Network Virtualization using Extreme Fabric Connect
Table Of Contents
- Table of Contents
- Table of Contents
- Table of Contents
- Table of Figures
- Table of Figures
- Table of Tables
- Conventions
- Introduction
- Reference Architecture
- Guiding Principles
- Architecture Components
- User to Network Interface
- Network to Network Interface
- Backbone Core Bridge
- Backbone Edge Bridge
- Customer MAC Address
- Backbone MAC Address
- SMLT-Virtual-BMAC
- IS-IS Area
- IS-IS System ID
- IS-IS Overload Function
- SPB Bridge ID
- SPBM Nick-name
- Dynamic Nick-name Assignment
- Customer VLAN
- Backbone VLAN
- Virtual Services Networks
- I-SID
- Inter-VSN Routing
- Fabric Area Network
- Fabric Attach / Auto-Attach
- FA Server
- FA Client
- FA Proxy
- FA Standalone Proxy
- VPN Routing and Forwarding Instance
- Global Router Table
- Distributed Virtual Routing
- Zero Touch Fabric (ZTF)
- Foundations for the Service Enabled Fabric
- IP Routing and L3 Services over Fabric Connect
- L2 Services Over SPB IS-IS Core
- Fabric Attach
- IP Multicast Enabled VSNs
- Extending the Fabric Across the WAN
- Distributed Virtual Routing
- Quality of Service
- Consolidated Design Overview
- High Availability
- Fabric and VSN Security
- Fabric as Best Foundation for SDN
- Glossary
- Reference Documentation
- Revisions
Network Virtualization Using Extreme Fabric Connect
© 2019 Extreme Networks, Inc. All rights reserved. 128
data center(s). So only a small proportion of data center host IPs will need to be optimized
against north-south traffic tromboning.
There are two possible approaches with DVR. In the first case, the Extreme’s Fabric Connect is end-to-end
extended from the data centers all the way to the wider campus, as depicted in Figure 73.
Figure 73 Eliminating North-South Tromboning with DVR, Over Campus Fabric
The users will be located in client IP subnets where a campus BEB will be acting as default gateway for
those users. On these campus IP Routers, Extreme offers the ability to let these BEBs join the DVR
Backbone I-SID tree in a listening only role. This is achieved by activating the IS-IS Backbone global switch,
which does not enable DVR on the node, but simply allows that BEB to obtain and maintain a software only
table of all data center hosts, across all DVR domains.
Tip
The ability to let an L3 BEB join the DVR Backbone is possible on all of the Extreme
Networks VSP platforms running VOSS software.
The obtained software table of data center hosts is not programmed in hardware and is not inserted in the
IP routing table and will not have any effect in altering traffic forwarding paths at first. For that to happen
the network administrator will need to take an additional step by defining an accept policy to inject a
selection of those hosts into the corresponding VRF IP routing table. Once the backbone accept policy is
applied, the BEB’s VRF IP routing table will be augmented to include host routes for the injected data
center hosts.
Caution
The backbone accept policy should be defined in such a way that only a selection of
relevant hosts is injected for which traffic tromboning effect needs to be optimized. Do
not inject all data center hosts as there could be thousands of hosts and this could exhaust
the BEB’s IP routing table scaling resources.
The resulting host routes on the campus BEBs will thus always point to the DVR controllers of the DVR
domain where the host is located. These routes will also automatically update themselves should the host
VM be migrated to a different DVR domain.