Hi,
I have recently set-up a Proxmox VE cluster with 2 HPE DL380e Gen. 8.
I’m now looking at the best way to have a segmented virtual network that could span the cluster nodes, so to ensure VMs on the same LAN can communicate to each other regardless of the host where they reside.
I have set-up vmbr0 so that it’s linked to eno1, this is the management network on both nodes, then I have vmbr1 which is bound to bond0 that is linked to eno2 and eno3 and that is used for cluster and replication and lastly vmbr2 which is linked to eno4.
All these NICs are connected to the same physical switch (HP 1810-48G) that is serving a 192.168.1.0/24 network. I would ideally like to find a way to have all the vmbr2 traffic segmented from the other traffic and ideally also use a different address space (i.e. 10.0.0.0/24); is there any easy way to achieve what I’m after?
I don’t need clients on vmbr2 to have internet connectivity, I just need to have VMs on different hosts to be able to communicate across these hosts. I would deploy a pfSense or vyOS or a Sophos UTM appliance with a WAN NIC on vmbr0 and the LAN NIC ok vmbr2.
Basically I would need to achieve a setup similar to a VMware Distributed vSwitch, where the vNetwork is isolated from the physical switch and downs the hosts.
What would be the best way to do so, supposing this is achievable?
Thank you very much!
I have recently set-up a Proxmox VE cluster with 2 HPE DL380e Gen. 8.
I’m now looking at the best way to have a segmented virtual network that could span the cluster nodes, so to ensure VMs on the same LAN can communicate to each other regardless of the host where they reside.
I have set-up vmbr0 so that it’s linked to eno1, this is the management network on both nodes, then I have vmbr1 which is bound to bond0 that is linked to eno2 and eno3 and that is used for cluster and replication and lastly vmbr2 which is linked to eno4.
All these NICs are connected to the same physical switch (HP 1810-48G) that is serving a 192.168.1.0/24 network. I would ideally like to find a way to have all the vmbr2 traffic segmented from the other traffic and ideally also use a different address space (i.e. 10.0.0.0/24); is there any easy way to achieve what I’m after?
I don’t need clients on vmbr2 to have internet connectivity, I just need to have VMs on different hosts to be able to communicate across these hosts. I would deploy a pfSense or vyOS or a Sophos UTM appliance with a WAN NIC on vmbr0 and the LAN NIC ok vmbr2.
Basically I would need to achieve a setup similar to a VMware Distributed vSwitch, where the vNetwork is isolated from the physical switch and downs the hosts.
What would be the best way to do so, supposing this is achievable?
Thank you very much!