Nothing Special   »   [go: up one dir, main page]

CN105490884B - A kind of VXLAN tunnel detection method and device - Google Patents

A kind of VXLAN tunnel detection method and device Download PDF

Info

Publication number
CN105490884B
CN105490884B CN201510931765.1A CN201510931765A CN105490884B CN 105490884 B CN105490884 B CN 105490884B CN 201510931765 A CN201510931765 A CN 201510931765A CN 105490884 B CN105490884 B CN 105490884B
Authority
CN
China
Prior art keywords
tunnel
configuration information
equipment
address
vxlan
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510931765.1A
Other languages
Chinese (zh)
Other versions
CN105490884A (en
Inventor
李金辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maipu Communication Technology Co Ltd
Original Assignee
Maipu Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maipu Communication Technology Co Ltd filed Critical Maipu Communication Technology Co Ltd
Priority to CN201510931765.1A priority Critical patent/CN105490884B/en
Publication of CN105490884A publication Critical patent/CN105490884A/en
Application granted granted Critical
Publication of CN105490884B publication Critical patent/CN105490884B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The reason of the embodiment provides a kind of VXLAN tunnel detection method and devices, are related to field of communication technology, can establish failure to the tunnel VXLAN is fed back, and is improved the tunnel VXLAN and is established efficiency.This method comprises: the first equipment receives the second tunnel configuration information that the second equipment is sent;Second tunnel configuration information is matched with the first tunnel configuration information in the first equipment;When the first tunnel configuration information and the second tunnel configuration information mismatch, the first equipment sends failure message to the second equipment;Tunnel configuration information includes the IP address of the destination in the tunnel VXLAN and the mapping relations of virtual network instance identification VNID, and wherein tunnel configuration information establishes the tunnel VXLAN for the first equipment and the second equipment.The embodiment of the present invention is used for VXLAN Tunnel testing.

Description

A kind of VXLAN tunnel detection method and device
Technical field
The embodiment of the present invention is related to the communications field more particularly to a kind of method and device of VXLAN Tunnel testing.
Background technique
Virtual expansible local area network (Virtual Extensible Local Area Network, VXLAN) technology is to use It is virtualized in extended network, meets the technology that user uses to obtain sufficient amount of virtual network.VXLAN technology is by building The vertical tunnel VXLAN creates a large amount of virtual expansible local area network, different virtual expansible local area networks on existing network framework It is identified using VNI (VXLAN Network Identifier, virtual expansible local net network identifier).
The tunnel VXLAN is established there are two types of modes in the prior art: one is being established using proprietary protocol, another kind is Manually establish.But when manually establishing the tunnel VXLAN, need by user configuration or third party Proprietary protocol is completed, when increasing the complexity of network, and establishing the tunnel VXLAN using proprietary protocol, it is possible to because of VXLAN The user configuration at tunnel both ends mismatches and the case where failure is established in the tunnel VXLAN occurs, and when there is above situation, nothing Method determines the reason of failure is established in the tunnel VXLAN, causes the tunnel VXLAN that cannot establish in time, reduces the tunnel VXLAN and establishes effect Rate influences user experience.
Summary of the invention
The embodiment of the present invention provides a kind of method and device of VXLAN Tunnel testing, can establish and lose to the tunnel VXLAN The reason of losing is fed back, and is improved the tunnel VXLAN and is established efficiency, improves user experience.
In a first aspect, the embodiment of the invention provides a kind of VXLAN tunnel detection method, this method comprises: the first equipment Receive the second tunnel configuration information of the second equipment transmission;Second tunnel configuration information and the first tunnel in the first equipment are matched Confidence breath is matched;When the first tunnel configuration information and the second tunnel configuration information mismatch, the first equipment is set to second Preparation send failure message;First tunnel configuration information includes the first IP address and the mapping pass of virtual network instance identification VNID System, the first IP address is that the IP address of the destination in the tunnel VXLAN is established with the first equipment;Second tunnel configuration information includes the The mapping relations of two IP address and virtual network instance identification VNID, the second IP address are to establish the tunnel VXLAN with the second equipment Destination IP address, wherein tunnel configuration information establishes the tunnel VXLAN for the first equipment and the second equipment.
In the first possible implementation of the first aspect, by the in the second tunnel configuration information and the first equipment One tunnel configuration information is matched, comprising: the first virtual network instance identification is taken out from the second tunnel configuration information, wherein First virtual network instance identification is any virtual network instance identification of the second tunnel configuration information;Believe in the second tunnel configuration The second IP address corresponding with the first virtual network instance identification is obtained in breath, and as the first tunnel source IP address;? The first IP address corresponding with the first virtual network instance identification is obtained in one tunnel configuration information, and as the first tunnel purpose Hold IP address;When the first tunnel configuration information and the second tunnel configuration information mismatch, the first equipment is sent to the second equipment Failure message, comprising: when the first tunnel source IP address is identical as the first tunnel destination IP address, the first equipment is to second Equipment sends Fisrt fault message.
With reference to first aspect or first aspect the first possible implementation, in second of possible implementation In, the second tunnel configuration information is matched with the first tunnel configuration information in the first equipment, further includes: by the second tunnel Configuration information is matched with the first tunnel configuration information in the first equipment, further includes: is taken from the second tunnel configuration information Second IP address is as the second tunnel destination IP address out;It is obtained and the second tunnel mesh in the second tunnel configuration information The corresponding all virtual network instance identifications of end IP address, and as the second virtual network instance identification group;In the first tunnel Tunnel destination corresponding with virtual network instance identification each in the second virtual network instance identification group is obtained in configuration information IP address;When the first tunnel configuration information and the second tunnel configuration information mismatch, the first equipment sends event to the second equipment Hinder message, comprising: as the corresponding tunnel destination IP of virtual network instance identification each in the second virtual network instance identification group When address is not unique, the first equipment sends the second failure message to second equipment.
With reference to first aspect or first aspect the first to second any one possible implementation, at the third In possible implementation, the first equipment and the second equipment are bgp neighbor.
The third possible implementation with reference to first aspect, in the fourth possible implementation, failure message is BGP notifies Notification message;After the second equipment receives failure message, the content according to failure message carries out mistake and mentions Show, and bgp neighbor is maintained to be in established state.
Second aspect, the embodiment of the invention provides a kind of VXLAN tunnel detectors, are located at the first equipment, comprising: connect Unit is received, for receiving the second tunnel configuration information of the second equipment transmission;Processing unit is used for the second tunnel configuration information It is matched with the first tunnel configuration information in the first equipment;Transmission unit, for when the first tunnel configuration information and second When tunnel configuration information mismatches, failure message is sent to the second equipment;First tunnel configuration information include the first IP address with The mapping relations of virtual network instance identification VNID, the first IP address are that the destination in the tunnel VXLAN is established with the first equipment IP address;Second tunnel configuration information includes the mapping relations of the second IP address Yu virtual network instance identification VNID, the 2nd IP Address is the IP address that the destination in the tunnel VXLAN is established with the second equipment, wherein tunnel configuration information for the first equipment with Second equipment establishes the tunnel VXLAN.
In the first possible implementation of the second aspect, processing unit is also used to: from the second tunnel configuration information The first virtual network instance identification of middle taking-up, wherein the first virtual network instance identification is any void of the second tunnel configuration information Quasi- network example mark;Twoth IP corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information Location, and as the first tunnel source IP address;It is obtained and the first virtual network instance identification pair in the first tunnel configuration information The first IP address answered, and as the first tunnel destination IP address;Transmission unit is also used to: when the first tunnel source IP address When identical as the first tunnel destination IP address, Fisrt fault message is sent to the second equipment.
In conjunction with second aspect or second aspect the first possible implementation, in second of possible implementation In, processing unit is also used to: second IP address is taken out from the second tunnel configuration information as the second tunnel destination IP Address;All virtual network example marks corresponding with the second tunnel destination IP address are obtained in the second tunnel configuration information Know, and as the second virtual network instance identification group;It is obtained and the second virtual network example mark in the first tunnel configuration information The corresponding tunnel destination IP address of each virtual network instance identification in knowledge group;Transmission unit is also used to: when the second virtual net When the corresponding tunnel destination IP address of each virtual network instance identification is not unique in network instance identification group, sent out to the second equipment Send the second failure message.
In conjunction with second aspect or second aspect the first to second any one possible implementation, at the third In possible implementation, the first equipment and the second equipment are bgp neighbor.
The third possible implementation in conjunction with second aspect, in the fourth possible implementation, failure message is BGP notifies Notification message;After the second equipment receives failure message, the content according to failure message carries out mistake and mentions Show, and bgp neighbor is maintained to be in established state.
A kind of VXLAN tunnel detection method and device provided in an embodiment of the present invention, comprising: the first equipment first receives the The second tunnel configuration information that two equipment are sent;Secondly by the first tunnel configuration in the second tunnel configuration information and the first equipment Information is matched;Finally when the first tunnel configuration information and the second tunnel configuration information mismatch, the first equipment is to second Equipment sends failure message;Wherein the first tunnel configuration information includes the first IP address and virtual network instance identification VNID reflects Relationship is penetrated, the first IP address is that the IP address of the destination in the tunnel VXLAN, the second tunnel configuration packet are established with the first equipment The mapping relations of the second IP address Yu virtual network instance identification VNID are included, the second IP address is to establish with second equipment The IP address of the destination in the tunnel VXLAN, tunnel configuration information establish the tunnel VXLAN for the first equipment and the second equipment.Cause This VXLAN tunnel detection method provided by the above embodiment, for the VXLAN tunnel information configured in VXLAN network, by The second tunnel configuration information that two equipment are generated according to own configuration information, with for detect the second tunnel configuration information legitimacy institute The configuration information in the first equipment needed i.e. the first tunnel configuration information is matched, and judges that second matches according to matching result Whether confidence breath is legal, and such as the second configuration information is illegal, sends failure message to the second equipment, the second equipment is enable to learn It is illegal that configuration information required for the tunnel VXLAN is established in second equipment, thus to will establish before establishing the tunnel VXLAN The configuration information in the tunnel VXLAN carries out legitimacy detection, when the configuration information of tested equipment is illegal, informs to the equipment The error message improves the foundation of the tunnel VXLAN so as to timely feedback the reason of establishing failure to the tunnel VXLAN Efficiency improves user experience.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the schematic diagram of VXLAN in the prior art;
Fig. 2 is a kind of flow diagram for VXLAN tunnel detection method that the embodiment of the present invention provides;
Fig. 3 is a kind of flow diagram for VXLAN tunnel detection method that another embodiment of the present invention provides;
Fig. 4 is a kind of schematic diagram for VXLAN tunnel detector that the embodiment of the present invention provides.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are acquired every other without making creative work Embodiment shall fall within the protection scope of the present invention.
The term used in this application is only merely for for the purpose of describing particular embodiments, being not intended to be limiting this Shen Please.It is also intended in the term such as "an" of the application and singular shape used in the attached claims, " described " and "the" Including most forms, unless the context clearly indicates other meaning.Simultaneously it is also understood that term used herein "and/or" refers to and includes that one or more associated any or all of project listed may combine.
It will be appreciated that though in the application various letters may be described using term such as " first ", " second ", " third " Breath, but these information should not necessarily be limited by these terms, and above-mentioned term is only used to for same type of information being distinguished from each other out.It is exemplary , in the case where not departing from the application range, the first information can also be referred to as the second information, similarly, the second information The first information can be referred to as, while depending on context, the word used in above-mentioned scene " if " can be construed as For " ... when " or " when ... " or " in response to determination ".
As shown in Figure 1, virtual expansible local area network VXLAN is generally included:
101, VXLAN endpoint of a tunnel (VXLAN Tunnel End Point, VTEP): VTEP is the edge device of VXLAN, The relevant treatment of VXLAN carries out all on VTEP, such as identifies VXLAN belonging to ethernet data frame, is based on VXLAN to data Frame carries out two layers of forwarding, encapsulation/decapsulation message etc., passes through three-layer network progress between VTEP by establishing the tunnel VXLAN Data communication, VTEP can be an independent physical equipment, be also possible to the server that operation has virtual machine.Wherein VXLAN It is identified by VXLAN network identifier (VXLAN Network Identifier, VNI).
102, the tunnel VXLAN: the tunnel VXLAN is the logical tunnel of point-to-point between two VTEP.VTEP is data frame envelope After dress VXLAN, UDP, IP, the message after encapsulation is transmitted to by distal end VTEP by the tunnel VXLAN, distal end VTEP is to it It is decapsulated.
When generating the tunnel VXLAN when establishing the tunnel VXLAN by proprietary protocol, need to carry out VXLAN phase on VTEP Close configuration, wherein carried out on VTEP to generate the tunnel VXLAN it is relevant configuration include: the tunnel VXLAN source IP address, The destination address in the tunnel VXLAN, the VNI with the VXLAN of VXLAN tunnel-associated.Wherein a tunnel VXLAN can only possess one A source, i.e. a tunnel VXLAN can only correspond to the source address in a tunnel VXLAN.A VXLAN can be associated with more simultaneously The tunnel VXLAN, a tunnel VXLAN can be associated with multiple VXLAN, these VXLAN share the tunnel VXLAN, i.e. a VNI The a plurality of tunnel VXLAN can be corresponded to, a tunnel VXLAN can also correspond to multiple VNI.
For the above-mentioned VXLAN tunnel information configured in VXLAN network, referring to shown in Fig. 2, the embodiment of the present invention A kind of VXLAN tunnel detection method is provided, is included the following steps:
201, the first equipment receives the second tunnel configuration information that the second equipment is sent.
Wherein the first equipment and the second equipment are VXLAN endpoint of a tunnel (VXLAN Tunnel End Point, VTEP), First equipment and the routing of the second equipment room are reachable, i.e. the first equipment sends data to the second equipment room, and the second equipment can receive The data sent to the first equipment, and feedback data is sent to the first equipment, the first equipment can receive the transmission of the second equipment Feedback data.First equipment and the second equipment can be independent physical equipment, such as router, or operation has void The server of quasi- machine.
Second tunnel configuration information, is included in the first equipment and the second equipment room establishes configuration required for the tunnel VXLAN Information, the second tunnel configuration information may include the tunnel VXLAN destination address i.e. the second IP address IPTA and the tunnel VXLAN The VNI and IPTA of associated VXLAN and the mapping relations of VNI, wherein IPTA is with the second equipment for the tunnel VXLAN source Under the premise of the tunnel VXLAN destination address.One of IPTA can correspond to one or more VNI, and a VNI is only capable of Wherein occur in a mapping relations.Second tunnel configuration information can be generated by the second equipment according to own configuration information, It can be the configuration information having previously been stored in the second equipment.
It illustratively, as shown in table 1, is a kind of specific implementation of the second tunnel configuration information.
Table 1
The destination address in the tunnel VXLAN VXLAN network identifier
IPTA1 VNI1
IPTA2 VNI2、VNI3
IPTA3 VNI4、VNI5、VNI6
202, judge whether the second tunnel configuration information matches with the first tunnel configuration information in the first equipment
Wherein the first tunnel configuration information is located in the first equipment, and the first tunnel configuration information includes in the first equipment pair The configuration information of first equipment required for the legitimacy of second tunnel configuration information is detected, the first tunnel configuration information can With include the tunnel VXLAN destination address i.e. the first IP address IPTB, with the VNI of the VXLAN of VXLAN tunnel-associated, and The mapping relations of IPTB and VNI, it is the tunnel VXLAN purpose under the premise of the tunnel VXLAN source that wherein IPTB, which is with the first equipment, The address at end.One of IPTB can correspond to one or more VNI, and a VNI is only capable of going out in a wherein mapping relations It is existing.First tunnel configuration information can be generated by the first equipment according to own configuration information, or have previously been stored in first Configuration information in equipment.
It illustratively, as shown in table 2, is a kind of specific implementation of the first tunnel configuration information.
Table 2
The destination address in the tunnel VXLAN VXLAN network identifier
IPTB1 VNI1
IPTB2 VNI2、VNI3
IPTB3 VNI4
Second tunnel configuration information is matched with the first tunnel configuration information, can be from the second tunnel configuration information One VNI of middle taking-up, and IPTA corresponding with the VNI, it is corresponding with the VNI further according to the first tunnel configuration acquisition of information IPTB, when IPTA is identical as IPTB, the second tunnel configuration information and the first tunnel configuration information are mismatched.Second tunnel is matched Confidence breath is matched with the first tunnel configuration information, is also possible to take out an IPTA, root from the second tunnel configuration information According to the IPTA and the second tunnel configuration acquisition of information all VNIs corresponding with the IPTA, according to the first tunnel configuration acquisition of information With all corresponding IPTB of VNI, when acquired IPTB is not unique, the second tunnel configuration information and the first tunnel configuration Information mismatches.
It is illustrative: it is based on the first tunnel configuration information shown in the second tunnel configuration information shown in table 1 and table 2, When being matched to the second tunnel configuration information with the first tunnel configuration information:
VNI1, and IPTA1 corresponding with VNI1 are taken out from the second configuration information, according to the first configuration information obtain with The corresponding IPTB1 of VNI1, as IPTA1=IPTB1, the second configuration information and the first configuration information are mismatched.
203, when the second configuration information and the first configuration information mismatch, the first equipment sends failure report to the second equipment Text.
The wherein failure message that the first equipment is sent to the second equipment can be the second configuration information of expression and the first configuration The unmatched data of information, or further include indicating that the second configuration information and the first configuration information specifically mismatch type Data, as long as the first equipment can inform that the second configuration information is illegal to the second equipment by failure message.
A kind of VXLAN tunnel detection method provided in an embodiment of the present invention, comprising: the first equipment first receives the second equipment The the second tunnel configuration information sent;Secondly by the first tunnel configuration information in the second tunnel configuration information and the first equipment into Row matching;Finally when the first tunnel configuration information and the second tunnel configuration information mismatch, the first equipment is sent out to the second equipment Send failure message;Wherein the first tunnel configuration information includes the first IP address and the mapping pass of virtual network instance identification VNID System, the first IP address be that the IP address of the destination in the tunnel VXLAN is established with the first equipment, and the second tunnel configuration information includes the The mapping relations of two IP address and virtual network instance identification VNID, the second IP address are to establish VXLAN with second equipment The IP address of the destination in tunnel, tunnel configuration information establish the tunnel VXLAN for the first equipment and the second equipment.Therefore above-mentioned The VXLAN tunnel detection method that embodiment provides, for the VXLAN tunnel information configured in VXLAN network, by the second equipment According to own configuration information generate the second tunnel configuration information, with for detect the second tunnel configuration information legitimacy required for Configuration information i.e. the first tunnel configuration information in first equipment is matched, and judges the second configuration information according to matching result Whether legal, such as the second configuration information is illegal, sends failure message to the second equipment, the second equipment is enable to learn that second sets It is illegal that configuration information required for the tunnel VXLAN is established on standby, thus to will establish VXLAN before establishing the tunnel VXLAN The configuration information in tunnel carries out legitimacy detection and informs the mistake to the equipment when the configuration information of tested equipment is illegal False information improves the tunnel VXLAN and establishes efficiency so as to timely feedback the reason of establishing failure to the tunnel VXLAN, Improve user experience.
For the above-mentioned VXLAN tunnel information configured in VXLAN network, referring to shown in Fig. 3, the embodiment of the present invention A kind of VXLAN tunnel detection method is provided, is included the following steps:
301, the first equipment receives the second tunnel configuration information that the second equipment is sent.
Specific example is referring to above-mentioned steps 201, and which is not described herein again.
It should be noted that the first equipment and the second equipment can also be to establish Border Gateway Protocol (Border Gateway Protocol, abbreviation BGP) in neighborhood (or Correspondent Node/peer-entities).
302, a virtual network instance identification is taken out from the second tunnel configuration information as the first virtual network example Mark.
A virtual network instance identification is wherein taken out from the second tunnel configuration information, can be from the second tunnel configuration Information takes out any one virtual network instance identification and as the first virtual network instance identification, illustratively, is based on 1 institute of table The the second tunnel configuration information shown, takes out VNI2 from the second tunnel configuration information, as the first virtual network instance identification.
303, the second IP address corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information, and As the first tunnel source IP address, corresponding with the first virtual network instance identification the is obtained in the first tunnel configuration information One IP address, and as the first tunnel destination IP address.
The second IP address corresponding with the first virtual network instance identification is wherein obtained in the second tunnel configuration information, and As the first tunnel source IP address, it is included in the second tunnel configuration information, acquisition is deposited with the first virtual network instance identification In the second IP address of mapping relations, and as the first tunnel source IP address.It is obtained and the in the first tunnel configuration information Corresponding first IP address of one virtual network instance identification, and as the first tunnel destination IP address, it is included in the first tunnel In configuration information, there are the first IP address of mapping relations with the first virtual network instance identification for acquisition, and make the first tunnel mesh End IP address.
Illustratively, based on the second tunnel configuration information shown in table 1, obtaining the first tunnel source IP address includes:
According to the VNI1 taken out in the second configuration information, the IPTA1 with VNI1 mapping is obtained in the second configuration information, is made For the first tunnel source IP address.
Based on the first tunnel configuration information shown in table 2, obtaining the first tunnel destination IP address includes:
According to the VNI1 taken out in the second tunnel configuration information, obtained in the first configuration information and VNI1 mapping IPTB1, as the first tunnel destination IP address.
304, judge whether the first tunnel source IP address and the first tunnel destination IP address are identical.
According to the first tunnel source IP address and the first tunnel destination IP address obtained in step 303, judge that it is No is same IP address.
According to the judging result of step 304, when the first tunnel source IP address is identical as the first tunnel destination IP address When, then carry out following steps:
305, the first equipment sends Fisrt fault message to the second equipment.
Wherein Fisrt fault message includes that the second tunnel configuration information is illegal and specific illegal content, i.e., and second Tunnel configuration information and the first tunnel configuration information for tunnel source IP address in the configuration information in the tunnel same VXLAN with Tunnel destination IP address is identical.Fisrt fault message can also be including in the second tunnel configuration information in above-mentioned illegal content There is the second IP address being overlapped.
First equipment to the second equipment send Fisrt fault message, can for the first equipment by the second tunnel configuration information not Legal and specific illegal content is sent to the second equipment in the form of data packet, or the first equipment is by the second tunnel Road configuration information is illegal and specific illegal content by the format of BGP notice Notification message is sent to the Two equipment.
According to the judging result of step 304, when the first tunnel source IP address is different from the first tunnel destination IP address When, then carry out following steps:
306, second IP address is taken out from the second tunnel configuration information as the second tunnel destination IP address.
Wherein one the second IP address of taking-up, can as the second tunnel destination IP address from the second tunnel configuration information Think and takes out any one second IP address from the second tunnel configuration information and as the second tunnel destination IP address, it is exemplary , based on the second tunnel configuration information shown in table 1, VNI4 is taken out from the second tunnel configuration information, as the second tunnel mesh End IP address.
307, all virtual networks corresponding with the second tunnel destination IP address are obtained in the second tunnel configuration information Instance identification, and as the second virtual network instance identification group;It is obtained and the second virtual network in the first tunnel configuration information The corresponding tunnel destination IP address of each virtual network instance identification in instance identification group.
Wherein, all virtual networks corresponding with the second tunnel destination IP address are obtained in the second tunnel configuration information Instance identification is deposited including obtaining in the second tunnel configuration information with the second tunnel destination IP address obtained within step 306 In one or more virtual network instance identifications of mapping relations, and using the set of acquired virtual network instance identification as Second virtual network instance identification group.
It is obtained in the first tunnel configuration information and each virtual network example mark in the second virtual network instance identification group Know corresponding tunnel destination IP address, including obtains in the first tunnel configuration information and in the second virtual network instance identification group Corresponding first IP address of all virtual network instance identifications, and the first IP address that will acquire is considered as the second tunnel source IP address, the second tunnel source IP address may include one or more first IP address.
308, judge the corresponding tunnel destination of each virtual network instance identification in the second virtual network instance identification group Whether IP address is unique.
When each virtual network instance identification is corresponding in the second virtual network instance identification group acquired in step 307 Tunnel destination IP address is multiple first IP address, then represents that there are multiple corresponding with the second tunnel destination IP address the Two tunnel source IP address;The second tunnel source IP address acquired in step 307 is first IP address, then represents The second tunnel source IP address corresponding with the second tunnel destination IP address is unique.
According to the judging result of step 308, when each virtual network instance identification in the second virtual network instance identification group When corresponding tunnel destination IP address is not unique, then following steps are carried out:
309, the first equipment sends the second failure message to the second equipment.
Wherein the second failure message includes that the second tunnel configuration information is illegal and specific illegal content, i.e., with the The corresponding second tunnel source IP address of two tunnel destination IP address is not unique.
First equipment to the second equipment send the second failure message, can for the first equipment by the second tunnel configuration information not Legal and specific illegal content is sent to the second equipment in the form of data packet, or the first equipment is by the second tunnel Road configuration information is illegal and specific illegal content by the format of BGP notice Notification message is sent to the Two equipment.Second failure message can also include above-mentioned illegal content in in the first tunnel configuration information be used as the second tunnel The 2nd IP in first IP address of destination IP address and the second tunnel configuration information as the second tunnel source IP address Address.
Optionally, after step 305, further includes:
S01, the second equipment carry out miscue according to the content of Fisrt fault message.
Second equipment is after receiving the Fisrt fault message that the first equipment is sent, according to including in Fisrt fault message The illegal content of second tunnel configuration information carries out miscue, wherein the content shown may include that the second tunnel is matched Confidence ceases illegal concrete reason, i.e., because the second tunnel configuration information and the first tunnel configuration information are directed to same Source IP address in tunnel is overlapped with tunnel destination IP address in the configuration information in the tunnel VXLAN, and the content shown may be used also To include occurring the second IP address being overlapped in above-mentioned illegal content in the second tunnel configuration information.Display herein, can be with It is shown, can also be shown by way of print command by way of log recording.
Optionally, after step 309, further includes:
S02, the second equipment carry out miscue according to the content of the second failure message.
Second equipment is after receiving the second failure message that the first equipment is sent, according to including in the second failure message The illegal content of second tunnel configuration information carries out miscue, wherein the content shown may include that the second tunnel is matched Confidence ceases illegal concrete reason, i.e., source IP address in the second tunnel corresponding with the second tunnel destination IP address is not only One, the content shown can also include above-mentioned illegal content in in the first tunnel configuration information be used as the second tunnel mesh End IP address the first IP address and the second tunnel configuration information in as mapping with the second tunnel destination IP address Second IP address of the second tunnel source IP address.Display herein can be shown by way of log recording, can also be led to The mode for crossing print command is shown.
A kind of VXLAN tunnel detection method provided in an embodiment of the present invention, comprising: the first equipment first receives the second equipment The the second tunnel configuration information sent;Secondly a virtual network instance identification is taken out from the second tunnel configuration information as the One virtual network instance identification;Twoth IP corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information Address, and as the first tunnel source IP address, it is obtained and the first virtual network instance identification in the first tunnel configuration information Corresponding first IP address, and as the first tunnel destination IP address;Judge the first tunnel source IP address and the first tunnel Whether destination IP address is identical, and the first equipment sends Fisrt fault message to the second equipment if they are the same;From the second tunnel configuration Second IP address is taken out in information as the second tunnel destination IP address;It is obtained and the in the second tunnel configuration information The corresponding all virtual network instance identifications of two tunnel destination IP address, and as the second virtual network instance identification group;? Tunnel corresponding with virtual network instance identification each in the second virtual network instance identification group is obtained in first tunnel configuration information Road destination IP address;Judge the corresponding tunnel purpose of each virtual network instance identification in the second virtual network instance identification group Hold IP address i.e. the second tunnel source IP address whether unique, if not unique first equipment sends the second failure report to the second equipment Text.Therefore VXLAN tunnel detection method provided by the above embodiment is believed for the tunnel VXLAN configured in VXLAN network Breath, the second tunnel configuration information that the second equipment is generated according to own configuration information, with for detection the second tunnel configuration information Configuration information i.e. the first tunnel configuration information in first equipment required for legitimacy is matched, when the second tunnel configuration is believed Breath is with the first tunnel configuration information for tunnel source IP address and tunnel destination in the configuration information in the tunnel same VXLAN When IP address is overlapped, the first equipment sends the Fisrt fault message comprising above-mentioned illegal content to the second equipment;When first Select first IP address as the second tunnel destination IP address in tunnel configuration information, according to the second tunnel configuration information When the second tunnel source IP address corresponding with the second tunnel destination IP address obtained is not unique, the first equipment is set to second Preparation send the second failure message comprising above-mentioned illegal content.To before establishing the tunnel VXLAN to VXLAN tunnel will be established The configuration information in road carries out legitimacy detection and informs the configuration to the equipment when the configuration information of tested equipment is illegal Information is illegal and the specific illegal content of configuration information, so as to carry out the reason of establishing failure to the tunnel VXLAN It timely feedbacks, improves the tunnel VXLAN and establish efficiency, improve user experience.
The embodiment of the present invention provides a kind of VXLAN tunnel establishing method, using any of the above-described before establishing the tunnel VXLAN VXLAN tunnel detection method in embodiment is detected.
In establishing VXLAN tunneling process, a VNI is taken out from the second tunnel configuration information, is matched according to the first tunnel Acquisition of information is set with the VNI the first IP address mapped and as tunnel source IP address, according to the second tunnel configuration acquisition of information The second IP address with VNI mapping is as tunnel purpose IP address, tunnel source IP address and tunnel purpose IP address composition one Tunnel.The VNI that the tunnel is carried by by tunnel purpose IP address in the second tunnel configuration information corresponding VNI and tunnel Source IP address corresponding VNI in the first tunnel configuration information in road seeks common ground acquisition.
A kind of VXLAN tunnel establishing method provided in an embodiment of the present invention, is included in front of establishing the tunnel VXLAN and is examined It surveys, comprising: the first equipment first receives the second tunnel configuration information that the second equipment is sent;Secondly from the second tunnel configuration information One virtual network instance identification of middle taking-up is as the first virtual network instance identification;In the second tunnel configuration information obtain with Corresponding second IP address of first virtual network instance identification, and as the first tunnel source IP address, in the first tunnel configuration The first IP address corresponding with the first virtual network instance identification is obtained in information, and as the first tunnel destination IP address; Judge whether the first tunnel source IP address and the first tunnel destination IP address are identical, the first equipment is to the second equipment if they are the same Send Fisrt fault message;Second IP address is taken out as the second tunnel destination IP from the second tunnel configuration information Location;All virtual network instance identifications corresponding with the second tunnel destination IP address are obtained in the second tunnel configuration information, And as the second virtual network instance identification group;It is obtained and the second virtual network instance identification group in the first tunnel configuration information In the corresponding tunnel destination IP address of each virtual network instance identification;It is every in judgement and the second virtual network instance identification group Whether the corresponding tunnel destination IP address of a virtual network instance identification is unique, if not unique first equipment is sent out to the second equipment Send the second failure message.Therefore VXLAN tunnel detection method provided by the above embodiment, for what is configured in VXLAN network VXLAN tunnel information, the second tunnel configuration information that the second equipment is generated according to own configuration information, with for detect the second tunnel Configuration information i.e. the first tunnel configuration information in first equipment required for road configuration information legitimacy is matched, when second Tunnel configuration information and the first tunnel configuration information for tunnel source IP address in the configuration information in the tunnel same VXLAN with When tunnel destination IP address is overlapped, the first equipment sends the Fisrt fault report comprising above-mentioned illegal content to the second equipment Text;When selecting first IP address in the first tunnel configuration information as the second tunnel destination IP address, according to second When the second tunnel source IP address corresponding with the second tunnel destination IP address of tunnel configuration acquisition of information is not unique, first Equipment sends the second failure message comprising above-mentioned illegal content to the second equipment.Thus to general before establishing the tunnel VXLAN The configuration information for establishing the tunnel VXLAN carries out legitimacy detection and sets when the configuration information of tested equipment is illegal to this It is standby to inform that the configuration information is illegal and the specific illegal content of configuration information, it is lost so as to be established to the tunnel VXLAN The reason of losing is timely feedbacked, and is improved the tunnel VXLAN and is established efficiency, improves user experience.
Referring to shown in Fig. 4, the embodiment of the present invention provides a kind of VXLAN tunnel detector, comprising:
Receiving unit 401, for when the second tunnel configuration information for receiving the transmission of the second equipment.
Wherein the first equipment and the second equipment are VXLAN endpoint of a tunnel (VXLAN Tunnel End Point, VTEP), First equipment and the routing of the second equipment room are reachable, i.e. the first equipment sends data to the second equipment room, and the second equipment can receive The data sent to the first equipment, and feedback data is sent to the first equipment, the first equipment can receive the transmission of the second equipment Feedback data.First equipment and the second equipment can be independent physical equipment, such as router, or operation has void The server of quasi- machine.
Second tunnel configuration information, is included in the first equipment and the second equipment room establishes configuration required for the tunnel VXLAN Information, the second tunnel configuration information may include the tunnel VXLAN destination address i.e. the second IP address IPTA and the tunnel VXLAN The VNI and IPTA of associated VXLAN and the mapping relations of VNI, wherein IPTA is with the second equipment for the tunnel VXLAN source Under the premise of the tunnel VXLAN destination address.One of IPTA can correspond to one or more VNI, and a VNI is only capable of Wherein occur in a mapping relations.Second tunnel configuration information can be generated by the second equipment according to own configuration information, It can be the configuration information having previously been stored in the second equipment.It illustratively, as shown in table 1, is the second tunnel configuration information A kind of specific implementation.
Processing unit 402, for by the first tunnel configuration in the second tunnel configuration information and first equipment Information is matched.
Wherein the first tunnel configuration information is located in the first equipment, and the first tunnel configuration information includes in the first equipment pair The configuration information of first equipment required for the legitimacy of second tunnel configuration information is detected, the first tunnel configuration information can With include the tunnel VXLAN destination address i.e. the first IP address IPTB, with the VNI of the VXLAN of VXLAN tunnel-associated, and The mapping relations of IPTB and VNI, it is the tunnel VXLAN purpose under the premise of the tunnel VXLAN source that wherein IPTB, which is with the first equipment, The address at end.One of IPTB can correspond to one or more VNI, and a VNI is only capable of going out in a wherein mapping relations It is existing.First tunnel configuration information can be generated by the first equipment according to own configuration information, or have previously been stored in first Configuration information in equipment.It illustratively, as shown in table 2, is a kind of specific implementation of the first tunnel configuration information.
Second tunnel configuration information is matched with the first tunnel configuration information, can be from the second tunnel configuration information One VNI of middle taking-up, and IPTA corresponding with the VNI, it is corresponding with the VNI further according to the first tunnel configuration acquisition of information IPTB, when IPTA is identical as IPTB, the second tunnel configuration information and the first tunnel configuration information are mismatched.Second tunnel is matched Confidence breath is matched with the first tunnel configuration information, is also possible to take out an IPTA, root from the second tunnel configuration information According to the IPTA and the second tunnel configuration acquisition of information all VNIs corresponding with the IPTA, according to the first tunnel configuration acquisition of information With all corresponding IPTB of VNI, when acquired IPTB is not unique, the second tunnel configuration information and the first tunnel configuration Information mismatches.
It is illustrative: it is based on the first tunnel configuration information shown in the second tunnel configuration information shown in table 1 and table 2, When being matched to the second tunnel configuration information with the first tunnel configuration information: VNI1 is taken out from the second configuration information, and IPTA1 corresponding with VNI1 obtains IPTB1 corresponding with VNI1, as IPTA1=IPTB1, second according to the first configuration information Configuration information and the first configuration information mismatch.
Transmission unit 403 is used for when the first tunnel configuration information and the second tunnel configuration information mismatch, Failure message is sent to second equipment.
The failure message wherein sent to the second equipment, can be not indicate the second configuration information and the first configuration information not The data matched, or further include indicating that the second configuration information and the first configuration information specifically mismatch the data of type, only Want the first equipment that can inform that the second configuration information is illegal to the second equipment by failure message.
A kind of VXLAN tunnel detector provided in an embodiment of the present invention, comprising: receive the of the second equipment transmission first Two tunnel configuration information;Secondly the second tunnel configuration information is matched with the first tunnel configuration information in the first equipment; Finally when the first tunnel configuration information and the second tunnel configuration information mismatch, failure message is sent to the second equipment;Wherein First tunnel configuration information includes the mapping relations of the first IP address Yu virtual network instance identification VNID, the first IP address be with First equipment establishes the IP address of the destination in the tunnel VXLAN, and the second tunnel configuration information includes the second IP address and virtual net The mapping relations of network instance identification VNID, the second IP address are that the IP of the destination in the tunnel VXLAN is established with second equipment Address, tunnel configuration information establish the tunnel VXLAN for the first equipment and the second equipment.Therefore provided by the above embodiment VXLAN tunnel detection method configures the second equipment according to itself for the VXLAN tunnel information configured in VXLAN network The second tunnel configuration information that information generates, and to detect required for the second tunnel configuration information legitimacy in the first equipment Configuration information i.e. the first tunnel configuration information is matched, and judges whether the second configuration information is legal according to matching result, such as Second configuration information is illegal, sends failure message to the second equipment, so that the second equipment is learnt in the second equipment and establish Configuration information required for the tunnel VXLAN is illegal, to match before establishing the tunnel VXLAN to will establish the tunnel VXLAN Confidence breath carries out legitimacy detection and informs the error message to the equipment when the configuration information of tested equipment is illegal, from And the reason of capable of establishing failure to the tunnel VXLAN, timely feedbacks, and improves the tunnel VXLAN and establishes efficiency, improves use Family experience.
Specifically, in the above-described embodiments, the first equipment and the second equipment can also be to establish side referring to shown in Fig. 4 (or Correspondent Node/equity is real for neighborhood in boundary's gateway protocol (Border Gateway Protocol, abbreviation BGP) Body).
Processing unit 401 can be also used for:
A virtual network instance identification is taken out from the second tunnel configuration information as the first virtual network instance identification; The second IP address corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information, and as the first tunnel Source IP address obtains the first IP address corresponding with the first virtual network instance identification in the first tunnel configuration information, and As the first tunnel destination IP address;A virtual network instance identification is wherein taken out from the second tunnel configuration information, it can Think and take out any one virtual network instance identification from the second tunnel configuration information and as the first virtual network instance identification, It is illustrative: based on the second tunnel configuration information shown in table 1, VNI2 to be taken out from the second tunnel configuration information, as first Virtual network instance identification.
The second IP address corresponding with the first virtual network instance identification is wherein obtained in the second tunnel configuration information, and As the first tunnel source IP address, it is included in the second tunnel configuration information, acquisition is deposited with the first virtual network instance identification In the second IP address of mapping relations, and as the first tunnel source IP address.It is obtained and the in the first tunnel configuration information Corresponding first IP address of one virtual network instance identification, and as the first tunnel destination IP address, it is included in the first tunnel In configuration information, there are the first IP address of mapping relations with the first virtual network instance identification for acquisition, and as the first tunnel Destination IP address.
Illustratively, based on the second tunnel configuration information shown in table 1, obtaining the first tunnel source IP address includes:
According to the VNI1 taken out in the second configuration information, the IPTA1 with VNI1 mapping is obtained in the second configuration information, is made For the first tunnel source IP address.
Based on the first tunnel configuration information shown in table 2, obtaining the first tunnel destination IP address includes:
According to the VNI1 taken out in the second tunnel configuration information, obtained in the first configuration information and VNI1 mapping IPTB1, as the first tunnel destination IP address.
Transmission unit 403 can be also used for:
When the first tunnel source IP address is identical as the first tunnel destination IP address, the first event is sent to the second equipment Hinder message.
Wherein Fisrt fault message includes that the second tunnel configuration information is illegal and specific illegal content, i.e., and second Tunnel configuration information and the first tunnel configuration information for tunnel source IP address in the configuration information in the tunnel same VXLAN with Tunnel destination IP address is identical.Fisrt fault message can also be including in the second tunnel configuration information in above-mentioned illegal content There is the second IP address being overlapped.
To the second equipment send Fisrt fault message, can for the first equipment by the second tunnel configuration information it is illegal and Specific illegal content is sent to the second equipment in the form of data packet, or the first equipment believes the second tunnel configuration It ceases illegal and specific illegal content and notifies the format of Notification message to be sent to the second equipment by BGP.
Optionally, the second equipment carries out miscue according to the Fisrt fault message after receiving Fisrt fault message.
A kind of VXLAN tunnel detector provided in an embodiment of the present invention, comprising: the first equipment first receives the second equipment The the second tunnel configuration information sent;Secondly a virtual network instance identification is taken out from the second tunnel configuration information as the One virtual network instance identification;Twoth IP corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information Address, and as the first tunnel source IP address, it is obtained and the first virtual network instance identification in the first tunnel configuration information Corresponding first IP address, and as the first tunnel destination IP address;Judge the first tunnel source IP address and the first tunnel Whether destination IP address is identical, sends Fisrt fault message to the second equipment if they are the same;Therefore provided by the above embodiment VXLAN tunnel detection method configures the second equipment according to itself for the VXLAN tunnel information configured in VXLAN network The second tunnel configuration information that information generates, and to detect required for the second tunnel configuration information legitimacy in the first equipment Configuration information i.e. the first tunnel configuration information is matched, when the second tunnel configuration information and the first tunnel configuration information are directed to together When source IP address in tunnel is overlapped with tunnel destination IP address in the configuration information in one tunnel VXLAN, sent out to the second equipment Send the Fisrt fault message comprising above-mentioned illegal content.To before establishing the tunnel VXLAN to the tunnel VXLAN will be established Configuration information carries out legitimacy detection and informs the configuration information to the equipment when the configuration information of tested equipment is illegal The illegal and specific illegal content of configuration information, it is timely so as to establish the reason of failing progress to the tunnel VXLAN Feedback, improves the tunnel VXLAN and establishes efficiency, improve user experience.
Specifically, in the above-described embodiments, processing unit 401 can be also used for referring to shown in Fig. 4:
Second IP address is taken out from the second tunnel configuration information as the second tunnel destination IP address;Second All virtual network instance identifications corresponding with the second tunnel destination IP address are obtained in tunnel configuration information, and as second Virtual network instance identification group;Obtained in the first tunnel configuration information with it is each virtual in the second virtual network instance identification group Network example identifies corresponding tunnel destination IP address.
Wherein one the second IP address of taking-up, can as the second tunnel destination IP address from the second tunnel configuration information Think and takes out any one second IP address from the second tunnel configuration information and as the second tunnel destination IP address, it is exemplary , based on the second tunnel configuration information shown in table 1, VNI4 is taken out from the second tunnel configuration information, as the second tunnel mesh End IP address.
All virtual network examples corresponding with the second tunnel destination IP address are obtained in the second tunnel configuration information Mark, and as the second virtual network instance identification group, including obtain in the second tunnel configuration information with obtain within step 306 The second tunnel destination IP address there are one or more virtual network instance identifications of mapping relations, and by acquired void The set of quasi- network example mark is as the second virtual network instance identification group.
It is obtained in the first tunnel configuration information and each virtual network example mark in the second virtual network instance identification group Know corresponding tunnel destination IP address, including obtains in the first tunnel configuration information and in the second virtual network instance identification group Corresponding first IP address of all virtual network instance identifications, and the first IP address that will acquire is considered as the second tunnel source IP address, the second tunnel source IP address may include one or more first IP address.
Transmission unit 403 can be also used for:
When the second tunnel source IP address is not unique, the second failure message is sent to the second equipment.
Distinguish when acquired in step 307 with virtual network instance identifications all in the second virtual network instance identification group When corresponding first IP address is greater than one, then represents presence and be greater than one and the second tunnel destination IP address corresponding second Tunnel source IP address;When the second tunnel source IP address acquired in step 307 is first IP address, then represent with The corresponding second tunnel source IP address of second tunnel destination IP address is unique.
Wherein the second failure message includes that the second tunnel configuration information is illegal and specific illegal content, i.e., with the The corresponding second tunnel source IP address of two tunnel destination IP address is not unique.
Send the second failure message to the second equipment, can for by the second tunnel configuration information it is illegal and it is specific not Legal content is sent to the second equipment in the form of data packet, or the second tunnel configuration information is illegal and specific Illegal content the second equipment is sent to by the format of BGP Notification message.Second failure message can also wrap Include in above-mentioned illegal content with the first IP address in the first tunnel configuration information as the second tunnel destination IP address, with And second the second IP address in tunnel configuration information as the second tunnel source IP address.
Optionally, the second equipment carries out miscue according to the second failure message after receiving the second failure message.
A kind of VXLAN tunnel detector provided in an embodiment of the present invention, comprising: the first equipment first receives the second equipment The the second tunnel configuration information sent;Second IP address is taken out first from the second tunnel configuration information as the second tunnel Destination IP address;Secondly it is obtained in the second tunnel configuration information corresponding with the second tunnel destination IP address all virtual Network example mark, and as the second virtual network instance identification group;It is obtained in the first tunnel configuration information with second virtually The corresponding tunnel destination IP address of each virtual network instance identification in network example mark group;Finally judge the second virtual net Corresponding i.e. the second tunnel source IP address of tunnel destination IP address of each virtual network instance identification in network instance identification group It is whether unique, if not unique first equipment sends the second failure message to the second equipment.Therefore VXLAN provided by the above embodiment Tunnel detection method, for the VXLAN tunnel information configured in VXLAN network, by the second equipment according to own configuration information The the second tunnel configuration information generated, and to detect the configuration required for the second tunnel configuration information legitimacy in the first equipment Information i.e. the first tunnel configuration information is matched, when selected in the first tunnel configuration information first IP address as Two tunnel destination IP address, according to the second tunnel configuration acquisition of information and the second tunnel destination IP address corresponding second When tunnel source IP address is not unique, the second failure message comprising above-mentioned illegal content is sent to the second equipment.Thus It establishes before the tunnel VXLAN and legitimacy detection is carried out to the configuration information that will establish the tunnel VXLAN, in the configuration of tested equipment When information is illegal, inform that the configuration information is illegal and the specific illegal content of configuration information to the equipment, so as to Enough the reason of establishing failure to the tunnel VXLAN, timely feedback, and improve the tunnel VXLAN and establish efficiency, improve user's body It tests.
Wherein, it should be noted that each unit in the present embodiment can be the processor or sensor individually set up, Also it can integrate and realized in some processor or sensor, in addition it is also possible to be stored in touch-control in the form of program code In the memory of point identification device, the function of above each unit is called by processor and executed.Processor described here can To be a central processing unit (full name in English: Central Processing Unit, English abbreviation: CPU), or matched It is set to the one or more integrated circuits (full name in English: Integrated Circuit, English letter for implementing the embodiment of the present invention Claim: IC);Sensor can be the circuit structure an of electronic component or multiple electronic components composition, or be configured to Implement one or more integrated circuits of the embodiment of the present invention.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by those familiar with the art, all answers It is included within the scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (14)

1. a kind of VXLAN tunnel detection method, which is characterized in that this method comprises:
First equipment receives the second tunnel configuration information that the second equipment is sent;
The second tunnel configuration information is matched with the first tunnel configuration information in first equipment;
When the first tunnel configuration information and the second tunnel configuration information mismatch, first equipment is to described the Two equipment send failure message;
The first tunnel configuration information includes the mapping relations of the first IP address Yu virtual network instance identification VNID, and described One IP address is that the IP address of the destination in the tunnel VXLAN is established with first equipment;The second tunnel configuration packet The mapping relations of the second IP address Yu virtual network instance identification VNID are included, second IP address is to build with second equipment The IP address of the destination in the vertical tunnel VXLAN, wherein tunnel configuration information establishes VXLAN tunnel for the first equipment and the second equipment Road.
2. VXLAN tunnel detection method according to claim 1, it is characterised in that:
It is described to match the second tunnel configuration information with the first tunnel configuration information in first equipment, packet It includes:
The first virtual network instance identification is taken out from the second tunnel configuration information, wherein the first virtual network example It is identified as any virtual network instance identification of the second tunnel configuration information;
The second IP address corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information, and As the first tunnel source IP address;
The first IP address corresponding with the first virtual network instance identification is obtained in the first tunnel configuration information, and As the first tunnel destination IP address;
It is described when the first tunnel configuration information and the second tunnel configuration information mismatch, first equipment is to institute It states the second equipment and sends failure message, comprising:
When the first tunnel source IP address is identical as the first tunnel destination IP address, first equipment is to institute It states the second equipment and sends Fisrt fault message.
3. -2 described in any item VXLAN tunnel detection methods according to claim 1, it is characterised in that:
It is described to match the second tunnel configuration information with the first tunnel configuration information in first equipment, also wrap It includes:
Second IP address is taken out from the second tunnel configuration information as the second tunnel destination IP address;
All virtual networks corresponding with the second tunnel destination IP address are obtained in the second tunnel configuration information Instance identification, and as the second virtual network instance identification group;
It is obtained in the first tunnel configuration information real with virtual network each in the second virtual network instance identification group Example identifies corresponding tunnel destination IP address;
It is described when the first tunnel configuration information and the second tunnel configuration information mismatch, first equipment is to institute It states the second equipment and sends failure message, further includes:
When the corresponding tunnel destination IP address of virtual network instance identification each in the second virtual network instance identification group When not unique, first equipment sends the second failure message to second equipment.
4. VXLAN tunnel detection method according to claim 1 or 2, which is characterized in that first equipment and described the Two equipment are bgp neighbor.
5. VXLAN tunnel detection method according to claim 3, which is characterized in that first equipment and described second Equipment is bgp neighbor.
6. VXLAN tunnel detection method according to claim 4, which is characterized in that the failure message is BGP notice Notification message;
After second equipment receives the failure message, the content according to failure message carries out miscue, and maintains institute It states bgp neighbor and is in established state.
7. VXLAN tunnel detection method according to claim 5, which is characterized in that the failure message is BGP notice Notification message;
After second equipment receives the failure message, the content according to failure message carries out miscue, and maintains institute It states bgp neighbor and is in established state.
8. a kind of VXLAN tunnel detector is located at the first equipment characterized by comprising
Receiving unit, for receiving the second tunnel configuration information of the second equipment transmission;
Processing unit, for carrying out the first tunnel configuration information in the second tunnel configuration information and first equipment Matching;
Transmission unit is used for when the first tunnel configuration information and the second tunnel configuration information mismatch, Xiang Suoshu Second equipment sends failure message;
The first tunnel configuration information includes the mapping relations of the first IP address Yu virtual network instance identification VNID, and described One IP address is that the IP address of the destination in the tunnel VXLAN is established with first equipment;The second tunnel configuration packet The mapping relations of the second IP address Yu virtual network instance identification VNID are included, second IP address is to build with second equipment The IP address of the destination in the vertical tunnel VXLAN, wherein the tunnel configuration information is established for the first equipment and the second equipment The tunnel VXLAN.
9. VXLAN tunnel detector according to claim 8, which is characterized in that the processing unit is also used to:
The first virtual network instance identification is taken out from the second tunnel configuration information, wherein the first virtual network example It is identified as any virtual network instance identification of the second tunnel configuration information;
The second IP address corresponding with the first virtual network instance identification is obtained in the second tunnel configuration information, and As the first tunnel source IP address;
The first IP address corresponding with the first virtual network instance identification is obtained in the first tunnel configuration information, and As the first tunnel destination IP address;
The transmission unit is also used to:
When the first tunnel source IP address is identical as the first tunnel destination IP address, the second equipment of Xiang Suoshu hair Send Fisrt fault message.
10. VXLAN tunnel detector according to claim 8 or claim 9, which is characterized in that the processing unit is also used to:
Second IP address is taken out from the second tunnel configuration information as the second tunnel destination IP address;
All virtual networks corresponding with the second tunnel destination IP address are obtained in the second tunnel configuration information Instance identification, and as the second virtual network instance identification group;
It is obtained in the first tunnel configuration information real with virtual network each in the second virtual network instance identification group Example identifies corresponding tunnel destination IP address;
The transmission unit is also used to:
When the corresponding tunnel destination IP address of virtual network instance identification each in the second virtual network instance identification group When not unique, the second equipment of Xiang Suoshu sends the second failure message.
11. VXLAN tunnel detector according to claim 8 or claim 9, which is characterized in that first equipment with it is described Second equipment is bgp neighbor.
12. VXLAN tunnel detector according to claim 10, which is characterized in that first equipment and described the Two equipment are bgp neighbor.
13. VXLAN tunnel detector according to claim 11, which is characterized in that the failure message is BGP notice Notification message;
After second equipment receives the failure message, the content according to failure message carries out miscue, and maintains institute It states bgp neighbor and is in established state.
14. VXLAN tunnel detector according to claim 12, which is characterized in that the failure message is BGP notice Notification message;
After second equipment receives the failure message, the content according to failure message carries out miscue, and maintains institute It states bgp neighbor and is in established state.
CN201510931765.1A 2015-12-14 2015-12-14 A kind of VXLAN tunnel detection method and device Active CN105490884B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510931765.1A CN105490884B (en) 2015-12-14 2015-12-14 A kind of VXLAN tunnel detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510931765.1A CN105490884B (en) 2015-12-14 2015-12-14 A kind of VXLAN tunnel detection method and device

Publications (2)

Publication Number Publication Date
CN105490884A CN105490884A (en) 2016-04-13
CN105490884B true CN105490884B (en) 2019-04-02

Family

ID=55677625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510931765.1A Active CN105490884B (en) 2015-12-14 2015-12-14 A kind of VXLAN tunnel detection method and device

Country Status (1)

Country Link
CN (1) CN105490884B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108123864B (en) * 2016-11-30 2020-09-25 新华三技术有限公司 EVPN tunnel monitoring method and device
CN108617008B (en) * 2016-12-05 2019-09-17 大唐移动通信设备有限公司 A kind of method and apparatus of business data processing
CN107171966B (en) * 2017-07-27 2019-11-26 迈普通信技术股份有限公司 A kind of VXLAN file transmitting method, VTEP and VXLAN system
CN111225006A (en) * 2018-11-23 2020-06-02 中兴通讯股份有限公司 Connection establishing method, message transmission method, device and storage medium
CN112583690B (en) * 2019-09-27 2022-08-19 华为技术有限公司 Tunnel configuration method, device, system, equipment and storage medium
CN112887185B (en) * 2019-11-29 2024-03-15 华为云计算技术有限公司 Communication method and device of overlay network
CN111130978B (en) * 2019-12-03 2021-11-23 杭州迪普科技股份有限公司 Network traffic forwarding method and device, electronic equipment and machine-readable storage medium
CN113923075A (en) * 2020-07-09 2022-01-11 华为技术有限公司 Data transmission method and device
CN112187611B (en) * 2020-09-30 2022-03-25 瑞斯康达科技发展股份有限公司 Method, storage medium and device for establishing service tunnel
CN113746715B (en) * 2021-07-16 2023-03-31 北京华三通信技术有限公司 Method and device for realizing cross-three-layer transmission of two-layer message

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7373660B1 (en) * 2003-08-26 2008-05-13 Cisco Technology, Inc. Methods and apparatus to distribute policy information
CN102822835A (en) * 2010-01-20 2012-12-12 先行有限公司 Personal portable secured network access system
CN103580980A (en) * 2012-07-24 2014-02-12 中兴通讯股份有限公司 Automatic searching and automatic configuration method and device of VN
CN104243268A (en) * 2014-09-19 2014-12-24 杭州华三通信技术有限公司 Association method and device between virtual extensible local area networks (VXLAN) and tunnel
US8954601B1 (en) * 2007-06-15 2015-02-10 Juniper Networks, Inc. Authentication and encryption of routing protocol traffic
CN104468394A (en) * 2014-12-04 2015-03-25 杭州华三通信技术有限公司 Method and device for forwarding messages in VXLAN network
CN104767666A (en) * 2015-04-15 2015-07-08 杭州华三通信技术有限公司 Virtual extensible local area network tunnel terminal tunnel building method and equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8948054B2 (en) * 2011-12-30 2015-02-03 Cisco Technology, Inc. System and method for discovering multipoint endpoints in a network environment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7373660B1 (en) * 2003-08-26 2008-05-13 Cisco Technology, Inc. Methods and apparatus to distribute policy information
US8954601B1 (en) * 2007-06-15 2015-02-10 Juniper Networks, Inc. Authentication and encryption of routing protocol traffic
CN102822835A (en) * 2010-01-20 2012-12-12 先行有限公司 Personal portable secured network access system
CN103580980A (en) * 2012-07-24 2014-02-12 中兴通讯股份有限公司 Automatic searching and automatic configuration method and device of VN
CN104243268A (en) * 2014-09-19 2014-12-24 杭州华三通信技术有限公司 Association method and device between virtual extensible local area networks (VXLAN) and tunnel
CN104468394A (en) * 2014-12-04 2015-03-25 杭州华三通信技术有限公司 Method and device for forwarding messages in VXLAN network
CN104767666A (en) * 2015-04-15 2015-07-08 杭州华三通信技术有限公司 Virtual extensible local area network tunnel terminal tunnel building method and equipment

Also Published As

Publication number Publication date
CN105490884A (en) 2016-04-13

Similar Documents

Publication Publication Date Title
CN105490884B (en) A kind of VXLAN tunnel detection method and device
CN103401726B (en) Network path detection method and device, system
CN105577417B (en) Message forwarding method and device based on VXLAN network
CN103581021B (en) The method and apparatus of business detection under software defined network
CN113595897B (en) Path detection method and device
CN107819677A (en) A kind of message forwarding method and device
CN104660469B (en) A kind of method for detecting connectivity and relevant device of double layer network
CN103580894B (en) Method, equipment and the system of Operations, Administration and Maintenance OAM configurations
CN105227466B (en) Communication processing method and device
CN104253745B (en) A kind of route withdraw method and the network equipment
CN104468368B (en) Configure the method and device of bgp neighbor
US10856202B2 (en) Creation of a wireless mesh network among proximately located wireless devices
CN104852840A (en) Method and device for controlling mutual access between virtual machines
CN102349277A (en) Intrusion detection for virtual layer-2 services
CN106878136A (en) A kind of message forwarding method and device
CN104579973B (en) Message forwarding method and device in a kind of Virtual Cluster
CN106452862A (en) Method and device for determining loop network
CN105207909B (en) A kind of method and network equipment sending information
JP5267065B2 (en) Communication apparatus and network test method
CN104009919B (en) Message forwarding method and device
US8514724B2 (en) Testing connectivity in networks using overlay transport virtualization
WO2018232910A1 (en) Method and system for determining data transmission routes between internet of things devices
CN102571464B (en) Link tracking processing method and system
US9893979B2 (en) Network topology discovery by resolving loops
CN105763411B (en) Method and device for establishing multicast tunnel

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant