€•ÿ>Œsphinx.addnodes”Œdocument”“”)”}”(Œ rawsource”Œ”Œchildren”]”(Œ translations”Œ LanguagesNode”“”)”}”(hhh]”(hŒ pending_xref”“”)”}”(hhh]”Œdocutils.nodes”ŒText”“”ŒChinese (Simplified)”…””}”Œparent”hsbaŒ attributes”}”(Œids”]”Œclasses”]”Œnames”]”Œdupnames”]”Œbackrefs”]”Œ refdomain”Œstd”Œreftype”Œdoc”Œ reftarget”Œ$/translations/zh_CN/networking/vxlan”Œmodname”NŒ classname”NŒ refexplicit”ˆuŒtagname”hhh ubh)”}”(hhh]”hŒChinese (Traditional)”…””}”hh2sbah}”(h]”h ]”h"]”h$]”h&]”Œ refdomain”h)Œreftype”h+Œ reftarget”Œ$/translations/zh_TW/networking/vxlan”Œmodname”NŒ classname”NŒ refexplicit”ˆuh1hhh ubh)”}”(hhh]”hŒItalian”…””}”hhFsbah}”(h]”h ]”h"]”h$]”h&]”Œ refdomain”h)Œreftype”h+Œ reftarget”Œ$/translations/it_IT/networking/vxlan”Œmodname”NŒ classname”NŒ refexplicit”ˆuh1hhh ubh)”}”(hhh]”hŒJapanese”…””}”hhZsbah}”(h]”h ]”h"]”h$]”h&]”Œ refdomain”h)Œreftype”h+Œ reftarget”Œ$/translations/ja_JP/networking/vxlan”Œmodname”NŒ classname”NŒ refexplicit”ˆuh1hhh ubh)”}”(hhh]”hŒKorean”…””}”hhnsbah}”(h]”h ]”h"]”h$]”h&]”Œ refdomain”h)Œreftype”h+Œ reftarget”Œ$/translations/ko_KR/networking/vxlan”Œmodname”NŒ classname”NŒ refexplicit”ˆuh1hhh ubh)”}”(hhh]”hŒSpanish”…””}”hh‚sbah}”(h]”h ]”h"]”h$]”h&]”Œ refdomain”h)Œreftype”h+Œ reftarget”Œ$/translations/sp_SP/networking/vxlan”Œmodname”NŒ classname”NŒ refexplicit”ˆuh1hhh ubeh}”(h]”h ]”h"]”h$]”h&]”Œcurrent_language”ŒEnglish”uh1h hhŒ _document”hŒsource”NŒline”NubhŒcomment”“”)”}”(hŒ SPDX-License-Identifier: GPL-2.0”h]”hŒ SPDX-License-Identifier: GPL-2.0”…””}”hh£sbah}”(h]”h ]”h"]”h$]”h&]”Œ xml:space”Œpreserve”uh1h¡hhhžhhŸŒ>/var/lib/git/docbuild/linux/Documentation/networking/vxlan.rst”h KubhŒsection”“”)”}”(hhh]”(hŒtitle”“”)”}”(hŒ6Virtual eXtensible Local Area Networking documentation”h]”hŒ6Virtual eXtensible Local Area Networking documentation”…””}”(hh»hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h¹hh¶hžhhŸh³h KubhŒ paragraph”“”)”}”(hŒ¾The VXLAN protocol is a tunnelling protocol designed to solve the problem of limited VLAN IDs (4096) in IEEE 802.1q. With VXLAN the size of the identifier is expanded to 24 bits (16777216).”h]”hŒ¾The VXLAN protocol is a tunnelling protocol designed to solve the problem of limited VLAN IDs (4096) in IEEE 802.1q. With VXLAN the size of the identifier is expanded to 24 bits (16777216).”…””}”(hhËhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h Khh¶hžhubhÊ)”}”(hX VXLAN is described by IETF RFC 7348, and has been implemented by a number of vendors. The protocol runs over UDP using a single destination port. This document describes the Linux kernel tunnel device, there is also a separate implementation of VXLAN for Openvswitch.”h]”hX VXLAN is described by IETF RFC 7348, and has been implemented by a number of vendors. The protocol runs over UDP using a single destination port. This document describes the Linux kernel tunnel device, there is also a separate implementation of VXLAN for Openvswitch.”…””}”(hhÙhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h K hh¶hžhubhÊ)”}”(hŒþUnlike most tunnels, a VXLAN is a 1 to N network, not just point to point. A VXLAN device can learn the IP address of the other endpoint either dynamically in a manner similar to a learning bridge, or make use of statically-configured forwarding entries.”h]”hŒþUnlike most tunnels, a VXLAN is a 1 to N network, not just point to point. A VXLAN device can learn the IP address of the other endpoint either dynamically in a manner similar to a learning bridge, or make use of statically-configured forwarding entries.”…””}”(hhçhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h Khh¶hžhubhÊ)”}”(hŒØThe management of vxlan is done in a manner similar to its two closest neighbors GRE and VLAN. Configuring VXLAN requires the version of iproute2 that matches the kernel release where VXLAN was first merged upstream.”h]”hŒØThe management of vxlan is done in a manner similar to its two closest neighbors GRE and VLAN. Configuring VXLAN requires the version of iproute2 that matches the kernel release where VXLAN was first merged upstream.”…””}”(hhõhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h Khh¶hžhubhŒenumerated_list”“”)”}”(hhh]”hŒ list_item”“”)”}”(hŒdCreate vxlan device:: # ip link add vxlan0 type vxlan id 42 group 239.1.1.1 dev eth1 dstport 4789 ”h]”(hÊ)”}”(hŒCreate vxlan device::”h]”hŒCreate vxlan device:”…””}”(hjhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h Khj ubhŒ literal_block”“”)”}”(hŒK# ip link add vxlan0 type vxlan id 42 group 239.1.1.1 dev eth1 dstport 4789”h]”hŒK# ip link add vxlan0 type vxlan id 42 group 239.1.1.1 dev eth1 dstport 4789”…””}”hjsbah}”(h]”h ]”h"]”h$]”h&]”h±h²uh1jhŸh³h Khj ubeh}”(h]”h ]”h"]”h$]”h&]”uh1jhjhžhhŸh³h Nubah}”(h]”h ]”h"]”h$]”h&]”Œenumtype”Œarabic”Œprefix”hŒsuffix”Œ.”uh1jhh¶hžhhŸh³h KubhÊ)”}”(hX©This creates a new device named vxlan0. The device uses the multicast group 239.1.1.1 over eth1 to handle traffic for which there is no entry in the forwarding table. The destination port number is set to the IANA-assigned value of 4789. The Linux implementation of VXLAN pre-dates the IANA's selection of a standard destination port number and uses the Linux-selected value by default to maintain backwards compatibility.”h]”hX«This creates a new device named vxlan0. The device uses the multicast group 239.1.1.1 over eth1 to handle traffic for which there is no entry in the forwarding table. The destination port number is set to the IANA-assigned value of 4789. The Linux implementation of VXLAN pre-dates the IANA’s selection of a standard destination port number and uses the Linux-selected value by default to maintain backwards compatibility.”…””}”(hj=hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h Khh¶hžhubj)”}”(hhh]”(j )”}”(hŒ0Delete vxlan device:: # ip link delete vxlan0 ”h]”(hÊ)”}”(hŒDelete vxlan device::”h]”hŒDelete vxlan device:”…””}”(hjRhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h K'hjNubj)”}”(hŒ# ip link delete vxlan0”h]”hŒ# ip link delete vxlan0”…””}”hj`sbah}”(h]”h ]”h"]”h$]”h&]”h±h²uh1jhŸh³h K)hjNubeh}”(h]”h ]”h"]”h$]”h&]”uh1jhjKhžhhŸh³h Nubj )”}”(hŒ-Show vxlan info:: # ip -d link show vxlan0 ”h]”(hÊ)”}”(hŒShow vxlan info::”h]”hŒShow vxlan info:”…””}”(hjxhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h K+hjtubj)”}”(hŒ# ip -d link show vxlan0”h]”hŒ# ip -d link show vxlan0”…””}”hj†sbah}”(h]”h ]”h"]”h$]”h&]”h±h²uh1jhŸh³h K-hjtubeh}”(h]”h ]”h"]”h$]”h&]”uh1jhjKhžhhŸh³h Nubeh}”(h]”h ]”h"]”h$]”h&]”j8j9j:hj;j<Œstart”Kuh1jhh¶hžhhŸh³h K'ubhÊ)”}”(hŒfIt is possible to create, destroy and display the vxlan forwarding table using the new bridge command.”h]”hŒfIt is possible to create, destroy and display the vxlan forwarding table using the new bridge command.”…””}”(hj¡hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h K/hh¶hžhubj)”}”(hhh]”(j )”}”(hŒbCreate forwarding table entry:: # bridge fdb add to 00:17:42:8a:b4:05 dst 192.19.0.2 dev vxlan0 ”h]”(hÊ)”}”(hŒCreate forwarding table entry::”h]”hŒCreate forwarding table entry:”…””}”(hj¶hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h K2hj²ubj)”}”(hŒ?# bridge fdb add to 00:17:42:8a:b4:05 dst 192.19.0.2 dev vxlan0”h]”hŒ?# bridge fdb add to 00:17:42:8a:b4:05 dst 192.19.0.2 dev vxlan0”…””}”hjÄsbah}”(h]”h ]”h"]”h$]”h&]”h±h²uh1jhŸh³h K4hj²ubeh}”(h]”h ]”h"]”h$]”h&]”uh1jhj¯hžhhŸh³h Nubj )”}”(hŒSDelete forwarding table entry:: # bridge fdb delete 00:17:42:8a:b4:05 dev vxlan0 ”h]”(hÊ)”}”(hŒDelete forwarding table entry::”h]”hŒDelete forwarding table entry:”…””}”(hjÜhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h K6hjØubj)”}”(hŒ0# bridge fdb delete 00:17:42:8a:b4:05 dev vxlan0”h]”hŒ0# bridge fdb delete 00:17:42:8a:b4:05 dev vxlan0”…””}”hjêsbah}”(h]”h ]”h"]”h$]”h&]”h±h²uh1jhŸh³h K8hjØubeh}”(h]”h ]”h"]”h$]”h&]”uh1jhj¯hžhhŸh³h Nubj )”}”(hŒ7Show forwarding table:: # bridge fdb show dev vxlan0 ”h]”(hÊ)”}”(hŒShow forwarding table::”h]”hŒShow forwarding table:”…””}”(hjhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h K:hjþubj)”}”(hŒ# bridge fdb show dev vxlan0”h]”hŒ# bridge fdb show dev vxlan0”…””}”hjsbah}”(h]”h ]”h"]”h$]”h&]”h±h²uh1jhŸh³h Khh¶hžhubhŒ block_quote”“”)”}”(hX€- `tx-udp_tnl-segmentation` - `tx-udp_tnl-csum-segmentation` ability to perform TCP segmentation offload of UDP encapsulated frames - `rx-udp_tunnel-port-offload` receive side parsing of UDP encapsulated frames which allows NICs to perform protocol-aware offloads, like checksum validation offload of inner frames (only needed by NICs without protocol-agnostic offloads) ”h]”hŒ bullet_list”“”)”}”(hhh]”(j )”}”(hŒ`tx-udp_tnl-segmentation`”h]”hÊ)”}”(hjEh]”hŒtitle_reference”“”)”}”(hjEh]”hŒtx-udp_tnl-segmentation”…””}”(hjLhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1jJhjGubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h KBhjCubah}”(h]”h ]”h"]”h$]”h&]”uh1jhj@ubj )”}”(hŒg`tx-udp_tnl-csum-segmentation` ability to perform TCP segmentation offload of UDP encapsulated frames ”h]”hŒdefinition_list”“”)”}”(hhh]”hŒdefinition_list_item”“”)”}”(hŒf`tx-udp_tnl-csum-segmentation` ability to perform TCP segmentation offload of UDP encapsulated frames ”h]”(hŒterm”“”)”}”(hŒ`tx-udp_tnl-csum-segmentation`”h]”jK)”}”(hjxh]”hŒtx-udp_tnl-csum-segmentation”…””}”(hjzhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1jJhjvubah}”(h]”h ]”h"]”h$]”h&]”uh1jthŸh³h KDhjpubhŒ definition”“”)”}”(hhh]”hÊ)”}”(hŒFability to perform TCP segmentation offload of UDP encapsulated frames”h]”hŒFability to perform TCP segmentation offload of UDP encapsulated frames”…””}”(hj’hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h KDhjubah}”(h]”h ]”h"]”h$]”h&]”uh1jhjpubeh}”(h]”h ]”h"]”h$]”h&]”uh1jnhŸh³h KDhjkubah}”(h]”h ]”h"]”h$]”h&]”uh1jihjeubah}”(h]”h ]”h"]”h$]”h&]”uh1jhj@ubj )”}”(hŒð`rx-udp_tunnel-port-offload` receive side parsing of UDP encapsulated frames which allows NICs to perform protocol-aware offloads, like checksum validation offload of inner frames (only needed by NICs without protocol-agnostic offloads) ”h]”jj)”}”(hhh]”jo)”}”(hŒí`rx-udp_tunnel-port-offload` receive side parsing of UDP encapsulated frames which allows NICs to perform protocol-aware offloads, like checksum validation offload of inner frames (only needed by NICs without protocol-agnostic offloads) ”h]”(ju)”}”(hŒ`rx-udp_tunnel-port-offload`”h]”jK)”}”(hjÅh]”hŒrx-udp_tunnel-port-offload”…””}”(hjÇhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1jJhjÃubah}”(h]”h ]”h"]”h$]”h&]”uh1jthŸh³h KIhj¿ubjŽ)”}”(hhh]”hÊ)”}”(hŒÏreceive side parsing of UDP encapsulated frames which allows NICs to perform protocol-aware offloads, like checksum validation offload of inner frames (only needed by NICs without protocol-agnostic offloads)”h]”hŒÏreceive side parsing of UDP encapsulated frames which allows NICs to perform protocol-aware offloads, like checksum validation offload of inner frames (only needed by NICs without protocol-agnostic offloads)”…””}”(hjÝhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h KGhjÚubah}”(h]”h ]”h"]”h$]”h&]”uh1jhj¿ubeh}”(h]”h ]”h"]”h$]”h&]”uh1jnhŸh³h KIhj¼ubah}”(h]”h ]”h"]”h$]”h&]”uh1jihj¸ubah}”(h]”h ]”h"]”h$]”h&]”uh1jhj@ubeh}”(h]”h ]”h"]”h$]”h&]”Œbullet”Œ-”uh1j>hŸh³h KBhj:ubah}”(h]”h ]”h"]”h$]”h&]”uh1j8hŸh³h KBhh¶hžhubhÊ)”}”(hŒ~For devices supporting `rx-udp_tunnel-port-offload` the list of currently offloaded ports can be interrogated with `ethtool`::”h]”(hŒFor devices supporting ”…””}”(hjhžhhŸNh NubjK)”}”(hŒ`rx-udp_tunnel-port-offload`”h]”hŒrx-udp_tunnel-port-offload”…””}”(hjhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1jJhjubhŒ@ the list of currently offloaded ports can be interrogated with ”…””}”(hjhžhhŸNh NubjK)”}”(hŒ `ethtool`”h]”hŒethtool”…””}”(hj+hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1jJhjubhŒ:”…””}”(hjhžhhŸNh Nubeh}”(h]”h ]”h"]”h$]”h&]”uh1hÉhŸh³h KKhh¶hžhubj)”}”(hŒå$ ethtool --show-tunnels eth0 Tunnel information for eth0: UDP port table 0: Size: 4 Types: vxlan No entries UDP port table 1: Size: 4 Types: geneve, vxlan-gpe Entries (1): port 1230, vxlan-gpe”h]”hŒå$ ethtool --show-tunnels eth0 Tunnel information for eth0: UDP port table 0: Size: 4 Types: vxlan No entries UDP port table 1: Size: 4 Types: geneve, vxlan-gpe Entries (1): port 1230, vxlan-gpe”…””}”hjCsbah}”(h]”h ]”h"]”h$]”h&]”h±h²uh1jhŸh³h KNhh¶hžhubeh}”(h]”Œ6virtual-extensible-local-area-networking-documentation”ah ]”h"]”Œ6virtual extensible local area networking documentation”ah$]”h&]”uh1h´hhhžhhŸh³h Kubeh}”(h]”h ]”h"]”h$]”h&]”Œsource”h³uh1hŒcurrent_source”NŒ current_line”NŒsettings”Œdocutils.frontend”ŒValues”“”)”}”(h¹NŒ generator”NŒ datestamp”NŒ source_link”NŒ source_url”NŒ toc_backlinks”Œentry”Œfootnote_backlinks”KŒ sectnum_xform”KŒstrip_comments”NŒstrip_elements_with_classes”NŒ strip_classes”NŒ report_level”KŒ halt_level”KŒexit_status_level”KŒdebug”NŒwarning_stream”NŒ traceback”ˆŒinput_encoding”Œ utf-8-sig”Œinput_encoding_error_handler”Œstrict”Œoutput_encoding”Œutf-8”Œoutput_encoding_error_handler”j|Œerror_encoding”Œutf-8”Œerror_encoding_error_handler”Œbackslashreplace”Œ language_code”Œen”Œrecord_dependencies”NŒconfig”NŒ id_prefix”hŒauto_id_prefix”Œid”Œ dump_settings”NŒdump_internals”NŒdump_transforms”NŒdump_pseudo_xml”NŒexpose_internals”NŒstrict_visitor”NŒ_disable_config”NŒ_source”h³Œ _destination”NŒ _config_files”]”Œ7/var/lib/git/docbuild/linux/Documentation/docutils.conf”aŒfile_insertion_enabled”ˆŒ raw_enabled”KŒline_length_limit”M'Œpep_references”NŒ pep_base_url”Œhttps://peps.python.org/”Œpep_file_url_template”Œpep-%04d”Œrfc_references”NŒ rfc_base_url”Œ&https://datatracker.ietf.org/doc/html/”Œ tab_width”KŒtrim_footnote_reference_space”‰Œsyntax_highlight”Œlong”Œ smart_quotes”ˆŒsmartquotes_locales”]”Œcharacter_level_inline_markup”‰Œdoctitle_xform”‰Œ docinfo_xform”KŒsectsubtitle_xform”‰Œ image_loading”Œlink”Œembed_stylesheet”‰Œcloak_email_addresses”ˆŒsection_self_link”‰Œenv”NubŒreporter”NŒindirect_targets”]”Œsubstitution_defs”}”Œsubstitution_names”}”Œrefnames”}”Œrefids”}”Œnameids”}”jVjSsŒ nametypes”}”jV‰sh}”jSh¶sŒ footnote_refs”}”Œ citation_refs”}”Œ autofootnotes”]”Œautofootnote_refs”]”Œsymbol_footnotes”]”Œsymbol_footnote_refs”]”Œ footnotes”]”Œ citations”]”Œautofootnote_start”KŒsymbol_footnote_start”KŒ id_counter”Œ collections”ŒCounter”“”}”…”R”Œparse_messages”]”hŒsystem_message”“”)”}”(hhh]”hÊ)”}”(hŒ:Enumerated list start value not ordinal-1: "2" (ordinal 2)”h]”hŒ>Enumerated list start value not ordinal-1: “2†(ordinal 2)”…””}”(hjãhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÉhjàubah}”(h]”h ]”h"]”h$]”h&]”Œlevel”KŒtype”ŒINFO”Œsource”h³Œline”Kuh1jÞhh¶hžhhŸh³h K'ubaŒtransform_messages”]”Œ transformer”NŒ include_log”]”Œ decoration”Nhžhub.