EP4248627A1 - Methods for micro-segmentation in sd-wan for virtual networks - Google Patents

Methods for micro-segmentation in sd-wan for virtual networks

Info

Publication number
EP4248627A1
EP4248627A1 EP22701494.1A EP22701494A EP4248627A1 EP 4248627 A1 EP4248627 A1 EP 4248627A1 EP 22701494 A EP22701494 A EP 22701494A EP 4248627 A1 EP4248627 A1 EP 4248627A1
Authority
EP
European Patent Office
Prior art keywords
packet
machine
policies
segment
micro
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP22701494.1A
Other languages
German (de)
French (fr)
Inventor
Navaneeth Krishnan Ramaswamy
Vaibhav Kulkarni
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VMware LLC
Original Assignee
VMware LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US17/569,526 external-priority patent/US20220353190A1/en
Application filed by VMware LLC filed Critical VMware LLC
Publication of EP4248627A1 publication Critical patent/EP4248627A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/028Capturing of monitoring data by filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • H04L45/306Route determination based on the nature of the carried application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]

Definitions

  • VLANs virtual local area networks
  • L3 segments level 3 segments
  • VNIs virtual network identifiers
  • the traffic when the traffic is a generic overlay traffic (e.g., Geneve), it can be considered as only user datagram protocol (UDP) traffic, and additional information about the packet, such as application traffic type, is not inferred.
  • UDP user datagram protocol
  • application-based business policy level quality of service (QoS) and other optimizations cannot be leveraged, and default UDP policies are applied over Geneve overlay-based traffic, which may then be treated as bulk/transactional traffic with low QoS prioritization.
  • QoS business policy level quality of service
  • Some embodiments of the invention provide a novel method for micro segmenting traffic flows in a software-defined wide area network (SD-WAN) by mapping virtual network identifiers (VNIs), or groups of VNIs, to level 3 (L3) segments as defined by the SD-WAN.
  • a first edge forwarding node of a first multi-machine site in the SD-WAN receives a first packet of a packet flow originating from a second multi-machine site that is external to the SD-WAN and destined for a particular machine at the first multi-machine site.
  • the first edge forwarding node determines that the first packet includes a GENEVE overlay encapsulation, and uses deep packet inspection (DPI) on the first packet to identify contextual information about the first packet and the packet flow.
  • DPI deep packet inspection
  • the first edge forwarding node Based on the identified contextual information, the first edge forwarding node applies one or more policies to the first packet before forwarding the first packet to the particular machine.
  • the first edge forwarding node receives the first packet from a switch that tags packets with a particular VLAN (virtual local area network) tag, which gets mapped to a single segment on the first edge forwarding node.
  • the single VLAN segment encompasses a set of VNI-based micro-segments, which are not specified by the VLAN tag.
  • Each micro-segment in the set of micro-segments includes machines dedicated to one of a web server, a database server, and an application server.
  • the identified contextual information learned by the first edge forwarding node through DPI includes at least a VNI that identifies a particular micro-segment in the set of micro-segments, as well as an AppID for the packet flow.
  • the first edge forwarding node uses the identified VNI to forward the first packet to the correct micro-segment where the particular machine is located.
  • the one or more policies applied to the first packet include micro segment based application policies. These micro-segment based application policies, in some embodiments, are associated with VNIs that correspond to different micro-segments, such as the set of micro-segments on the first edge forwarding node. In some embodiments, the micro-segment based application policies are attached to respective L3 segments within the SD-WAN. Examples of micro-segment based application policies include quality of service (QoS) policies, firewall policies, business policies, other security policies (e.g., intrusion detection, intrusion prevention, etc.), middlebox policies (e.g., load balancing policies), and forwarding policies (e.g., gateway forwarding policies, etc.). The policies, in some embodiments, are user-defined (e.g., defined by a network administrator) and specific to each micro-segment.
  • QoS quality of service
  • the policies in some embodiments, are user-defined (e.g., defined by a network administrator) and
  • Figure 1 illustrates an example of a virtual network that is created for a particular entity using SD-WAN forwarding elements deployed at branch sites, datacenters, and public clouds, in some embodiments.
  • Figure 2 illustrates a more in-depth view of part of a virtual network created for a particular entity using SD-WAN forwarding elements deployed at branch sites, datacenters, and public clouds, in some embodiments.
  • Figure 3 illustrates a frame of a UDP packet having a Geneve encapsulation, in some embodiments.
  • Figure 4 illustrates a process performed by an edge node in some embodiments upon receipt of a packet with a Geneve overlay.
  • Figure 5 illustrates a more detailed view of an edge forwarding node, according to some embodiments.
  • FIG. 6 illustrates two example diagrams of how policies and services for the different micro-segments (VNIs) can be defined in some embodiments.
  • Figure 7 conceptually illustrates a computer system with which some embodiments of the invention are implemented.
  • Some embodiments of the invention provide a novel method for micro segmenting traffic flows in a software-defined wide area network (SD-WAN) by mapping virtual network identifiers (VNIs), or groups of VNIs, to level 3 (L3) segments as defined by the SD-WAN.
  • a first edge forwarding node of a first multi-machine site in the SD-WAN receives a first packet of a packet flow originating from a second multi-machine site that is external to the SD-WAN and destined for a particular machine at the first multi-machine site.
  • the first edge forwarding node determines that the first packet includes a GENEVE overlay encapsulation, and uses deep packet inspection (DPI) on the first packet to identify contextual information about the first packet and the packet flow.
  • DPI deep packet inspection
  • the first edge forwarding node Based on the identified contextual information, the first edge forwarding node applies one or more policies to the first packet before forwarding the first packet to the particular machine.
  • the first edge forwarding node receives the first packet from a switch that tags packets with a particular VLAN (virtual local area network) tag, which gets mapped to a single segment on the first edge forwarding node.
  • the single VLAN segment encompasses a set of VNI-based micro-segments, which are not specified by the VLAN tag.
  • Each micro-segment in the set of micro-segments includes machines dedicated to one of a web server, a database server, and an application server.
  • the identified contextual information learned by the first edge forwarding node through DPI includes at least a VNI that identifies a particular micro-segment in the set of micro-segments, as well as an AppID for the packet flow.
  • the first edge forwarding node uses the identified VNI to forward the first packet to the correct micro-segment where the particular machine is located.
  • the one or more policies applied to the first packet include micro segment based application policies. These micro-segment based application policies, in some embodiments, are associated with VNIs that correspond to different micro-segments, such as the set of micro-segments on the first edge forwarding node. In some embodiments, the micro-segment based application policies are attached to respective L3 segments within the SD-WAN. Examples of micro-segment based application policies include quality of service (QoS) policies, firewall policies, business policies, other security policies (e.g., intrusion detection, intrusion prevention, etc.), middlebox policies (e.g., load balancing policies), and forwarding policies (e.g., gateway forwarding policies, etc.). The policies, in some embodiments, are user-defined (e.g., defined by a network administrator) and specific to each micro-segment.
  • QoS quality of service
  • the policies in some embodiments, are user-defined (e.g., defined by a network administrator) and
  • Figure 1 illustrates an example of a virtual network 100 that is created for a particular entity using SD-WAN forwarding elements deployed at branch sites, datacenters, and public clouds.
  • public clouds are public clouds provided by Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, etc.
  • entities include a company (e.g., corporation, partnership, etc.), an organization (e.g., a school, a non-profit, a government entity, etc.), etc.
  • the SD-WAN forwarding elements include cloud gateway 105 and SD-WAN forwarding elements 130, 132, 134, 136.
  • the cloud gateway (CGW) in some embodiments is a forwarding element that is in a private or public datacenter 110.
  • the CGW 105 in some embodiments has secure connection links (e.g., tunnels) with edge forwarding elements (e.g., SD- WAN edge forwarding elements (FEs) 130, 132, 134, and 136) at the particular entity’s multi machine sites (e.g., SD-WAN edge sites 120, 122, 124, and 126), such as branch offices, datacenters, etc.
  • edge forwarding elements e.g., SD- WAN edge forwarding elements 130, 132, 134, and 136
  • multi machine sites e.g., SD-WAN edge sites 120, 122, 124, and 126
  • multi-machine sites are often at different physical locations (e.g., different buildings, different cities
  • Each branch site 120- 124 is shown to include an edge forwarding node 130- 134, while the datacenter site 126 is shown to include a hub forwarding node 136.
  • the datacenter SD-WAN forwarding node 136 is referred to as a hub node because in some embodiments this forwarding node can be used to connect to other edge forwarding nodes of the branch sites 120-124.
  • the hub node in some embodiments provides services (e.g., middlebox services) for packets that it forwards from one branch site to another branch site.
  • the hub node also provides access to the datacenter resources 156, as further described below.
  • Each edge forwarding element exchanges data messages with one or more cloud gateways 105 through one or more connection links 115 (e.g., multiple connection links available at the edge forwarding element).
  • connection links include secure and unsecure connection links, while in other embodiments they only include secure connection links.
  • multiple secure connection links e.g., multiple secure tunnels that are established over multiple physical links
  • each secure connection link in some embodiments is associated with a different physical network link between the edge node and an external network.
  • an edge node in some embodiments has one or more commercial broadband Internet links (e.g., a cable modem, a fiber optic link) to access the Internet, an MPLS (multiprotocol label switching) link to access external networks through an MPLS provider’s network, a wireless cellular link (e.g., a 5G LTE network), etc.
  • the different physical links between the edge node 134 and the cloud gateway 105 are the same type of links (e.g., are different MPLS links).
  • one edge forwarding node 130-134 can also have multiple direct links 115 (e.g., secure connection links established through multiple physical links) to another edge forwarding node 130-134, and/or to a datacenter hub node 136.
  • the different links in some embodiments can use different types of physical links or the same type of physical links.
  • a first edge forwarding node of a first branch site can connect to a second edge forwarding node of a second branch site (1) directly through one or more links 115, (2) through a cloud gateway or datacenter hub to which the first edge forwarding node connects through two or more links 115, or (3) through another edge forwarding node of another branch site that can augment its role to that of a hub forwarding node, as will be described in more detail below.
  • a first edge forwarding node (e.g., 134) of a first branch site can use multiple SD-WAN links 115 to reach a second edge forwarding node (e.g., 130) of a second branch site (e.g., 120), or a hub forwarding node 136 of a datacenter site 126.
  • the cloud gateway 105 in some embodiments is used to connect two SD-WAN forwarding nodes 130-136 through at least two secure connection links 115 between the gateway 105 and the two forwarding elements at the two SD-WAN sites (e.g., branch sites 120-124 or datacenter site 126).
  • the cloud gateway 105 also provides network data from one multi machine site to another multi-machine site (e.g., provides the accessible subnets of one site to another site).
  • the hub forwarding element 136 of the datacenter 126 in some embodiments can be used to connect two SD-WAN forwarding nodes 130-134 of two branch sites through at least two secure connection links 115 between the hub 136 and the two forwarding elements at the two branch sites 120-124.
  • each secure connection link between two SD-WAN forwarding nodes is formed as a VPN tunnel between the two forwarding nodes.
  • the collection of the SD-WAN forwarding nodes (e.g., forwarding elements 130-136 and gateways 105) and the secure connections 115 between the forwarding nodes forms the virtual network 100 for the particular entity that spans at least the public or private cloud datacenter 110 to connect the branch and datacenter sites 120-126.
  • secure connection links are defined between gateways in different public cloud datacenters to allow paths through the virtual network to traverse from one public cloud datacenter to another, while no such links are defined in other embodiments.
  • the gateway 105 is a multi -tenant gateway that is used to define other virtual networks for other entities (e.g., other companies, organizations, etc.). Some such embodiments use tenant identifiers to create tunnels between a gateway and edge forwarding element of a particular entity, and then use tunnel identifiers of the created tunnels to allow the gateway to differentiate data message flows that it receives from edge forwarding elements of one entity from data message flows that it receives along other tunnels of other entities.
  • gateways are single-tenant and are specifically deployed to be used by just one entity.
  • Figure 1 illustrates a cluster of controllers 140 that serve as a central point for managing (e.g., defining and modifying) configuration data that is provided to the edge nodes and/or gateways to configure some or all of the operations.
  • this controller cluster 140 is in one or more public cloud datacenters, while in other embodiments it is in one or more private datacenters.
  • the controller cluster 140 has a set of manager servers that define and modify the configuration data, and a set of controller servers that distribute the configuration data to the edge forwarding elements (FEs), hubs and/or gateways.
  • FEs edge forwarding elements
  • the controller cluster 140 directs edge forwarding elements and hubs to use certain gateways (i.e., assigns a gateway to the edge forwarding elements and hubs).
  • the controller cluster 140 also provides next hop forwarding rules and load balancing criteria in some embodiments.
  • the controller cluster 140 provides micro-segmentation policies to each of the sites 120-126, as illustrated by the policies 165 sent along the connection links 160.
  • Figure 2 illustrates a more in-depth view of part of a virtual network 200 created for a particular entity using SD-WAN forwarding elements deployed at branch sites, datacenters, and public clouds, in some embodiments.
  • This part of the virtual network 200 includes SD-WAN edge forwarding nodes 220 and 222 at the datacenter site 210, and edge forwarding node 224 at branch site 212.
  • the datacenter 210 also includes a switching element 205 that connects the edge forwarding node 224 at the branch site to the edge forwarding nodes 220 and 222 at the datacenter site.
  • the datacenter 210 also includes an application server 240 and a video server 242.
  • the application server 240 includes three micro-segments (e.g., web, application, and database) on a forwarding element 250.
  • Each micro-segment includes a set of VMs 260a, 260b, and 260c, respectively, which each have a corresponding VNI (e.g., 10001, 20002, and 30003).
  • the video server 242 also includes three micro-segments (e.g., web, application, and database) on a forwarding element 252.
  • Each micro-segment includes a respective set of VMs 262a, 262b, and 262c, which also each have a corresponding VNI (e.g., 10001, 20002, and 30003) matching their counterparts on the application server 240.
  • VNI e.g. 10001, 20002, and 30003
  • the branch site 212 includes a forwarding element 254 to which a first pair of VMs 264a belonging to VNI 10001 connect, and to which a second pair of VMs 264b belonging to VNI 20002 connect.
  • the branch site 212 connects to the datacenter 210 through the tunnel 274 between the edge forwarding node 224 and switching element 205.
  • the tunnel 274 is a dynamic multipath optimization (DMPO) tunnel that uses real-time performance metrics of WAN links in order to deliver a resilient overlay network to connect different sites in the SD-WAN.
  • DMPO dynamic multipath optimization
  • a particular tunneling mechanism is provided, such as a Geneve overlay, which creates layer 2 (L2) logical networks encapsulated in user datagram protocol (UDP) packets.
  • forwarding elements such as the switching element 205 do not parse packets deep enough to extract the addition contextual information of a packet having a Geneve overlay encapsulation before forwarding the packet toward its final destination.
  • Figure 3 illustrates a frame of a UDP packet having a Geneve encapsulation, in some embodiments.
  • the switching element when a UDP packet is received by a switching element (e.g., 205), the switching element will parse the packet and stop once it reaches row 310 which indicates the packet is a UDP packet. As a result, the switching element tags the packet with a VLAN tag that maps to a single segment on an edge node to which the packet is destined, and forwards the packet to the edge node for delivery to its final destination, according to some embodiments.
  • the edge node When the packet reaches the edge node, the edge node performs DPI on the packet to identify the additional contextual information not provided by the switching element. For example, through DPI, the edge node can identify the particular micro-segment to which the packet is destined, and determine the traffic type of the packet in order to apply any applicable policies to the packet based on the traffic type.
  • the row 320 (outlined for emphasis) indicates that the packet is a Geneve overlay packet and is destined to a micro-segment associated with the VNI 0x00078b. It should be noted that in some embodiments, more than one VNI can be mapped to a single segment.
  • the last row 330 of the packet frame 300 indicates the packet should be classified as ICMP traffic. Without this pertinent contextual information, the edge node in some embodiments would not be able to apply appropriate policies to the packet and would not be able to correctly forward the packet to its destination.
  • the dashed lines 280 and 282 represent packet flows from the branch site 212 to the datacenter 210.
  • the packets may end up at VMs belonging to different micro segments than what was intended for the packet as the switching element views the micro segments on each edge node as a single segment.
  • the edge node may direct the packet to the VM 260c in the third micro-segment, in some embodiments.
  • FIG. 4 illustrates a process 400 performed by an edge node in some embodiments upon receipt of a packet with a Geneve overlay.
  • the process 400 will be described with reference to Figure 2 and Figure 5, which illustrates a more detailed view of an edge forwarding node 500, according to some embodiments.
  • the process 400 starts, at 405, when the edge node receives a packet of a packet flow.
  • the edge forwarding node 220 can receive a packet from the switching element 205 via the tunnel 270.
  • the edge node uses, at 410, DPI on the packet to identify contextual information including the VNI associated with the packet and the AppID (i.e., traffic type) of the packet.
  • the AppID i.e., traffic type
  • the packet processor 510 can provide the packet to the DPI engine 520 to identify contextual information of the packet. Once the additional contextual information is identified, the edge node determines, at 415, whether any policies are applicable to the identified VNI and/or AppID. In the edge node 500, for example, after the DPI engine 520 identifies the contextual information, the information is provided to the traffic classifier 530 to determine the traffic type based on the identified AppID. The traffic classifier 530 then provides the information to the policy enforcer 540, which uses the traffic classification and the VNI of the packet to determine whether any policies from the policy storage 550 should be applied to the packet.
  • the process transitions to 425 to forward the packet to the micro-segment to which the destination machine of the packet belongs. Otherwise, when the edge node determines, at 415, that there are applicable policies for the packet based on the VNI and/or traffic classification, the process transitions to 420 to apply the applicable policies to the packet. The edge node then forwards, at 425, the packet to the micro-segment to which the destination machine of the packet belongs.
  • the policy enforcer 540 when the policy enforcer 540 identifies one or more applicable policies from the policy storage 550, the policy enforcer then applies the policies to the packet and provides the packet back to the packet processor 510. The packet processor then forwards the processed packet to its destination.
  • the edge node determines, at 430, whether there are additional packets to process. If there are no additional packets to process, the process ends. Otherwise, when the edge node determines that there are additional packets, the process transitions back to 405 to continue to receive packets.
  • policies and services are defined for particular traffic classes (i.e., real-time, transactional, and bulk traffic), as well as on a per- VNI basis.
  • the per- VNI policies and services include business policies, firewall policies, etc.
  • VNI group-based policies and services can also be defined.
  • the controller cluster in some embodiments provides these policies to the edge nodes for application and enforcement.
  • the policies are defined by a user (e.g., network administrator) through a manager, which passes the policies to controller for distribution.
  • FIG. 6 illustrates two example diagrams 600a and 600b of how policies and services for the different micro-segments (VNIs) can be defined in some embodiments.
  • VNIs micro-segments
  • the edge node uses DPI on the packet to identify additional contextual information for the packet, such as VNI and traffic type, and uses that information to identify and apply any applicable policies and/or services.
  • the support VNI 620 receives traffic from application 1, the traffic is treated as high/transactional traffic. Conversely, the same traffic is treated as low/bulk traffic when received at the finance VNI 622, and realtime/high traffic when it’s received at the engineering VNI 624. Similarly, traffic from application 2 is treated as realtime/high traffic when destined to the support VNI 620, high/transaction traffic when destined for finance VNI 622, and low/bulk traffic when destined for the engineering VNI 624. In some embodiments, traffic from a particular application may be treated the same by each of the VNIs. [0050] In the second diagram 600b, a different firewall policy is defined for each of the different VNIs.
  • firewall policies For the support VNI 620, Apache Hadoop traffic is only allowed for the subnet “192.168.100.0/24”. On the finance VNI 622, all UDP traffic destined for the subnet “192.168.11.0/24”. Lastly, all torrent traffic is blocked on the engineering VNI 624 for all subnets. While these are just a few examples of firewall policies that can be defined for each micro segment, additional, fewer, or other policies may be defined for each of the micro-segments in some embodiments.
  • the term “software” is meant to include firmware residing in read only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor. Also, in some embodiments, multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions. In some embodiments, multiple software inventions can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software invention described here is within the scope of the invention. In some embodiments, the software programs, when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
  • FIG. 7 conceptually illustrates a computer system 700 with which some embodiments of the invention are implemented.
  • the computer system 700 can be used to implement any of the above-described hosts, controllers, gateway and edge forwarding elements. As such, it can be used to execute any of the above described processes.
  • This computer system includes various types of non-transitory machine readable media and interfaces for various other types of machine readable media.
  • Computer system 700 includes a bus 705, processing unit(s) 710, a system memory 725, a read-only memory 730, a permanent storage device 735, input devices 740, and output devices 745.
  • the bus 705 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the computer system 700.
  • the bus 705 communicatively connects the processing unit(s) 710 with the read-only memory 730, the system memory 725, and the permanent storage device 735.
  • the processing unit(s) 710 retrieve instructions to execute and data to process in order to execute the processes of the invention.
  • the processing unit(s) may be a single processor or a multi-core processor in different embodiments.
  • the read only-memory (ROM) 730 stores static data and instructions that are needed by the processing unit(s) 710 and other modules of the computer system.
  • the permanent storage device 735 is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the computer system 700 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 735.
  • the system memory 725 is a read-and-write memory device. However, unlike storage device 735, the system memory is a volatile read-and-write memory, such as random access memory.
  • the system memory stores some of the instructions and data that the processor needs at runtime.
  • the invention’s processes are stored in the system memory 725, the permanent storage device 735, and/or the read-only memory 730. From these various memory units, the processing unit(s) 710 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.
  • the bus 705 also connects to the input and output devices 740 and 745.
  • the input devices enable the user to communicate information and select commands to the computer system.
  • the input devices 740 include alphanumeric keyboards and pointing devices (also called “cursor control devices”).
  • the output devices 745 display images generated by the computer system.
  • the output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as touchscreens that function as both input and output devices.
  • bus 705 also couples computer system 700 to a network 765 through a network adapter (not shown).
  • the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet), or a network of networks (such as the Internet). Any or all components of computer system 700 may be used in conjunction with the invention.
  • Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
  • electronic components such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
  • Such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD- ROM), a variety of recordable/rewritable DVDs (e g., DVD-RAM, DVD-RW, DVD+RW, etc ), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra-density optical discs, any other optical or magnetic media, and floppy disks.
  • RAM random access memory
  • ROM read-only compact discs
  • CD-R recordable compact discs
  • CD-RW rewritable compact discs
  • read-only digital versatile discs e.g., DVD-ROM, dual-layer DVD- ROM
  • flash memory e.g.
  • the computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations.
  • Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
  • processors that execute software
  • some embodiments are performed by one or more integrated circuits, such as application specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs).
  • ASICs application specific integrated circuits
  • FPGAs field programmable gate arrays
  • such integrated circuits execute instructions that are stored on the circuit itself.
  • computer “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people.
  • display or “displaying” mean displaying on an electronic device.
  • computer readable medium As used in this specification, the terms “computer readable medium,” “computer readable media,” and “machine readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral or transitory signals.
  • gateways in public cloud datacenters.
  • the gateways are deployed in a third party’s virtual private cloud datacenters (e.g., datacenters that the third party uses to deploy cloud gateways for different entities in order to deploy virtual networks for these entities).
  • virtual private cloud datacenters e.g., datacenters that the third party uses to deploy cloud gateways for different entities in order to deploy virtual networks for these entities.

Abstract

Some embodiments of the invention provide a method for micro-segmenting traffic flows in a software defined wide area network (SD-WAN). At a first edge forwarding node of a first multi-machine site in the SD-WAN, the method receives, from a particular forwarding element, a first packet of a packet flow originating from a second multi-machine site that is external to the SD-WAN, the packet flow destined for a particular machine at the first multi-machine site. The method uses deep packet inspection (DPI) on the first packet to identify contextual information not provided by the particular forwarding element about the first packet and the packet flow. Based on the identified contextual information, the method applies one or more policies to the first packet before forwarding the first packet to the particular machine.

Description

METHODS FOR MICRO-SEGMENTATION IN SD-WAN FOR
VIRTUAL NETWORKS
Navaneethkrishnan Ramaswamy and Vaibhav Kulkarni
BACKGROUD
[0001] Today, virtual local area networks (VLANs) and related interfaces are used to map against level 3 (L3) segments, and the traffic that ingress through them derive respective L3 segment identifiers inside of the SD-WAN overlay. As a result, once the overlay packets ingress to the edge node, they are mapped to a single segment and the corresponding segment-specific policy is applied over the packets despite there being three application types (i.e., virtual network identifiers (VNIs)) spread across three service classes of traffic (i.e., real-time, transactional, and bulk traffic). Moreover, when the traffic is a generic overlay traffic (e.g., Geneve), it can be considered as only user datagram protocol (UDP) traffic, and additional information about the packet, such as application traffic type, is not inferred. In turn, application-based business policy level quality of service (QoS) and other optimizations cannot be leveraged, and default UDP policies are applied over Geneve overlay-based traffic, which may then be treated as bulk/transactional traffic with low QoS prioritization.
BRIEF SUMMARY
[0003] Some embodiments of the invention provide a novel method for micro segmenting traffic flows in a software-defined wide area network (SD-WAN) by mapping virtual network identifiers (VNIs), or groups of VNIs, to level 3 (L3) segments as defined by the SD-WAN. A first edge forwarding node of a first multi-machine site in the SD-WAN receives a first packet of a packet flow originating from a second multi-machine site that is external to the SD-WAN and destined for a particular machine at the first multi-machine site. The first edge forwarding node determines that the first packet includes a GENEVE overlay encapsulation, and uses deep packet inspection (DPI) on the first packet to identify contextual information about the first packet and the packet flow. Based on the identified contextual information, the first edge forwarding node applies one or more policies to the first packet before forwarding the first packet to the particular machine. [0004] In some embodiments, the first edge forwarding node receives the first packet from a switch that tags packets with a particular VLAN (virtual local area network) tag, which gets mapped to a single segment on the first edge forwarding node. In some embodiments, the single VLAN segment encompasses a set of VNI-based micro-segments, which are not specified by the VLAN tag. Each micro-segment in the set of micro-segments in some embodiments includes machines dedicated to one of a web server, a database server, and an application server.
[0005] While the VLAN tag does not specify the particular micro-segment to which the particular destination machine belongs, the identified contextual information learned by the first edge forwarding node through DPI, in some embodiments, includes at least a VNI that identifies a particular micro-segment in the set of micro-segments, as well as an AppID for the packet flow. Thus, the first edge forwarding node in some embodiments uses the identified VNI to forward the first packet to the correct micro-segment where the particular machine is located.
[0006] In some embodiments, the one or more policies applied to the first packet include micro segment based application policies. These micro-segment based application policies, in some embodiments, are associated with VNIs that correspond to different micro-segments, such as the set of micro-segments on the first edge forwarding node. In some embodiments, the micro-segment based application policies are attached to respective L3 segments within the SD-WAN. Examples of micro-segment based application policies include quality of service (QoS) policies, firewall policies, business policies, other security policies (e.g., intrusion detection, intrusion prevention, etc.), middlebox policies (e.g., load balancing policies), and forwarding policies (e.g., gateway forwarding policies, etc.). The policies, in some embodiments, are user-defined (e.g., defined by a network administrator) and specific to each micro-segment.
[0007] The preceding Summary is intended to serve as a brief introduction to some embodiments of the invention. It is not meant to be an introduction or overview of all inventive subject matter disclosed in this document. The Detailed Description that follows and the Drawings that are referred to in the Detailed Description will further describe the embodiments described in the Summary as well as other embodiments. Accordingly, to understand all the embodiments described by this document, a full review of the Summary, the Detailed Description, the Drawings, and the Claims is needed. Moreover, the claimed subject matters are not to be limited by the illustrative details in the Summary, the Detailed Description, and the Drawings.
BRIEF DESCRIPTION OF FIGURES
[0009] The novel features of the invention are set forth in the appended claims. However, for purposes of explanation, several embodiments of the invention are set forth in the following figures.
[0010] Figure 1 illustrates an example of a virtual network that is created for a particular entity using SD-WAN forwarding elements deployed at branch sites, datacenters, and public clouds, in some embodiments.
[0011] Figure 2 illustrates a more in-depth view of part of a virtual network created for a particular entity using SD-WAN forwarding elements deployed at branch sites, datacenters, and public clouds, in some embodiments.
[0012] Figure 3 illustrates a frame of a UDP packet having a Geneve encapsulation, in some embodiments.
[0013] Figure 4 illustrates a process performed by an edge node in some embodiments upon receipt of a packet with a Geneve overlay.
[0014] Figure 5 illustrates a more detailed view of an edge forwarding node, according to some embodiments.
[0015] Figure 6 illustrates two example diagrams of how policies and services for the different micro-segments (VNIs) can be defined in some embodiments.
[0016] Figure 7 conceptually illustrates a computer system with which some embodiments of the invention are implemented.
DETAILED DESCRIPTION
[0018] In the following detailed description of the invention, numerous details, examples, and embodiments of the invention are set forth and described. However, it will be clear and apparent to one skilled in the art that the invention is not limited to the embodiments set forth and that the invention may be practiced without some of the specific details and examples discussed.
[0019] Some embodiments of the invention provide a novel method for micro segmenting traffic flows in a software-defined wide area network (SD-WAN) by mapping virtual network identifiers (VNIs), or groups of VNIs, to level 3 (L3) segments as defined by the SD-WAN. A first edge forwarding node of a first multi-machine site in the SD-WAN receives a first packet of a packet flow originating from a second multi-machine site that is external to the SD-WAN and destined for a particular machine at the first multi-machine site. The first edge forwarding node determines that the first packet includes a GENEVE overlay encapsulation, and uses deep packet inspection (DPI) on the first packet to identify contextual information about the first packet and the packet flow. Based on the identified contextual information, the first edge forwarding node applies one or more policies to the first packet before forwarding the first packet to the particular machine. [0020] In some embodiments, the first edge forwarding node receives the first packet from a switch that tags packets with a particular VLAN (virtual local area network) tag, which gets mapped to a single segment on the first edge forwarding node. In some embodiments, the single VLAN segment encompasses a set of VNI-based micro-segments, which are not specified by the VLAN tag. Each micro-segment in the set of micro-segments in some embodiments includes machines dedicated to one of a web server, a database server, and an application server.
[0021] While the VLAN tag does not specify the particular micro-segment to which the destination particular machine belongs, the identified contextual information learned by the first edge forwarding node through DPI, in some embodiments, includes at least a VNI that identifies a particular micro-segment in the set of micro-segments, as well as an AppID for the packet flow. Thus, the first edge forwarding node in some embodiments uses the identified VNI to forward the first packet to the correct micro-segment where the particular machine is located.
[0022] In some embodiments, the one or more policies applied to the first packet include micro segment based application policies. These micro-segment based application policies, in some embodiments, are associated with VNIs that correspond to different micro-segments, such as the set of micro-segments on the first edge forwarding node. In some embodiments, the micro-segment based application policies are attached to respective L3 segments within the SD-WAN. Examples of micro-segment based application policies include quality of service (QoS) policies, firewall policies, business policies, other security policies (e.g., intrusion detection, intrusion prevention, etc.), middlebox policies (e.g., load balancing policies), and forwarding policies (e.g., gateway forwarding policies, etc.). The policies, in some embodiments, are user-defined (e.g., defined by a network administrator) and specific to each micro-segment.
[0023] Figure 1 illustrates an example of a virtual network 100 that is created for a particular entity using SD-WAN forwarding elements deployed at branch sites, datacenters, and public clouds. Examples of public clouds are public clouds provided by Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, etc., while examples of entities include a company (e.g., corporation, partnership, etc.), an organization (e.g., a school, a non-profit, a government entity, etc.), etc.
[0024] In Figure 1, the SD-WAN forwarding elements include cloud gateway 105 and SD-WAN forwarding elements 130, 132, 134, 136. The cloud gateway (CGW) in some embodiments is a forwarding element that is in a private or public datacenter 110. The CGW 105 in some embodiments has secure connection links (e.g., tunnels) with edge forwarding elements (e.g., SD- WAN edge forwarding elements (FEs) 130, 132, 134, and 136) at the particular entity’s multi machine sites (e.g., SD-WAN edge sites 120, 122, 124, and 126), such as branch offices, datacenters, etc. These multi-machine sites are often at different physical locations (e.g., different buildings, different cities, different states, etc.) and are referred to below as multi-machine sites or nodes.
[0025] Four multi-machine sites 120- 126 are illustrated in Figure 1, with three of them being branch sites 120- 124, and one being a datacenter 126. Each branch site is shown to include an edge forwarding node 130- 134, while the datacenter site 126 is shown to include a hub forwarding node 136. The datacenter SD-WAN forwarding node 136 is referred to as a hub node because in some embodiments this forwarding node can be used to connect to other edge forwarding nodes of the branch sites 120-124. The hub node in some embodiments provides services (e.g., middlebox services) for packets that it forwards from one branch site to another branch site. The hub node also provides access to the datacenter resources 156, as further described below.
[0026] Each edge forwarding element (e.g., SD-WAN edge FEs 130-134) exchanges data messages with one or more cloud gateways 105 through one or more connection links 115 (e.g., multiple connection links available at the edge forwarding element). In some embodiments, these connection links include secure and unsecure connection links, while in other embodiments they only include secure connection links. As shown by edge node 134 and gateway 105, multiple secure connection links (e.g., multiple secure tunnels that are established over multiple physical links) can be established between one edge node and a gateway.
[0027] When multiple such links are defined between an edge node and a gateway, each secure connection link in some embodiments is associated with a different physical network link between the edge node and an external network. For instance, to access external networks, an edge node in some embodiments has one or more commercial broadband Internet links (e.g., a cable modem, a fiber optic link) to access the Internet, an MPLS (multiprotocol label switching) link to access external networks through an MPLS provider’s network, a wireless cellular link (e.g., a 5G LTE network), etc. In some embodiments, the different physical links between the edge node 134 and the cloud gateway 105 are the same type of links (e.g., are different MPLS links).
[0028] In some embodiments, one edge forwarding node 130-134 can also have multiple direct links 115 (e.g., secure connection links established through multiple physical links) to another edge forwarding node 130-134, and/or to a datacenter hub node 136. Again, the different links in some embodiments can use different types of physical links or the same type of physical links. Also, in some embodiments, a first edge forwarding node of a first branch site can connect to a second edge forwarding node of a second branch site (1) directly through one or more links 115, (2) through a cloud gateway or datacenter hub to which the first edge forwarding node connects through two or more links 115, or (3) through another edge forwarding node of another branch site that can augment its role to that of a hub forwarding node, as will be described in more detail below. Hence, in some embodiments, a first edge forwarding node (e.g., 134) of a first branch site (e.g., 124) can use multiple SD-WAN links 115 to reach a second edge forwarding node (e.g., 130) of a second branch site (e.g., 120), or a hub forwarding node 136 of a datacenter site 126.
[0029] The cloud gateway 105 in some embodiments is used to connect two SD-WAN forwarding nodes 130-136 through at least two secure connection links 115 between the gateway 105 and the two forwarding elements at the two SD-WAN sites (e.g., branch sites 120-124 or datacenter site 126). In some embodiments, the cloud gateway 105 also provides network data from one multi machine site to another multi-machine site (e.g., provides the accessible subnets of one site to another site). Like the cloud gateway 105, the hub forwarding element 136 of the datacenter 126 in some embodiments can be used to connect two SD-WAN forwarding nodes 130-134 of two branch sites through at least two secure connection links 115 between the hub 136 and the two forwarding elements at the two branch sites 120-124.
[0030] In some embodiments, each secure connection link between two SD-WAN forwarding nodes (i.e., CGW 105 and edge forwarding nodes 130-136) is formed as a VPN tunnel between the two forwarding nodes. In this example, the collection of the SD-WAN forwarding nodes (e.g., forwarding elements 130-136 and gateways 105) and the secure connections 115 between the forwarding nodes forms the virtual network 100 for the particular entity that spans at least the public or private cloud datacenter 110 to connect the branch and datacenter sites 120-126.
[0031] In some embodiments, secure connection links are defined between gateways in different public cloud datacenters to allow paths through the virtual network to traverse from one public cloud datacenter to another, while no such links are defined in other embodiments. Also, in some embodiments, the gateway 105 is a multi -tenant gateway that is used to define other virtual networks for other entities (e.g., other companies, organizations, etc.). Some such embodiments use tenant identifiers to create tunnels between a gateway and edge forwarding element of a particular entity, and then use tunnel identifiers of the created tunnels to allow the gateway to differentiate data message flows that it receives from edge forwarding elements of one entity from data message flows that it receives along other tunnels of other entities. In other embodiments, gateways are single-tenant and are specifically deployed to be used by just one entity.
[0032] Figure 1 illustrates a cluster of controllers 140 that serve as a central point for managing (e.g., defining and modifying) configuration data that is provided to the edge nodes and/or gateways to configure some or all of the operations. In some embodiments, this controller cluster 140 is in one or more public cloud datacenters, while in other embodiments it is in one or more private datacenters. In some embodiments, the controller cluster 140 has a set of manager servers that define and modify the configuration data, and a set of controller servers that distribute the configuration data to the edge forwarding elements (FEs), hubs and/or gateways. In some embodiments, the controller cluster 140 directs edge forwarding elements and hubs to use certain gateways (i.e., assigns a gateway to the edge forwarding elements and hubs). The controller cluster 140 also provides next hop forwarding rules and load balancing criteria in some embodiments. Also in some embodiments, the controller cluster 140 provides micro-segmentation policies to each of the sites 120-126, as illustrated by the policies 165 sent along the connection links 160. [0033] Figure 2 illustrates a more in-depth view of part of a virtual network 200 created for a particular entity using SD-WAN forwarding elements deployed at branch sites, datacenters, and public clouds, in some embodiments. This part of the virtual network 200 includes SD-WAN edge forwarding nodes 220 and 222 at the datacenter site 210, and edge forwarding node 224 at branch site 212. The datacenter 210 also includes a switching element 205 that connects the edge forwarding node 224 at the branch site to the edge forwarding nodes 220 and 222 at the datacenter site.
[0034] In addition to the edge forwarding nodes 220-222 and the switching element 205, the datacenter 210 also includes an application server 240 and a video server 242. The application server 240 includes three micro-segments (e.g., web, application, and database) on a forwarding element 250. Each micro-segment includes a set of VMs 260a, 260b, and 260c, respectively, which each have a corresponding VNI (e.g., 10001, 20002, and 30003). Similarly, the video server 242 also includes three micro-segments (e.g., web, application, and database) on a forwarding element 252. Each micro-segment includes a respective set of VMs 262a, 262b, and 262c, which also each have a corresponding VNI (e.g., 10001, 20002, and 30003) matching their counterparts on the application server 240.
[0035] Similarly, the branch site 212 includes a forwarding element 254 to which a first pair of VMs 264a belonging to VNI 10001 connect, and to which a second pair of VMs 264b belonging to VNI 20002 connect. The branch site 212 connects to the datacenter 210 through the tunnel 274 between the edge forwarding node 224 and switching element 205. In some embodiments, the tunnel 274 is a dynamic multipath optimization (DMPO) tunnel that uses real-time performance metrics of WAN links in order to deliver a resilient overlay network to connect different sites in the SD-WAN.
[0036] In some embodiments, in order to allow multiple isolated layer 2 (L2) networks on a single layer 3 (L3) segment, such as the micro-segments in the datacenter 210, a particular tunneling mechanism is provided, such as a Geneve overlay, which creates layer 2 (L2) logical networks encapsulated in user datagram protocol (UDP) packets. In some such embodiments, forwarding elements, such as the switching element 205 do not parse packets deep enough to extract the addition contextual information of a packet having a Geneve overlay encapsulation before forwarding the packet toward its final destination. [0037] For example, Figure 3 illustrates a frame of a UDP packet having a Geneve encapsulation, in some embodiments. In some embodiments, when a UDP packet is received by a switching element (e.g., 205), the switching element will parse the packet and stop once it reaches row 310 which indicates the packet is a UDP packet. As a result, the switching element tags the packet with a VLAN tag that maps to a single segment on an edge node to which the packet is destined, and forwards the packet to the edge node for delivery to its final destination, according to some embodiments.
[0038] When the packet reaches the edge node, the edge node performs DPI on the packet to identify the additional contextual information not provided by the switching element. For example, through DPI, the edge node can identify the particular micro-segment to which the packet is destined, and determine the traffic type of the packet in order to apply any applicable policies to the packet based on the traffic type. In this example packet frame 300, the row 320 (outlined for emphasis) indicates that the packet is a Geneve overlay packet and is destined to a micro-segment associated with the VNI 0x00078b. It should be noted that in some embodiments, more than one VNI can be mapped to a single segment.
[0039] Additionally, the last row 330 of the packet frame 300 indicates the packet should be classified as ICMP traffic. Without this pertinent contextual information, the edge node in some embodiments would not be able to apply appropriate policies to the packet and would not be able to correctly forward the packet to its destination.
[0040] For example, the dashed lines 280 and 282 represent packet flows from the branch site 212 to the datacenter 210. In some embodiments, without the edge nodes performing DPI to identify the additional contextual information, the packets may end up at VMs belonging to different micro segments than what was intended for the packet as the switching element views the micro segments on each edge node as a single segment. For example, rather than path 280 terminating at the third VM in the group 260a, the edge node may direct the packet to the VM 260c in the third micro-segment, in some embodiments.
[0041] Figure 4 illustrates a process 400 performed by an edge node in some embodiments upon receipt of a packet with a Geneve overlay. The process 400 will be described with reference to Figure 2 and Figure 5, which illustrates a more detailed view of an edge forwarding node 500, according to some embodiments. [0042] The process 400 starts, at 405, when the edge node receives a packet of a packet flow. For example, in the virtual network 200 the edge forwarding node 220 can receive a packet from the switching element 205 via the tunnel 270. Next, the edge node uses, at 410, DPI on the packet to identify contextual information including the VNI associated with the packet and the AppID (i.e., traffic type) of the packet.
[0043] In the example edge node 500, once a packet is received, the packet processor 510 can provide the packet to the DPI engine 520 to identify contextual information of the packet. Once the additional contextual information is identified, the edge node determines, at 415, whether any policies are applicable to the identified VNI and/or AppID. In the edge node 500, for example, after the DPI engine 520 identifies the contextual information, the information is provided to the traffic classifier 530 to determine the traffic type based on the identified AppID. The traffic classifier 530 then provides the information to the policy enforcer 540, which uses the traffic classification and the VNI of the packet to determine whether any policies from the policy storage 550 should be applied to the packet.
[0044] When the edge node determines, at 415, that there are no applicable policies for the packet, the process transitions to 425 to forward the packet to the micro-segment to which the destination machine of the packet belongs. Otherwise, when the edge node determines, at 415, that there are applicable policies for the packet based on the VNI and/or traffic classification, the process transitions to 420 to apply the applicable policies to the packet. The edge node then forwards, at 425, the packet to the micro-segment to which the destination machine of the packet belongs. [0045] In the edge node 500, for example, when the policy enforcer 540 identifies one or more applicable policies from the policy storage 550, the policy enforcer then applies the policies to the packet and provides the packet back to the packet processor 510. The packet processor then forwards the processed packet to its destination.
[0046] After the packet has been forwarded at 425, the edge node determines, at 430, whether there are additional packets to process. If there are no additional packets to process, the process ends. Otherwise, when the edge node determines that there are additional packets, the process transitions back to 405 to continue to receive packets.
[0047] In some embodiments, policies and services are defined for particular traffic classes (i.e., real-time, transactional, and bulk traffic), as well as on a per- VNI basis. The per- VNI policies and services, in some embodiments, include business policies, firewall policies, etc. In some embodiments, VNI group-based policies and services can also be defined. As illustrated in the virtual network 100, the controller cluster in some embodiments provides these policies to the edge nodes for application and enforcement. In some embodiments, the policies are defined by a user (e.g., network administrator) through a manager, which passes the policies to controller for distribution.
[0048] Figure 6 illustrates two example diagrams 600a and 600b of how policies and services for the different micro-segments (VNIs) can be defined in some embodiments. When packets are sent to any of the VNIs 620, 622, and 624, the packets hit the single VDI segment due to VLAN-level mappings in the SD-WAN. As described for the figures above, when packets destined for any of the VNIs on the single segment are received at the edge node, the edge node uses DPI on the packet to identify additional contextual information for the packet, such as VNI and traffic type, and uses that information to identify and apply any applicable policies and/or services.
[0049] For example, in the first diagram 600a, when the support VNI 620 receives traffic from application 1, the traffic is treated as high/transactional traffic. Conversely, the same traffic is treated as low/bulk traffic when received at the finance VNI 622, and realtime/high traffic when it’s received at the engineering VNI 624. Similarly, traffic from application 2 is treated as realtime/high traffic when destined to the support VNI 620, high/transaction traffic when destined for finance VNI 622, and low/bulk traffic when destined for the engineering VNI 624. In some embodiments, traffic from a particular application may be treated the same by each of the VNIs. [0050] In the second diagram 600b, a different firewall policy is defined for each of the different VNIs. For the support VNI 620, Apache Hadoop traffic is only allowed for the subnet “192.168.100.0/24”. On the finance VNI 622, all UDP traffic destined for the subnet “192.168.11.0/24”. Lastly, all torrent traffic is blocked on the engineering VNI 624 for all subnets. While these are just a few examples of firewall policies that can be defined for each micro segment, additional, fewer, or other policies may be defined for each of the micro-segments in some embodiments.
[0051] Many of the above-described features and applications are implemented as software processes that are specified as a set of instructions recorded on a computer readable storage medium (also referred to as computer readable medium). When these instructions are executed by one or more processing unit(s) (e.g., one or more processors, cores of processors, or other processing units), they cause the processing unit(s) to perform the actions indicated in the instructions. Examples of computer readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc. The computer readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.
[0052] In this specification, the term “software” is meant to include firmware residing in read only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor. Also, in some embodiments, multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions. In some embodiments, multiple software inventions can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software invention described here is within the scope of the invention. In some embodiments, the software programs, when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
[0053] Figure 7 conceptually illustrates a computer system 700 with which some embodiments of the invention are implemented. The computer system 700 can be used to implement any of the above-described hosts, controllers, gateway and edge forwarding elements. As such, it can be used to execute any of the above described processes. This computer system includes various types of non-transitory machine readable media and interfaces for various other types of machine readable media. Computer system 700 includes a bus 705, processing unit(s) 710, a system memory 725, a read-only memory 730, a permanent storage device 735, input devices 740, and output devices 745.
[0054] The bus 705 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the computer system 700. For instance, the bus 705 communicatively connects the processing unit(s) 710 with the read-only memory 730, the system memory 725, and the permanent storage device 735.
[0055] From these various memory units, the processing unit(s) 710 retrieve instructions to execute and data to process in order to execute the processes of the invention. The processing unit(s) may be a single processor or a multi-core processor in different embodiments. The read only-memory (ROM) 730 stores static data and instructions that are needed by the processing unit(s) 710 and other modules of the computer system. The permanent storage device 735, on the other hand, is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the computer system 700 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 735.
[0056] Other embodiments use a removable storage device (such as a floppy disk, flash drive, etc.) as the permanent storage device. Like the permanent storage device 735, the system memory 725 is a read-and-write memory device. However, unlike storage device 735, the system memory is a volatile read-and-write memory, such as random access memory. The system memory stores some of the instructions and data that the processor needs at runtime. In some embodiments, the invention’s processes are stored in the system memory 725, the permanent storage device 735, and/or the read-only memory 730. From these various memory units, the processing unit(s) 710 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.
[0057] The bus 705 also connects to the input and output devices 740 and 745. The input devices enable the user to communicate information and select commands to the computer system. The input devices 740 include alphanumeric keyboards and pointing devices (also called “cursor control devices”). The output devices 745 display images generated by the computer system. The output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as touchscreens that function as both input and output devices.
[0058] Finally, as shown in Figure 7, bus 705 also couples computer system 700 to a network 765 through a network adapter (not shown). In this manner, the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet), or a network of networks (such as the Internet). Any or all components of computer system 700 may be used in conjunction with the invention.
[0059] Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media). Some examples of such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD- ROM), a variety of recordable/rewritable DVDs (e g., DVD-RAM, DVD-RW, DVD+RW, etc ), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra-density optical discs, any other optical or magnetic media, and floppy disks. The computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations. Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
[0060] While the above discussion primarily refers to microprocessor or multi-core processors that execute software, some embodiments are performed by one or more integrated circuits, such as application specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs). In some embodiments, such integrated circuits execute instructions that are stored on the circuit itself. [0061] As used in this specification, the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms “display” or “displaying” mean displaying on an electronic device. As used in this specification, the terms “computer readable medium,” “computer readable media,” and “machine readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral or transitory signals.
[0062] While the invention has been described with reference to numerous specific details, one of ordinary skill in the art will recognize that the invention can be embodied in other specific forms without departing from the spirit of the invention. For instance, several of the above-described embodiments deploy gateways in public cloud datacenters. However, in other embodiments, the gateways are deployed in a third party’s virtual private cloud datacenters (e.g., datacenters that the third party uses to deploy cloud gateways for different entities in order to deploy virtual networks for these entities). Thus, one of ordinary skill in the art would understand that the invention is not to be limited by the foregoing illustrative details, but rather is to be defined by the appended claims.

Claims

1. A method for micro segmenting traffic flows in a software defined wide area network (SD- WAN), the method comprising: at a first edge forwarding node of a first multi-machine site in the SD-WAN, receiving, from a particular forwarding element, a first packet of a packet flow originating from a second multi-machine site that is external to the SD-WAN, the packet flow destined for a particular machine at the first multi-machine site; using deep packet inspection (DPI) on the first packet to identify contextual information not provided by the particular forwarding element about the first packet and the packet flow; based on the identified contextual information, applying one or more policies to the first packet before forwarding the first packet to the particular machine.
2. The method of claim 1, wherein the contextual information includes at least a virtual network identifier (VNI) and an AppID.
3. The method of claim 2, wherein the first edge forwarding node forwards traffic for a set of micro-segments, wherein the VNI identifies a particular segment in the set of micro-segments to which the particular machine belongs.
4. The method of claim 3, wherein the packet flow is a first packet flow and the particular machine is a first machine of a first segment, the method further comprising: at the first edge forwarding node, receiving, from the particular forwarding element, a second packet belonging to a second packet flow destined for a second machine of a second segment at the first multi-machine site; using deep packet inspection (DPI) on the second packet to identify contextual information not provided by the particular forwarding element about the second packet and the second packet flow; based on the identified contextual information, applying one or more policies to the second packet before forwarding the second packet to the second machine, wherein the second machine is in a different segment than the first machine.
5. The method of claim 1, wherein the particular forwarding element is a switching element that tags packets with a particular virtual local area network (VLAN) tag that gets mapped to a single segment on the first edge forwarding node.
6. The method of claim 5, wherein the single VLAN segment comprises a set of VNI-based micro-segments, wherein the VLAN tag does not identify a particular VNI-based micro-segment to which the first packet is destined.
7. The method of claim 6, wherein each VNI-based micro-segment in the set of VNI-based micro-segments comprises machines dedicated to one of a web server, a database server, and an application server.
8. The method of claim 7, wherein applying one or more policies to the first packet based on the identified contextual information comprises applying one or more policies based on the VNI- based micro-segment to which the first packet is destined.
9. The method of claim 1, wherein the first multi-machine site is a multi-tenant datacenter site of the SD-WAN.
10. The method of claim 9, wherein the second multi -machine site is a branch site of the SD- WAN.
11. The method of claim 1, wherein the one or more policies comprise any of firewall policies, middlebox service policies, quality of service (QoS) policies, forwarding policies, and business policies.
12. A non-transitory machine readable medium storing a program for execution by a set of processing units, the program for micro segmenting traffic flows in a software defined wide area network (SD-WAN), the method comprising: at a first edge forwarding node of a first multi-machine site in the SD-WAN, receiving, from a particular forwarding element, a first packet of a packet flow originating from a second multi-machine site that is external to the SD-WAN, the packet flow destined for a particular machine at the first multi-machine site; using deep packet inspection (DPI) on the first packet to identify contextual information not provided by the particular forwarding element about the first packet and the packet flow; based on the identified contextual information, applying one or more policies to the first packet before forwarding the first packet to the particular machine.
13. The non-transitory machine readable medium of claim 12, wherein the contextual information includes at least a virtual network identifier (VNI) and an AppID.
14. The non-transitory machine readable medium of claim 13, wherein the first edge forwarding node forwards traffic for a set of micro-segments, wherein the VNI identifies a particular segment in the set of micro-segments to which the particular machine belongs.
15. The non-transitory machine readable medium of claim 14, wherein the packet flow is a first packet flow and the particular machine is a first machine of a first segment, the program further comprising sets of instructions for: at the first edge forwarding node, receiving, from the particular forwarding element, a second packet belonging to a second packet flow destined for a second machine of a second segment at the first multi-machine site; using deep packet inspection (DPI) on the second packet to identify contextual information not provided by the particular forwarding element about the second packet and the second packet flow; based on the identified contextual information, applying one or more policies to the second packet before forwarding the second packet to the second machine, wherein the second machine is in a different segment than the first machine.
16. The non-transitory machine readable medium of claim 12, wherein the particular forwarding element is a switching element that tags packets with a particular virtual local area network (VLAN) tag that gets mapped to a single segment on the first edge forwarding node.
17. The non-transitory machine readable medium of claim 16, wherein the single VLAN segment comprises a set of VNI-based micro-segments, wherein the VLAN tag does not identify a particular VNI-based micro-segment to which the first packet is destined.
18. The non-transitory machine readable medium of claim 17, wherein each VNI-based micro segment in the set of VNI-based micro-segments comprises machines dedicated to one of a web server, a database server, and an application server, wherein the set of instructions for applying one or more policies to the first packet based on the identified contextual information comprises a set of instructions for applying one or more policies based on the VNI-based micro-segment to which the first packet is destined.
19. The non-transitory machine readable medium of claim 12, wherein (i) the first multi machine site is a multi-tenant datacenter site of the SD-WAN, and (ii) the second multi-machine site is a branch site of the SD-WAN.
20. The non-transitory machine readable medium of claim 12, wherein the one or more policies comprise any of firewall policies, middlebox service policies, quality of service (QoS) policies, forwarding policies, and business policies.
EP22701494.1A 2021-04-29 2022-01-07 Methods for micro-segmentation in sd-wan for virtual networks Pending EP4248627A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
IN202141019754 2021-04-29
US17/569,526 US20220353190A1 (en) 2021-04-29 2022-01-06 Methods for micro-segmentation in sd-wan for virtual networks
PCT/US2022/011730 WO2022231668A1 (en) 2021-04-29 2022-01-07 Methods for micro-segmentation in sd-wan for virtual networks

Publications (1)

Publication Number Publication Date
EP4248627A1 true EP4248627A1 (en) 2023-09-27

Family

ID=80122563

Family Applications (1)

Application Number Title Priority Date Filing Date
EP22701494.1A Pending EP4248627A1 (en) 2021-04-29 2022-01-07 Methods for micro-segmentation in sd-wan for virtual networks

Country Status (2)

Country Link
EP (1) EP4248627A1 (en)
WO (1) WO2022231668A1 (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10454714B2 (en) 2013-07-10 2019-10-22 Nicira, Inc. Method and system of overlay flow control
US10135789B2 (en) 2015-04-13 2018-11-20 Nicira, Inc. Method and system of establishing a virtual private network in a cloud service for branch networking
US10992568B2 (en) 2017-01-31 2021-04-27 Vmware, Inc. High performance software-defined core network
US11706127B2 (en) 2017-01-31 2023-07-18 Vmware, Inc. High performance software-defined core network
US20200036624A1 (en) 2017-01-31 2020-01-30 The Mode Group High performance software-defined core network
US11005684B2 (en) 2017-10-02 2021-05-11 Vmware, Inc. Creating virtual networks spanning multiple public clouds
US11115480B2 (en) 2017-10-02 2021-09-07 Vmware, Inc. Layer four optimization for a virtual network defined over public cloud
US10999100B2 (en) 2017-10-02 2021-05-04 Vmware, Inc. Identifying multiple nodes in a virtual network defined over a set of public clouds to connect to an external SAAS provider
US11223514B2 (en) 2017-11-09 2022-01-11 Nicira, Inc. Method and system of a dynamic high-availability mode based on current wide area network connectivity
US11153230B2 (en) 2019-08-27 2021-10-19 Vmware, Inc. Having a remote device use a shared virtual network to access a dedicated virtual network defined over public clouds
US11489783B2 (en) 2019-12-12 2022-11-01 Vmware, Inc. Performing deep packet inspection in a software defined wide area network
US11606712B2 (en) 2020-01-24 2023-03-14 Vmware, Inc. Dynamically assigning service classes for a QOS aware network link
US11363124B2 (en) 2020-07-30 2022-06-14 Vmware, Inc. Zero copy socket splicing
US11601356B2 (en) 2020-12-29 2023-03-07 Vmware, Inc. Emulating packet flows to assess network links for SD-WAN
CN116783874A (en) 2021-01-18 2023-09-19 Vm维尔股份有限公司 Network aware load balancing
US11381499B1 (en) 2021-05-03 2022-07-05 Vmware, Inc. Routing meshes for facilitating routing through an SD-WAN
US11729065B2 (en) 2021-05-06 2023-08-15 Vmware, Inc. Methods for application defined virtual network service among multiple transport in SD-WAN
US11943146B2 (en) 2021-10-01 2024-03-26 VMware LLC Traffic prioritization in SD-WAN
US11909815B2 (en) 2022-06-06 2024-02-20 VMware LLC Routing based on geolocation costs

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10797966B2 (en) * 2017-10-29 2020-10-06 Nicira, Inc. Service operation chaining
US10797910B2 (en) * 2018-01-26 2020-10-06 Nicira, Inc. Specifying and utilizing paths through a network
US11184327B2 (en) * 2018-07-05 2021-11-23 Vmware, Inc. Context aware middlebox services at datacenter edges
US11665095B2 (en) * 2020-02-21 2023-05-30 Cisco Technology, Inc. Fine-grained SD-WAN optimization services for cloud-native applications

Also Published As

Publication number Publication date
WO2022231668A1 (en) 2022-11-03

Similar Documents

Publication Publication Date Title
US20220353190A1 (en) Methods for micro-segmentation in sd-wan for virtual networks
EP4248627A1 (en) Methods for micro-segmentation in sd-wan for virtual networks
US11695697B2 (en) Performing in-line service in public cloud
US11729065B2 (en) Methods for application defined virtual network service among multiple transport in SD-WAN
US11388086B1 (en) On demand routing mesh for dynamically adjusting SD-WAN edge forwarding node roles to facilitate routing through an SD-WAN
US11863352B2 (en) Hierarchical networking for nested container clusters
US20220353152A1 (en) Methods to support dynamic transit paths through hub clustering across branches in sd-wan
US11159343B2 (en) Configuring traffic optimization using distributed edge services
US20150117454A1 (en) Dynamic Generation of Flow Entries for Last-Hop Processing
US11729095B2 (en) Allocating additional bandwidth to resources in a datacenter through deployment of dedicated gateways
US11171878B1 (en) Allocating additional bandwidth to resources in a datacenter through deployment of dedicated gateways
US20230224759A1 (en) Heterogeneous hub clustering and application policy based automatic node selection for network of clouds
WO2022250735A1 (en) Allocating additional bandwidth to resources in a datacenter through deployment of dedicated gateways
CN117223270A (en) Method for micro-segmentation in SD-WAN of virtual network
US20230396536A1 (en) Allocating additional bandwidth to resources in a datacenter through deployment of dedicated gateways
US20240031273A1 (en) Method for modifying an sd-wan using metric-based heat maps
WO2024019853A1 (en) Method for modifying an sd-wan using metric-based heat maps
CN117178259A (en) Allocating additional bandwidth to resources in a data center through deployment of dedicated gateways

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20230623

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

RAP3 Party data changed (applicant data changed or rights of an application transferred)

Owner name: VMWARE LLC