Network Virtualization using Extreme Fabric Connect
Table Of Contents
- Table of Contents
- Table of Contents
- Table of Contents
- Table of Figures
- Table of Figures
- Table of Tables
- Conventions
- Introduction
- Reference Architecture
- Guiding Principles
- Architecture Components
- User to Network Interface
- Network to Network Interface
- Backbone Core Bridge
- Backbone Edge Bridge
- Customer MAC Address
- Backbone MAC Address
- SMLT-Virtual-BMAC
- IS-IS Area
- IS-IS System ID
- IS-IS Overload Function
- SPB Bridge ID
- SPBM Nick-name
- Dynamic Nick-name Assignment
- Customer VLAN
- Backbone VLAN
- Virtual Services Networks
- I-SID
- Inter-VSN Routing
- Fabric Area Network
- Fabric Attach / Auto-Attach
- FA Server
- FA Client
- FA Proxy
- FA Standalone Proxy
- VPN Routing and Forwarding Instance
- Global Router Table
- Distributed Virtual Routing
- Zero Touch Fabric (ZTF)
- Foundations for the Service Enabled Fabric
- IP Routing and L3 Services over Fabric Connect
- L2 Services Over SPB IS-IS Core
- Fabric Attach
- IP Multicast Enabled VSNs
- Extending the Fabric Across the WAN
- Distributed Virtual Routing
- Quality of Service
- Consolidated Design Overview
- High Availability
- Fabric and VSN Security
- Fabric as Best Foundation for SDN
- Glossary
- Reference Documentation
- Revisions
Network Virtualization Using Extreme Fabric Connect
© 2019 Extreme Networks, Inc. All rights reserved. 109
Tip
The Extreme Networks Fabric Connect VPN software (e.g. running on XA1400 platforms)
supports the following IPsec parameters:
• IPSec Mode: Tunnel mode
• Key Exchange Protocol: IKEv2
• Authentication methods: Pre shared key
• IPSec Security Protocol: ESP
• ESP Encryption: aes128gcm16 sha256
With the Fabric Connect VPN software the XA1400 designated WAN port is hardened and can be directly
connected to the Internet without having to go through any firewall. Nevertheless, in many deployments
the Fabric Extend terminating XA1400 nodes will typically be connected behind the enterprise firewall and
in this case two possible deployment models exist. Either the Fabric Connect VPN software is configured
with a public Internet IP address (and no NAT is performed by the Firewall) or the Fabric Connect VPN
software is configured with private IP addressing and the Firewall perfoms NAT. In this latter case the
Fabric Connect VPN will need to be enabled for NAT Traversal (NAT-T) which will add an additional UDP
header to the IPsec ESP encapsulation as shown in Figure 53.
Figure 56 Fabric Extend over the Public Internet with IPSec
Caution
Extreme Networks Fabric Connect VPN software does not support NAT Traversal (NAT-T)
in the first release.
IP interfaces used by Fabric Extend to build the IP tunnels must be isolated from any other IP interface used
to carry VSN services above the Fabric. The correct design approach is to allocate a VRF for Fabric Extend