Owner's Manual

Contents
1 Introduction ...............................................................................................................7
Supported Platforms..............................................................................................................................7
How the Active Fabric Works................................................................................................................ 7
Advantages of Active Fabric Deployment............................................................................................ 8
Active Fabric Element Definitions and Requirements..........................................................................8
AFC and SDN....................................................................................................................................... 10
2 Active Fabric Features............................................................................................13
Active Fabric Resiliency....................................................................................................................... 13
Link Resiliency................................................................................................................................13
Switch Resiliency .......................................................................................................................... 13
Packet Forwarding...............................................................................................................................13
Policies.................................................................................................................................................14
Important Points to Remember.................................................................................................... 14
Policy Configuration and Types....................................................................................................14
Policy Association..........................................................................................................................15
Network Policies............................................................................................................................15
Endpoint Policies........................................................................................................................... 15
Middlebox Policy........................................................................................................................... 16
Filter Policy.....................................................................................................................................16
Statistics............................................................................................................................................... 16
User Authentication ............................................................................................................................17
Remote Authentication Dial In User Service (RADIUS)................................................................ 18
Terminal Access Controller Access Control System (TACACS)...................................................18
3 Supported Technologies and Protocols........................................................... 19
Bare Metal Provisioning (BMP)............................................................................................................19
Destination Lookup Failure (DLF)........................................................................................................19
DLF Port Roles...............................................................................................................................20
DLF Topology................................................................................................................................20
High Availability (HA)............................................................................................................................21
HA and SDN...................................................................................................................................22
Deployment Model........................................................................................................................22
Design ........................................................................................................................................... 23
Role Determination....................................................................................................................... 23
Checkpoints...................................................................................................................................24
Reconciliation Process..................................................................................................................24
Link Aggregation Control Protocol (LACP) and NIC Teaming.......................................................... 25