing machine 123a), an IPv6 processing module (e.g., IPv6 processing module 122a), a distributed middlebox instance (e.g., SNAT 124a), and a storage (e.g., NAT Records 125a) storing records for doing an IPv4 translation operation, executing on the host computer. In other embodiments, some of the elements are combined (e.g., the MFE implements (or is) the software routing element and contains IPv6 packet processing instructions, while the distributed middlebox service instance includes the records used to perform the middlebox service). The process 500 begins by receiving (at 510) an IPv6 packet destined to the IPv6 address associated with the middlebox service instance executing on the host computer.
[0055] The process 500 then removes (at 520) the IPv6 encapsulation header and performs a lookup in a routing table to identify the next hop for the inner IPv4 packet. In some embodiments, the received packet is passed to an IPv6 processing module (e.g., 122) that is programmed with IPv6 routing rules and tables. The routing rules, in some embodiments, include a rule identifying IPv6 packets destined to a middlebox service instance as requiring removal of an IPv6 encapsulation header and being passed to an IPv4 routing table lookup (e.g., performed by an MFE or routing module). In some embodiments, the rule identifies a next hop and that the IPv6 encapsulation should be removed before forwarding the packet.
[0056] In other embodiments, the lookup is performed in an IPv4 routing table after removing the IPv6 encapsulation to identify the next hop towards the middlebox service instance. In some embodiments, the IPv6 processing module is an IPv6 stack of a dual stack routing element (an MFE or routing module) instead of an independent module. The lookup, in some embodiments, is performed in a first virtual routing and forwarding (VRF) context for a first logical network or tenant associated with the middlebox service instance. A virtual tunnel end point (VTEP), in some embodiments, receives the encapsulated packet based on an IPv6 address of the encapsulated packet. The VTEP is then responsible for decapsulating the packet and identifying a next hop based on a virtual network identifier and IPv4 address associated with the received IPv6 packet. The packet is then forwarded (at 530) towards the middlebox service instance with the IPv4 header, using the IPv4 header values in the packet received at the gateway device through the identified next hop interface.
[0057] The distributed middlebox service instance receives the packet and identifies (at
540) destination internal IPv4 header values to forward the data to the correct destination. In some embodiments, identifying the destination IPv4 internal header values includes performing a lookup in a middlebox service record storage (e.g., a cache) that maintains associations between ports used to replace source ports for outgoing packets and source IPv4 addresses and ports. In some embodiments, the ports used to replace the source port for outgoing packets belong to a range of port numbers assigned to the middlebox service instance executing on the host computer (e.g., for the middlebox service instance to use to replace the source port of outgoing packets, or source ports that will be directed to the middlebox service instance). The destination port is used, in some embodiments, to perform the lookup in (e.g., query) the middlebox service record storage to identify an internal IPv4 address and port to replace a current (external) destination IPv4 address and port for forwarding the packet to the correct destination machine (e.g., a virtual machine, container, pod, etc.).
[0058] For a distributed LB instance, identifying the destination internal IPv4 address includes, for a first packet of a particular flow, performing a load balancing operation to select a destination machine (either on the same host computer or on a different host computer). The load balancing operation, in some embodiments, preferentially selects local compute nodes to provide the service associated with the VIP in order to reduce redirection, but based on the load balancing algorithm or method can select any compute node executing on any host computer and selects at least one compute node on at least one other host computer for at least one flow. Once the destination machine is selected, the distributed LB instance, in some embodiments, creates a record in the middlebox service record storage to identify the destination IPv4 header values for subsequent packets of the particular flow. For subsequent packets in a flow destined to the LB VIP, the lookup in the middlebox service record storage is based on a set of at least one other IPv4 header values (e.g., source IP, source port, source IP/port, etc.).
[0059] Once the internal IPv4 address and port have been identified, the distributed middlebox service replaces (at 550) the external IPv4 address and port with the identified internal IPv4 address and port. The packet is then forwarded (at 560) to the destination machine based on the internal IPv4 address and port. In some embodiments, the packet is forwarded (at 560) through a logical switch that connects the destination machine to the distributed middlebox service instance. For the LB instance, the identified IPv4 destination connected to the logical switch, in some embodiments, is a compute node executing on another host computer that also implements the logical switch (i.e., is within the span of the logical switch). Once the packet is forwarded to the destination machine, the process ends. [0060] Figure 6 illustrates a packet being sent from an external machine 102 to a guest machine (GM) 126 in an internal network. The original data message is sent with an IP header 650a that specifies a destination IP (DIP) address associated with the dSNAT middlebox service and a destination port (Dport) that is within the range assigned to a particular dSNAT middlebox service instance 124a. The source IP address (SIP, Ext IP1) and port (Sport, Port Y) are associated with the external machine 102. At the gateway device 110 the IPv4 packet (i.e., inner packet 670) sent by the external machine 102 is encapsulated with an IPv6 header 660 based on the process discussed above in relation to Figures 2-3B. The resulting packet has a destination IPv6 address associated with host 120a (e.g., FC00:NAT IP:PortN::) and NAT instance 124a and is sent to the host 120 through the intervening fabric 150.
[0061] The IPv6 encapsulated packet is then received at the managed forwarding element
(MFE) 121a and is passed to an IPv6 processing module 122a to perform IPv6 processing. In other embodiments, IPv6 processing is performed in an IPv6 stack in a dual stack MFE or routing machine 123a. The IPv6 processing, in some embodiments, includes removing the IPv6 encapsulation and returning the IPv4 packet to the MFE 121a. In other embodiments, the IPv6 processing includes identifying the NAT instance 124a based on the IPv6 header values and removing the encapsulation. In embodiments in which the inner packet 670 is returned to the MFE 121a, the MFE 121a identifies the NAT instance 124a as the destination of the inner packet 670 based on the IPv4 header.
[0062] The NAT 124a instance receives the original (or inner) IPv4 packet and performs a lookup in NAT records storage 127a. The NAT records 127a includes a record 680 that associates a port number used to replace the source port and the replaced source port and replaced source IPv4 address. In some embodiments, the port number used to replace the source port is also associated with an IP address of the external machine so that a same port number can be reused for connections to different external machines. The lookup, in some embodiments, is based on a destination port of the IPv4 packet. The result of the lookup in the NAT records 127a is then provided to the NAT instance 124a to be used to replace the destination IPv4 address and port number. The IPv4 packet with the translated address (i.e., having IPv4 header 650b) is then forwarded to the destination machine (e.g., GM 126a).
[0063] Figure 7 conceptually illustrates a process 700 performed by a NAT instance (e.g.,
NAT instance 124a) processing a first packet in a packet flow destined for a destination machine 102 in an external network 101. The discussion of Figure 7 will reference elements of Figure 8 to provide examples of the operations of Figure 7. Figure 8 illustrates a first packet in a packet flow being sent from a GM and processed by the NAT instance executing on the same host computer. The process 700 begins by receiving (at 710) a packet destined to a machine in an external network. The received packet has a source IPv4 address associated with a source machine in an internal network and a source port selected by the source machine. For example, packet 831 received at NAT instance 124a from GM 126a is destined to an external IP (i.e., Ext IP1) and destination port (i.e., Port X) and has a source IP address of a GM 126a (i.e., GM IP) and a source port (i.e., Port Y). In some embodiments, the source port of packet 831 is randomly selected from the entire range of source ports (0-65535).
[0064] The process selects (at 720) a source port number (e.g., Port N) from a range of available port numbers allocated to the NAT instance. The available port numbers, in some embodiments, are port numbers in an assigned range of port numbers that have not been selected for a currently-active connection. In some embodiments, the range of port numbers is allocated by a controller computer cluster. The range of port numbers, in some embodiments, is a range of port numbers that share a first set of common bits that are not shared by port numbers allocated to other NAT instances on other host computers. For example, each port number in a range of 1024 port numbers from 0-1023 or 2048-3071 each share a different common set of 6 initial bits in a 16-bit port address. Larger or smaller allocated ranges will have fewer or greater numbers of common bits respectively.
[0065] After selecting (at 720) the port number, the process 700 creates (at 730) a connection tracking record (e.g., a NAT record) in a connection tracker (e.g., NAT records 127) that associates the selected port number with the source IP address and source port of the packet for which the port number is selected. In Figure 8, the NAT record 841 associates the selected port, Port N, with the source IP address, GM IP, and the source port, Port Y, of the received packet 831. In some embodiments, the port number used to replace the source port is also associated with an IP address of the external machine so that a same port number can be reused for connections to different external machines. The connection tracking record is used, as described above, to translate a NAT IP and port number of a packet received from an external network back to the internal IP and port number of the original connection associated with the destination port number of the received packet. [0066] After creating (at 730) the connection tracking record, the process 700 replaces (at
740) the source IP address and source port number with a particular IP address in a set of IP addresses assigned to the distributed NAT service and the selected port number. For simplicity, the examples throughout the description assume that the distributed NAT service is assigned a single external IP address, i.e., NAT IP. One of ordinary skill in the art will appreciate that the methods discussed are applied similarly for multiple IP addresses associated with a distributed NAT service (or any other distributed middlebox service using a set of external IP addresses). For example, packet 831 has its source IP address and port replaced with the NAT IP and selected port number to produce a serviced packet 832 which is then forwarded (at 750) to the destination and the process 700 ends. In some embodiments, forwarding the serviced packet to the destination includes forwarding the serviced packet to an MFE (e.g., MFE 121a) to be forwarded to the external destination.
[0067] Packets processed by the middlebox service instance executing on a host computer that are destined for an external network, in some embodiments, are sent from the host without encapsulation in an IPv6 header using the advertised IPv6 address as a source IP address. While the IPv6 address prefix associated with the middlebox service instance is not used in encapsulating the packet, in some embodiments, other encapsulation may be used to reach the gateway device or the external destination machine. In some embodiments, the packets processed by the middlebox service instance are encapsulated in an IPv6 header using an IPv6 source address associated with the middlebox service instance. Figure 8 illustrates the serviced packet 832 being encapsulated in overlay encapsulation header 870 to be sent over an overlay network (e.g., using an overlay network identifier such as a virtual network identifier (VNI)) to which the GM 126a and NAT instance 124a belong. An MFE or virtual tunnel end point (VTEP), in some embodiments, performs the encapsulation of the serviced packet 832 to produce the encapsulated packet 833. [0068] In some embodiments, a controller computer cluster (i.e., a set of one or more controller computers) of the first network provides configuration information to network elements to facilitate the middlebox service operation for the first network. Figure 9 conceptually illustrates a process 900 for generating configuration data for different network elements that provide a middlebox service or facilitate the provision of the middlebox service. In some embodiments, process 900 is performed by a controller computer or a controller computer cluster. In some embodiments, the process 900 is performed each time a new middlebox service instance is spun up.
[0069] Process 900 begins by identifying (at 910) the middlebox service instances in the first network. In some embodiments, identifying the middlebox service instances includes identifying (1) active middlebox service instances and (2) middlebox service instances that have been requested to be activated (e.g., spun up). Identifying the middlebox service instances, in some embodiments, includes identifying the number of end machines (e.g., workload VMs, containers, etc.) that each middlebox service instance supports (i.e., provides the middlebox service for). In some embodiments, in addition to identifying the number of end machines, identifying the middlebox service instances includes identifying either or both of (1) a total number of connections being handled by the distributed middlebox service (i.e., a sum over all the distributed middlebox instances) and (2) a number of connections being handled by each middlebox service instance. [0070] After identifying (at 910) the middlebox service instances, the process 900 determines (at 920) a number of port ranges or a size of port ranges that will be available for assignment. In some embodiments, the number of port ranges or the size of the port ranges is determined based on input from a user (e.g., an administrator) of the first network or a logical network within the first network. The input from the user may be based on a maximum amount of resources that the user desires a middlebox service instance to consume in providing the middlebox service. The user input, in some embodiments specifies any or all of (1) a maximum number of middlebox service instances that can be instantiated, (2) a maximum number of ports that can be assigned to a single middlebox service instance, or (3) policies for determining the number of ports assigned to particular middlebox service instances. The policies, in some embodiments, are based on any or all of (1) a number of active middlebox service instances, (2) a number of compute nodes for which each active middlebox service instance provides the distributed middlebox service, (3) a number of connections being handled by the distributed middlebox service, and (4) the number of connections being handled by each middlebox service instance.
[0071] For example, a policy may specify that a division of the entire range of possible port numbers be divided into a power of two that is at least twice as large as (or as large as) the number of middlebox service instances and that the port number ranges are adjusted based on the policy as the number of middlebox service instances increases or decreases (e.g., going from 4 to 5 middlebox service instances causes each of 8 port ranges to be divided into two smaller port number ranges, or going from 17 to 16 middlebox instances causing 64 port number ranges to be consolidated into 32 port number ranges). The policy, in some embodiments, specifies that each middlebox service instance be assigned non-adjacent port number ranges (e.g., 0-8191 assigned to a first middlebox service instance, 16384-2475 for the second middlebox service instance, etc.). Such a policy allows for increasing and decreasing the number of hosts without having to reassign port number ranges as often.
[0072] In some embodiments, the policy may specify that (1) when a particular middlebox service instance uses a fraction of the port numbers assigned to the middlebox service instance above a threshold fraction (e.g., .8 or .9) an adjacent available range will be assigned, workload compute nodes will be migrated from the host computer on which the middlebox service instance executes, or a new middlebox service instance will be spun up (e.g., activated on another host computer), (2) when a particular middlebox service instance uses a fraction of the port numbers assigned to the middlebox service instance below a threshold fraction (e.g., .3 or .2) the range of port numbers assigned will be reduced or additional end machines will be migrated to the host computer on which the middlebox service instance executes (e.g., from a host computer executing a middlebox service instance that is using a greater fraction of its assigned port numbers), and (3) when the total number of connections being handled by the middlebox service instances is below a certain threshold fraction of the capacity based on the number of middlebox service instances and assigned port ranges that a middlebox service instance will be deactivated, or smaller port ranges will be assigned to each active middlebox service instance. Other policies may specify assigning port ranges based on a number of workload compute nodes that are provided the middlebox service by the middlebox service instance (e.g., for 0-10 workload compute nodes, 256 port numbers are assigned; for 11-20 workload compute nodes, 512 port numbers are assigned; etc.). One of ordinary skill in the art will understand that these policies are merely examples of possible policies and that different policies are used in different embodiments according to the requirements of the user.
[0073] After identifying (at 910) the middlebox service instances and determining (at 920) the port number ranges, the process 900 selects (at 930) at least one port range to assign to each middlebox service instance. As discussed above, an initial port range assignment, in some embodiments, assigns each middlebox service instance a non-adjacent, non-overlapping, port range. Subsequent assignments, in some embodiments, assign at least one additional port number range to particular middlebox service instances that use a number of port numbers above a threshold fraction of the assigned port numbers. Other subsequent assignments, in some embodiments, remove a portion of a range of port numbers from an initial assignment to a particular middlebox service instance that uses less than a threshold number of port numbers in the initially assigned port number range.
[0074] The size of the port number ranges assigned to the middlebox service instances, in some embodiments, are fixed by an administrator based on a maximum number of expected middlebox service instances (e.g., for an expected maximum of 64 middlebox service instances, creating 64 different port number ranges each including 1024 ports that are each assigned to a middlebox service instance on startup). In other embodiments, the size of the port number ranges is dynamic and may change based on the number of active middlebox service instances, active connections, or workload compute nodes using the middlebox service. The port number ranges may also vary in size between middlebox service instances. For example, a larger port number range is assigned to a first middlebox service instance executing on a host computer executing a larger number of workload compute nodes using the middlebox service than a second middlebox service instance executing on a host computer executing a smaller number of workload compute nodes using the middlebox service and may change as the number of workload compute nodes changes.
[0075] After selecting (at 930) the range of port numbers for each middlebox service instance to use, the process 900 generates (at 940) configuration data for implementing the desired middlebox service instances. The configuration data, in some embodiments, includes multiple sets of configuration data for different network elements (e.g., host computers, gateway devices) and for different purposes. Figure 10 illustrates a computer controller cluster 1040 in a datacenter 1005 sending different types of configuration data to different network elements. The elements of Figure 10 are generally the same as those discussed in Figure 1 with the addition of a local controller 1028 that receives configuration data from controller cluster 1040. Figure 10 illustrates a set of configuration data 1029 for each host computer 1020 (received at local controller 1028). The configuration data 1029, in some embodiments, includes configuration information for (1) configuring the middlebox service instance to provide the middlebox service, (2) configuring other network elements executing on the host computer (e.g., GMs 1026 and MFE 1021) to communicate with the middlebox service instance (e.g., 1024), (3) configuring an MFE or BGP instance executing on a host computer to advertise the IPv6 address associated with a middlebox service instance executing on the host computer. The local controller 1028, in some embodiments, receives the configuration data and identifies the configuration data for each module executing on the host computer 1020 as will be explained in relation to Figure 12. The controller computer cluster 1040, in some embodiments, also sends configuration data 1019 to the set of gateway devices for configuring a gateway device to perform an IPv4 to IPv6 encapsulation and, in some embodiments, for configuring the gateway device with IPv6 routing table entries.
[0076] The configuration data (e.g., configuration data 1029) includes configuration data for configuring at least one middlebox service instance executing on at least one host computer to provide the middlebox service using an assigned range of port numbers. Configuration data for initializing a new middlebox service instance on a host computer includes, in some embodiments, an IPv4 address associated with the middlebox service used in performing the middlebox service operation (e.g., replacing source IP addresses of packets going from the first network to an external network) and an assigned port number range. Additional configuration information (e.g., logical overlay network elements to which the middlebox instance connects) is sent, in some embodiments, to the host computer to configure other elements of the host to communicate with the new middlebox service instance as will be appreciated by one of ordinary skill in the art. [0077] The additional configuration data sent to the host computer, in some embodiments, includes configuration data sent to the host computer to configure the host computer (or an MFE or BGP instance executing on the host computer) to identify and advertise the IPv6 address prefix associated with the middlebox service instance as described in relation to Figure 12. As discussed in relation to Figure 12, the configuration data, in some embodiments, also includes information used internally to the host computer to address the middlebox service instance and configure machines executing on the host computer to use the middlebox service instance for particular packets (e.g., packets destined for external networks).
[0078] In some embodiments, the generated configuration data includes configuration data
(e.g., configuration data 1019) generated for providing to gateway devices. The gateway devices, in some embodiments, are partially- or fully-programmable gateway devices that can be programmed by the controller computer cluster to implement the IPv4 to IPv6 translation and encapsulation based on PBR rules specified based on IPv4 address and destination port in an IPv4 header. In other embodiments, the gateway devices are off-the shelf-gateway devices (e.g., dual stack routers) that are capable of simple programming sufficient to configure the gateway device to implement the IPv4 to IPv6 encapsulation.
[0079] For both programmable and off-the-shelf gateway devices the configuration data includes what will be referred to as a set of middlebox service records and IPv6 routing table entries. The middlebox service records, in some embodiments, map combinations of the IPv4 address used by a particular middlebox service operation and destination port number to an IPv6 destination address. The middlebox service records in some embodiments, are provided as a lookup table and an instruction to use the lookup table to route data messages using the IPv4 address used by a distributed middlebox service. In some embodiments, the middlebox service record is a PBR rule (or similar rule or policy) that defines an algorithm for generating an IPv6 address from an IPv4 destination address and port number. In some embodiments, the PBR rule specifies an IPv4 destination address for which the algorithm should be applied, while in other embodiments, both an IPv4 address and port number are specified. The middlebox service record, in some embodiments, is an instruction to configure an off-the-shelf gateway device to perform IPv6 encapsulation according to a specified algorithm for IPv4 packets destined to the IPv4 used by a particular middlebox service operation. In some embodiments, the instruction is based on a functionality provided by the off-the-shelf gateway device (e.g., an exposed API).
[0080] The IPv6 routing table entries, in some embodiments, each identify an IPv6 address prefix associated with a particular host computer in a set of multiple host computers that each execute a middlebox service instance and a next hop interface to use to reach the particular host computer. The IPv6 address prefix specified in the IPv6 routing entry for a particular host computer is based on the IPv4 address associated with the distributed middlebox service and a port number range assigned to the distributed middlebox service instance executing on the host computer. If multiple non-adjacent port ranges are assigned to a particular host computer, the set of IPv6 routing table entries includes multiple entries for the particular host computer.
[0081] Once the configuration data is generated (at 940), the configuration data generated for each network element is forwarded (at 950) to the appropriate network element to be used to configure the network element as described in relation to Figures 12 and 11. The configuration data, in some embodiments, is received at the host computers by a local controller (e.g., local controller 1028) or a local controller agent that communicates with the controller computer cluster using control plane messages. The local controller then provides the configuration data or configures the elements on the host computer to implement the middlebox service (e.g., instantiate a middlebox service instance, configure GMs to use the middlebox service instance, and configure an MFE to advertise the IPv6 address prefix associated with the middlebox service instance, etc.). The configuration data generated for the gateway device is forwarded to the gateway device to configure the gateway device to identify particular host machines associated with particular received packets (e.g., by using the provided IPv6 routing table entries). After forwarding (at 950) the configuration data, the process ends. One of ordinary skill in the art will understand that, in some embodiments, process 900 is performed for each distributed middlebox service that uses a same IPv4 address as a source address for outgoing packets at each of multiple distributed middlebox service instances.
[0082] The controller computer cluster, in some embodiments, monitors the load on the middlebox service instances and the middlebox service in the aggregate periodically or based on a schedule. In some embodiments, the monitoring is based on a program executing on the same host computers as the middlebox service instances. The program, in some embodiments, monitors a set of metrics associated with the middlebox service instance (e.g., latency, number of connections handled, number of packets per second, number of end machines using the middlebox service instance, etc.). In some embodiments, operations 910 and 920 are performed whenever a new middlebox service instance or workload machine is requested to be initialized. The operations 910 and 920 are also performed periodically or based on a schedule set by an administrator, in some embodiments, to determine if the monitoring information indicates that there has been a change requiring reallocation of port number ranges or the size of any port number ranges. If such a change occurs, operations 930-950 are then performed to update the allocation of port ranges and provide updated configuration data to the network elements.
[0083] Figure 11 conceptually illustrates a process 1100 performed by a gateway device to facilitate the provision of the middlebox service based on received configuration data. The process 1100 begins by receiving (at 1110) configuration data for facilitating the provision of the middlebox service in an internal network. As discussed in relation to Figures 9 and 12, the configuration data in some embodiments is received from a controller computer cluster (e.g., configuration data 1019) or as an advertisement of the availability of an IPv6 address prefix (e.g., advertisement 1039). In some embodiments, the controller cluster provides a portion of the configuration data while the advertisement includes a different portion of the configuration data. For example, the controller computer, in some embodiments provides configuration data relating to the middlebox service records as described in relation to Figure 9, while the IPv6 routing table entry configuration data is received from host computers through advertisements of IPv6 address prefixes available at the host computers as described in relation to Figure 12. In embodiments in which the advertisements made by host computers provide configuration information for routing table entries, as new middlebox service instances come online, the gateway device receives additional configuration information in the form of additional advertisements for the IPv6 address prefixes of the new middlebox service instances.
[0084] Based on the configuration data received (at 1110) the gateway device creates (at
1120) at least one IPv6 routing table entry for the received IPv6 address prefixes. In some embodiments, the routing table entries are static entries provided by the controller computer cluster that can be updated by the controller computer cluster as the configuration data changes. In other embodiments, the routing table entries are dynamic routing table entries that are created based on BGP or other route learning protocols known to one of ordinary skill in the art.
[0085] The process 1100 also creates (at 1130) middlebox service records based on the configuration data. As discussed in relation to Figures 9 and 12, the middlebox service records may be any type of record or rule that identifies packets destined to the IPv4 address associated with the middlebox service as requiring IPv6 encapsulation and enable the gateway device to identify the correct IPv6 destination address to use to reach the middlebox service instance associated with the packet. For example, the middlebox service record, in some embodiments, is any of (1) a PBR rule that identifies packets destined for the IPv4 address associated with the middlebox service as requiring IPv6 encapsulation and specifying the method for producing the IPv6 destination, (2) a set of records for a lookup table that identifies IPv6 destination addresses for a set of combinations of IPv4 address and destination port, or (3) an API instruction for an API exposed by an off-the-shelf gateway device to enable the programmatic encapsulation of the IPv4 packets destined for the IPv4 address associated with the middlebox service into an IPv6 packet. One of ordinary skill in the art will appreciate that the creation of the routing table entries (at 1120) and middlebox service records (at 1130) may be performed simultaneously or in the opposite order from that described in process 1100. Once the routing table entries and middlebox service records have been created the process ends. However, one of ordinary skill in the art will appreciate that process 1100, or a portion thereof, is performed each time new configuration data is received at the gateway device. For example, each advertisement of a new IPv6 address prefix by a host computer will lead to the creation of a new IPv6 routing table entry in the gateway device.
[0086] The host computer, in some embodiments, is configured to advertise the availability of an IPv6 address prefix that is based on the IPv4 used by the middlebox service instance as a source address for packets going from the first network to external networks and the range of port numbers assigned to the middlebox service instance. Figure 12 conceptually illustrates a process 1200 for configuring a host computer to execute a distributed middlebox service instance and advertise the IPv6 address prefix associated with the middlebox service instance executing on the host computer. The process 1200, in some embodiments, is performed by a host computer (e.g., host computer 1020) executing a local controller (e.g., local controller 1028) and a BGP instance (e.g. either MFE 1021 or routing machine 1023).
[0087] Process 1200 begins by receiving (at 1210) configuration information relating to a middlebox service instance executing on the host computer. The configuration information relating to the middlebox service instance, in some embodiments, includes (1) the IPv4 address used by the middlebox service to replace the source address of packets sent from within the first network to machines in external networks and (2) the range of port addresses assigned to the middlebox service instance executing on the host computer. In other embodiments, the configuration information also includes information used internally to route packets to the middlebox service instance such as IP and MAC addresses or next hop interfaces used to forward packets to the middlebox service instance. An IPv6 address associated with the middlebox service instance is also included in the configuration information, in some embodiments. The configuration information, in some embodiments, is received from a controller computer in a controller computer cluster that configures the elements of the first network.
[0088] After receiving (at 1210) the configuration information, the process 1200 identifies
(at 1220) configuration data for configuring different components (e.g., machines, MFEs, filters, containers, pods, etc.) executing on the host computer. For example, the middlebox service instance requires configuration data including the external IP address associated with the middlebox service, a range of ports assigned to the middlebox service instance and, in some embodiments, IP and media access control (MAC) addresses associated with the middlebox service instance. A BGP instance (e.g., MFE 1021 or routing machine 1023), in some embodiments, requires knowledge of the IP address associated with the middlebox service and a port range assigned to the middlebox service instance. In other embodiments, the BGP instance is provided with the IPv6 address prefix to advertise. Other network elements need to be configured with information used to interact with the middlebox service instance such as policies for identifying packets requiring the middlebox service, a MAC address associated with the middlebox service instance and other information that will be apparent to one of ordinary skill in the art. [0089] After the configuration data for each component the process 1200 configures (at
1230) the middlebox service instance with the IP address and port range associated with the middlebox service instance. If the middlebox service instance is being configured for a first time (i.e., is being instantiated) the configuration data includes additional information such as IP and MAC addresses associated with the middlebox service instance. In some embodiments, the configuration data only includes the IP address associated with the middlebox service when a middlebox service instance is instantiated and subsequent updates include only an updated port range.
[0090] After configuring (at 1230) the middlebox service instance, the process 1200 provides (at 1240), to a BGP instance executing on the host computer, an IPv6 address prefix identified as being associated with a middlebox service instance based on the configuration information. The identified IPv6 address prefix, in some embodiments, is based on the IPv4 address used by the middlebox service included in the configuration information, and the range of port numbers assigned to the middlebox service instance. The assigned range of port numbers, in some embodiments, is a range of port numbers that share a common set of leftmost bits. For example, assigned ranges of 1024 port numbers are numbers that share the 6 leftmost bits of the port number in common, while assigned ranges of 512 port numbers are numbers that share the 7 leftmost bits in common. The IPv6 address prefix associated with the middlebox service instance in such embodiments, is then identified as an IPv6 address prefix with the rightmost significant bits being the common set of bits in the port numbers assigned to the middlebox service instance. In some embodiments, the advertised IPv6 address is based on existing functions of a hardware gateway device for handling IPv6 encapsulation of IPv4 packets.
[0091] Figure 13 illustrates three different exemplary advertised IPv6 address prefixes
1331-1333 that are used in different embodiments to advertise the availability of the service at the host computer and corresponding exemplary addresses 1341-1343 generated by a gateway device to use in an IPv6 encapsulation header to forward a packet to the particular service instance executing on the host computer making the advertisement. Figure 13 illustrates a set of identified IPv6 address prefixes 1331-1333 that are in the FC00::/8 address block based on a configuration of a middlebox service instance. Other IPv6 prefixes are used, in some embodiments, for other address blocks such as the FD00::/8 address block. The illustrated IPv6 includes the IPv4 address 1310 used by the middlebox service and the common bits (i.e., in the illustrated example the first 6 bits) of the range of port numbers 1315. The illustrated example is for a middlebox service using an IPv4 address 1310 of 192.168.32.1 (or, in hexadecimal, C6A8:2001) and a port range 1315 of 0-1023 (with 6 “0” bits in common). The example also illustrates a user-configured prefix 1320 (e.g., F462:5D1C:A451:2BD6) that, in some embodiments, is used to distinguish packets received for different tenants or logical network implemented in the same datacenter. In some embodiments, the user-configured 64-bit prefix is randomly generated such that common prefixes generated for different tenants are highly unlikely to be the same.
[0092] Exemplary IPv6 prefix 1331 is generated using the first 8 bits of the FC00: :/8 prefix followed by the 32 bits of the service IPv4 address 1310 and finally the port range prefix common to all the port numbers in the port range 1315 (i.e., FCC6:A820:0100::/46 ). Similarly, IPv6 prefix 1332 is generated using the first 16 bits of the FD00: :/8 prefix followed by the 32 bits of the service IPv4 address 1310 and finally the port range prefix common to all the port numbers in the port range 1315 (i.e., FD00:C6A8:2001::/54). Alternatively, the IPv6 prefix 1333 is generated using the first 16 bits of the FC00: :/8 prefix followed by the user-configured 64-bit prefix 1320 followed by the 32 bits of the service IPv4 address 1310 and finally the port range prefix common to all the port numbers in the port range 1315 (i.e., FC00:<user-configured 64-bit prefix>:C6A8:2001::/118).
[0093] Figure 13 shows IPv6 destination addresses 1341-1343 for an exemplary received packet having header values 1302 corresponding to advertisedIPv6 prefixes 1331-1333. Exemplary IPv6 destination address 1341 is generated by a gateway device using the first 8 bits of the FC00::/8 prefix followed by the 32 bits of the destination IPv4 address 1350 and finally the destination port number 1355 (i.e., FCC6:A820:0100:0000:01::). Similarly, IPv6 destination address 1342 is generated using the first 16 bits of the FD00::/8 prefix followed by the 32 bits of the destination IPv4 address 1350 and finally the destination port number 1355 (i.e., FD00:C6A8:2001:0000:0001::). Alternatively, the IPv6 destination address 1343 is generated using the first 16 bits of the FC00::/8 prefix followed by the user-configured 64-bit prefix 1320 followed by the 32 bits of the destination IPv4 address 1350 and finally the destination port number 1355 (i.e., FC00:F462:5D1C:A451:2BD6:C6A8:2001::01:0000:0000).
[0094] The BGP instance then advertises the provided IPv6 address prefix associated with the middlebox service instance to a gateway device as being available at the host computer. The advertisement, in some embodiments, includes an instruction to the gateway device to identify the IPv6 address based on an IPv4 address and port number of packets received at the gateway device and encapsulate the IPv4 packets with the identified IPv6 address. In other embodiments, the advertised IPv6 address is (1) based on existing functions of a hardware gateway device for handling IPv6 encapsulation of IPv4 packets, or (2) based on a central controller cluster separately configuring the gateway device to perform the IPv6 encapsulation based on the IPv4 address and port number. In these other embodiments, no special configuration instruction is required from the BGP instance. In some embodiments, the advertisement uses a border gateway protocol (BGP). In other embodiments, other proprietary or non-proprietary (IS-IS, OSPF, FRR etc.) route advertisement protocols or methods are used that inform other routers of the availability of particular network addresses at the host computer. The advertisement, in some embodiments, is made to a route server (or route reflector) that identifies the advertised IPv6 address as being available at the host computer to the gateway device as well as other forwarding elements of the internal network.
[0095] The route server, in some embodiments, also uses a BGP advertisement to identify the advertised IPv6 address as being available at the host computer and is used to simplify the exchange of routing information in the network by minimizing the number of peerings between different network elements necessary to propagate routing information in a full mesh configuration. However, one of ordinary skill in the art will appreciate that other methods of advertising the availability of IP addresses may be used. One of ordinary skill in the art will appreciate that the description of BGP instances and BGP protocols is merely one example or a protocol for advertising routing information and is used here merely as an example.
[0096] Process 1200 then continues to configure (at 1250) the other components (e.g., machines, MFEs, filters, containers, pods, etc.) executing on the host computer based on the received configuration data. The other components, in some embodiments, are configured to direct traffic to the middlebox service instance based on policies included in the configuration data identifying traffic destined for an external network. One of ordinary skill in the art will understand that the order of configuring the components presented above is not the only possible order and that, in other embodiments, components are configured in parallel (e.g., simultaneously) or in a different order than the order presented above.
[0097] Figure 14 conceptually illustrates a set of data exchanges between network elements to migrate a VM (e.g., a guest virtual machine (GVM)) in communication with an external machine using a dSNAT middlebox service. Figure 14 illustrates a controller computer 1440 that initiates the VM migration, a source host computer 1420a on which the VM originally executes, a destination host computer 1420b to which the VM is migrated, and a route server 1430 that is used by host computers as a central BGP server to disseminate routing information (e.g., IP address prefixes available at each host computer). The data exchange begins (at 1410) with the controller computer initiating a VM migration by sending configuration data to each of the source host computer 1420a and the destination host computer 1420b to identify the VM being migrated. [0098] The source host computer then identifies (at 1411) a set of ports for a set of middlebox services used by active connections of the migrated VM to inform the destination host computer 1420b of the migrated ports. The set of ports identified to the destination host computer 1420b includes NAT records associating the identified ports with the internal IPv4 address and port used by the migrated VM. In some embodiments, the identified ports are put in a list of ports at the source host computer 1420a not to use until they are freed by the migrated VM (e.g., when the active connections using the identified ports end). The source host computer 1420a, in some embodiments, also adds the port numbers to a redirection table to redirect any packets received for that port number to the destination host computer 1420b. In some embodiments in which port numbers are reused for different source and destination IP address pairs, the redirection instruction specifies the specific communications destined to the migrated VM instead of redirecting all packets using a specific port number.
[0099] Based on the identified port numbers, the destination host computer, in some embodiments, advertises (at 1412) a set of IPv6 address for the specific migrated port numbers (e.g., an IP address prefix that is FC00:IPv4 address:port::/64) that will be the longest matching prefix at the gateway device and supersede the existing prefix (e.g., a /54 prefix) originally advertised by the source host computer 1420a without requiring further advertisement by the source host computer 1420a. One of ordinary skill in the art will appreciate that in some embodiments in which the same port number is reused for different source and destination IP address pairs, the host computer to which the VM is migrated will not make the advertisement and will instead rely on the redirection at the host computer from which the VM was migrated. As each migrated port is “freed” (i.e., the active connection using that port number ends) the destination host computer 1420b informs (at 1413) the source host computer 1420a that the port has been freed and can be used by the source host computer 1420a for new connections. The source host computer, in some embodiments, then removes the freed port from the list of ports not to use. [0100] The destination host computer, in some embodiments, also advertises (at 1413) that the specific IPv6 address prefix (e.g., the /64 prefix) is no longer available at the destination host computer 1420b. In some embodiments, the source host computer 1420a additionally advertises (at 1414) that the specific IPv6 address prefix (e.g., the /64 prefix) is available at the source host computer 1420a. One of ordinary skill in the art will appreciate that, in embodiments in which the same port number is reused for different source and destination IP address pairs, since the host computer to which the VM was migrated does not make an advertisement of the IPv6 address the subsequent advertisements described (at 1413 and 1414) are not necessary. In some embodiments, the source host computer 1420a omits advertising the IPv6 /64 address prefix associated with the freed port (at 1414) and relies on the IPv6 address prefix (e.g., a /54 prefix associated with the assigned range of port numbers) covering the specific IPv6 address to direct packets to the source host computer 1420a once the IPv6 /64 address is withdrawn by the destination host computer 1420b. Destination host computer 1420b, in some embodiments sends information and advertises the unavailability related to a freed port for each freed port as a connection using the port ends. One of ordinary skill in the art will understand that VM migration was used as an example but the above set of data exchanges could be used to migrate any similar compute node (e.g., container, pod, etc.).
[0101] Many of the above-described features and applications are implemented as software processes that are specified as a set of instructions recorded on a computer readable storage medium (also referred to as computer readable medium). When these instructions are executed by one or more processing unit(s) (e.g., one or more processors, cores of processors, or other processing units), they cause the processing unit(s) to perform the actions indicated in the instructions. Examples of computer readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc. The computer readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections. [0102] In this specification, the term “software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor. Also, in some embodiments, multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions. In some embodiments, multiple software inventions can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software invention described here is within the scope of the invention. In some embodiments, the software programs, when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
[0103] Figure 15 conceptually illustrates a computer system 1500 with which some embodiments of the invention are implemented. The computer system 1500 can be used to implement any of the above-described hosts, controllers, and managers. As such, it can be used to execute any of the above described processes. This computer system includes various types of non-transitory machine readable media and interfaces for various other types of machine readable media. Computer system 1500 includes a bus 1505, processing unit(s) 1510, a system memory 1525, a read-only memory 1530, a permanent storage device 1535, input devices 1540, and output devices 1545.
[0104] The bus 1505 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the computer system 1500. For instance, the bus 1505 communicatively connects the processing unit(s) 1510 with the read-only memory 1530, the system memory 1525, and the permanent storage device 1535.
[0105] From these various memory units, the processing unit(s) 1510 retrieve instructions to execute and data to process in order to execute the processes of the invention. The processing unit(s) may be a single processor or a multi-core processor in different embodiments. The read only-memory (ROM) 1530 stores static data and instructions that are needed by the processing unit(s) 1510 and other modules of the computer system. The permanent storage device 1535, on the other hand, is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the computer system 1500 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 1535. [0106] Other embodiments use a removable storage device (such as a floppy disk, flash drive, etc.) as the permanent storage device. Like the permanent storage device 1535, the system memory 1525 is a read-and-write memory device. However, unlike storage device 1535, the system memory is a volatile read-and-write memory, such a random access memory. The system memory stores some of the instructions and data that the processor needs at runtime. In some embodiments, the invention’s processes are stored in the system memory 1525, the permanent storage device 1535, and/or the read-only memory 1530. From these various memory units, the processing unit(s) 1510 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.
[0107] The bus 1505 also connects to the input and output devices 1540 and 1545. The input devices enable the user to communicate information and select commands to the computer system. The input devices 1540 include alphanumeric keyboards and pointing devices (also called “cursor control devices”). The output devices 1545 display images generated by the computer system. The output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as a touchscreen that function as both input and output devices.
[0108] Finally, as shown in Figure 15, bus 1505 also couples computer system 1500 to a network 1565 through a network adapter (not shown). In this manner, the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet, or a network of networks, such as the Internet. Any or all components of computer system 1500 may be used in conjunction with the invention.
[0109] Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer- readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media). Some examples of such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra-density optical discs, any other optical or magnetic media, and floppy disks. The computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations. Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
[0110] While the above discussion primarily refers to microprocessor or multi-core processors that execute software, some embodiments are performed by one or more integrated circuits, such as application specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs). In some embodiments, such integrated circuits execute instructions that are stored on the circuit itself.
[0111] As used in this specification, the terms “computer”, “server”, “processor”, and
“memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms display or displaying means displaying on an electronic device. As used in this specification, the terms “computer readable medium,” “computer readable media,” and “machine readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral or transitory signals.
[0112] While the invention has been described with reference to numerous specific details, one of ordinary skill in the art will recognize that the invention can be embodied in other specific forms without departing from the spirit of the invention. For instance, several figures conceptually illustrate processes. The specific operations of these processes may not be performed in the exact order shown and described. The specific operations may not be performed in one continuous series of operations, and different specific operations may be performed in different embodiments. Furthermore, the process could be implemented using several sub-processes, or as part of a larger macro process. Thus, one of ordinary skill in the art would understand that the invention is not to be limited by the foregoing illustrative details, but rather is to be defined by the appended claims.

Claims

CLAIMS We claim:
1. A method of facilitating, at a gateway device, a source network address translation (SNAT) middlebox service operation for a first network, the method comprising: receiving, from a second network, a packet comprising an internet protocol version 4 (IPv4) header with a first destination IPv4 address and a first destination port; identifying an SNAT record that maps the first destination IPv4 address and port to a second destination IP address and a second destination port for inclusion in an IP version 6 (IPv6) header; encapsulating the received packet with the IPv6 header that uses the second destination IPv6 address and port; forwarding the encapsulated packet along the first network for an SNAT middlebox service instance within the first network to receive the packet with the IPv4 header and replace the first destination IP address and port with a third destination IP address and a third destination port so that the packet can then be supplied to a destination machine connected to the first network.
2. The method of claim 1, wherein forwarding the encapsulated packet comprises forwarding the encapsulated packet to a host computer on which the SNAT middlebox service instance executes, and wherein the host computer removes the IPv6 encapsulation and forwards the received packet to the SNAT middlebox service instance based on the first destination IPv4 address.
3. The method of claim 2, wherein forwarding the encapsulated packet to the host computer is based on a routing entry in an IPv6 routing table of the gateway device that is created based on the host computer advertising the second destination IP address as available at the host computer.
4. The method of claim 3, wherein the advertised IPv6 address is an IPv6 address prefix based on the first destination IPv4 address used by the SNAT middlebox service instance to replace source addresses of packets sent from within the first network to which it provides the SNAT middlebox service.
5. The method of claim 4, wherein the SNAT middlebox service is a distributed SNAT (dSNAT) middlebox service implemented by a plurality of dSNAT middlebox service instances executing on a plurality of host computers and using the first destination IPv4 address to provide the dSNAT middlebox service for packets sent from within the first network, each dSNAT middlebox service instance is assigned a non-overlapping range of port numbers to use in providing the dSNAT middlebox service, and each host computer advertises a different IPv6 address prefix based on the first destination IPv4 address and the range of port numbers assigned to the dSNAT middlebox service instance executing on the host computer.
6. The method of claim 1, wherein the SNAT record is a record that identifies packets destined to the first destination IPv4 address as requiring the identifying and encapsulating operations to forward the packet using the identified second destination IP address.
7. The method of claim 1, wherein the second destination IP address is an IPv6 address comprising the first destination IPv4 address and a set of bits of the first destination port.
8. The method of claim 7, wherein the IPv6 address comprises a first set of bits that indicate that the address is not necessarily globally unique, a second set of bits comprising the IPv4 address, and a third set of bits comprising a set of bits of the port number that belong to a port number range that has been assigned to the SNAT middlebox instance.
9. The method of claim 1, wherein the SNAT record is received from a controller computer of the first network.
10. The method of claim 1, wherein a set of IPv6 routing entries associated with a set of SNAT middlebox service instances is received from a controller computer for inclusion in an IPv6 routing table of the gateway device, and forwarding the encapsulated packet comprises performing a lookup in the IPv6 routing table to identify a next hop for forwarding the encapsulated packet to the SNAT middlebox service instance.
11. A method of facilitating the provision of a distributed source network address translation (dSNAT) middlebox service at a host computer for a first network, the dSNAT middlebox service implemented by a plurality of dSNAT middlebox service instances executing on a plurality of host computers, each dSNAT using a same external IPv4 address as a source address for serviced packets the method comprising: receiving, from a gateway device executing between the first network and a second network, a packet comprising an inner IPv4 packet and an internet protocol version 6 (IPv6) encapsulation header with a first destination IP address and a first destination port number; removing the IPv6 encapsulation header to identify a dSNAT middlebox service instance executing on the host computer that is associated with a second destination IP address and a second destination port number in an IPv4 header of the inner IPv4 packet; forwarding the inner IPv4 packet along the first network to the identified dSNAT middlebox service within the first network to receive the packet with the IPv4 header and replace the second destination IP address and second port number with a third destination IP address and port number so that the packet can then be supplied to a destination machine connected to the first network.
12. The method of claim 11, wherein the inner IPv4 packet is sent as an IPv4 packet by a source device in the second network using the second IP address and port number as a destination IP address and destination port number in the IPv4 packet header, and the gateway device receives the IPv4 packet for forwarding to the dSNAT middlebox service instance in the first network.
13. The method of claim 12, wherein the gateway device generates the IPv6 encapsulation header and forwards the encapsulated packet to the host machine based on the first destination IP address in the IPv6 encapsulation header.
14. The method of claim 13, wherein the gateway device identifies the first destination IP address in the IPv6 encapsulation header based on the second IP address and port number in the IPv4 header.
15. The method of claim 14, wherein the gateway device is configured by a controller computer in the first network (1) to identify the first IP destination address, (2) to encapsulate IPv4 packets destined to the second IP address with the IPv6 header using the first IP destination address, and (3) to forward data messages destined to the first IPv6 address to the host computer.
16. The method of claim 11 further comprising advertising, to the gateway device, an IPv6 address prefix that comprises the first IP destination address as available at the host computer to cause the gateway device to forward to the host computer packets destined to IPv6 destination addresses for which the advertised IPv6 address prefix is the longest matching prefix.
17. The method of claim 16 further comprising identifying the IPv6 address prefix based on (1) an IPv4 address used as a source IP address by the dSNAT middlebox service instance for outgoing packets and (2) a range of port numbers assigned to the dSNAT middlebox service instance to use as source ports for outgoing packets.
18. The method of claim 16, wherein advertising the IPv6 address prefix to the gateway device comprises advertising the IPv6 address prefix as available at the host computer to a route reflector that, in turn, advertises the IPv6 address prefix as available at the host computer to the gateway device.
19. The method of claim 16, wherein advertising the IPv6 address prefix to the gateway device further comprises information for configuring the gateway device to perform the IPv6 encapsulation for data messages destined for the second IP address.
20. The method of claim 11, wherein the packet is a first packet in a packet flow between a device in the second network and the destination machine, the method further comprising: receiving a second packet in the packet flow from a source machine that was the destination machine of the first packet with a first source IP address that is the same as the second destination IP address and a first source port that is the same as the second destination source port; and forwarding the data message to the device in the second network without encapsulating the packet using the first IP destination address as either a source or destination IP address, wherein the source machine that was the destination machine of the first packet sends the second packet with a second source IP address that is the same as the third destination IP address and a second source port that is the same as the third destination source port that are replaced with the first source IP address and source port by a dSNAT service operation performed by the identified dSNAT middlebox instance.
21. A method of facilitating the provision of a distributed source network address translation (dSNAT) middlebox service for a first network at a dSNAT middlebox service instance executing on a host computer, the method comprising: receiving configuration information related to the dSNAT middlebox service, the configuration information comprising (i) a common internet protocol version 4 (IPv4) address used by each instance of the dSNAT middlebox service as a source IP address for data messages sent out of the first network through the dSNAT middlebox service instance and (2) a range of port numbers assigned to the dSNAT middlebox service instance executing on the host computer; identifying, based on the received IPv4 address and the assigned range of port numbers, an IP version 6 (IPv6) address prefix to use to advertise the dSNAT middlebox service instance provided at the host computer; advertising, to a gateway device that provides access to networks external to the first network, the identified IPv6 address prefix as reachable at the host computer to direct packets received at the gateway device from an external network using the common IPv4 address and a port number in the range of port numbers assigned to the dSNAT middlebox instance to the dSNAT middlebox service instance executing on the host computer.
22. The method of claim 21, wherein the host computer is a first host computer and the dSNAT middlebox service instance executing on the first host computer is a first dSNAT middlebox service instance, the identified IPv6 address prefix is a first IPv6 address prefix, wherein, a second dSNAT middlebox service instance executes on a second host computer and uses the common IPv4 address as a source address for data messages sent out of the first network through the second dSNAT middlebox service instance, the second dSNAT middlebox service instance is assigned a different range of port numbers than the first dSNAT middlebox service instance, and the second host computer advertises a second IPv6 address prefix, that is different from the first IPv6 address prefix, as reachable at the second host computer.
23. The method of claim 21, wherein the configuration information is received from a controller computer that provides configuration data to the dSNAT middlebox service instance to configure the dSNAT middlebox service instance to use the common IPv4 address and the assigned range of port numbers.
24. The method of claim 21, wherein, identifying the IPv6 address prefix comprises generating the IPv6 address prefix to begin with a first number of bits common to all the dSNAT instances, the common bits comprising the common IPv4 address used by each dSNAT instance as a source IP address and a second number of bits representing the range of port numbers assigned to the dSNAT middlebox service instance, and advertising the identified IPv6 address prefix comprises advertising the IPv6 address prefix along with a prefix length.
25. The method of claim 24, wherein the bits representing the range of port numbers is a set of the leftmost bits of each port number in the range of port numbers that are common to all port numbers in the assigned range.
26. The method of claim 21, wherein advertising the IPv6 address prefix to the gateway device as reachable at the host computer comprises advertising the IPv6 address prefix as reachable at the host computer to a route reflector that then advertises the IPv6 address prefix to the gateway device as reachable at the host computer.
27. The method of claim 26, wherein a managed forwarding element (MFE) executing on the host computer receives the configuration information, identifies the IPv6 address prefix, and advertises the identified IPv6 address prefix.
28. The method of claim 27, wherein the MFE is a border gateway protocol (BGP) instance and the advertisement comprises a BGP advertisement.
29. The method of claim 28, wherein the dSNAT middlebox service is a first dSNAT middlebox service and the host computer facilitates the provision of a second dSNAT middlebox service for a second network at a second dSNAT middlebox service instance executing on the host computer, the configuration information is first configuration information, the common IPv4 address is a first IPv4 address, the range of port numbers is a first range of port numbers, and the identified IPv6 address is a first IPv6 address, the method further comprising: receiving second configuration information related to the second dSNAT middlebox service, the configuration information comprising (i) a second internet protocol version 4 (IPv4) address used by each instance of the second dSNAT middlebox service as a source IP address for data messages sent out of the second network through the second dSNAT middlebox service instance and (2) a second range of port numbers assigned to the second dSNAT middlebox service instance executing on the host computer; identifying, based on the received second IPv4 address and the assigned second range of port numbers, a second IP version 6 (IPv6) address prefix to use to advertise the second dSNAT middlebox service instance provided at the host computer; advertising, to a gateway device that provides access to networks external to the second network, the second identified IPv6 address prefix as reachable at the host computer.
30. The method of claim 26, wherein a set of forwarding elements in an intervening fabric between the gateway device and the host computer associate the advertised IPv6 address prefix with a path from the gateway device to the host computer based on the advertisement.
31. The method of claim 21, wherein the range of port numbers is determined by a controller computer that provides the configuration information related to the dSNAT middlebox service to the dSNAT middlebox service instance.
32. The method of claim 31, wherein the range of port numbers is a first range of port numbers, the identified IPv6 address prefix is a first IPv6 address prefix, and the controller computer subsequently determines a second range of port numbers assigned to the dSNAT middlebox service instance, the method further comprising: receiving the second range of port numbers assigned to the dSNAT middlebox service instance executing on the host computer; identifying, based on the received IPv4 address and the second range of port numbers assigned to the dSNAT middlebox service instance, a second IPv6 address prefix to use to advertise the dSNAT middlebox service instance provided at the host computer; advertising, to the gateway device, the identified second IPv6 address prefix as reachable at the host computer.
33. The method of claim 32 wherein the first range of port numbers is based on a first number of host computers executing dSNAT middlebox service instances of the dSNAT middlebox service and the second range of port numbers is based on a second number of host computers executing dSNAT middlebox service instances of the dSNAT middlebox service.
34. The method of claim 33, wherein the first range of port numbers comprises more port numbers than the second range of port numbers and the second number of host computers executing dSNAT middlebox service instances of the dSNAT middlebox service is greater than the first number of host computers executing dSNAT middlebox service instances of the dSNAT middlebox service.
35. The method of claim 33, wherein the second range of port numbers comprises more port numbers than the first range of port numbers and the second number of host computers executing dSNAT middlebox service instances of the dSNAT middlebox service is less than the first number of host computers executing dSNAT middlebox service instances of the dSNAT middlebox service.
36. The method of claim 33, wherein the first number of host computers is below a threshold number for reassigning port number ranges and the second number of host computers is above a threshold number for reassigning port number ranges.
37. The method of claim 36, wherein each host computer executing a dSNAT middlebox service instance of the dSNAT middlebox service is assigned a range of port numbers that covers a same number of port numbers, the first range of port numbers is based on dividing an entire range of possible port numbers into a first number of port number ranges that is equal to the threshold number, and the second range of port numbers is based on dividing the entire range of possible port numbers into a second number of port number ranges that is greater than the second number of host computers executing dSNAT middlebox service instances of the dSNAT middlebox service.
38. The method of claim 32, wherein the first range of port numbers is based on a first number of workload machines executing on the host computer for which the dSNAT middlebox service instance provides the dSNAT middlebox service and the second range of port numbers is based on a second number of workload machines executing on the host computer for which the dSNAT middlebox service instance provides the dSNAT middlebox service.
39. The method of claim 38, wherein the second range of port numbers comprises more port numbers than the first range of port numbers and the second number of workload machines is more than the first number of workload machines.
40. The method of claim 38, wherein the second range of port numbers comprises fewer port numbers than the first range of port numbers and the second number of workload machines is less than the first number of workload machines.
41. A machine readable medium storing a program which when implemented by at least one processing unit implements the method according to any one of claims 1-40.
42. An electronic device comprising: a set of processing units; and a machine readable medium storing a program which when implemented by at least one of the processing units implements the method according to any one of claims 1-40.
43. A system comprising means for implementing the method according to any one of claims 1-40.
44. A computer program product comprising instructions which when executed by a computer cause the computer to perform the method according to any one of claims 1-40.
EP21727683.1A 2020-07-16 2021-05-01 Facilitating distributed snat service Pending EP4078935A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US16/931,196 US11616755B2 (en) 2020-07-16 2020-07-16 Facilitating distributed SNAT service
US16/931,207 US11606294B2 (en) 2020-07-16 2020-07-16 Host computer configured to facilitate distributed SNAT service
PCT/US2021/030371 WO2022015394A1 (en) 2020-07-16 2021-05-01 Facilitating distributed snat service

Publications (1)

Publication Number Publication Date
EP4078935A1 true EP4078935A1 (en) 2022-10-26

Family

ID=76076480

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21727683.1A Pending EP4078935A1 (en) 2020-07-16 2021-05-01 Facilitating distributed snat service

Country Status (3)

Country Link
EP (1) EP4078935A1 (en)
CN (1) CN116158064A (en)
WO (1) WO2022015394A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10742746B2 (en) 2016-12-21 2020-08-11 Nicira, Inc. Bypassing a load balancer in a return path of network traffic
US11616755B2 (en) 2020-07-16 2023-03-28 Vmware, Inc. Facilitating distributed SNAT service
US11606294B2 (en) 2020-07-16 2023-03-14 Vmware, Inc. Host computer configured to facilitate distributed SNAT service
US11902050B2 (en) 2020-07-28 2024-02-13 VMware LLC Method for providing distributed gateway service at host computer
US11451413B2 (en) 2020-07-28 2022-09-20 Vmware, Inc. Method for advertising availability of distributed gateway service and machines at host computer

Also Published As

Publication number Publication date
CN116158064A (en) 2023-05-23
WO2022015394A1 (en) 2022-01-20

Similar Documents

Publication Publication Date Title
US11616755B2 (en) Facilitating distributed SNAT service
US11902050B2 (en) Method for providing distributed gateway service at host computer
US11606294B2 (en) Host computer configured to facilitate distributed SNAT service
US10911360B2 (en) Anycast edge service gateways
US11451413B2 (en) Method for advertising availability of distributed gateway service and machines at host computer
US12074731B2 (en) Transitive routing in public cloud
AU2021349770B2 (en) Flow processing offload using virtual port identifiers
US10491466B1 (en) Intelligent use of peering in public cloud
WO2022015394A1 (en) Facilitating distributed snat service
US20210136140A1 (en) Using service containers to implement service chains
CN112039768B (en) Intermediate logical interface in a virtual distributed routing environment
US11843547B2 (en) Allocating additional bandwidth to resources in a datacenter through deployment of dedicated gateways
US20220038379A1 (en) Route advertisement to support distributed gateway services architecture
US11159343B2 (en) Configuring traffic optimization using distributed edge services
WO2022026012A1 (en) Route advertisement to support distributed gateway services architecture
US11706191B2 (en) Link local address assignment for interfaces of overlay distributed router

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20220718

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20230705

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
RAP3 Party data changed (applicant data changed or rights of an application transferred)

Owner name: VMWARE LLC