Network Virtualization using Extreme Fabric Connect
Table Of Contents
- Table of Contents
- Table of Contents
- Table of Contents
- Table of Figures
- Table of Figures
- Table of Tables
- Conventions
- Introduction
- Reference Architecture
- Guiding Principles
- Architecture Components
- User to Network Interface
- Network to Network Interface
- Backbone Core Bridge
- Backbone Edge Bridge
- Customer MAC Address
- Backbone MAC Address
- SMLT-Virtual-BMAC
- IS-IS Area
- IS-IS System ID
- IS-IS Overload Function
- SPB Bridge ID
- SPBM Nick-name
- Dynamic Nick-name Assignment
- Customer VLAN
- Backbone VLAN
- Virtual Services Networks
- I-SID
- Inter-VSN Routing
- Fabric Area Network
- Fabric Attach / Auto-Attach
- FA Server
- FA Client
- FA Proxy
- FA Standalone Proxy
- VPN Routing and Forwarding Instance
- Global Router Table
- Distributed Virtual Routing
- Zero Touch Fabric (ZTF)
- Foundations for the Service Enabled Fabric
- IP Routing and L3 Services over Fabric Connect
- L2 Services Over SPB IS-IS Core
- Fabric Attach
- IP Multicast Enabled VSNs
- Extending the Fabric Across the WAN
- Distributed Virtual Routing
- Quality of Service
- Consolidated Design Overview
- High Availability
- Fabric and VSN Security
- Fabric as Best Foundation for SDN
- Glossary
- Reference Documentation
- Revisions
Network Virtualization Using Extreme Fabric Connect
© 2019 Extreme Networks, Inc. All rights reserved. 4
Inter VSN IP Multicast ................................................................................................................................................................... 99
Extending the Fabric Across the WAN ............................................................................................................................... 102
Fabric Extend .................................................................................................................................................................................. 103
Fabric Extend over IPVPN Service.......................................................................................................................................... 107
Fabric Extend over the Public Internet with IPSec .......................................................................................................... 108
Fabric Extend over E-LAN/VPLS Service ............................................................................................................................. 110
Fabric Extend over E-LINE Service .......................................................................................................................................... 111
VSN Extend with VXLAN Gateway ......................................................................................................................................... 113
Distributed Virtual Routing ..................................................................................................................................................... 117
Traffic Tromboning Challenges ................................................................................................................................................. 117
DVR Deployment Model .............................................................................................................................................................. 118
DVR Host Tracking and Traffic Forwarding ........................................................................................................................ 124
Eliminating North-South Tromboning ................................................................................................................................... 127
DVR limitations and Design Alternatives ............................................................................................................................. 130
Quality of Service ....................................................................................................................................................................... 131
Initial Considerations ..................................................................................................................................................................... 131
QoS Implementation Over SPB ................................................................................................................................................ 133
QoS Considerations with Fabric Extend ............................................................................................................................... 136
Consolidated Design Overview ............................................................................................................................................. 138
Campus Distribution ..................................................................................................................................................................... 138
Data Center Distribution ............................................................................................................................................................ 140
Data Center Access ..................................................................................................................................................................... 140
High Availability ......................................................................................................................................................................... 142
System Level Resiliency .............................................................................................................................................................. 142
Hardware Component Redundancy..................................................................................................................................................................... 142
High-Availability Mode ............................................................................................................................................................................................... 142
Network Level Resiliency ........................................................................................................................................................... 142
Fabric Connect Fast-Rerouting .............................................................................................................................................................................. 142
Virtual LACP ................................................................................................................................................................................................................... 143
Link Aggregation / Multi-Link Trunking (MLT) ............................................................................................................................................... 144
Multi-chassis Link Aggregation ..............................................................................................................................................................................146
Active/Active IP Gateway Redundancy with SMLT ...................................................................................................................................... 148
DVR On Campus SMLT Distribution ...................................................................................................................................................................... 151
Load Sharing Over Fabric Connect VSNs .......................................................................................................................................................... 152
Human Level Resiliency .............................................................................................................................................................. 156
Loop Detection and Protection Mechanisms ................................................................................................................................................... 157
Fabric and VSN Security .......................................................................................................................................................... 161
Address Space, Routing, and Traffic Separation................................................................................................................ 161