pvlan
Project: http://git-wip-us.apache.org/repos/asf/cloudstack/repo Commit: http://git-wip-us.apache.org/repos/asf/cloudstack/commit/840e14de Tree: http://git-wip-us.apache.org/repos/asf/cloudstack/tree/840e14de Diff: http://git-wip-us.apache.org/repos/asf/cloudstack/diff/840e14de Branch: refs/heads/disk_io_throttling Commit: 840e14de0b322013a496f62958889383f9ccc1e3 Parents: 78811c5 Author: radhikap <radhika.puthiyet...@citrix.com> Authored: Mon Jun 10 17:56:27 2013 +0530 Committer: radhikap <radhika.puthiyet...@citrix.com> Committed: Mon Jun 10 17:56:27 2013 +0530 ---------------------------------------------------------------------- docs/en-US/pvlan.xml | 117 +++++++++++++++++++++++++++++++++++++++------- 1 file changed, 99 insertions(+), 18 deletions(-) ---------------------------------------------------------------------- http://git-wip-us.apache.org/repos/asf/cloudstack/blob/840e14de/docs/en-US/pvlan.xml ---------------------------------------------------------------------- diff --git a/docs/en-US/pvlan.xml b/docs/en-US/pvlan.xml index 5084ec4..e3f2ea3 100644 --- a/docs/en-US/pvlan.xml +++ b/docs/en-US/pvlan.xml @@ -21,27 +21,25 @@ --> <section id="pvlan"> <title>Isolation in Advanced Zone Using Private VLAN</title> - <para/> + <para>Isolation of guest traffic in shared networks can be achieved by using Private VLANs + (PVLAN). PVLANs provide Layer 2 isolation between ports within the same VLAN. In a PVLAN-enabled + shared network, a user VM cannot reach other user VM though they can reach the DHCP server and + gateway, this would in turn allow users to control traffic within a network and help them deploy + multiple applications without communication between application as well as prevent communication + with other usersâ VMs.</para> <itemizedlist> <listitem> - <para>isolate VMs from other VMs on the same network (Shared Networks are the most common use - case) using PVLANs</para> + <para>Isolate VMs in a shared networks by using Private VLANs.</para> </listitem> <listitem> - <para>create a Network Offering enabling PVLAN support</para> + <para>Supported in both VPC and non-VPC deployments.</para> </listitem> <listitem> - <para>create shared networks based on a network offering which has PVLANs enabled</para> + <para>Supported on all hypervisors.</para> </listitem> <listitem> - <para>supported in VPC as well as non-VPC deployments</para> - </listitem> - <listitem> - <para>supported on all Hypervisors</para> - </listitem> - <listitem> - <para>Allow end users to deploy VMs on Isolated Networks or VPC along with the Shared Networks - that have PVLAN support</para> + <para>Allow end users to deploy VMs in an isolated networks, or a VPC, or a Private + VLAN-enabled shared network.</para> </listitem> </itemizedlist> <section id="about-pvlan"> @@ -54,7 +52,38 @@ Secondary VLAN. The original VLAN that is being divided into smaller groups is called Primary, which implies that all VLAN pairs in a private VLAN share the same Primary VLAN. All the secondary VLANs exist only inside the Primary. Each Secondary VLAN has a specific VLAN ID - associated to it, which differentiates one sub-domain from another.</para> + associated to it, which differentiates one sub-domain from another. </para> + <para>Three types of ports exist in a private VLAN domain, which essentially determine the + behaviour of the participating hosts. Each ports will have its own unique set of rules, which + regulate a connected host's ability to communicate with other connected host within the same + private VLAN domain. Configure each host that is part of a PVLAN pair can be by using one of + these three port designation:</para> + <itemizedlist> + <listitem> + <para><emphasis role="bold">Promiscuous</emphasis>: A promiscuous port can communicate with + all the interfaces, including the community and isolated host ports that belong to the + secondary VLANs. In Promiscuous mode, hosts are connected to promiscuous ports and are + able to communicate directly with resources on both primary and secondary VLAN. Routers, + DHCP servers, and other trusted devices are typically attached to promiscuous + ports.</para> + </listitem> + <listitem> + <para><emphasis role="bold">Isolated VLANs</emphasis>: The ports within an isolated VLAN + cannot communicate with each other at the layer-2 level. The hosts that are connected to + Isolated ports can directly communicate only with the Promiscuous resources. If your + customer device needs to have access only to a gateway router, attach it to an isolated + port.</para> + </listitem> + <listitem> + <para><emphasis role="bold">Community VLANs</emphasis>: The ports within a community VLAN + can communicate with each other and with the promiscuous ports, but they cannot + communicate with the ports in other communities at the layer-2 level. In a Community mode, + direct communication is permitted only with the hosts in the same community and those that + are connected to the Primary PVLAN in promiscuous mode. If your customer has two devices + that need to be isolated from other customers' devices, but to be able to communicate + among themselves, deploy them in community ports.</para> + </listitem> + </itemizedlist> <para>For further reading:</para> <itemizedlist> <listitem> @@ -72,11 +101,63 @@ </listitem> </itemizedlist> </section> - <section id="ability-pvlan"> - <title>Prerequisites</title> - </section> <section id="prereq-pvlan"> <title>Prerequisites</title> - <para>Ensure that you configure private VLAN on your physical switches out-of-band.</para> + <itemizedlist> + <listitem> + <para>Use a PVLAN supported switch.</para> + <para>See <ulink + url="http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a0080094830.shtml" + >Private VLAN Catalyst Switch Support Matrix</ulink>for more information.</para> + </listitem> + <listitem> + <para>Connect a switch to the gateway; connect additional switches to the gateway via a + trunk port: Only Cisco Catalyst 4500 has the PVLAN promiscuous trunk mode to connect both + normal VLAN and PVLAN to a PVLAN-unaware switch. For other Catalyst PVLAN support switch, + connect the switch to upper switch by using cables. The number of cables should be greater + than the number of PVLANs used.</para> + </listitem> + <listitem> + <para>All the layer 2 switches, which are PVLAN-aware, are connected to each other, and one + of them is connected to a router. All the ports connected to the host would be configured + in trunk mode. Allow Management VLAN, Primary VLAN (public) and secondary Isolated VLAN + ports. Configure the switch port connected to the router in PVLAN promiscuous trunk mode, + which would translate an isolated VLAN to primary VLAN for router, which is PVLAN-unaware. + </para> + </listitem> + <listitem> + <para>If your Catalyst switch supports PVLAN, but not PVLAN promiscuous trunk mode, perform + the following: </para> + <orderedlist numeration="loweralpha"> + <listitem> + <para>Configure one of the switch port as trunk for management network (management + VLAN).</para> + </listitem> + <listitem> + <para>For each PVLAN, perform the following:</para> + <orderedlist numeration="lowerroman"> + <listitem> + <para>Connect one port of the Catalyst switch to the upper switch.</para> + </listitem> + <listitem> + <para>Set the port in the Catalyst Switch in promiscuous mode for one pair of + PVLAN</para> + </listitem> + <listitem> + <para>Set the port in upper switch to access mode, and allow only the traffic of + primary VLAN of the PVLAN pair.</para> + </listitem> + </orderedlist> + </listitem> + </orderedlist> + </listitem> + <listitem> + <para>Configure private VLAN on your physical switches out-of-band.</para> + </listitem> + </itemizedlist> + </section> + <section id="ability-pvlan"> + <title/> + <para/> </section> </section>