Network Virtualization using Extreme Fabric Connect

Table Of Contents
Network Virtualization Using Extreme Fabric Connect
© 2019 Extreme Networks, Inc. All rights reserved. 163
establish the initial service path (sections thereof), all additional path notions such as BGP and MPLS are
dependent upon, it meaning that these networks are potentially vulnerable to IP scanning techniques.
Strong access control lists can mask the environment from the general routed core, but this carries with it
its own set of conundrums in that path behavior is dependent upon reachability, as such there is only so
much that can be masked. Certain nodes will need to ‘see’ the IP reachability information, so all of this leads
to a scenario very similar to the trail brushing analogy.
But consider a bird. A bird can arrive at that given location. It will most certainly take a path to get there as
well as one to leave. It will also leave footprints where it lands; this would be its ‘point of presence’ on the
ground. Beyond this, however, there is no trace of the path that the bird took even though it did indeed
take one. No amount of tracking on the ground will effectively yield the path information.
This is because the paths for the bird are occurring on a different plane. Here the analogy to Fabric Connect
is also very strong. In Fabric Connect, path behavior is created at the Ethernet Switched Path level
(hereafter referred to as ESPs). All ESP knowledge is handled within resident link-state databases in each
Fabric Connect switch node. As a result, IP simply becomes a service around the edge of the Fabric
Connect Cloud.
Much like the bird footprints, an IP subnet becomes a ‘service point of presence’. Explicit path information
however is totally obscured from the perspective of IP because the path is not a routed IP hop-by-hop
path; it is held as an ESP at the Ethernet Shortest Path Bridging level.
Tip
The definition of a Stealth Network Topology is as follows:
“A network that is self-contained, with no ingress in or out of it except by strictly
controlled secure access points. The network must also be dark and not visible to IP or
other topological scanning techniques. As such the potential surface for any such activities
is either highly mitigated and protected or totally eliminated due to true isolation.”
In the Extreme Networks Fabric Connect architecture the different VSN types have slightly different stealth
attributes. These are listed in Table 13. By virtue of running over SPB, they all share the stealth property that
the core’s topology cannot be inferred.
Table 13 - Stealth Properties for SPB VSN Types
Stealth Properties
L3 VSN
I-SID VRF
L2 VSN
I-SID
VLAN
IP Shortcuts
GRT
(VRF-0)
Core’s topology cannot be inferred
**
IP interfaces need not exist
*
IP interfaces only exist at the edge as
gateways for IP end users in subnet
n/a
All remote IP subnets are 1 hop away
n/a
Network IP interfaces are not bound to any
socket (e.g., SSH, SNMP, HTTPS)
n/a
* NOTE: Any IP interfaces provisioned will expose the L2 VSN to the routing instance to which that IP
interface belongs (i.e., GRT IP Shortcuts or VRF which may or may not be part of an L3 VSN).
** NOTE: While the core topology cannot be determined, the individual switch elements can still be
enumerated through the IS-IS Source IP addresses.