One of the more common tools is Wireshark so that's what we'll use in this example. We have a very simple topology that looks like this. The DC1-CentOS-01 machine is connected to a NSX provided logical switch, which uses VXLAN for the transport. We have a Distributed Logical Router (DLR) running OSPF to then connect to a NSX Edge that also uses OSPF to connect to a Cisco Catalyst 4948 and from there, the rest of the world.
I setup a SPAN session from the interface where the VXLAN traffic on the ESX host hits the network to my laptop. Nothing magical here, just the usual SPAN session.
I fired up Wireshark and selected my wired interface. As this is a trunk from my ESXi server and I use NFS for my file system, I saw a ton of traffic. I used the filtering capability in Wireshark to display the traffic with a source IP of 192.168.11.18, which is the VXLAN vmk of the ESXi host where the CentOS VM is running. Here's what we see - at first glance, promising!
Let's expand the headers so we can see the traffic encapsulated in VXLAN.
Oh, it must be in the data section.
Ummmm, now what? Have no fear, the data is there, we just need to tell Wireshark to decode it properly. Click on Analyze ----> Decode As
Click on the + in the lower left corner and let's fill in the blanks.
Now when you click on OK, it'll take you back to the trace file and check this out....we see a totally different view of the world.
I mentioned earlier we are running OSPF and there it is. So what about traffic from the CentOS-01 VM? Well, let's start something and see what we see.
That looks better. Yes, I know it's a cop out that I am just pinging Google - it's easy and still illustrates the point. Let's look at the headers now.
We can expand the VXLAN header and see the VNI assigned by NSX for that logical segment.
We can also see the original L2 frame and IP header.
Pretty cool, isn't it?
So with just a few clicks you are able to see inside VXLAN frames and not lose visibility for packet capture. Hopefully this was helpful.
The pcap file can be found here.
For completeness I used this version of Wireshark.
It’s a good resource for learning. I see the post again and again
ReplyDeleteWell informative post here your have done . Really i'm glad to see this one .
ReplyDeleteIt's an awesome post . I read this article . Just nice
ReplyDeleteClipping Path EU
Clipping Path
Clipping Path service
Really Awesome Blog Thanks for Sharing...
ReplyDeleteSo awesome post. Thanks for share it.
ReplyDeleteclipping path service | clipping path
Frame Relay encapsulation seems simple enough, but for your CCNA and CCNP exams, you've got to know vital details that are often overlooked.
ReplyDeletekeep sharing all information.
ReplyDeleteimage retouching service
image retouching service
IBR Graphics Studio Blog
clipping path service
The Eight-Wheel Classic - TITIAN Arts
ReplyDeleteThe eight-wheel classic bicycle is available in bsjeon.net six sizes. herzamanindir.com/ The 메이피로출장마사지 Bicycle Wheel is a classic bicycle https://tricktactoe.com/ made in USA, but there are ford fusion titanium three variations in