HCI Network Interfaces for management and Edge network when creating HCI Cluster

gmailTommy Lv1Posted Nov-06-2025 22:08

Should I first create a subinterfaces and then use subinterface eg.
subinterface(vlan10) with sepecific IP 192.168.10.11/24, vlan 10, gateway 192.168.10.1 as management network
subinterface(vlan0) as Edge network
subinterface(vlan100) as vxlan network with IP range 100.100.100.1-3

Or
Let it as default. eg.
eth0 with IP 192.168.10.11/24, vlan 10, gateway 192.168.10.1 as management network
eth0 as edge network
eth0 as vxlan netwokr with IP range100.100.100.1-3

dhileepan has solved this question and earned 20 coins.

Posting a reply earns you 2 coins. An accepted reply earns you 20 coins and another 10 coins for replying within 10 minutes. (Expired) What is Coin?

Enter your mobile phone number and company name for better service. Go

Short Answer:
It depends on whether you need VLAN isolation — but as a best practice, I strongly recommend using VLAN isolation.

Recommended Approach: VLAN Isolation
Create separate sub-interfaces (e.g., eth0.x) for each logical network, each tagged with its respective VLAN ID and IP range as outlined in your setup:
- VLAN 10 – Management
- VLAN 0 – Edge Network
- VLAN 100 – Overlay (VXLAN)
Why VLAN Isolation?
- Network Segmentation – Separates management, storage (VXLAN), and edge traffic
- Security & Performance – Minimizes interference between overlay, management, and user data
- Scalability – Enables independent expansion, migration, or replacement of network segments

Alternative (Not Recommended for Production): Single Interface Setup
Using a single interface (e.g., eth0) for all traffic types — management, edge, and VXLAN — is only suitable for:
- Lab/test environments
- Single-node HCI setups
Drawbacks in Production:
- No traffic isolation — all VLANs are mixed
- Troubleshooting and QoS become more complex
- Performance may suffer under VXLAN-heavy workloads
Is this answer helpful?
dhileepan Lv1Posted Nov-07-2025 15:06
  
Short Answer:
It depends on whether you need VLAN isolation — but as a best practice, I strongly recommend using VLAN isolation.

Recommended Approach: VLAN Isolation
Create separate sub-interfaces (e.g., eth0.x) for each logical network, each tagged with its respective VLAN ID and IP range as outlined in your setup:
- VLAN 10 – Management
- VLAN 0 – Edge Network
- VLAN 100 – Overlay (VXLAN)
Why VLAN Isolation?
- Network Segmentation – Separates management, storage (VXLAN), and edge traffic
- Security & Performance – Minimizes interference between overlay, management, and user data
- Scalability – Enables independent expansion, migration, or replacement of network segments

Alternative (Not Recommended for Production): Single Interface Setup
Using a single interface (e.g., eth0) for all traffic types — management, edge, and VXLAN — is only suitable for:
- Lab/test environments
- Single-node HCI setups
Drawbacks in Production:
- No traffic isolation — all VLANs are mixed
- Troubleshooting and QoS become more complex
- Performance may suffer under VXLAN-heavy workloads
dhileepan Lv1Posted Dec-10-2025 18:17
  
Physical interface, aggregation port and VXLAN Sub interface need to be set to MTU 1600.

I Can Help:

Change

Board Leaders

NyxZale...

Weekly Sharers

Newbie5...

Weekly Questioners