EP4078935A1 - Facilitating distributed snat service - Google Patents
Facilitating distributed snat serviceInfo
- Publication number
- EP4078935A1 EP4078935A1 EP21727683.1A EP21727683A EP4078935A1 EP 4078935 A1 EP4078935 A1 EP 4078935A1 EP 21727683 A EP21727683 A EP 21727683A EP 4078935 A1 EP4078935 A1 EP 4078935A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- address
- dsnat
- middlebox service
- ipv6
- destination
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 101150071927 AANAT gene Proteins 0.000 title 1
- 238000000034 method Methods 0.000 claims abstract description 132
- 238000005538 encapsulation Methods 0.000 claims abstract description 56
- 238000012545 processing Methods 0.000 claims description 36
- 239000004744 fabric Substances 0.000 claims description 6
- 238000013519 translation Methods 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 4
- 101000652292 Homo sapiens Serotonin N-acetyltransferase Proteins 0.000 abstract 3
- 102100030547 Serotonin N-acetyltransferase Human genes 0.000 abstract 3
- 230000008569 process Effects 0.000 description 65
- 239000010410 layer Substances 0.000 description 10
- 230000008859 change Effects 0.000 description 6
- 230000003068 static effect Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000009977 dual effect Effects 0.000 description 3
- 239000000945 filler Substances 0.000 description 3
- 238000013508 migration Methods 0.000 description 3
- 230000005012 migration Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 235000008694 Humulus lupulus Nutrition 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 239000002355 dual-layer Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2521—Translation architectures other than single NAT servers
- H04L61/2532—Clique of NAT servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1023—Server selection for load balancing based on a hash applied to IP addresses or costs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2517—Translation of Internet protocol [IP] addresses using port numbers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2592—Translation of Internet protocol [IP] addresses using tunnelling or encapsulation
Definitions
- SNAT source network address translation
- Some embodiments of the invention provide novel methods for facilitating a distributed middlebox service operation (e.g., a distributed SNAT (dSNAT) or distributed load balancing (dLB) middlebox service) for a first network at a host computer in the first network on which the middlebox service operation is performed and a gateway device between the first network and a second network.
- a distributed middlebox service operation e.g., a distributed SNAT (dSNAT) or distributed load balancing (dLB) middlebox service
- dSNAT distributed SNAT
- dLB distributed load balancing
- the novel methods enable a distributed middlebox service (e.g., dSNAT or dLB) that provides a stateful middlebox service at multiple host computers, thus avoiding the bottleneck problem associated with providing stateful middlebox services at gateways and also significantly reduces the need to redirect packets received at the wrong host by using a capacity of off-the-shelf gateway devices to perform IPv6 encapsulation for IPv4 packets and assigning locally unique IPv6 addresses to each host executing a distributed middlebox service instance.
- dSNAT distributed middlebox service
- the method configures the gateway device to receive packets destined for a distributed middlebox service and identify, based on a destination internet protocol version 4 (IPv4) address and a port specified in an IPv4 header of the received packet, an IP version 6 (IPv6) address to use to forward the received packet to a particular host computer on which a middlebox service instance associated with the destination IPv4 address executes.
- IPv4 address is an IPv4 VIP address associated with a dLB middlebox service or an IPv4 address used by a dSNAT as a source address for packets going from the first network to external networks.
- the gateway device then encapsulates the packet with an IPv6 header using the identified IPv6 address and forwards the encapsulated packet based on an IPv6 routing table of the gateway device.
- the host computer is configured to receive encapsulated packets destined to the identified IPv6 address from the gateway device and remove the encapsulation to provide the inner IPv4 packet to a middlebox service instance executing on the host computer based on the IPv4 address in a header of the inner IPv4 packet.
- the middlebox service instance performs an address replacement operation (e.g., a lookup in a connection tracker that associates translated IP addresses and ports into original IP addresses and ports, or replaces a VIP destination address and port with a workload IP address and port) to replace the IP address and port number in the IPv4 header with an IPv4 address and port used by a source machine in the first network.
- the middlebox service instance executing on the host computer is assigned a range of port numbers for performing the middlebox service operation for packets going from the first network to external networks, in the case of dSNAT or, in the case of dLB, is assigned a range of port numbers for which to receive packets.
- the host computer in some embodiments, is configured to advertise the availability of an IPv6 address prefix that is based on the IPv4 used by the middlebox service instance as a source address for packets going from the first network to external networks and the range of port numbers assigned to the middlebox service instance.
- the advertised IPv6 address prefix begins with 16 bits that are not assigned to be globally unique in IPv6 (e.g., FC00) followed by the IPv4 address used by the middlebox service and then followed by the set of bits in the 16-bit port address that are common to the range of port numbers assigned to the middlebox service instance executing on the host computer (e.g., the first 6 bits common to a range of 1024 assigned port numbers).
- Packets processed by the middlebox service instance executing on a host computer that are destined for an external network are sent from the host without encapsulation in an IPv6 header using the advertised IPv6 address as a source IP address. While the IPv6 address associated with the middlebox service instance is not used in encapsulating the packet, in some embodiments, other encapsulation may be used to reach the gateway device.
- the advertisement in some embodiments, is made by a border gateway protocol
- the advertisement is made to a route reflector (e.g., a route server) that advertises the availability of the IPv6 address prefix at the host computer to other network elements including the gateway device or set of gateway devices.
- the advertisement includes an instruction to the gateway device to identify the IPv6 address based on an IPv4 address and port number of packets received at the gateway device and encapsulate the IPv4 packets with the identified IPv6 address.
- the advertised IPv6 address is based on existing functions of a hardware gateway device for handling IPv6 encapsulation of IPv4 packets.
- a controller computer cluster i.e., a set of one or more controller computers of the first network provides configuration information to network elements to facilitate the distributed middlebox service operation for the first network.
- the configuration information includes a set of middlebox service records and IPv6 routing table entries provided to a gateway device.
- the middlebox service records map combinations of the IPv4 used by a particular middlebox service operation and destination port number to an IPv6 destination address.
- the middlebox service record is a policy-based routing (PBR) rule that defines an algorithm for generating an IPv6 address from an IPv4 destination address and a port number included in an IPv4 header and specifies an IPv4 destination address for which the algorithm should be applied.
- PBR policy-based routing
- the IPv6 routing table entries in some embodiments, each identify an IPv6 address prefix associated with a particular host computer in a set of multiple host computers that each execute a middlebox service instance and a next hop towards the particular host computer.
- the controller computer cluster configures the middlebox service instances to use a particular IPv4 address when performing the middlebox service operation and assigns, to each middlebox service instance of a particular middlebox service, a non-overlapping range of port numbers to use.
- the IPv4 address and port number range are provided to the host computer (e.g., an MFE of the host computer) to identify the IPv6 address prefix that corresponds to the IPv4 address and range of assigned port numbers and to advertise the availability of the identified IPv6 address at the host computer.
- the size of the port number ranges assigned to the middlebox service instances are fixed by an administrator based on a maximum number of expected middlebox service instances (e.g., for an expected maximum of 64 middlebox service instances, creating 64 different port number ranges each including 1024 ports that are each assigned to a middlebox service instance on startup). In other embodiments, the size of the port number ranges is dynamic and may change based on the number of active middlebox service instances. The port number ranges may also vary in size between middlebox service instances.
- a larger port number range is assigned to a first middlebox service instance executing on a host computer executing a larger number of workload machines using the middlebox service than a second middlebox service instance executing on a host computer executing a smaller number of workload machines using the middlebox service.
- Figure 1 illustrates an exemplary network in which the novel method for facilitating the provision of a distributed SNAT middlebox service operation for a first network is performed.
- Figure 2 conceptually illustrates a process performed by a gateway device to process a received packet that is destined to a particular middlebox service instance.
- Figure 3A illustrates packet processing at a gateway device as depicted in Figure
- Figure 3B illustrates packet processing at a gateway device as depicted in Figure
- Figure 4 illustrates packet processing at a gateway device as depicted in Figure 1 for a subsequent packet in a particular packet flow destined to an LB VIP for which a packet was previously received from the external network.
- Figure 5 conceptually illustrates a process performed at a host computer for processing a received IPv6 packet destined for a middlebox service instance executing on the host computer.
- Figure 6 illustrates a packet being sent from an external machine to a guest machine in an internal network.
- Figure 7 conceptually illustrates a process performed by a NAT instance processing a first packet in a packet flow destined for a destination machine in an external network.
- Figure 8 illustrates a first packet in a packet flow being sent from a GM and processed by the NAT instance executing on the same host computer.
- Figure 9 conceptually illustrates a process for generating configuration data for different network elements that provide the middlebox service and facilitate the provision of the middlebox service.
- Figure 10 illustrates a computer controller cluster in a datacenter sending different types of configuration data to different network elements.
- Figure 11 conceptually illustrates a process performed by a gateway device to facilitate the provision of the middlebox service based on received configuration data.
- Figure 12 conceptually illustrates a process for configuring a host computer to execute a distributed middlebox service instance and advertise the IPv6 address prefix associated with the middlebox service instance executing on the host computer.
- Figure 13 illustrates three different exemplary advertised IPv6 address prefixes that are used in different embodiments to advertise the availability of the service at the host computer and corresponding exemplary destination IPv6 addresses generated by a gateway device to use in an IPv6 encapsulation header to forward a packet to the particular service instance executing on the host computer making the advertisement.
- Figure 14 conceptually illustrates a set of data exchanges between network elements to migrate a compute node.
- Figure 15 conceptually illustrates a computer system with which some embodiments of the invention are implemented.
- Some embodiments of the invention provide novel methods for facilitating a distributed middlebox service operation (e.g., a distributed SNAT (dSNAT) or distributed load balancing (dLB) middlebox service) for a first network at a host computer in the first network on which the middlebox service operation is performed and a gateway device between the first network and a second network.
- a distributed middlebox service operation e.g., a distributed SNAT (dSNAT) or distributed load balancing (dLB) middlebox service
- dSNAT distributed SNAT
- dLB distributed load balancing
- the novel methods enable a distributed middlebox service (e.g., dSNAT or dLB) that provides a stateful middlebox service at multiple host computers, thus avoiding the bottleneck problem associated with providing stateful middlebox services at gateways and also significantly reduces the need to redirect packets received at the wrong host by using a capacity of off-the-shelf gateway devices to perform IPv6 encapsulation for IPv4 packets and assigning locally unique IPv6 addresses to each host executing a distributed middlebox service instance.
- dSNAT and dLB middlebox service focuses on a dSNAT and dLB middlebox service, however one of ordinary skill in the art will appreciate that the methods discussed can be applied to a any distributed, stateful middlebox service using a same IP address at multiple host computers.
- the method configures the gateway device to receive packets destined for an IPv4
- IPv6 IP version 6
- packet refers to a collection of bits in a particular format sent across a network.
- a packet in some embodiments, is referred to as a data message.
- packet is used in this document to refer to various formatted collections of bits that are sent across a network.
- the formatting of these bits can be specified by standardized protocols or non-standardized protocols. Examples of packets following standardized protocols include Ethernet frames, IP packets, TCP segments, UDP datagrams, etc.
- references to L2, L3, L4, and L7 layers are references respectively to the second data link layer, the third network layer, the fourth transport layer, and the seventh application layer of the OSI (Open System Interconnection) layer model.
- OSI Open System Interconnection
- the term managed forwarding element refers to software forwarding elements or hardware forwarding elements that are configured by a controller computer cluster (i.e., a set of one or more controller computers that provide configuration data to network elements) to implement a logical network comprising a set of logical forwarding elements (LFEs).
- each LFE is a distributed forwarding element that is implemented by configuring multiple MFEs on multiple host computers.
- each MFE or a module associated with the MFE in some embodiments is configured to encapsulate the data messages of the LFE with an overlay network header that contains a virtual network identifier (VNI) associated with the overlay network.
- VNI virtual network identifier
- the LFEs also span, in some embodiments, configured hardware forwarding elements (e.g., top of rack switches).
- the set of LFEs includes a logical switch that is implemented by configuring multiple software switches or related modules on multiple host computers.
- the LFEs can be other types of forwarding elements (e.g., logical routers), or any combination of forwarding elements (e.g., logical switches and/or logical routers) that form logical networks or portions thereof.
- Figure 1 illustrates an exemplary network 100 in which the novel method for facilitating the provision of a distributed SNAT operation for a first network is performed.
- Figure 1 illustrates a network 100 comprising an external network 101 connecting a set of machines 102 outside of a datacenter 105 with guest machines (GMs) 126 executing on a number of hosts 120 in the datacenter 105 (e.g., a public cloud datacenter or set of datacenters).
- the gateway devices 110 execute between the internal network and the external network 101 and are configured, as discussed below in relation to Figure 11, to facilitate the provision of the distributed middlebox service for communications between the external machines 102 and the internal compute nodes (e.g., GMs 126).
- the gateway device 110 includes a cache 111 that stores information regarding forwarding decisions made for previously received packets and a set of pre-routing rules 112 that, in some embodiments, includes policy-based routing rules based on IP (either IPv4 or IPv6) addresses. After performing a lookup in the cache 111 and performing a lookup in the set of pre routing rules 112, packets may be routed using an IPv4 routing table, or an IPv6 routing table, or may be sent to an IPv6 encapsulator to be encapsulated in an IPv6 header and then routed based on the IPv6 routing table.
- IP IP
- the system 100 also includes a set of controller computers 140 that provide configuration information to the set of host computers 120 to implement a set of logical forwarding elements (e.g., using the MFEs 121), an IPv6 processing module 122 that processes received IPv6 packets, a routing machine (RM) 123 that acts as a BGP instance to interact with the set of route servers 130, a distributed middlebox service instance 124 (e.g., the SNAT instances 124 that, in the illustrated embodiment, provide a dSNAT middlebox service), and a set of compute nodes (e.g., the GMs 126).
- a set of controller computers 140 that provide configuration information to the set of host computers 120 to implement a set of logical forwarding elements (e.g., using the MFEs 121), an IPv6 processing module 122 that processes received IPv6 packets, a routing machine (RM) 123 that acts as a BGP instance to interact with the set of route servers 130, a distributed middlebox service instance 124 (e.g
- the host computers 120 also include a set of NAT records 125 that, in some embodiments, are caches recording associations between internal IP address/port pairs and ports selected by the SNAT instance 124 as external ports for each IP address/port pair.
- the cache records also store an IP address of the external machine along with the port selected by the SNAT instance 124 to allow the SNAT instance 124 to use a same port for multiple data message flows established with different external machines using different IP addresses.
- the system 100 also includes a set of route servers 130 (also referred to as route reflectors) that each receive routing information from multiple network elements and provides the routing information to other network elements to simplify the exchange of routing information. For example, instead of using a full mesh connecting each BGP instance (e.g., RM 123), each BGP instance interacts with the route servers 130 to reduce the number of advertisements made by each BGP instance.
- the datacenter 105 also includes the intervening fabric 150 that provides the physical connections between the illustrated network elements.
- FIG. 2 conceptually illustrates a process 200 performed by a gateway device (e.g., the gateway device 110) to process a received packet that is destined to a particular middlebox service instance (e.g., SNAT instance 124a).
- the gateway device is an off-the-shelf gateway device with the capability to encapsulate an IPv4 packet in an IPv6 packet and to generate the IPv6 header of the IPv6 packet using either a set of rules or a set of records specifying IPv6 headers to use based on IPv4 header values.
- the gateway device is a fully programmable forwarding element that is programmed to carry out the operations of process 200.
- process 200 can be performed for packets destined for an IPv4 address associated with any of a dSNAT middlebox service, a dLB middlebox service for a set of load balanced set of workload compute nodes, or any distributed middlebox service using a same IP address at multiple middlebox service instances executing on multiple host computers.
- the process 200 begins by receiving (at 210) an IPv4 packet destined to a particular middlebox service instance (e.g., SNAT instance 124a) executing on a particular host computer (e.g., host computer 120a) with a destination address that is associated with the middlebox service (i.e., all the middlebox service instances).
- the IPv4 header identifies the source machine in the external network by a source IP address and identifies a destination IP address and port that is a source IP address and port used by the SNAT instance that processes packets for the communication session (also referred to as a packet flow or connection) between the external machine and the internal compute node serviced by the middlebox service instance.
- the process determines (at 220) that the IPv4 packet requires encapsulation in an IPv6 packet.
- the determination for a first packet in a particular flow of packets received from an external machine is made based on a middlebox service record.
- the middlebox service record in some embodiments is an IPv4 routing table entry for the IPv4 destination address that indicates that the packet requires encapsulation in an IPv6 packet.
- the IPv4 routing entry also indicates either (1) a specific IPv6 destination address to use for encapsulating the IPv4 packet based on the IPv4 header values (e.g., an IPv4 destination address and destination port (for SNAT) or source port (for LB)) or (2) an algorithm for generating an IPv6 destination address to use in the IPv6 encapsulation header.
- the middlebox service record is a policy based routing (PBR) rule that specifies encapsulation for all packets destined to the IPv4 address associated with the middlebox service. As with the IPv4 routing entry the PBR rule can either specify an IPv6 destination address or a method for generating the IPv6 destination address.
- PBR policy based routing
- PBR rule is included in the pre routing rules 112. After the first received packet for a particular flow of packets from an external machine, in some embodiments, the determination for subsequent packets of the particular flow is made based on a cache record that includes the determination made for the first packet of the particular flow and that is stored in cache 111.
- the process 200 identifies (at 230) the IPv6 destination address to use in the IPv6 encapsulation header based on the IPv4 header values (e.g., a destination IPv4 address and a destination port (for dSNAT) or a source port (for dLB)).
- the identification is based on an IPv6 destination address specified in the middlebox service record for the IPv4 destination address and port pair. In other embodiments, the identification is based on an algorithm or other programmatic method of generating an IPv6 destination address from IPv4 headers.
- the algorithm in some embodiments takes an IPv6 prefix that is used for locally unique addresses (e.g., FC00::/8) and appends the IPv4 destination address and the destination (or source) port followed by zeros (zeros are used for simplicity but any set of trailing bits would work in some embodiments).
- IPv6 prefix that is used for locally unique addresses (e.g., FC00::/8) and appends the IPv4 destination address and the destination (or source) port followed by zeros (zeros are used for simplicity but any set of trailing bits would work in some embodiments).
- the IPv4 packet is encapsulated (at 240) with an IPv6 header using the identified IPv6 address as a destination address.
- the encapsulation is done by an IPv6 encapsulation module (e.g., IPv6 encapsulator 114).
- the destination port in some embodiments, is the IPv4 destination port but, in other embodiments, may be any port.
- the source IPv6 address and port in some embodiments, are an IPv6 address and port associated with the gateway device.
- the process 200 then performs (at 250) a lookup in an IPv6 routing table (e.g., IPv6 routing table 115) to identify the next hop for the encapsulated date message.
- the gateway device is configured with a set of IPv6 routes (i.e., routing table entries) for each of a set of IPv6 address prefixes associated with a set of host computers that executes middlebox service instances that indicate the next hop for each IPv6 address prefix.
- the IPv6 address prefixes are provided by a controller computer (e.g., as static routes).
- the host computers e.g., BGP instances executing on the host computers
- each middlebox service instance is assigned a range of port numbers that can be used to generate a unique IPv6 address prefix based on the algorithm described above for generating the IPv6 destination address.
- the process 200 forwards (at 260) the IPv6 packet to the identified next hop towards the middlebox service instance and the process ends.
- the packet is forwarded over an intervening network fabric (e.g., intervening fabric 150).
- the forwarding elements in the intervening fabric learn the next hop for the destination IPv6 address using standard protocols such as any or all of BGP, IGP, ARP, or any of the other route learning mechanisms known to one of ordinary skill in the art.
- Figure 3A illustrates packet processing at a gateway device 110 as depicted in Figure 1 for a first packet 320a in a particular packet flow received from the external network 101.
- packet 320a is received from a machine 102 in the external network 101 destined for the NAT IP address and Port N (i.e., the port selected by the SNAT as a source port).
- the packet is first compared to cache entries in cache 111 which does not yet include cache record 111a.
- a lookup is performed in the set of pre-routing rules 112, and in the illustrated embodiment, a pre routing rule 112a is identified as applying to the packet based on the destination IP (i.e., NAT IP). Based on identifying pre-routing rule 112a as applying to the packet, a cache record 11 la is created in cache 111.
- the cache record 111a identifies the result of the lookup in the pre-routing rules, however one of ordinary skill in the art will appreciate that the cache record, in other embodiments, identifies the specific IPv6 address used to encapsulate the packets in the flow based on the rule or the IPv6 encapsulation address and a next hop.
- the packet is passed to the IPv6 packet encapsulator 114 for encapsulation instead of being passed to IPv4 routing table 113 for forwarding based on the IPv4 header values.
- the pre-routing rule 112a identifies an encapsulation rule stored by the IPv6 encapsulator that would be identified, as part of passing the packet, to the IPv6 encapsulator 114 to perform the encapsulation.
- passing the packet to IPv6 encapsulator 114 comprises sending a rule (e.g., an algorithm) for generating the encapsulation header values.
- the IPv6 encapsulator 114 then encapsulates the packet with an IPv6 header packet based on the identified rule (i.e., rule 114a).
- the destination IPv6 address is generated by using an FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the destination port (Port N) followed by 0’s.
- FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the destination port (Port N) followed by 0’s.
- Other prefixes or filler bits are used in other embodiments, and one of ordinary skill in the art will recognize that this is just one of many possible algorithms for generating the IPv6 destination address that has been selected for simplicity.
- the IPv6 destination port, source IPv6 address, and IPv6 source port are, the original destination port, a source IPv6 address associated with the gateway device 110 and a randomly selected IPv6 source port.
- IPv6 routing table 115 An IPv6 forwarding operation represented by IPv6 routing table 115.
- a lookup in IPv6 routing table 115 identifies a matching routing table entry 115a that includes a next hop (i.e., next hop 3) interface that is used to forward the packet to its destination.
- the IPv6 routing table entries for the NAT IP are dynamic routes learned based on advertisements from the BGP instances on the host machines, while in other embodiments the routing table entries are static routes received from a controller computer in a set of controller computers (e.g., controller computer cluster 140).
- the IPv6 packet 330a is then forwarded to the destination host based on the IPv6 destination address (i.e., FC00:NAT IP:PortN::).
- Figure 3B illustrates packet processing at a gateway device 110 as depicted in
- FIG 1 for a subsequent packet 320b in the particular packet flow for which packet 320a was the first packet received from the external network 101.
- packet 320b is received from a machine 102 in the external network 101 destined for the NAT IP address and Port N (i.e., the port selected by the SNAT as a source port).
- the packet is first compared to cache entries in cache 111 which includes cache record 111a based on the first packet 320a received from the external network 101.
- the cache record 111a indicates that the packet 320b should be encapsulated in an IPv6 header according to a particular encapsulation rule (i.e., “IPv6 Encap Rule 1”).
- the packet and the rule identifier are passed, in some embodiments, to the IPv6 encapsulator 114, bypassing pre-routing rules 112.
- the cache record identifies the specific IPv6 address used to encapsulate the packets in the flow based on the rule or the IPv6 encapsulation address and a next hop.
- the IPv6 encapsulator 114 then encapsulates the packet with an IPv6 header packet based on the identified rule (i.e., rule 114a).
- the destination IPv6 address is generated by using an FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the destination port (Port N) followed by 0’s.
- FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the destination port (Port N) followed by 0’s.
- Other prefixes or filler bits are used in other embodiments, and one of ordinary skill in the art will recognize that this is just one of many possible algorithms for generating the IPv6 destination address that has been selected for simplicity.
- the IPv6 destination port, source IPv6 address, and IPv6 source port in some embodiments, are, the original destination port, a source IPv6 address associated with the gateway device 110 and a randomly selected IPv6 source port for the particular flow.
- other destination ports and source IPv6 address and port are used in other embodiments without affecting the routing of the packet to the particular host and dSNAT instance.
- IPv6 routing table 115 identifies a matching routing table entry 115a that includes a next hop (i.e., next hop 3) interface that is used to forward the packet to its destination.
- the lookup in IPv6 routing table 115 is not performed if the cache record 111a identifies the next hop interface to use after encapsulation.
- the IPv6 routing table entries for the NAT IP are dynamic routes learned based on advertisements from the BGP instances on the host machines, while in other embodiments the routing table entries are static routes received from a controller computer in the set of controller computers 140.
- the IPv6 packet 330b is then forwarded to the destination host based on the IPv6 destination address (i.e., FC00:NAT IP:PortN::).
- Figure 4 illustrates packet processing at a gateway device 110 as depicted in Figure
- packet 420 is received from a machine 102 in the external network 101 destined for the LB VIP address and Port B (i.e., a port associated with the VIP).
- the packet is first compared to cache entries in cache 111 which includes cache record 111b based on the first packet received from the external network 101 for the particular packet flow destined to the LB VIP.
- the cache record 111b indicates that the packet 420 should be encapsulated in an IPv6 header according to a particular encapsulation rule (i.e., “IPv6 Encap Rule 2”).
- the packet and the rule identifier are passed, in some embodiments, to the IPv6 encapsulator 114, bypassing pre-routing rules 112.
- the cache record identifies the specific IPv6 address used to encapsulate the packets in the flow based on the rule or the IPv6 encapsulation address and a next hop.
- the IPv6 encapsulator 114 then encapsulates the packet with an IPv6 header packet based on the identified rule (i.e., rule 114b).
- the destination IPv6 address is generated by using an FC00 prefix that is used for locally unique addresses followed by the destination IP (i.e., NAT IP) followed by the source port (Port Z) followed by 0’s.
- the source port is used instead of the destination port, in some embodiments, because it is randomly selected from the possible port values when initiating a flow (e.g., a session or connection) and is then constant for the lifetime of the packet. This allows the flows to be distributed among multiple LB instances based on different source port ranges assigned to each LB instance while at the same time ensuring that the same LB instance that maintains state information for providing the LB service to a particular flow receives packets of that flow.
- the LB VIP may be associated with servers listening on a specific port or ports such that the destination port will not allow for identifying a specific LB instance.
- the rule will be the same as that used for the NAT IP of Figure 3.
- Other prefixes or filler bits are used in other embodiments, and one of ordinary skill in the art will recognize that this is just one of many possible algorithms for generating the IPv6 destination address that has been selected for simplicity.
- the IPv6 destination port, source IPv6 address, and IPv6 source port are, the original destination port, a source IPv6 address associated with the gateway device 110 and a randomly selected IPv6 source port for the particular flow.
- IPv6 destination port, source IPv6 address, and IPv6 source port are, the original destination port, a source IPv6 address associated with the gateway device 110 and a randomly selected IPv6 source port for the particular flow.
- destination ports and source IPv6 address and port are used in other embodiments without affecting the routing of the packet to the particular host and dLB instance.
- a stateful distributed load balancing service for distributing requests received from clients in external networks relies on a set of gateways of the availability zone (AZ) to consistently send a same flow to a same host computer providing the distributed load balancing based on an equal cost multipathing (ECMP) operation performed at the gateway devices of the A Z across the host computers providing the distributed load balancing service.
- AZ availability zone
- ECMP equal cost multipathing
- the routing machine on each host executing a distributed load balancer instance advertises the same VIP address as being available and the gateway devices of the A Z record the multiple advertised next hop addresses as being associated with the VIP as possible next hops.
- a gateway device of the AZ selects a particular next hop using an ECMP operation.
- an acceptable number of redirection operations may be required upon a change in the number of host computers providing the distributed load balancing service such that it is not worth the effort to ensure that different host computers can be deterministically identified for each flow (or data message).
- IPv6 routing table 115 identifies a next hop (i.e., next hop 3) interface that is used to forward the packet to its destination.
- the lookup in IPv6 routing table 115 is not performed if the cache record 111b identifies the next hop interface to use after encapsulation.
- the IPv6 routing table entries for the LB IP are dynamic routes learned based on advertisements from the BGP instances on the host machines, while in other embodiments the routing table entries are static routes received from a controller computer in the set of controller computers 140.
- the IPv6 packet 430 is then forwarded to the destination host based on the IPv6 destination address (i.e., FC00:LB IP:PortZ::).
- the gateway device Once the gateway device has encapsulated and forwarded the packet, it will reach the host computer on which the destination distributed middlebox instance executes.
- the host computer is configured to receive encapsulated packets destined to the identified IPv6 address from the gateway device and remove the encapsulation to provide the inner IPv4 packet to a middlebox service instance executing on the host computer based on the IPv4 address in a header of the inner IPv4 packet.
- Figure 5 conceptually illustrates a process 500 performed at a host computer for processing a received IPv6 packet destined for a middlebox service instance executing on the host computer. In some embodiments, the process 500 is performed by a host computer on which the middlebox service instance executes.
- the host computer performs the process 500 using an MFE (e.g., MFE 121a), a software routing element (e.g., routing machine 123a), an IPv6 processing module (e.g., IPv6 processing module 122a), a distributed middlebox instance (e.g., SNAT 124a), and a storage (e.g., NAT Records 125a) storing records for doing an IPv4 translation operation, executing on the host computer.
- MFE e.g., MFE 121a
- a software routing element e.g., routing machine 123a
- an IPv6 processing module e.g., IPv6 processing module 122a
- a distributed middlebox instance e.g., SNAT 124a
- a storage e.g., NAT Records 125a
- some of the elements are combined (e.g., the MFE implements (or is) the software routing element and contains IPv6 packet processing instructions, while the distributed middlebox service instance includes the records used
- the process 500 then removes (at 520) the IPv6 encapsulation header and performs a lookup in a routing table to identify the next hop for the inner IPv4 packet.
- the received packet is passed to an IPv6 processing module (e.g., 122) that is programmed with IPv6 routing rules and tables.
- the routing rules include a rule identifying IPv6 packets destined to a middlebox service instance as requiring removal of an IPv6 encapsulation header and being passed to an IPv4 routing table lookup (e.g., performed by an MFE or routing module).
- the rule identifies a next hop and that the IPv6 encapsulation should be removed before forwarding the packet.
- the lookup is performed in an IPv4 routing table after removing the IPv6 encapsulation to identify the next hop towards the middlebox service instance.
- the IPv6 processing module is an IPv6 stack of a dual stack routing element (an MFE or routing module) instead of an independent module.
- the lookup in some embodiments, is performed in a first virtual routing and forwarding (VRF) context for a first logical network or tenant associated with the middlebox service instance.
- VRF virtual routing and forwarding
- a virtual tunnel end point (VTEP) receives the encapsulated packet based on an IPv6 address of the encapsulated packet.
- the VTEP is then responsible for decapsulating the packet and identifying a next hop based on a virtual network identifier and IPv4 address associated with the received IPv6 packet.
- the packet is then forwarded (at 530) towards the middlebox service instance with the IPv4 header, using the IPv4 header values in the packet received at the gateway device through the identified next hop interface.
- the distributed middlebox service instance receives the packet and identifies (at
- identifying the destination IPv4 internal header values includes performing a lookup in a middlebox service record storage (e.g., a cache) that maintains associations between ports used to replace source ports for outgoing packets and source IPv4 addresses and ports.
- the ports used to replace the source port for outgoing packets belong to a range of port numbers assigned to the middlebox service instance executing on the host computer (e.g., for the middlebox service instance to use to replace the source port of outgoing packets, or source ports that will be directed to the middlebox service instance).
- the destination port is used, in some embodiments, to perform the lookup in (e.g., query) the middlebox service record storage to identify an internal IPv4 address and port to replace a current (external) destination IPv4 address and port for forwarding the packet to the correct destination machine (e.g., a virtual machine, container, pod, etc.).
- the correct destination machine e.g., a virtual machine, container, pod, etc.
- identifying the destination internal IPv4 address includes, for a first packet of a particular flow, performing a load balancing operation to select a destination machine (either on the same host computer or on a different host computer).
- the load balancing operation in some embodiments, preferentially selects local compute nodes to provide the service associated with the VIP in order to reduce redirection, but based on the load balancing algorithm or method can select any compute node executing on any host computer and selects at least one compute node on at least one other host computer for at least one flow.
- the distributed LB instance creates a record in the middlebox service record storage to identify the destination IPv4 header values for subsequent packets of the particular flow. For subsequent packets in a flow destined to the LB VIP, the lookup in the middlebox service record storage is based on a set of at least one other IPv4 header values (e.g., source IP, source port, source IP/port, etc.).
- IPv4 header values e.g., source IP, source port, source IP/port, etc.
- the distributed middlebox service replaces (at 550) the external IPv4 address and port with the identified internal IPv4 address and port.
- the packet is then forwarded (at 560) to the destination machine based on the internal IPv4 address and port.
- the packet is forwarded (at 560) through a logical switch that connects the destination machine to the distributed middlebox service instance.
- the identified IPv4 destination connected to the logical switch in some embodiments, is a compute node executing on another host computer that also implements the logical switch (i.e., is within the span of the logical switch).
- Figure 6 illustrates a packet being sent from an external machine 102 to a guest machine (GM) 126 in an internal network.
- the original data message is sent with an IP header 650a that specifies a destination IP (DIP) address associated with the dSNAT middlebox service and a destination port (Dport) that is within the range assigned to a particular dSNAT middlebox service instance 124a.
- the source IP address (SIP, Ext IP1) and port (Sport, Port Y) are associated with the external machine 102.
- the IPv4 packet i.e., inner packet 670
- the resulting packet has a destination IPv6 address associated with host 120a (e.g., FC00:NAT IP:PortN::) and NAT instance 124a and is sent to the host 120 through the intervening fabric 150.
- IPv6 encapsulated packet is then received at the managed forwarding element
- IPv6 processing is performed in an IPv6 stack in a dual stack MFE or routing machine 123a.
- the IPv6 processing includes removing the IPv6 encapsulation and returning the IPv4 packet to the MFE 121a.
- the IPv6 processing includes identifying the NAT instance 124a based on the IPv6 header values and removing the encapsulation.
- the MFE 121a identifies the NAT instance 124a as the destination of the inner packet 670 based on the IPv4 header.
- the NAT 124a instance receives the original (or inner) IPv4 packet and performs a lookup in NAT records storage 127a.
- the NAT records 127a includes a record 680 that associates a port number used to replace the source port and the replaced source port and replaced source IPv4 address.
- the port number used to replace the source port is also associated with an IP address of the external machine so that a same port number can be reused for connections to different external machines.
- the lookup in some embodiments, is based on a destination port of the IPv4 packet.
- the result of the lookup in the NAT records 127a is then provided to the NAT instance 124a to be used to replace the destination IPv4 address and port number.
- the IPv4 packet with the translated address i.e., having IPv4 header 650b
- FIG. 7 conceptually illustrates a process 700 performed by a NAT instance (e.g.,
- NAT instance 124a processing a first packet in a packet flow destined for a destination machine 102 in an external network 101.
- the discussion of Figure 7 will reference elements of Figure 8 to provide examples of the operations of Figure 7.
- Figure 8 illustrates a first packet in a packet flow being sent from a GM and processed by the NAT instance executing on the same host computer.
- the process 700 begins by receiving (at 710) a packet destined to a machine in an external network.
- the received packet has a source IPv4 address associated with a source machine in an internal network and a source port selected by the source machine.
- packet 831 received at NAT instance 124a from GM 126a is destined to an external IP (i.e., Ext IP1) and destination port (i.e., Port X) and has a source IP address of a GM 126a (i.e., GM IP) and a source port (i.e., Port Y).
- the source port of packet 831 is randomly selected from the entire range of source ports (0-65535).
- the process selects (at 720) a source port number (e.g., Port N) from a range of available port numbers allocated to the NAT instance.
- the available port numbers are port numbers in an assigned range of port numbers that have not been selected for a currently-active connection.
- the range of port numbers is allocated by a controller computer cluster.
- the range of port numbers in some embodiments, is a range of port numbers that share a first set of common bits that are not shared by port numbers allocated to other NAT instances on other host computers. For example, each port number in a range of 1024 port numbers from 0-1023 or 2048-3071 each share a different common set of 6 initial bits in a 16-bit port address. Larger or smaller allocated ranges will have fewer or greater numbers of common bits respectively.
- the process 700 creates (at 730) a connection tracking record (e.g., a NAT record) in a connection tracker (e.g., NAT records 127) that associates the selected port number with the source IP address and source port of the packet for which the port number is selected.
- a connection tracking record e.g., a NAT record
- a connection tracker e.g., NAT records 1257
- the NAT record 841 associates the selected port, Port N, with the source IP address, GM IP, and the source port, Port Y, of the received packet 831.
- the port number used to replace the source port is also associated with an IP address of the external machine so that a same port number can be reused for connections to different external machines.
- connection tracking record is used, as described above, to translate a NAT IP and port number of a packet received from an external network back to the internal IP and port number of the original connection associated with the destination port number of the received packet.
- forwarding the serviced packet to the destination includes forwarding the serviced packet to an MFE (e.g., MFE 121a) to be forwarded to the external destination.
- MFE Mobility Fidelity
- Packets processed by the middlebox service instance executing on a host computer that are destined for an external network are sent from the host without encapsulation in an IPv6 header using the advertised IPv6 address as a source IP address. While the IPv6 address prefix associated with the middlebox service instance is not used in encapsulating the packet, in some embodiments, other encapsulation may be used to reach the gateway device or the external destination machine. In some embodiments, the packets processed by the middlebox service instance are encapsulated in an IPv6 header using an IPv6 source address associated with the middlebox service instance.
- Figure 8 illustrates the serviced packet 832 being encapsulated in overlay encapsulation header 870 to be sent over an overlay network (e.g., using an overlay network identifier such as a virtual network identifier (VNI)) to which the GM 126a and NAT instance 124a belong.
- An MFE or virtual tunnel end point (VTEP) performs the encapsulation of the serviced packet 832 to produce the encapsulated packet 833.
- a controller computer cluster i.e., a set of one or more controller computers of the first network provides configuration information to network elements to facilitate the middlebox service operation for the first network.
- Figure 9 conceptually illustrates a process 900 for generating configuration data for different network elements that provide a middlebox service or facilitate the provision of the middlebox service.
- process 900 is performed by a controller computer or a controller computer cluster.
- the process 900 is performed each time a new middlebox service instance is spun up.
- Process 900 begins by identifying (at 910) the middlebox service instances in the first network.
- identifying the middlebox service instances includes identifying (1) active middlebox service instances and (2) middlebox service instances that have been requested to be activated (e.g., spun up).
- Identifying the middlebox service instances includes identifying the number of end machines (e.g., workload VMs, containers, etc.) that each middlebox service instance supports (i.e., provides the middlebox service for).
- identifying the middlebox service instances includes identifying either or both of (1) a total number of connections being handled by the distributed middlebox service (i.e., a sum over all the distributed middlebox instances) and (2) a number of connections being handled by each middlebox service instance.
- the process 900 determines (at 920) a number of port ranges or a size of port ranges that will be available for assignment. In some embodiments, the number of port ranges or the size of the port ranges is determined based on input from a user (e.g., an administrator) of the first network or a logical network within the first network.
- the input from the user may be based on a maximum amount of resources that the user desires a middlebox service instance to consume in providing the middlebox service.
- the user input specifies any or all of (1) a maximum number of middlebox service instances that can be instantiated, (2) a maximum number of ports that can be assigned to a single middlebox service instance, or (3) policies for determining the number of ports assigned to particular middlebox service instances.
- the policies are based on any or all of (1) a number of active middlebox service instances, (2) a number of compute nodes for which each active middlebox service instance provides the distributed middlebox service, (3) a number of connections being handled by the distributed middlebox service, and (4) the number of connections being handled by each middlebox service instance.
- a policy may specify that a division of the entire range of possible port numbers be divided into a power of two that is at least twice as large as (or as large as) the number of middlebox service instances and that the port number ranges are adjusted based on the policy as the number of middlebox service instances increases or decreases (e.g., going from 4 to 5 middlebox service instances causes each of 8 port ranges to be divided into two smaller port number ranges, or going from 17 to 16 middlebox instances causing 64 port number ranges to be consolidated into 32 port number ranges).
- the policy specifies that each middlebox service instance be assigned non-adjacent port number ranges (e.g., 0-8191 assigned to a first middlebox service instance, 16384-2475 for the second middlebox service instance, etc.). Such a policy allows for increasing and decreasing the number of hosts without having to reassign port number ranges as often.
- the policy may specify that (1) when a particular middlebox service instance uses a fraction of the port numbers assigned to the middlebox service instance above a threshold fraction (e.g., .8 or .9) an adjacent available range will be assigned, workload compute nodes will be migrated from the host computer on which the middlebox service instance executes, or a new middlebox service instance will be spun up (e.g., activated on another host computer), (2) when a particular middlebox service instance uses a fraction of the port numbers assigned to the middlebox service instance below a threshold fraction (e.g., .3 or .2) the range of port numbers assigned will be reduced or additional end machines will be migrated to the host computer on which the middlebox service instance executes (e.g., from a host computer executing a middlebox service instance that is using a greater fraction of its assigned port numbers), and (3) when the total number of connections being handled by the middlebox service instances is below a certain threshold fraction of the capacity based on the number of middlebox service instances and assigned port range
- a threshold fraction e
- policies may specify assigning port ranges based on a number of workload compute nodes that are provided the middlebox service by the middlebox service instance (e.g., for 0-10 workload compute nodes, 256 port numbers are assigned; for 11-20 workload compute nodes, 512 port numbers are assigned; etc.).
- a number of workload compute nodes that are provided the middlebox service by the middlebox service instance (e.g., for 0-10 workload compute nodes, 256 port numbers are assigned; for 11-20 workload compute nodes, 512 port numbers are assigned; etc.).
- the process 900 selects (at 930) at least one port range to assign to each middlebox service instance.
- an initial port range assignment in some embodiments, assigns each middlebox service instance a non-adjacent, non-overlapping, port range.
- Subsequent assignments in some embodiments, assign at least one additional port number range to particular middlebox service instances that use a number of port numbers above a threshold fraction of the assigned port numbers.
- Other subsequent assignments in some embodiments, remove a portion of a range of port numbers from an initial assignment to a particular middlebox service instance that uses less than a threshold number of port numbers in the initially assigned port number range.
- the size of the port number ranges assigned to the middlebox service instances are fixed by an administrator based on a maximum number of expected middlebox service instances (e.g., for an expected maximum of 64 middlebox service instances, creating 64 different port number ranges each including 1024 ports that are each assigned to a middlebox service instance on startup).
- the size of the port number ranges is dynamic and may change based on the number of active middlebox service instances, active connections, or workload compute nodes using the middlebox service.
- the port number ranges may also vary in size between middlebox service instances.
- a larger port number range is assigned to a first middlebox service instance executing on a host computer executing a larger number of workload compute nodes using the middlebox service than a second middlebox service instance executing on a host computer executing a smaller number of workload compute nodes using the middlebox service and may change as the number of workload compute nodes changes.
- the process 900 After selecting (at 930) the range of port numbers for each middlebox service instance to use, the process 900 generates (at 940) configuration data for implementing the desired middlebox service instances.
- the configuration data includes multiple sets of configuration data for different network elements (e.g., host computers, gateway devices) and for different purposes.
- Figure 10 illustrates a computer controller cluster 1040 in a datacenter 1005 sending different types of configuration data to different network elements. The elements of Figure 10 are generally the same as those discussed in Figure 1 with the addition of a local controller 1028 that receives configuration data from controller cluster 1040.
- Figure 10 illustrates a set of configuration data 1029 for each host computer 1020 (received at local controller 1028).
- the configuration data 1029 includes configuration information for (1) configuring the middlebox service instance to provide the middlebox service, (2) configuring other network elements executing on the host computer (e.g., GMs 1026 and MFE 1021) to communicate with the middlebox service instance (e.g., 1024), (3) configuring an MFE or BGP instance executing on a host computer to advertise the IPv6 address associated with a middlebox service instance executing on the host computer.
- the local controller 1028 receives the configuration data and identifies the configuration data for each module executing on the host computer 1020 as will be explained in relation to Figure 12.
- the controller computer cluster 1040 also sends configuration data 1019 to the set of gateway devices for configuring a gateway device to perform an IPv4 to IPv6 encapsulation and, in some embodiments, for configuring the gateway device with IPv6 routing table entries.
- the configuration data (e.g., configuration data 1029) includes configuration data for configuring at least one middlebox service instance executing on at least one host computer to provide the middlebox service using an assigned range of port numbers.
- Configuration data for initializing a new middlebox service instance on a host computer includes, in some embodiments, an IPv4 address associated with the middlebox service used in performing the middlebox service operation (e.g., replacing source IP addresses of packets going from the first network to an external network) and an assigned port number range.
- Additional configuration information (e.g., logical overlay network elements to which the middlebox instance connects) is sent, in some embodiments, to the host computer to configure other elements of the host to communicate with the new middlebox service instance as will be appreciated by one of ordinary skill in the art.
- the additional configuration data sent to the host computer includes configuration data sent to the host computer to configure the host computer (or an MFE or BGP instance executing on the host computer) to identify and advertise the IPv6 address prefix associated with the middlebox service instance as described in relation to Figure 12.
- the configuration data in some embodiments, also includes information used internally to the host computer to address the middlebox service instance and configure machines executing on the host computer to use the middlebox service instance for particular packets (e.g., packets destined for external networks).
- the generated configuration data includes configuration data
- the gateway devices are partially- or fully-programmable gateway devices that can be programmed by the controller computer cluster to implement the IPv4 to IPv6 translation and encapsulation based on PBR rules specified based on IPv4 address and destination port in an IPv4 header.
- the gateway devices are off-the shelf-gateway devices (e.g., dual stack routers) that are capable of simple programming sufficient to configure the gateway device to implement the IPv4 to IPv6 encapsulation.
- the configuration data includes what will be referred to as a set of middlebox service records and IPv6 routing table entries.
- the middlebox service records map combinations of the IPv4 address used by a particular middlebox service operation and destination port number to an IPv6 destination address.
- the middlebox service records in some embodiments, are provided as a lookup table and an instruction to use the lookup table to route data messages using the IPv4 address used by a distributed middlebox service.
- the middlebox service record is a PBR rule (or similar rule or policy) that defines an algorithm for generating an IPv6 address from an IPv4 destination address and port number.
- the PBR rule specifies an IPv4 destination address for which the algorithm should be applied, while in other embodiments, both an IPv4 address and port number are specified.
- the middlebox service record in some embodiments, is an instruction to configure an off-the-shelf gateway device to perform IPv6 encapsulation according to a specified algorithm for IPv4 packets destined to the IPv4 used by a particular middlebox service operation.
- the instruction is based on a functionality provided by the off-the-shelf gateway device (e.g., an exposed API).
- the IPv6 routing table entries each identify an IPv6 address prefix associated with a particular host computer in a set of multiple host computers that each execute a middlebox service instance and a next hop interface to use to reach the particular host computer.
- the IPv6 address prefix specified in the IPv6 routing entry for a particular host computer is based on the IPv4 address associated with the distributed middlebox service and a port number range assigned to the distributed middlebox service instance executing on the host computer. If multiple non-adjacent port ranges are assigned to a particular host computer, the set of IPv6 routing table entries includes multiple entries for the particular host computer.
- the configuration data generated for each network element is forwarded (at 950) to the appropriate network element to be used to configure the network element as described in relation to Figures 12 and 11.
- the configuration data in some embodiments, is received at the host computers by a local controller (e.g., local controller 1028) or a local controller agent that communicates with the controller computer cluster using control plane messages.
- the local controller then provides the configuration data or configures the elements on the host computer to implement the middlebox service (e.g., instantiate a middlebox service instance, configure GMs to use the middlebox service instance, and configure an MFE to advertise the IPv6 address prefix associated with the middlebox service instance, etc.).
- the middlebox service e.g., instantiate a middlebox service instance, configure GMs to use the middlebox service instance, and configure an MFE to advertise the IPv6 address prefix associated with the middlebox service instance, etc.
- the configuration data generated for the gateway device is forwarded to the gateway device to configure the gateway device to identify particular host machines associated with particular received packets (e.g., by using the provided IPv6 routing table entries). After forwarding (at 950) the configuration data, the process ends.
- process 900 is performed for each distributed middlebox service that uses a same IPv4 address as a source address for outgoing packets at each of multiple distributed middlebox service instances.
- the controller computer cluster monitors the load on the middlebox service instances and the middlebox service in the aggregate periodically or based on a schedule. In some embodiments, the monitoring is based on a program executing on the same host computers as the middlebox service instances.
- the program in some embodiments, monitors a set of metrics associated with the middlebox service instance (e.g., latency, number of connections handled, number of packets per second, number of end machines using the middlebox service instance, etc.).
- operations 910 and 920 are performed whenever a new middlebox service instance or workload machine is requested to be initialized.
- the operations 910 and 920 are also performed periodically or based on a schedule set by an administrator, in some embodiments, to determine if the monitoring information indicates that there has been a change requiring reallocation of port number ranges or the size of any port number ranges. If such a change occurs, operations 930-950 are then performed to update the allocation of port ranges and provide updated configuration data to the network elements.
- FIG 11 conceptually illustrates a process 1100 performed by a gateway device to facilitate the provision of the middlebox service based on received configuration data.
- the process 1100 begins by receiving (at 1110) configuration data for facilitating the provision of the middlebox service in an internal network.
- the configuration data in some embodiments is received from a controller computer cluster (e.g., configuration data 1019) or as an advertisement of the availability of an IPv6 address prefix (e.g., advertisement 1039).
- the controller cluster provides a portion of the configuration data while the advertisement includes a different portion of the configuration data.
- the controller computer in some embodiments provides configuration data relating to the middlebox service records as described in relation to Figure 9, while the IPv6 routing table entry configuration data is received from host computers through advertisements of IPv6 address prefixes available at the host computers as described in relation to Figure 12.
- the gateway device receives additional configuration information in the form of additional advertisements for the IPv6 address prefixes of the new middlebox service instances.
- the gateway device Based on the configuration data received (at 1110) the gateway device creates (at 1110)
- the routing table entries are static entries provided by the controller computer cluster that can be updated by the controller computer cluster as the configuration data changes.
- the routing table entries are dynamic routing table entries that are created based on BGP or other route learning protocols known to one of ordinary skill in the art.
- the process 1100 also creates (at 1130) middlebox service records based on the configuration data.
- the middlebox service records may be any type of record or rule that identifies packets destined to the IPv4 address associated with the middlebox service as requiring IPv6 encapsulation and enable the gateway device to identify the correct IPv6 destination address to use to reach the middlebox service instance associated with the packet.
- the middlebox service record in some embodiments, is any of (1) a PBR rule that identifies packets destined for the IPv4 address associated with the middlebox service as requiring IPv6 encapsulation and specifying the method for producing the IPv6 destination, (2) a set of records for a lookup table that identifies IPv6 destination addresses for a set of combinations of IPv4 address and destination port, or (3) an API instruction for an API exposed by an off-the-shelf gateway device to enable the programmatic encapsulation of the IPv4 packets destined for the IPv4 address associated with the middlebox service into an IPv6 packet.
- routing table entries at 1120
- middlebox service records at 1130
- process 1100 is performed each time new configuration data is received at the gateway device. For example, each advertisement of a new IPv6 address prefix by a host computer will lead to the creation of a new IPv6 routing table entry in the gateway device.
- the host computer in some embodiments, is configured to advertise the availability of an IPv6 address prefix that is based on the IPv4 used by the middlebox service instance as a source address for packets going from the first network to external networks and the range of port numbers assigned to the middlebox service instance.
- Figure 12 conceptually illustrates a process 1200 for configuring a host computer to execute a distributed middlebox service instance and advertise the IPv6 address prefix associated with the middlebox service instance executing on the host computer.
- the process 1200 in some embodiments, is performed by a host computer (e.g., host computer 1020) executing a local controller (e.g., local controller 1028) and a BGP instance (e.g. either MFE 1021 or routing machine 1023).
- Process 1200 begins by receiving (at 1210) configuration information relating to a middlebox service instance executing on the host computer.
- the configuration information relating to the middlebox service instance includes (1) the IPv4 address used by the middlebox service to replace the source address of packets sent from within the first network to machines in external networks and (2) the range of port addresses assigned to the middlebox service instance executing on the host computer.
- the configuration information also includes information used internally to route packets to the middlebox service instance such as IP and MAC addresses or next hop interfaces used to forward packets to the middlebox service instance.
- An IPv6 address associated with the middlebox service instance is also included in the configuration information, in some embodiments.
- the configuration information in some embodiments, is received from a controller computer in a controller computer cluster that configures the elements of the first network.
- the process 1200 After receiving (at 1210) the configuration information, the process 1200 identifies
- configuration data for configuring different components (e.g., machines, MFEs, filters, containers, pods, etc.) executing on the host computer.
- the middlebox service instance requires configuration data including the external IP address associated with the middlebox service, a range of ports assigned to the middlebox service instance and, in some embodiments, IP and media access control (MAC) addresses associated with the middlebox service instance.
- a BGP instance e.g., MFE 1021 or routing machine 1023
- the BGP instance is provided with the IPv6 address prefix to advertise.
- the middlebox service instance with the IP address and port range associated with the middlebox service instance. If the middlebox service instance is being configured for a first time (i.e., is being instantiated) the configuration data includes additional information such as IP and MAC addresses associated with the middlebox service instance. In some embodiments, the configuration data only includes the IP address associated with the middlebox service when a middlebox service instance is instantiated and subsequent updates include only an updated port range.
- the process 1200 After configuring (at 1230) the middlebox service instance, the process 1200 provides (at 1240), to a BGP instance executing on the host computer, an IPv6 address prefix identified as being associated with a middlebox service instance based on the configuration information.
- the identified IPv6 address prefix in some embodiments, is based on the IPv4 address used by the middlebox service included in the configuration information, and the range of port numbers assigned to the middlebox service instance.
- the assigned range of port numbers in some embodiments, is a range of port numbers that share a common set of leftmost bits.
- assigned ranges of 1024 port numbers are numbers that share the 6 leftmost bits of the port number in common, while assigned ranges of 512 port numbers are numbers that share the 7 leftmost bits in common.
- the IPv6 address prefix associated with the middlebox service instance in such embodiments is then identified as an IPv6 address prefix with the rightmost significant bits being the common set of bits in the port numbers assigned to the middlebox service instance.
- the advertised IPv6 address is based on existing functions of a hardware gateway device for handling IPv6 encapsulation of IPv4 packets.
- Figure 13 illustrates three different exemplary advertised IPv6 address prefixes
- FIG. 13 illustrates a set of identified IPv6 address prefixes 1331-1333 that are in the FC00::/8 address block based on a configuration of a middlebox service instance. Other IPv6 prefixes are used, in some embodiments, for other address blocks such as the FD00::/8 address block.
- the illustrated IPv6 includes the IPv4 address 1310 used by the middlebox service and the common bits (i.e., in the illustrated example the first 6 bits) of the range of port numbers 1315.
- the illustrated example is for a middlebox service using an IPv4 address 1310 of 192.168.32.1 (or, in hexadecimal, C6A8:2001) and a port range 1315 of 0-1023 (with 6 “0” bits in common).
- the example also illustrates a user-configured prefix 1320 (e.g., F462:5D1C:A451:2BD6) that, in some embodiments, is used to distinguish packets received for different tenants or logical network implemented in the same datacenter.
- the user-configured 64-bit prefix is randomly generated such that common prefixes generated for different tenants are highly unlikely to be the same.
- Exemplary IPv6 prefix 1331 is generated using the first 8 bits of the FC00: :/8 prefix followed by the 32 bits of the service IPv4 address 1310 and finally the port range prefix common to all the port numbers in the port range 1315 (i.e., FCC6:A820:0100::/46 ).
- IPv6 prefix 1332 is generated using the first 16 bits of the FD00: :/8 prefix followed by the 32 bits of the service IPv4 address 1310 and finally the port range prefix common to all the port numbers in the port range 1315 (i.e., FD00:C6A8:2001::/54).
- the IPv6 prefix 1333 is generated using the first 16 bits of the FC00: :/8 prefix followed by the user-configured 64-bit prefix 1320 followed by the 32 bits of the service IPv4 address 1310 and finally the port range prefix common to all the port numbers in the port range 1315 (i.e., FC00: ⁇ user-configured 64-bit prefix>:C6A8:2001::/118).
- FIG. 13 shows IPv6 destination addresses 1341-1343 for an exemplary received packet having header values 1302 corresponding to advertisedIPv6 prefixes 1331-1333.
- Exemplary IPv6 destination address 1341 is generated by a gateway device using the first 8 bits of the FC00::/8 prefix followed by the 32 bits of the destination IPv4 address 1350 and finally the destination port number 1355 (i.e., FCC6:A820:0100:0000:01:::).
- IPv6 destination address 1342 is generated using the first 16 bits of the FD00::/8 prefix followed by the 32 bits of the destination IPv4 address 1350 and finally the destination port number 1355 (i.e., FD00:C6A8:2001:0000:0001::).
- the IPv6 destination address 1343 is generated using the first 16 bits of the FC00::/8 prefix followed by the user-configured 64-bit prefix 1320 followed by the 32 bits of the destination IPv4 address 1350 and finally the destination port number 1355 (i.e., FC00:F462:5D1C:A451:2BD6:C6A8:2001::01:0000:0000).
- the BGP instance then advertises the provided IPv6 address prefix associated with the middlebox service instance to a gateway device as being available at the host computer.
- the advertisement includes an instruction to the gateway device to identify the IPv6 address based on an IPv4 address and port number of packets received at the gateway device and encapsulate the IPv4 packets with the identified IPv6 address.
- the advertised IPv6 address is (1) based on existing functions of a hardware gateway device for handling IPv6 encapsulation of IPv4 packets, or (2) based on a central controller cluster separately configuring the gateway device to perform the IPv6 encapsulation based on the IPv4 address and port number.
- the advertisement uses a border gateway protocol (BGP).
- BGP border gateway protocol
- other proprietary or non-proprietary (IS-IS, OSPF, FRR etc.) route advertisement protocols or methods are used that inform other routers of the availability of particular network addresses at the host computer.
- the advertisement in some embodiments, is made to a route server (or route reflector) that identifies the advertised IPv6 address as being available at the host computer to the gateway device as well as other forwarding elements of the internal network.
- the route server in some embodiments, also uses a BGP advertisement to identify the advertised IPv6 address as being available at the host computer and is used to simplify the exchange of routing information in the network by minimizing the number of peerings between different network elements necessary to propagate routing information in a full mesh configuration.
- BGP advertisement to identify the advertised IPv6 address as being available at the host computer and is used to simplify the exchange of routing information in the network by minimizing the number of peerings between different network elements necessary to propagate routing information in a full mesh configuration.
- BGP advertisement to identify the advertised IPv6 address as being available at the host computer and is used to simplify the exchange of routing information in the network by minimizing the number of peerings between different network elements necessary to propagate routing information in a full mesh configuration.
- BGP instances and BGP protocols is merely one example or a protocol for advertising routing information and is used here merely as an example.
- Process 1200 then continues to configure (at 1250) the other components (e.g., machines, MFEs, filters, containers, pods, etc.) executing on the host computer based on the received configuration data.
- the other components are configured to direct traffic to the middlebox service instance based on policies included in the configuration data identifying traffic destined for an external network.
- the order of configuring the components presented above is not the only possible order and that, in other embodiments, components are configured in parallel (e.g., simultaneously) or in a different order than the order presented above.
- Figure 14 conceptually illustrates a set of data exchanges between network elements to migrate a VM (e.g., a guest virtual machine (GVM)) in communication with an external machine using a dSNAT middlebox service.
- a controller computer 1440 that initiates the VM migration, a source host computer 1420a on which the VM originally executes, a destination host computer 1420b to which the VM is migrated, and a route server 1430 that is used by host computers as a central BGP server to disseminate routing information (e.g., IP address prefixes available at each host computer).
- a VM e.g., a guest virtual machine (GVM)
- GVM guest virtual machine
- the data exchange begins (at 1410) with the controller computer initiating a VM migration by sending configuration data to each of the source host computer 1420a and the destination host computer 1420b to identify the VM being migrated.
- the source host computer then identifies (at 1411) a set of ports for a set of middlebox services used by active connections of the migrated VM to inform the destination host computer 1420b of the migrated ports.
- the set of ports identified to the destination host computer 1420b includes NAT records associating the identified ports with the internal IPv4 address and port used by the migrated VM.
- the identified ports are put in a list of ports at the source host computer 1420a not to use until they are freed by the migrated VM (e.g., when the active connections using the identified ports end).
- the source host computer 1420a also adds the port numbers to a redirection table to redirect any packets received for that port number to the destination host computer 1420b.
- the redirection instruction specifies the specific communications destined to the migrated VM instead of redirecting all packets using a specific port number.
- the destination host computer Based on the identified port numbers, the destination host computer, in some embodiments, advertises (at 1412) a set of IPv6 address for the specific migrated port numbers (e.g., an IP address prefix that is FC00:IPv4 address:port::/64) that will be the longest matching prefix at the gateway device and supersede the existing prefix (e.g., a /54 prefix) originally advertised by the source host computer 1420a without requiring further advertisement by the source host computer 1420a.
- a set of IPv6 address for the specific migrated port numbers e.g., an IP address prefix that is FC00:IPv4 address:port::/64
- FC00:IPv4 address:port::/64 FC00:IPv4 address:port::/64
- the host computer to which the VM is migrated will not make the advertisement and will instead rely on the redirection at the host computer from which the VM was migrated.
- the destination host computer 1420b informs (at 1413) the source host computer 1420a that the port has been freed and can be used by the source host computer 1420a for new connections.
- the source host computer in some embodiments, then removes the freed port from the list of ports not to use.
- the destination host computer also advertises (at 1413) that the specific IPv6 address prefix (e.g., the /64 prefix) is no longer available at the destination host computer 1420b.
- the source host computer 1420a additionally advertises (at 1414) that the specific IPv6 address prefix (e.g., the /64 prefix) is available at the source host computer 1420a.
- the specific IPv6 address prefix e.g., the /64 prefix
- the source host computer 1420a omits advertising the IPv6 /64 address prefix associated with the freed port (at 1414) and relies on the IPv6 address prefix (e.g., a /54 prefix associated with the assigned range of port numbers) covering the specific IPv6 address to direct packets to the source host computer 1420a once the IPv6 /64 address is withdrawn by the destination host computer 1420b.
- Destination host computer 1420b in some embodiments sends information and advertises the unavailability related to a freed port for each freed port as a connection using the port ends.
- VM migration was used as an example but the above set of data exchanges could be used to migrate any similar compute node (e.g., container, pod, etc.).
- the term “software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor. Also, in some embodiments, multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions. In some embodiments, multiple software inventions can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software invention described here is within the scope of the invention. In some embodiments, the software programs, when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
- FIG. 15 conceptually illustrates a computer system 1500 with which some embodiments of the invention are implemented.
- the computer system 1500 can be used to implement any of the above-described hosts, controllers, and managers. As such, it can be used to execute any of the above described processes.
- This computer system includes various types of non-transitory machine readable media and interfaces for various other types of machine readable media.
- Computer system 1500 includes a bus 1505, processing unit(s) 1510, a system memory 1525, a read-only memory 1530, a permanent storage device 1535, input devices 1540, and output devices 1545.
- the bus 1505 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the computer system 1500.
- the bus 1505 communicatively connects the processing unit(s) 1510 with the read-only memory 1530, the system memory 1525, and the permanent storage device 1535.
- the processing unit(s) 1510 retrieve instructions to execute and data to process in order to execute the processes of the invention.
- the processing unit(s) may be a single processor or a multi-core processor in different embodiments.
- the read only-memory (ROM) 1530 stores static data and instructions that are needed by the processing unit(s) 1510 and other modules of the computer system.
- the permanent storage device 1535 is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the computer system 1500 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 1535.
- the system memory 1525 is a read-and-write memory device. However, unlike storage device 1535, the system memory is a volatile read-and-write memory, such a random access memory.
- the system memory stores some of the instructions and data that the processor needs at runtime.
- the invention’s processes are stored in the system memory 1525, the permanent storage device 1535, and/or the read-only memory 1530. From these various memory units, the processing unit(s) 1510 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.
- the bus 1505 also connects to the input and output devices 1540 and 1545.
- the input devices enable the user to communicate information and select commands to the computer system.
- the input devices 1540 include alphanumeric keyboards and pointing devices (also called “cursor control devices”).
- the output devices 1545 display images generated by the computer system.
- the output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as a touchscreen that function as both input and output devices.
- bus 1505 also couples computer system 1500 to a network 1565 through a network adapter (not shown).
- the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet, or a network of networks, such as the Internet. Any or all components of computer system 1500 may be used in conjunction with the invention.
- Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer- readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
- electronic components such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer- readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
- Such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra-density optical discs, any other optical or magnetic media, and floppy disks.
- RAM random access memory
- ROM read-only compact discs
- CD-R recordable compact discs
- CD-RW rewritable compact discs
- read-only digital versatile discs e.g., DVD-ROM, dual-layer DVD-ROM
- flash memory e.g., SD
- the computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations.
- Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
- ASICs application specific integrated circuits
- FPGAs field programmable gate arrays
- integrated circuits execute instructions that are stored on the circuit itself.
- memory all refer to electronic or other technological devices. These terms exclude people or groups of people.
- display or displaying means displaying on an electronic device.
- computer readable medium As used in this specification, the terms “computer readable medium,” “computer readable media,” and “machine readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral or transitory signals.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/931,196 US11616755B2 (en) | 2020-07-16 | 2020-07-16 | Facilitating distributed SNAT service |
US16/931,207 US11606294B2 (en) | 2020-07-16 | 2020-07-16 | Host computer configured to facilitate distributed SNAT service |
PCT/US2021/030371 WO2022015394A1 (en) | 2020-07-16 | 2021-05-01 | Facilitating distributed snat service |
Publications (1)
Publication Number | Publication Date |
---|---|
EP4078935A1 true EP4078935A1 (en) | 2022-10-26 |
Family
ID=76076480
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP21727683.1A Pending EP4078935A1 (en) | 2020-07-16 | 2021-05-01 | Facilitating distributed snat service |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP4078935A1 (en) |
CN (1) | CN116158064A (en) |
WO (1) | WO2022015394A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10742746B2 (en) | 2016-12-21 | 2020-08-11 | Nicira, Inc. | Bypassing a load balancer in a return path of network traffic |
US11616755B2 (en) | 2020-07-16 | 2023-03-28 | Vmware, Inc. | Facilitating distributed SNAT service |
US11606294B2 (en) | 2020-07-16 | 2023-03-14 | Vmware, Inc. | Host computer configured to facilitate distributed SNAT service |
US11902050B2 (en) | 2020-07-28 | 2024-02-13 | VMware LLC | Method for providing distributed gateway service at host computer |
US11451413B2 (en) | 2020-07-28 | 2022-09-20 | Vmware, Inc. | Method for advertising availability of distributed gateway service and machines at host computer |
-
2021
- 2021-05-01 CN CN202180061371.9A patent/CN116158064A/en active Pending
- 2021-05-01 WO PCT/US2021/030371 patent/WO2022015394A1/en unknown
- 2021-05-01 EP EP21727683.1A patent/EP4078935A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CN116158064A (en) | 2023-05-23 |
WO2022015394A1 (en) | 2022-01-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11616755B2 (en) | Facilitating distributed SNAT service | |
US11902050B2 (en) | Method for providing distributed gateway service at host computer | |
US11606294B2 (en) | Host computer configured to facilitate distributed SNAT service | |
US10911360B2 (en) | Anycast edge service gateways | |
US11451413B2 (en) | Method for advertising availability of distributed gateway service and machines at host computer | |
US12074731B2 (en) | Transitive routing in public cloud | |
AU2021349770B2 (en) | Flow processing offload using virtual port identifiers | |
US10491466B1 (en) | Intelligent use of peering in public cloud | |
WO2022015394A1 (en) | Facilitating distributed snat service | |
US20210136140A1 (en) | Using service containers to implement service chains | |
CN112039768B (en) | Intermediate logical interface in a virtual distributed routing environment | |
US11843547B2 (en) | Allocating additional bandwidth to resources in a datacenter through deployment of dedicated gateways | |
US20220038379A1 (en) | Route advertisement to support distributed gateway services architecture | |
US11159343B2 (en) | Configuring traffic optimization using distributed edge services | |
WO2022026012A1 (en) | Route advertisement to support distributed gateway services architecture | |
US11706191B2 (en) | Link local address assignment for interfaces of overlay distributed router |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20220718 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20230705 |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: VMWARE LLC |