Virtual Extensible LAN (VXLAN) is a network virtualization technology that attempts to address the scalability problems associated with large cloud computing deployments. It uses a VLAN-like encapsulation technique to encapsulate OSI layer 2 Ethernet frames within layer 4 UDP datagrams, using 4789 as the default IANA-assigned destination UDP port number,[1] although many implementations that predate the IANA assignment use port 8472.[2] VXLAN endpoints, which terminate VXLAN tunnels and may be either virtual or physical switch ports, are known as VXLAN tunnel endpoints (VTEPs).[3][4]
VXLAN is an evolution of efforts to standardize on an overlay encapsulation protocol. Compared to single-tagged IEEE 802.1Q VLANs which provide a limited number of layer-2 VLANs (4094, using a 12-bit VLAN ID), VXLAN increases scalability up to about 16 million logical networks (using a 24-bit VNID) and allows for layer-2 adjacency across IP networks. Multicast or unicast with head-end replication (HER) is used to flood Broadcast, unknown-unicast and multicast traffic.[5]
The VXLAN specification was originally created by VMware, Arista Networks and Cisco.[6][7] Other backers of the VXLAN technology include Huawei,[8] Broadcom, Citrix, Pica8, Big Switch Networks, Cumulus Networks, Dell EMC, Ericsson, Mellanox,[9] FreeBSD,[10] OpenBSD,[11] Red Hat,[12] Joyent, and Juniper Networks.
VXLAN is officially documented by the IETF in RFC 7348.[12] VXLAN encapsulates a MAC frame in a UDP datagram for transport across an IP network,[13] creating an overlay network or tunnel.
Open vSwitch is an example of a software-based virtual network switch that supports VXLAN overlay networks.
^Steve Herrod (August 30, 2011). "Towards Virtualized Networking for the Cloud". VMware. Retrieved 2013-02-25.
^"Arista Expands Leaf Switch Product Portfolio" (Press release). Arista Networks. 22 October 2014. Retrieved 8 November 2014. Arista's updated VXLAN implementation eliminates the need for multicast in the underlay network by using Head End Replication for forwarding broadcast, multicast and unknown unicast traffic
^Timothy Prickett Morgan (30 August 2011). "VMware, Cisco stretch virtual LANs across the heavens". The Register. Retrieved 2013-02-25.
^"VXLAN Bridges Virtual and Physical Networks to the Cloud" (PDF). Retrieved 2013-12-01.
^"Huawei CE12800 Series Data Center Switches - Huawei products". Huawei. December 2012.
^Timothy Pricket Morgan (April 23, 2013). "Mellanox adds VM-flitting to ConnectX-3 adapters - Going Pro with VXLAN". The Register.
^"FreeBSD 10.2-RELEASE Release Notes". The FreeBSD Project. Retrieved 30 June 2016.
VirtualExtensibleLAN (VXLAN) is a network virtualization technology that attempts to address the scalability problems associated with large cloud computing...
principal backer is Microsoft. VirtualExtensibleLAN (VXLAN), a similar competing specification Generic Networking Virtualization Encapsulation (GENEVE), an...
Virtual Private LAN Service (VPLS) is a way to provide Ethernet-based multipoint to multipoint communication over IP or MPLS networks. It allows geographically...
re-programmed to add new features that work at wire-speed, such as VirtualExtensibleLAN (VXLAN) or network address translation (NAT/PAT). 7130 series (7130...
NVGRE OSI model (Diagram) Pseudo-wire Stunnel Tunnel broker VirtualExtensibleLAN (VXLAN) Virtual private network (VPN) "Upgrading to TLS Within HTTP/1.1"...
EVPN with VXLAN Data Plane Encapsulation - TechLibrary - Juniper Networks". www.juniper.net. Retrieved 2019-12-19. Virtual Private LAN Service v t e...
Protocol Point-to-Point Tunneling Protocol Point-to-Point Protocol VirtualExtensibleLAN See example of reseller ISPs using L2TP. IETF (1999), RFC 2661,...
time-division multiplexing (TDM) circuit. VirtualExtensibleLANVirtual Private LAN Service Layer 2 Virtual Private Networks (l2vpn) working group homepage...
establish communication through virtual private network (VPN) technologies to ease usage over the Internet, or as a LAN connection if VPN is used as a...
frames into UDP packets using the VirtualExtensibleLAN (VXLAN) frame format, and provide virtual interfaces for virtual machines to plug into, similarly...
support Support for multiple tunneling protocols, including GRE, VirtualExtensibleLAN (VXLAN), Stateless Transport Tunneling (STT) and Geneve, with additional...
XHTML—eXtensible Hypertext Markup Language XILP—X Interactive ListProc XML—eXtensible Markup Language XMMS—X Multimedia System XMPP—eXtensible Messaging...
support the VirtualExtensibleLAN (VXLAN), an encapsulation protocol for running virtual networks across the network. The HP Virtual Cloud Networking...
authorization for access of wireless and wired LANs. In addition to this, extra measures such as the Extensible Authentication Protocol (EAP) have initiated...
up.[clarification needed] Meru Networks develops and markets a virtualized wireless LAN solution that enables enterprises to migrate applications from...
purpose of a firewall. The design is modular, making its functionalities extensible through plugins, but the base comes with the following features Stateful...
Operating System; DNOS9 is NetBSD based, while OS10 uses the Linux kernel Extensible Operating System runs on switches from Arista and uses an unmodified Linux...
an extensible multipathing mechanism to allow many more multipath variations in the future. 802.1aq supports the dynamic creation of virtualLAN's that...
with low level APIs for rendering, physics, audio, AI all of which are extensible through plug-ins which also serve the official high-level API. The aim...
creating a rich network of end-user created interlinked virtual worlds. It is more extensible than the proprietary technologies behind collaborative worlds...
the directory store, in Windows 2000 Server uses the JET Blue-based Extensible Storage Engine (ESE98). Each domain controller's database is limited to...
OpenVMS, often referred to as just VMS, is a multi-user, multiprocessing and virtual memory-based operating system. It is designed to support time-sharing,...
OpenVPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or...
system are responsible for ensuring integrity. For example, the Unified Extensible Firmware Interface (UEFI) can use TPM to form a root of trust: The TPM...