Hello Gents.
Recently I've deployed vCloud Director/vShield infrastructure to utilize VXLAN functionality. The main purpose of activity was to create completly isolated ethernet domains across 2 VMWare ESXi 5.0 hosts w/o utilizing ttraditional VLAN. The reason why not to use VLAN is out of scope of this document. But in short there is limitation on VLAN usage on upstream N5K connecting these 2 hosts.
So I've deployed VXLAN using very clear document "VMware® VXLAN Deployment Guide". Finally I've obtained neccessary segments as shown in attach. Then I've reconnected relevant interfaces of POD's virtual appliances as consequently shown in attach. Topology in short is 2 sites connected via "Internet" as follows:
1) vA of Cisco CRS1K ("left") is connected by 2 uplink interfaces to isolated PG InsideSite1 (isolated sid 5004)
2) cluster of 2vA of Cisco ASA8.4(2) ("left") is connected by 1 downliks (each) to isolated PG InsideSite1
3) "left" ASAs (active and standby) is interconnected each to other for purpose of clustering with 2 links: ASA1-HA-Failover (sid 5000) and ASA1-HA-StatefulFailover (sid 5001)
4) vA of Cisco CRS1K ("right") is connected by 2 uplink interfaces to isolated PG InsideSite2 (isolated sid 5005)
5) cluster of 2vA of Cisco ASA8.4(2) ("right") is connected by 1 downliks (each) to isolated PG InsideSite2
6) "right" ASAs (active and standby) is interconnected each to other for purpose of clustering with 2 links: ASA2-HA-Failover (sid 5002) and ASA2-HA-StatefulFailover (sid 5003)
7) both "left" and "right" clusters has "internet" connectivity with the help of uplinks in (standard VLAN) distributed PGs similar to:
interface GigabitEthernet1.1071
vlan 1071
nameif OUTSIDE
security-level 0
ip address 10.255.71.1 255.255.255.0 standby 10.255.71.2
8) each device of the POD has management interface connected to specific (standard VLAN) management distributed PG
POD is operational and works as expected, EXCEPT:
I observe broadcast leaks between the "left" and "right" ASA's failover interfaces:
%ASA-4-405001: Received ARP request collision from 10.0.0.1/0050.5697.3340 on interface FAILOVER with existing ARP entry 10.0.0.1/0050.5697.1cd4
Moreover on INSIDE interfaces of ASAs I observe martian broadcasts from completely unknown devices which are absent in my datacenter:
%ASA-6-302015: Built inbound UDP connection 4781 for INSIDE:10.10.10.11/138 (10.10.10.11/138) to OUTSIDE:10.10.255.255/138 (10.10.255.255/138)
First, I dont understand HOW traffic can leak between completely isolated VXLANs as it exposed on ASA's Failover interface?
Second, HOW can martian traffic can enter in VXLAN? I must clarify that multicast groups I've utilized may not be dedicated exclusively to my POD, because there are a lot of different testers and developers in our LAB.
But VTEP on each of the datacenter hosts first looks at the encapsulation header and if the 24-bit value of VXLAN identifier matches with the logical Layer 2 network ID, it removes the encapsulation header and delivers the packet to the virtual machine, doesnt it?
I'll appreciate any help/explanation of described behavior
8) each device of the POD has management interface connected to specific (standard VLAN) management distributed PG