V-Net

Introduction

A V-Net (Virtual Network) is a Netris construct for grouping switch ports into a defined network segment—much like a traditional VLAN or a public cloud subnet.

To build a V-Net you only need to supply a list of switch ports, a name, parent VPC, and site(s). Optionally IP subnet, gateway, and DHCP settings.

Netris, having already configured the EVPN underlay, then automatically pushes the entire under-the-hood V-Net configuration to every Ethernet switch and DPU in the fabric:

  • VLAN-to-VNI mapping, when needed

  • Anycast gateway IP/MAC on every leaf that hosts the V-Net, when a gateway is specified

  • Assign switch ports to the appropriate VLANs or configure L3 physical/subinterfaces

  • Set MTU

  • Configure custom LLDP TLVs

Netris V-Net supports two transport modes:

  • L2VPN (Layer 2 Virtual Private Network) is similar to a traditional VLAN with modern and scalable implementation. It is typically used for front-end (north-south) or management/out-of-band networks. Add a gateway, and it behaves like a VLAN with an SVI / IRB.

    L2VPN is implemented with VXLAN (Virtual Extensible LAN) transport and is a technology that enables the creation of Layer 2 switched overlays on top of a Layer 3 routed infrastructure. Often used in data centers to provide flexibility and scalability, VXLAN encapsulates Ethernet frames within UDP packets, enabling Layer 2 segments to span across a routed network. EVPN (Ethernet VPN) is a control plane protocol that works with VXLAN to distribute MAC address information and manage traffic to enable efficient and scalable Layer 2 connectivity.

  • L3VPN is typically used for back-end (east–west) connectivity in GPU clusters on Ethernet-based AI fabrics such as NVIDIA Spectrum-X. Built as one mini-subnet per switch port, a VXLAN L3VPN is conceptually similar to MPLS L3VPN in provider networks.

    VXLAN L3VPN is implemented by extending VXLAN’s overlay capabilities to support Layer 3 routing between different Layer 2 networks (VNIs). This is achieved by using an IP VRF and a Layer 3 VNI (VXLAN Network Identifier) within the VXLAN tunnel to forward routed traffic between VNIs. Essentially, VXLAN provides the encapsulation and tunneling, while EVPN (Ethernet VPN) distributes reachability information using BGP.

    Each switch port gets its own /31 IPv4 (RFC 3021) or /127 IPv6 (RFC 6164) address; the leaf’s address becomes the server’s default gateway. All of those “2 host” subnets are advertised inside the VPC’s VRF, so every server can reach every other purely through routing—there is no shared Layer-2 broadcast domain.

L2VPN V-Nets

You can start creating a new V-Net by navigating to Services -> V-Net and clicking +Add in the top right.

Every V-Net must include:
  • Name of the V-Net,

  • VPC containing the V-Net,

  • Sites where V-Net is deployed,

  • VLAN ID (for L2VPN V-Nets), which Netris will assign when set to Automatic,

  • Owner administering the V-Net,

  • V-Net state,

  • List of switch ports to include in the V-Net, which can be explicitly listed or referenced through Labels.

Optionally V-Net definition can also include:
  • Labels for dynamic switch port inclusion into the V-Net,

  • List of collaborators (Guest tenants) who can add or remove switch ports to and from the V-Net, but not edit any other properties of the V-Net,

  • IPv4 or IPv6 Gateway (for L2VPN V-Nets) to make the V-Net routable inside the VPC, i.e., add an SVI to the VLAN,

  • DHCP scope and option set (for L2VPN V-Nets),

  • Anycast MAC address (for L2VPN V-Nets), which Netris can assign for you.

Example V-Net configuration

DHCP

L2VPN routed V-Nets (where an IP gateway is added) may also be configured with a DHCP service fully managed by Netris and hosted on SoftGate.

You can configure additional DHCP Option Sets before enabling a DHCP server for any V-Net. Add a DHCP Options Set by navigating to Services -> DHCP Options Sets and clicking +Add in the top right.

DHCP Option Set

Netris supports a wide range of Standard DHCP Options.

Standard DHCP Options

Netris also enables you to define Custom DHCP Options.

Custom DHCP Options

V-Net Fields explained

Field

What it does

Notes / defaults

Name

Unique name for the V-Net.

Must be globally unique.

VPC (Virtual Private Cloud)

Construct that contains the V-Net.

A VPC must exist first.

Sites

One or more sites where the V-Net will run.

Sites must belong to the chosen VPC. Multi-site V-Nets would require backbone connectivity between sites.

VLAN ID

  • Assign Automatically – controller picks the next free VLAN ID.

  • Enter Manually – you type the VLAN ID.

  • Disabled – VXLAN only (no 802.1Q).

Always visible. When L3VPN is enabled this field is auto-set to Disabled and cannot be changed.

Owner

User group with full edit rights.

Can change any setting: name, VLANs, gateways, DHCP, tags, and so on

V-Net state

Active or Disabled.

Disabled = config withdrawn from switches.

Tags

Free-form labels for search/filter.

Example: prod, gpu, east-1.

Add Network Interface

Explicitly attach switch ports to the V-Net.

Use when exact ports are known. Switch Port should be assigned to the owner or collaborator under Network -> Network Interfaces

Add Network Interface Tag

Attach ports by label.

Useful for large server fleets.

Untagged

Set port to untagged mode. Triggers whether traffic should be sent VLAN tagged (trunk mode) or VLAN untagged (access mode) for this switch port.

VLAN tags are only significant on each port’s ingress/egress unless VLAN aware mode is used.

Advanced V-Net Fields explained

Field

What it does

When it appears

L3VPN

Puts the V-Net in Layer-3 mode: Netris assigns each switch port a /31 and sets the leaf’s IP as the host’s gateway.

Ethernet fabrics only. Enabling L3VPN forces VLAN ID = Disabled.

VLAN-aware

Lets one V-Net carry multiple VLAN tags inside a single VXLAN ID. Think of this like Q-in-Q, but it’s Q-in-VxLAN.

Requires switches that support VLAN-aware bridging.

Guest Tenants (Collaborators)

Admin units that may add/remove switch ports but cannot change core settings.

Optional; owner always retains full control.

Anycast MAC address

Overrides the auto-generated anycast MAC.

Leave blank to use the default.

VXLAN ID

VXLAN Network Identifier (1 – 16777216).

Auto-assigned unless you enter a value.

IPv4 Gateway / IPv6 Gateway

Anycast gateway IPs for Layer-3-enabled L2VPN.

Hidden when L3VPN is on. Leave blank for pure Layer-2 V-Net. Must be configured under Network -> IPAM as a subnet with purpose set to common, assigned to the Owner, and available in the site where V-Net is intended to span.

Warning

Many switches cannot autodetect 1Gbps link speed. If attaching hosts with 1Gbps NICs to 10Gbps switch ports, set the speed for the given Switch Port from Auto(default) to 1Gbps. You can edit a port in Network -> Network Interfaces individually or in bulk.

Multisite V-Nets

Any V-Net may span multiple sites. If the V-Net spans multiple sites and you add a gateway, you must first create the subnet under Network -> Subnets and assign it to all sites the V-Net will span (You can define additional sites in Network -> Sites). This way the anycast IP is valid everywhere.

Multisite V-Net

Labels

Labels (sometimes called tags) can be used to automatically place hundreds of switch ports into a V-Net. They can work together with the Server Cluster and manual methods, or they can replace those methods.

Because Netris knows the topology, When you label server NICs, Netris can automatically identify the connected switch ports and place them into the V-Net.

How labels work

When defining a server object in Network -> Inventory or Network -> Topology, use the Labels section to label each NIC on the server using the following key/value syntax.

iface.eth1 = prod
iface.eth2 = prod
iface.eth3 = storage
iface.eth4 = storage

Tip

The hard-coded prefix iface. is required; it tells Netris the label applies to that specific NIC, not the whole server.

Server interface labels
To automatically add switch ports to a V-Net based on a label, in the V-net definition dialog:
  • Click the Add Network Interface Label button.

  • Enter the “value” portion of the label. E.g., storage is the value of iface.eth3=storage label.

  • Specify whether you want the switch port to be 802.1q tagged or untagged.

Based on the links defined in the Topology, Netris finds the switch ports eth1 and eth2 are connected to and adds them to the V-Net.

Add Network Interface Label dialog

Rules and limits

  • If a port is added both directly and by label, the direct entry wins even if you remove the label from the server NIC.

  • The same NIC can be untagged in only one V-Net.

  • Switch ports used for underlay links are ignored.

  • Works only on server objects with switch-to-server links defined.

  • Labels can only be used to add switch ports to a VLAN-unaware L2VPN V-Nets. L3VPN and VLAN-aware L2VPN are not supported.

When to use labels

Labels can be used on their own or together with Server Cluster.

Imagine a multi-tenant cloud operator manages hundreds of GPU servers, each with 11 network interfaces (a very typical situation): 8 interfaces for east-west traffic, 2 interfaces for north-south, and the last one for management.

The operator wants to be able to dynamically assign servers to different tenants, which means NICs eth1 through eth10 must be placed into the correct tenant’s VPC.

At the same time, the operator wants to keep the server’s IPMI / ILO / iDrac interface eth11 in the management VPC regardless of which tenant the server is reassigned to.

To achieve this outcome, the cloud operator can

  • Define a Server Cluster Template and only include non-management server NICs (eth1 through eth10) in the template.

    [
        {
            "postfix": "East-West",
            "type": "l3vpn",
            "vlan": "untagged",
            "vlanID": "auto",
            "serverNics": [
                "eth1",
                "eth2",
                "eth3",
                "eth4",
                "eth5",
                "eth6",
                "eth7",
                "eth8"
            ]
        },
        {
            "postfix": "North-South-in-band-and-storage",
            "type": "l2vpn",
            "vlan": "untagged",
            "vlanID": "auto",
            "serverNics": [
                "eth9",
                "eth10"
            ],
            "ipv4Gateway": "192.168.7.254/21"
        }
    ]
    
GPU Cluster Template
  • Label the IPMI (eth11) NIC rather than include it in the Server Cluster Template.

Label eth11 for IPMI

The operator adds a iface.eth11=ipmi label to each server object for eth11


  • Create a V-Net that includes this label as described earlier.

Create V-Net for IPMI label

The operator creates a V-Net for the management interfaces and adds network interfaces matching the ipmi label value.


As a result of this configuration, Netris automatically adds eth11 into the “Management” V-Net.

When a Server Cluster is created referencing the GPU-cluster-template, Netris will:

  • Keep eth11 in the Management V-Net (notice in this example the V-Net is in the Default VPC).

  • Create new East-West and North-South-in-band-and-storage V-Nets in the VPCs selected when defining the Server Cluster. See Server Cluster documentation for more details about creating Server Clusters.

  • Place eth1 through eth10 into the tenant’s V-Nets as specified in the template, even though the V-Nets are in a different VPC from the Management V-Net.

When the operator needs to reallocate the GPU servers to a different tenant, they simply reassign these servers to a different tenant’s Server Cluster. Netris will reconfigure the appropriate switch ports on the appropriate switches, but will keep the eth11 in the Management V-Net.

L3VPN

L3VPNs are typically used for back-end (east–west) connectivity in GPU clusters on Ethernet-based AI fabrics such as NVIDIA Spectrum-X.

L3VPN turns every switch port in the V-Net into its own /31 IPv4 (or /127 IPv6) routed link to the server. There is no fabric-wide broadcast domain; all traffic is routed from the first hop. The leaf-side switch port IP is the server’s gateway.

This method is commonly used on rail-optimized AI fabrics where each server NIC is dedicated to a GPU and has an individual /31 IP. Thorough planning of the IP schema and server-side routing configuration is required for this to function. Contact Netris for more details.

Netris still moves packets over VXLAN and advertises the /31 prefixes with EVPN, giving you VRF-style isolation without MPLS.

Creating an L3VPN V-Net

L3VPN V-Nets require you to provide much the same information as the L2VPN V-Nets, such as a name, parent VPC, site(s), and a list of switch ports, but with a few key differences.

  1. Set the L3VPN checkbox.

  • The VLAN ID field locks to Disabled.

  • Gateway and DHCP options disappear—routing is handled on the /31 links.

  • Anycast MAC address is ignored.

  1. Add switch ports (directly, by label) and, per port:

  • Untagged – makes the port an access interface.

  • VLAN ID – optional; enter a tag to create a routed sub-interface instead.

  • IPv4 / IPv6 – optional; leave blank to let Netris auto-allocate the /31 or a /127 pair.

Warning

Typically /31s get assigned to links with Terraform during the onboarding phase.

L3VPN V-Net configuration

Behind the scenes, Netris

  1. Reserves or accepts a VXLAN ID for the V-Net.

  2. Creates a routed interface (or sub-interface if you set a VLAN ID) for each selected port.

  3. Assigns a /31 IPv4 (and /127 IPv6 if enabled) to every appropriate port on every appropriate switch.

  4. Advertises every /31 with EVPN route-type 5 so other leaves learn the host prefixes without flooding.

Rules and limits

  • VLAN-aware mode is not available with L3VPN.

  • DHCP and anycast gateway are intentionally disabled; each server must configure its own IP on the peer side of the /31.

  • The Untagged toggle and per-port VLAN ID apply only to the interface you are adding; they never create a global broadcast domain.

With these steps you have a routed, broadcast-free V-Net ready for high-scale east–west traffic.

In larger fabrics Netris recommends turning on the optional /26 aggregation in the Inventory Profile (Network -> Inventory Profiles) to reduce TCAM usage in the hardware.

Aggregate /26 setting in Inventory Profile

Verification Tools

UI Tools

You can view all existing V-Nets by navigating to Services -> V-Net.

V-Net list

You can view additional operational details of any V-Net by clicking on the chevron to the left of the V-Net name to expand the view.

Expanded V-Net list