[c-nsp] PVLANs in a Hosting Environment
chris at lavin-llc.com
chris at lavin-llc.com
Sun Mar 7 19:00:15 EST 2010
Please pardon the top post.
Thanks for such a detailed response to the OP. I'm just starting on a
similar design and trying to figure out options. PVLANs on Nexus 7k was
going to be my starting point. Now I don't know....
-chris
> On Fri, Feb 26, 2010 at 6:59 AM, Matthew Melbourne
> <matt at melbourne.org.uk>wrote:
>
>> We are investigating options to provide a "VLAN-per-customer" within a
>> hosting environment. Inside each VLAN could be hosting services, e.g.
>> hosted web servers, AD, Exchange (etc). In order to maximum the number
>> of supported VLANs, then the use of Private VLANs has been raised.
>>
>
> I have used this configuration in a large scale hosting environment with
> numerous /24's on a single SVI interface. This works reasonably well if
> you
> want to throw a bunch of servers into a VLAN and provide some form of
> isolation, but still allow full IP connectivity. It isn't as good as a
> VLAN
> per customer though, and really if you are going to add a firewall you
> pretty much need a real VLAN for each customer anyway. PVLAN +
> local-proxy-arp is really only useful for non-firewalled servers, or
> perhaps
> for the outside interfaces of firewalls with real VLANs behind those
> firewalls.
>
> However, there are many caveats.
>
> "Transparent" briding firewalls, such as the Cisco ASA in transparent
> mode,
> don't really work in this environment. If you have 2 servers downstream
> of
> your transparent firewall and they ARP for each other, it becomes
> undefined
> who will answer. The other server may answer first - or the upstream
> router's "local proxy arp" may answer first. If local proxy arp wins,
> then
> server a's path to server b is up through the firewall, through the
> upstream
> router, and then back down to the firewall, who sees packets sourced from
> behind it and simply drops them.
>
> Semi-transparent firewalls (such as the Sonicwall), that don't actually
> bridge traffic, but instead do more of a proxy ARPing router type
> behavior,
> will work fine.
>
> Routed mode firewalls work, however it should be noted that if you don't
> put
> an HA pair in a community, then the HA pair's heartbeats won't be seen.
> For
> ASA this seems to end up working OK, but if you look at "show failover" it
> complains about not seeing the other firewall on the outside interface.
>
> PVLAN communities are hard to maintain. I have pretty much stopped using
> them. You have to associate the primary VLAN with the isolated and all
> community VLANs on EVERY switch that will carry them. I can't tell you
> how
> many times I've seen someone forget to associate a new community on a
> switch
> that is in-between the router and the client. When this happens, packets
> will pass through the middle switch, however since the middle switch
> doesn't
> know to share a single CAM table between the VLAN tags, your traffic will
> be
> unknown unicast flooded. If you have a lot of automation and/or a
> simple/static network, this may not be a problem for you. However, if you
> have a lot of switches in a chaotic environment with lots of engineers
> manually making changes, this can be a problem.
>
> PVLAN with local-proxy-arp provides full protection against
> default-gateway
> IP conflicts. However, it only provides mitigation (sticky arp) against
> conflicts between host IPs. Whoever gets an IP first gets to keep it.
> However, one day a year from now you might reboot your upstream router
> and
> suddenly find 100 IP conflicts that you have been "protected" against
> suddenly all happen at once since you lost your sticky arp table.
>
> For load balancing, I offer it by placing a large shared load balancer
> with
> a single interface going to another VLAN on the router. I then use policy
> based routing (applied to the PVLAN interface) to ensure that traffic
> originating on the PVLAN that is part of a load balanced real-server goes
> through the load balancer on the way upstream. This works fine, and even
> customers on the PVLAN in the same subnet can hit other customer's VIPs
> since it all gets forced through the upstream router. You could place
> dedicated load balancers with their outside interfaces in a PVLAN as long
> as
> you watch out for HA heartbeats as discussed above.
>
> Finally, understand that this is a relatively poorly documented
> configuration, and also may not be 100% bug free. For example, imagine a
> basic PVLAN configuration with local proxy arp, upstream redundant routers
> running HSRP, and a subnet on the PVLAN interface of those routers. Each
> router is configured with local-proxy-arp, which means it answers every
> ARP.
> Now, how does redundant router B know to not respond to router A's ARPs?
> I've never seen this documented, but it seems to be a behavior triggered
> by
> an HSRP association. If you see an ARP from your HSRP partner, do not
> respond as you would normally because of your local-proxy-arp
> configuration.
>
> However, imagine the first 5-10 seconds when the router has just booted
> up,
> but HSRP is not yet active? What happens? They both answer each other's
> ARPs. Router A's PVLAN ARP table is full of router B's mc, and router B's
> PVLAN ARP table is full of router A's mac. All of these IPs are now in a
> routing loop. On top of that, the "sticky arp" feature ensures that these
> ARP entries are never overwritten and the routing loop lasts forever.
>
> I'm not aware of any resolution to this problem other than to clear ARP on
> the PVLAN interfaces after HSRP becomes active. Personally, my routers
> rarely reboot so this isn't a huge issue.
>
> At this point, I no longer deploy this (PVLAN with local proxy ARP).
> Everyone gets a firewall, and thus everyone needs a real VLAN behind that
> firewall. The downside of this is that my pain point now is number of
> VLANs. I haven't yet moved to MST, and the 1,800 logical-port-per-slot
> limit of the 6500 is terribly easy to reach with 500 VLANs that the
> distribution layer needs to send down to the many switches of the access
> layer.
>
> Scaling lots of VLANs to lots of switches, all in the same domain (aka
> every
> VLAN on every switch throughout the data center), has become the number 1
> architectural issue I focus on these days.
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
More information about the cisco-nsp
mailing list