In a Nutshell

The expansion of the datacenter from physical clusters into software-defined clouds is powered by **Virtual Extensible LAN (VXLAN)**. By encapsulating Layer 2 Ethernet frames within Layer 3 UDP packets, VXLAN enables the migration of virtual machines and containers across routed boundaries. However, this 50-byte "Shim" introduces critical complexity in the underlying L3 MTU budget. This article provides a clinical engineering model for calculating **VXLAN Goodput Efficiency**, mapping the relationship between inner MSS and outer fragmentation, and auditing the performance impact of **VTEP Hardware Offloading** on modern ASICs.

BACK TO TOOLKIT

VXLAN Overhead & Efficiency Modeler

A precision simulator for VXLAN overlay fabrics. Model the exact impact of encapsulation on your MTU and total available bandwidth.

Simulation Params

64MTU Standard (1500)Jumbo (9000)
15009216
Encapsulation Forensics

Packet Overhead Analysis

L2
IP
UDP
VX
L2
PAYLOAD (1400B)
Safe to Propagate
Efficiency: 0.00%
0B
Total Overhead
0B
Transit MTU
1500B
Remaining MTU
0.0%
Header Expansion
MTU vs. MSS Relationship

For TCP traffic traversing EVPN-VXLAN, the **MSS (Maximum Segment Size)** must be reduced to account for the encapsulation. If the absolute path MTU is 1500 bytes, the VXLAN overhead (typically 50 bytes) dictates a maximum IP payload of 1450 bytes. Subtracting the internal IPv4 and TCP headers (40 bytes), the ideal MSS should be set to **1410 bytes** to prevent performance-killing ICMP "Fragmentation Needed" events.

Jumbo Frame Necessity

In modern Leaf-Spine AI fabrics, implementing **Jumbo Frames (9000-9216 bytes)** on the underlay is mandatory. This provides sufficient "headroom" for nested encapsulation, multi-level VLAN tagging, and security headers while still allowing the standard 1500-byte client Ethernet frame to pass without fragmentation, significantly reducing CPU interrupts at the VTEP (Virtual Tunnel Endpoint).

Share Article

1. The Anatomy of 50 Bytes: VXLAN Framing

A VXLAN packet is a "Layer 2 inside Layer 3" structure. Unlike standard VLANs which insert a tag, VXLAN wraps the entire original frame in a new set of headers.

Overhead Breakdown

Outer L2
14 Bytes
Outer IP
20 Bytes
Outer UDP
8 Bytes
VXLAN Header
8 Bytes

Total Overhead: 50 Bytes. If the inner Ethernet frame contains a VLAN tag, the overhead effectively grows as that tag is encapsulated along with the rest of the frame.

2. The 1550 Rule: Bridging the MTU Gap

In a native IPv4 network, the MTU is 1500. If we add 50 bytes of VXLAN, the packet becomes 1550.

Fragmentation (MTU 1500)

If the underlay only supports 1500, every VXLAN packet is fragmented into two. This doubles the PPS (Packets Per Second) for the same bandwidth, crushing firewall and router CPU performance.

Clean Tunnel (MTU 1550+)

By increasing the underlay MTU to 1550 or 9000 (Jumbo), we ensure zero fragmentation. The inner packet remains 1500, and standard host stacks require no modification.

3. VNI Scalability: Beyond the 4096 Limit

The primary driver for VXLAN wasn't encapsulation, but the exhaustion of VLAN IDs.

24-Bit Identifier

1. **VLAN**: 12 bits = 4,096 segments. (Legacy Enterprise)
2. **VXLAN VNI**: 24 bits = 16,777,216 segments. (Hyperscale Cloud)
3. **Entropy**: The source UDP port is hashed from the inner L2/L3/L4 headers, enabling perfect ECMP (Equal-Cost Multi-Path) spreading without the switch needing to inspect the inner packet.

4. VTEP Forensics: Hardware vs. Software Endpoints

A **VTEP** is where the VXLAN magic happens. It can be a software switch (Linux kernel) or a hardware ASIC (Arista/Cisco).

Frequently Asked Questions

Technical Standards & References

Mahlalingam, M. et al. (IETF)
RFC 7348: VXLAN: A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks
VIEW OFFICIAL SOURCE
Arista Networks
Arista: VXLAN Architecture and Troubleshooting
VIEW OFFICIAL SOURCE
VMware
VMware NSX: VXLAN Implementation in Software-Defined Datacenters
VIEW OFFICIAL SOURCE
Ivan Pepelnjak
Packet Overhead and Fragmentation in VXLAN Overlays
VIEW OFFICIAL SOURCE
Mathematical models derived from standard engineering protocols. Not for human safety critical systems without redundant validation.

Related Engineering Resources

Partner in Accuracy

"You are our partner in accuracy. If you spot a discrepancy in calculations, a technical typo, or have a field insight to share, don't hesitate to reach out. Your expertise helps us maintain the highest standards of reliability."

Contributors are acknowledged in our technical updates.

Share Article