8
3.
VTEP 2 and VTEP 3 de-encapsulate the ARP request. The VTEPs create a suppression entry
for VM 1, and broadcast the request in the local site.
4.
VM 7 sends an ARP reply.
5.
VTEP 2 creates a suppression entry for VM 7 and forwards the ARP reply to VTEP 1.
6.
VTEP 1 de-encapsulates the ARP reply, creates a suppression entry for VM 7, and forwards the
ARP reply to VM 1.
7.
VM 4 sends an ARP request to obtain the MAC address of VM 1 or VM 7.
8.
VTEP 1 creates a suppression entry for VM 4 and replies to the ARP request.
9.
VM 10 sends an ARP request to obtain the MAC address of VM 1.
10.
VTEP 3 creates a suppression entry for VM 10 and replies to the ARP request.
Protocols and standards
IETF draft,
draft-mahalingam-dutt-dcops-vxlan-04