DHCP Server
Dynamic or sequential IP assignment with configurable start/stop ranges, lease management, and domain name settings. DHCP release/renew available from the network diagnostics tool.
VergeFabric is the software-defined networking (SDN) layer built directly into VergeOS. Unlike traditional virtualization platforms that require separate SDN products (VMware NSX, Nutanix Flow), VergeFabric is native to the platform — there is no additional product to license, deploy, or manage.
VergeFabric provides:
This integrated approach means that every VergeOS deployment — from a two-node edge cluster to a multi-site MSP platform — gets the full SDN stack out of the box.
VergeOS uses five distinct network types, each serving a specific role in the system architecture. Understanding these types is essential for designing, deploying, and troubleshooting VergeOS environments.
A physical network represents an isolated Layer 2 connection to physical switch infrastructure. Physical networks are configured during VergeOS installation and map directly to the physical NICs and switches in your environment.
Key characteristics:
Physical networks are the foundation that all other network types build upon. You do not create VMs on physical networks directly — they serve as the transport layer for virtual networks.
The core network is a virtual network created automatically during VergeOS installation. It handles all vSAN replication and inter-node communication, running across two physical networks (Core Fabric 1 and Core Fabric 2) for redundancy.
Key characteristics:
The core network is never exposed to external traffic. It is the most performance-critical network in a VergeOS system because vSAN throughput depends directly on inter-node communication speed. For a deep dive into the core fabric, see Module 1: Core Fabric & Networking.
The DMZ network is a virtual network created automatically during VergeOS installation (and during tenant creation). It serves as the central connection point — the Layer 3 routing backbone — for all networks in the system.
Key characteristics:
The DMZ is the architectural backbone that makes VergeOS networking work. When an internal network needs to reach another internal network or an external network, traffic routes through the DMZ. This centralized routing model enables fine-grained security policies at the network boundary.
An external network interfaces VergeOS with networks outside the system — your company LAN, a direct WAN connection, the internet, or any pre-existing network infrastructure.
Key characteristics:
External networks connect to the DMZ, which then routes traffic to and from internal networks. This architecture means that workload traffic never touches physical switch infrastructure directly — it always passes through the VergeOS SDN layer where security rules can be applied.
An internal network is a virtual network created within VergeOS (from the UI or via the API). Internal networks are where your workloads — VMs and containers — actually live.
Key characteristics:
192.168.1.0/24) because each network is isolated by defaultInternal networks connect to the DMZ for inter-network routing and external access. The default-secure model means that a newly created internal network is completely isolated — you must add routing rules to enable communication with other networks.
A special external network type intended for IPMI or out-of-band management access to physical nodes and optional PXE boot. A maintenance network can be created during installation or added afterward. It provides a dedicated management path separate from production traffic.
Every VergeOS network (internal and external) can leverage a comprehensive set of built-in services. These services replace the external appliances and add-on products typically required in traditional virtualization environments.
DHCP Server
Dynamic or sequential IP assignment with configurable start/stop ranges, lease management, and domain name settings. DHCP release/renew available from the network diagnostics tool.
DNS Server
Built-in DNS with zones, views, host registration, and record management. Each network can serve as its own DNS authority.
Routing
Static route rules direct traffic between VergeOS networks and out to external networks. Dynamic routing via BGP and OSPF available for enterprise environments.
Firewall
Accept, drop, or reject packets based on defined criteria. Stateful packet inspection with granular rules applied at any network level.
NAT / PAT
Map external-to-internal and internal-to-internal IP addresses and ports. Most commonly used to conserve external IP addresses.
QoS & Rate Limiting
Bandwidth prioritization and rate limiting to prevent resource contention and ensure fair usage across networks and tenants.
Port Mirroring
Replicate a network’s traffic to a VM NIC for deep packet inspection, analysis, or compliance monitoring.
VPN
Site-to-site and client VPN access using WireGuard or IPsec. Secure remote access without external VPN appliances.
Understanding the traffic flow through VergeOS is critical for troubleshooting and network design. Traffic follows a predictable path through the network type hierarchy:
Outbound traffic flow (VM → Internet):
Inbound traffic flow (Internet → VM):
The reverse path applies. Traffic arrives at the physical network, enters the external network, routes through the DMZ (where NAT translates the destination), and reaches the internal network where firewall rules determine if the packet is delivered to the VM.
Inter-network traffic (VM on Network A → VM on Network B):
Traffic between two internal networks also passes through the DMZ. Network A routes to the DMZ, the DMZ evaluates rules and routes to Network B, and Network B delivers to the destination VM. This provides a consistent security enforcement point for all inter-network communication.
VergeOS supports both Layer 2 and Layer 3 virtual networks, each suited to different use cases:
| Feature | Layer 3 Network | Layer 2 Network |
|---|---|---|
| IP management | VergeOS manages DHCP, DNS, routing, firewall | Third-party appliance manages IP-level services |
| Network services | Full built-in stack (DHCP, DNS, routing, FW) | Cross-node routing via DMZ only |
| Use case | Standard VM workloads, tenant networks | Virtual firewall/router appliances, bridged physical devices |
| Security | VergeOS firewall rules | Delegated to third-party appliance |
| Configuration | IP address, subnet, gateway defined in VergeOS | No IP configuration in VergeOS |
Most deployments use Layer 3 networks for the majority of workloads, as they provide the full benefit of VergeFabric’s integrated services. Layer 2 networks are used when you need to bridge to physical infrastructure or when a third-party virtual appliance must handle IP-level functions.
VergeOS networking extends seamlessly into the multi-tenant model. When a new tenant is created:
From there, tenants can create a virtually unlimited number of internal networks within their own environment. They have full self-service control over DHCP, DNS, routing, firewall rules, and network segmentation — without requiring host-level access.
Layer 2 external access can also be configured so a tenant has its own dedicated WAN connection or a dedicated VLAN on the host’s external connection.
| Concept | Summary |
|---|---|
| VergeFabric | Integrated SDN — no separate product to license or deploy. Full networking stack built into every VergeOS installation. |
| Physical networks | Layer 2 representations of physical switch connections, configured at install time, named with “Switch” suffix |
| Core network | Auto-created virtual network for vSAN and inter-node traffic, runs on dual physical fabrics for redundancy |
| DMZ network | Auto-created Layer 3 routing backbone, one per cloud/tenant, central point for all inter-network communication |
| External networks | Interface with upstream LAN/WAN/Internet, VLAN-capable, support static/DHCP/BGP addressing |
| Internal networks | User-created virtual networks for workloads, default-secure, unlimited quantity, built-in DHCP/DNS/FW |
| Traffic flow | VM → Internal → DMZ → External → Physical → Upstream (consistent path for all traffic) |
| Tenant networking | Full self-service network stack per tenant with isolated DMZ, internal networks, and firewall rules |
Now that you understand the VergeOS network types and how traffic flows through the system, the next topic covers how to connect VergeOS to your upstream infrastructure: External Networks →