mirror of
https://github.com/netbox-community/netbox.git
synced 2026-01-11 21:10:29 +01:00
Assign VLAN to multiple L2VPNs #7494
Open
opened 2025-12-29 20:24:05 +01:00 by adam
·
17 comments
No Branch/Tag Specified
main
update-changelog-comments-docs
feature-removal-issue-type
20911-dropdown
20239-plugin-menu-classes-mutable-state
21097-graphql-id-lookups
feature
fix_module_substitution
20923-dcim-templates
20044-elevation-stuck-lightmode
feature-ip-prefix-link
v4.5-beta1-release
20068-import-moduletype-attrs
20766-fix-german-translation-code-literals
20378-del-script
7604-filter-modifiers-v3
circuit-swap
12318-case-insensitive-uniqueness
20637-improve-device-q-filter
20660-script-load
19724-graphql
20614-update-ruff
14884-script
02496-max-page
19720-macaddress-interface-generic-relation
19408-circuit-terminations-export-templates
20203-openapi-check
fix-19669-api-image-download
7604-filter-modifiers
19275-fixes-interface-bulk-edit
fix-17794-get_field_value_return_list
11507-show-aggregate-and-rir-on-api
9583-add_column_specific_search_field_to_tables
v4.5.0
v4.4.10
v4.4.9
v4.5.0-beta1
v4.4.8
v4.4.7
v4.4.6
v4.4.5
v4.4.4
v4.4.3
v4.4.2
v4.4.1
v4.4.0
v4.3.7
v4.4.0-beta1
v4.3.6
v4.3.5
v4.3.4
v4.3.3
v4.3.2
v4.3.1
v4.3.0
v4.2.9
v4.3.0-beta2
v4.2.8
v4.3.0-beta1
v4.2.7
v4.2.6
v4.2.5
v4.2.4
v4.2.3
v4.2.2
v4.2.1
v4.2.0
v4.1.11
v4.1.10
v4.1.9
v4.1.8
v4.2-beta1
v4.1.7
v4.1.6
v4.1.5
v4.1.4
v4.1.3
v4.1.2
v4.1.1
v4.1.0
v4.0.11
v4.0.10
v4.0.9
v4.1-beta1
v4.0.8
v4.0.7
v4.0.6
v4.0.5
v4.0.3
v4.0.2
v4.0.1
v4.0.0
v3.7.8
v3.7.7
v4.0-beta2
v3.7.6
v3.7.5
v4.0-beta1
v3.7.4
v3.7.3
v3.7.2
v3.7.1
v3.7.0
v3.6.9
v3.6.8
v3.6.7
v3.7-beta1
v3.6.6
v3.6.5
v3.6.4
v3.6.3
v3.6.2
v3.6.1
v3.6.0
v3.5.9
v3.6-beta2
v3.5.8
v3.6-beta1
v3.5.7
v3.5.6
v3.5.5
v3.5.4
v3.5.3
v3.5.2
v3.5.1
v3.5.0
v3.4.10
v3.4.9
v3.5-beta2
v3.4.8
v3.5-beta1
v3.4.7
v3.4.6
v3.4.5
v3.4.4
v3.4.3
v3.4.2
v3.4.1
v3.4.0
v3.3.10
v3.3.9
v3.4-beta1
v3.3.8
v3.3.7
v3.3.6
v3.3.5
v3.3.4
v3.3.3
v3.3.2
v3.3.1
v3.3.0
v3.2.9
v3.2.8
v3.3-beta2
v3.2.7
v3.3-beta1
v3.2.6
v3.2.5
v3.2.4
v3.2.3
v3.2.2
v3.2.1
v3.2.0
v3.1.11
v3.1.10
v3.2-beta2
v3.1.9
v3.2-beta1
v3.1.8
v3.1.7
v3.1.6
v3.1.5
v3.1.4
v3.1.3
v3.1.2
v3.1.1
v3.1.0
v3.0.12
v3.0.11
v3.0.10
v3.1-beta1
v3.0.9
v3.0.8
v3.0.7
v3.0.6
v3.0.5
v3.0.4
v3.0.3
v3.0.2
v3.0.1
v3.0.0
v2.11.12
v3.0-beta2
v2.11.11
v2.11.10
v3.0-beta1
v2.11.9
v2.11.8
v2.11.7
v2.11.6
v2.11.5
v2.11.4
v2.11.3
v2.11.2
v2.11.1
v2.11.0
v2.10.10
v2.10.9
v2.11-beta1
v2.10.8
v2.10.7
v2.10.6
v2.10.5
v2.10.4
v2.10.3
v2.10.2
v2.10.1
v2.10.0
v2.9.11
v2.10-beta2
v2.9.10
v2.10-beta1
v2.9.9
v2.9.8
v2.9.7
v2.9.6
v2.9.5
v2.9.4
v2.9.3
v2.9.2
v2.9.1
v2.9.0
v2.9-beta2
v2.8.9
v2.9-beta1
v2.8.8
v2.8.7
v2.8.6
v2.8.5
v2.8.4
v2.8.3
v2.8.2
v2.8.1
v2.8.0
v2.7.12
v2.7.11
v2.7.10
v2.7.9
v2.7.8
v2.7.7
v2.7.6
v2.7.5
v2.7.4
v2.7.3
v2.7.2
v2.7.1
v2.7.0
v2.6.12
v2.6.11
v2.6.10
v2.6.9
v2.7-beta1
Solcon-2020-01-06
v2.6.8
v2.6.7
v2.6.6
v2.6.5
v2.6.4
v2.6.3
v2.6.2
v2.6.1
v2.6.0
v2.5.13
v2.5.12
v2.6-beta1
v2.5.11
v2.5.10
v2.5.9
v2.5.8
v2.5.7
v2.5.6
v2.5.5
v2.5.4
v2.5.3
v2.5.2
v2.5.1
v2.5.0
v2.4.9
v2.5-beta2
v2.4.8
v2.5-beta1
v2.4.7
v2.4.6
v2.4.5
v2.4.4
v2.4.3
v2.4.2
v2.4.1
v2.4.0
v2.3.7
v2.4-beta1
v2.3.6
v2.3.5
v2.3.4
v2.3.3
v2.3.2
v2.3.1
v2.3.0
v2.2.10
v2.3-beta2
v2.2.9
v2.3-beta1
v2.2.8
v2.2.7
v2.2.6
v2.2.5
v2.2.4
v2.2.3
v2.2.2
v2.2.1
v2.2.0
v2.1.6
v2.2-beta2
v2.1.5
v2.2-beta1
v2.1.4
v2.1.3
v2.1.2
v2.1.1
v2.1.0
v2.0.10
v2.1-beta1
v2.0.9
v2.0.8
v2.0.7
v2.0.6
v2.0.5
v2.0.4
v2.0.3
v2.0.2
v2.0.1
v2.0.0
v2.0-beta3
v1.9.6
v1.9.5
v2.0-beta2
v1.9.4-r1
v1.9.3
v2.0-beta1
v1.9.2
v1.9.1
v1.9.0-r1
v1.8.4
v1.8.3
v1.8.2
v1.8.1
v1.8.0
v1.7.3
v1.7.2-r1
v1.7.1
v1.7.0
v1.6.3
v1.6.2-r1
v1.6.1-r1
1.6.1
v1.6.0
v1.5.2
v1.5.1
v1.5.0
v1.4.2
v1.4.1
v1.4.0
v1.3.2
v1.3.1
v1.3.0
v1.2.2
v1.2.1
v1.2.0
v1.1.0
v1.0.7-r1
v1.0.7
v1.0.6
v1.0.5
v1.0.4
v1.0.3-r1
v1.0.3
1.0.0
Labels
Clear labels
beta
breaking change
complexity: high
complexity: low
complexity: medium
needs milestone
netbox
pending closure
plugin candidate
pull-request
severity: high
severity: low
severity: medium
status: accepted
status: backlog
status: blocked
status: duplicate
status: needs owner
status: needs triage
status: revisions needed
status: under review
topic: GraphQL
topic: Internationalization
topic: OpenAPI
topic: UI/UX
topic: cabling
topic: event rules
topic: htmx navigation
topic: industrialization
topic: migrations
topic: plugins
topic: scripts
topic: templating
topic: testing
type: bug
type: deprecation
type: documentation
type: feature
type: housekeeping
type: translation
Mirrored from GitHub Pull Request
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/netbox#7494
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @johannwagner on GitHub (Jan 11, 2023).
NetBox version
v3.3
Feature type
Change to existing functionality
Proposed functionality
We document VLANs transferred through a fabric with L2VPNs, e.g. adding the VLAN to the fabric-specific L2VPN.
Currently we are not able to add the VLAN to two different L2VPN instances, which means that we cannot document a VLAN that is transferred through two different fabrics.
Therefore, we propose to remove the requirement, that an object can only be attached to one L2VPN, at least for VLANs. I see that this limit is useful for interfaces.
Use case
We have two different fabrics, a "Core Fabric" in our data center and a "WAN Fabric" for our wide area network. We provide services to our customers tunneling the same VLAN from a port in the data center to a port in a WAN pop. So this VLAN needs to be transferred through the "Core Fabric" and the "WAN Fabric".
Database changes
None
External dependencies
None
@github-actions[bot] commented on GitHub (Apr 12, 2023):
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. NetBox is governed by a small group of core maintainers which means not all opened issues may receive direct feedback. Do not attempt to circumvent this process by "bumping" the issue; doing so will result in its immediate closure and you may be barred from participating in any future discussions. Please see our contributing guide.
@DanSheps commented on GitHub (Apr 13, 2023):
How is it stitched together between the fabrics (a config example would be helpful)
@johannwagner commented on GitHub (Apr 13, 2023):
I made a drawing for better understandability:

We need to connect Device 1 and Device 2 and choose to do it with VLAN 100. Therefore, we attach VLAN 100 to both Device interfaces and all the leaf switch interfaces, e.g. WAN-1, WAN-2, CORE-1 and CORE-2. WAN-2 and CORE-1 are connected via a fiber connection which is used as Tagged link between both worlds. Each VLAN which needs to travel between both fabrics needs to be configured there.
Now, we would attach VLAN 100 to each farbic, i.e. WAN Fabric and Core Farbic, it participates in. We model those fabrics as L2VPNs. WAN Fabric is an L2VPN object and Core Farbic is another L2VPN object. All VLANS that participate in the fabrics are attached to the corresponding L2VPN as L2VPN termination with the type VLAN.
BUT we can currently only attach VLAN 100 to one L2VPN but we would need to attach it to both L2VPNs.
@DanSheps commented on GitHub (Apr 14, 2023):
Maybe within the vlan assignment, we should add an optional "device" assignment. You then have the following options:
Interface <> L2VPN
VLAN <> L2VPN
VLAN + Device <> L2VPN
Could then maintain the existing uniqueness based on VLAN but ultimately each VLAN L2VPN assignment will be associated with a specific device.
@johannwagner commented on GitHub (May 1, 2023):
I needed multiple reads to understand this proposal, but here we are.
So, this means, that we could assign VLANs to two different L2VPNs, if they are "terminated" on two different Devices?
Some examples that would work together:
Device + VLAN -> L2VPN
WAN-1 + VLAN 100 -> WAN
WAN-2 + VLAN 100 -> WAN
CORE-1 + VLAN 100 -> CORE
CORE-2 + WLAN 100 -> CORE
Some examples, that wouldn't work together:
Device + VLAN -> L2VPN
CORE-1 + VLAN 100 -> CORE
CORE-1 + VLAN 100 -> WAN
If I understood this correctly, this would solve our issue and would be a great solution.
@DanSheps commented on GitHub (May 2, 2023):
That is what I was thinking, yes.
And you are correct, in that the bottom scenario would not work. I don't know if it is even possible to make that work. I haven't tried personally to be honest.
@jeremystretch commented on GitHub (Jun 14, 2023):
@DanSheps do you want to move forward with this?
@DanSheps commented on GitHub (Jun 19, 2023):
I think yes, we should make this a little more robust in allowing additional assignment options.
@DanSheps commented on GitHub (Jun 19, 2023):
I might have some time this coming week to work on this, but if someone else wants to volunteer feel free to speak up.
@johannwagner commented on GitHub (Jun 19, 2023):
I would be happy to provide a PR for this!
@DanSheps commented on GitHub (Jun 19, 2023):
@johannwagner Assigned to you.
@johannwagner commented on GitHub (Jun 27, 2023):
@DanSheps I thought about an idea of implementing this.
Currently, VLANs are assigned to interfaces, not devices. Also there is no "intermediate" model or anything which could be easily used in
assigned_object(e.g. https://github.com/netbox-community/netbox/blob/develop/netbox/ipam/models/l2vpn.py#L91), therefore there is no straight forward thing to do.How would you tackle the implementation? Creating an additional GenericForeignKey on L2VPNTermination, which is only filled in this specific case, seems odd to me?
@DanSheps commented on GitHub (Aug 28, 2023):
@johannwagner Sorry for not getting back.
My thought was to add a
devicefield on the L2VPNTermination model, which is basically the though model for a M2M relationship. If you are still interested in this, let me know, otherwise I can take this on as well.@johannwagner commented on GitHub (Aug 28, 2023):
Feel free to give this a go! I am not sure how to tackle this in a clean way. Probably an easy one for an experienced maintainer but a lot of headache otherwise!
@DanSheps commented on GitHub (Aug 31, 2023):
@jeremystretch Are we good adding this to v4.0 milestone based on your comment on the PR?
@DanSheps commented on GitHub (Nov 22, 2023):
I re-did the drawing to hopefully make everything more clear.
f2e86238-2d11-4459-bcd2-137f005415c8.pdf
The L2VPN terminates on the VLAN on each "headend" device. You could have two discrete VLAN's between the sites, but within the sites you would have two devices terminating on 1 vlan and another device on that same VLAN not terminating the L2VPN.
This is where the problem comes in when you are trying to build a config for example from the available information, without inferring which devices are headends for the L2VPN terminating simply to the VLAN cannot work.
@DanSheps commented on GitHub (Dec 6, 2023):
Blocked by #14451