Cluster Affinity
Optionally pin the network to a specific cluster and failover cluster to control where the VNet runs in multi-cluster environments.
External networks are the bridge between your VergeOS environment and the outside world. They connect VergeOS to upstream physical infrastructure — your corporate LAN, WAN connections, the Internet, or any network that exists outside of VergeOS.
Every VergeOS system requires at least one external network, which is typically created during initial installation. After installation, you can create additional external networks to support multiple uplinks, VLANs, separate management networks, or tenant-dedicated WAN connections.
External networks sit between physical networks (Layer 2 switch connections) and the DMZ (the Layer 3 routing backbone). Traffic flowing from VMs to the Internet must pass through an external network to reach the physical infrastructure.
To create a new external network, navigate to Networks → New External in the VergeOS UI. The creation form covers three major areas: network identity, Layer 2 configuration, and IP addressing.
| Field | Description |
|---|---|
| Name | A descriptive name (e.g., WAN1, MGMT-LAN). Spaces are not permitted. |
| Description | Optional notes for future administration. |
| HA Group | Assign to a high-availability group so the system distributes network instances across different physical nodes. |
The Layer 2 Type determines how the external network connects to the physical infrastructure:
| Layer 2 Type | Use Case |
|---|---|
| vLAN | Most common — tags traffic with an 802.1Q VLAN ID on the selected physical network |
| Bond | Active-backup bond across multiple physical networks for NIC redundancy |
| Bond Slave | Secondary interface in a bonded pair (supports LAG group) |
| none | Direct connect with no VLAN tagging — used for untagged/native VLAN connections |
| vxLAN | VXLAN overlay — specify a VXLAN Network Identifier (VNI) in the Layer 2 ID field |
After selecting the Layer 2 type:
1500 for external networks (advanced users may adjust for jumbo frames)External Switch). Selecting another external network here enables Q-in-Q (VLAN inside VLAN) configurations.The IP Address Type determines how the external network’s router obtains its address:
| IP Address Type | Description |
|---|---|
| Static | Manually specify IP, network CIDR, gateway, and DNS. Most common for production deployments. |
| Dynamic | Obtain an address via DHCP. Limited to a single address — suited for small test or archive systems only. |
| BGP/OSPF | Dynamic routing protocol integration for enterprise environments. |
| None | Layer 2-only connection with no IP assignment on the VergeOS router. |
For static configurations, provide:
192.168.212.2)192.168.212.0/24)10.10.25.3, 10.10.25.4)VLANs are the most common Layer 2 configuration for external networks. Each external network can be mapped to a specific 802.1Q VLAN ID on a physical network, enabling network segmentation without additional physical cabling.
Example: Create an external network named WAN1 on VLAN 50:
WAN1vLAN50External SwitchFor environments that require double-tagging (e.g., service provider edge), select an external network (rather than a physical network) as the Interface Network. This stacks a second VLAN tag on top of the existing one, creating a Q-in-Q tunnel.
Bonding creates an active-backup configuration across VLAN-tagged physical networks, providing NIC redundancy for external connectivity. This is especially recommended for bare-metal installations limited to two NICs per node, where both NICs carry core fabric traffic and the external connection must share those same physical interfaces via VLANs.
vLAN and enter the appropriate VLAN IDcore-fabric-1 Switch, core-fabric-2 Switch), orAfter configuring a bond, validate failover behavior:
After creating an external network, traffic will not flow until you add a default routing rule. This is a critical post-creation step that is easy to overlook.
To add the default route:
default routeRouteOutgoingAnyDefaultIP/Custom192.168.212.1)Without this rule, the external network will be running but unable to route traffic to the upstream gateway.
HA Groups provide high availability for external networks by distributing network instances across different physical nodes. When two or more networks are assigned to the same HA Group, the system ensures they run on separate nodes — so a single node failure does not take down all external connectivity.
To configure:
External networks can run a built-in DHCP server to assign addresses to clients on the network (e.g., tenants, VMs with direct external access, or PXE-booting nodes).
| Setting | Description |
|---|---|
| Domain Name | Optional domain name for the DHCP scope |
| Gateway | The default gateway advertised to DHCP clients |
| Hostname | Hostname for this network’s router |
| Dynamic DHCP | Enable to specify a DHCP start/stop address range for dynamic allocation |
| Sequential Addresses | When enabled, assigns addresses consecutively rather than pseudo-randomly |
Cluster Affinity
Optionally pin the network to a specific cluster and failover cluster to control where the VNet runs in multi-cluster environments.
PXE Boot
Enable PXE boot on the external network if VergeOS nodes will PXE boot from this network. Disabled by default.
On Power Loss
Controls behavior after a physical node power loss or tenant power cycle: Last State (restore previous state), Leave Off, or Power On.
Rate Limiting
Enable rate limiting on routing to throttle overall network traffic. Configure the rate limit value, rate type (packets/sec, MB/day, bytes/hour, etc.), and burst allowance.
Statistics Tracking
Track Statistics for All Rules enables automatic packet/byte counting on every rule. Track DMZ Statistics monitors total traffic between this network and the DMZ.
DNS Configuration
Choose Disabled (no DNS), Bind (authoritative DNS), or Simple (DNS forwarding without local records).
This end-to-end example creates a VLAN-tagged external network with a static IP and default route.
Step-by-step:
WAN1vLAN, Layer 2 ID: 501500External SwitchStatic192.168.212.2192.168.212.0/2410.10.25.3, 10.10.25.4default route, Action: Route, Direction: OutgoingDefault, Target Type: IP/Custom, Target IP: 192.168.212.1Your external network is now operational and routing traffic to the upstream gateway.
Production deployments often use more than one external network:
Each external network can be mapped to the same or different physical networks, using different VLANs, IP ranges, and routing rules.
| Concept | Summary |
|---|---|
| Purpose | External networks connect VergeOS to upstream LAN, WAN, and Internet infrastructure |
| Layer 2 types | vLAN (most common), Bond, Bond Slave, none (direct connect), vxLAN |
| IP types | Static, Dynamic/DHCP, BGP/OSPF, None (Layer 2 only) |
| Default route | Required after creation — without it, the network runs but cannot route traffic |
| Bonding | Active-backup across physical networks for NIC redundancy; recommended for 2-NIC bare-metal nodes |
| HA Groups | Distribute network instances across nodes for high availability |
| Gateway monitoring | Detect upstream connectivity loss — always recommended for production |
| DHCP | Optional built-in DHCP server with dynamic or sequential address assignment |
| Q-in-Q | Double VLAN tagging by selecting an external (not physical) as the interface network |
With external networks connecting VergeOS to upstream infrastructure, the next topic covers how to build isolated virtual networks for your workloads: Internal Networks & DHCP/DNS →