Network Virtualization using Extreme Fabric Connect
Table Of Contents
- Table of Contents
- Table of Contents
- Table of Contents
- Table of Figures
- Table of Figures
- Table of Tables
- Conventions
- Introduction
- Reference Architecture
- Guiding Principles
- Architecture Components
- User to Network Interface
- Network to Network Interface
- Backbone Core Bridge
- Backbone Edge Bridge
- Customer MAC Address
- Backbone MAC Address
- SMLT-Virtual-BMAC
- IS-IS Area
- IS-IS System ID
- IS-IS Overload Function
- SPB Bridge ID
- SPBM Nick-name
- Dynamic Nick-name Assignment
- Customer VLAN
- Backbone VLAN
- Virtual Services Networks
- I-SID
- Inter-VSN Routing
- Fabric Area Network
- Fabric Attach / Auto-Attach
- FA Server
- FA Client
- FA Proxy
- FA Standalone Proxy
- VPN Routing and Forwarding Instance
- Global Router Table
- Distributed Virtual Routing
- Zero Touch Fabric (ZTF)
- Foundations for the Service Enabled Fabric
- IP Routing and L3 Services over Fabric Connect
- L2 Services Over SPB IS-IS Core
- Fabric Attach
- IP Multicast Enabled VSNs
- Extending the Fabric Across the WAN
- Distributed Virtual Routing
- Quality of Service
- Consolidated Design Overview
- High Availability
- Fabric and VSN Security
- Fabric as Best Foundation for SDN
- Glossary
- Reference Documentation
- Revisions
Network Virtualization Using Extreme Fabric Connect
© 2019 Extreme Networks, Inc. All rights reserved. 5
Concealment of the Core Infrastructure ............................................................................................................................... 162
Extreme’s Fabric Connect Stealth Networking ............................................................................................................................................... 162
Resistance to Attacks .................................................................................................................................................................. 165
Impossibility of Spoofing Attacks ........................................................................................................................................... 166
Stealth Networking Design Guidelines .................................................................................................................................. 167
Layer 2 Virtual Service Networks .......................................................................................................................................................................... 168
Different L2 Service Categories .............................................................................................................................................................................. 169
Layer 3 Virtual Service Networks .......................................................................................................................................................................... 170
Fabric as Best Foundation for SDN ...................................................................................................................................... 172
Glossary ........................................................................................................................................................................................ 174
Reference Documentation....................................................................................................................................................... 181
Revisions ...................................................................................................................................................................................... 182
Table of Figures
Figure 1 SPBM’s Mac-in-Mac Encapsulation ................................................................................................................................... 13
Figure 2 Comparison of SPB’s Simplicity with Traditional Protocol Stack ........................................................................ 14
Figure 3 Virtualization with SPB L3 VSNs ........................................................................................................................................ 15
Figure 4 L2 Virtualization with SPB L2 VSNs .................................................................................................................................. 17
Figure 5 Data Center Virtualization with SPB and DVR ........................................................................................................... 20
Figure 6 Overview of Fabric Layers and Overlays ......................................................................................................................26
Figure 7 Virtualization of Logical Networks over SPB ............................................................................................................... 27
Figure 8 Fabric Connect Reference Deployment Model ........................................................................................................... 28
Figure 9 Benefits of Extending Fabric Services with Fabric Extend .................................................................................... 32
Figure 10 Smaller (Meshed) vs Larger (Spine-Leaf) Topologies ............................................................................................ 34
Figure 11 DVR Architecture ................................................................................................................................................................... 36
Figure 12 VM Attachment to Server VLAN (L2 VSN) ..................................................................................................................38
Figure 13 SPB Fabric Architecture Components .......................................................................................................................... 39
Figure 14 IS-IS NNI Parallel Links ......................................................................................................................................................... 40
Figure 15 How the SPBM Nick-name is Used to Construct a Multicast BMAC .................................................................. 44
Figure 16 SPB Fabric Inter-VSN Routing .......................................................................................................................................... 47
Figure 17 Fabric Attach Foundation of Elastic Campus Architecture .................................................................................. 48
Figure 18 Unicast Shortest Path Between Two Nodes; Forward & Reverse Congruent ............................................... 56
Figure 19 Service-Specific (I-SID) Multicast Shortest Path Tree Rooted at Node A....................................................... 56
Figure 20 SPB path calculation and suggested link metrics ..................................................................................................... 59
Figure 21 Example of SPB’s ECT algorithms to select shortest paths .................................................................................. 60
Figure 22 SPB shortest path optimization via SMLT Primary/Secondary BEB positioning ...........................................61
Figure 23 Different Encapsulation Used by GRT IP Shortcuts ................................................................................................. 63
Figure 24 Relevant SPB L3 VSN Forwarding Tables .................................................................................................................... 64
Figure 25 Security Zones with Common Services ........................................................................................................................ 65
Figure 26 Simplicity of Using IS-IS Accept Policies with SPB .................................................................................................. 66
Figure 27 IS-IS External Routes Prefer Lower Route Metric over SPB’s Shortest Path ................................................. 68
Figure 28 Redundantly IP Routing Fabric VSN with External OSPF/RIP/BGP Network ............................................... 70
Figure 29 Relevant SPB L2 VSN Forwarding Tables ..................................................................................................................... 72
Figure 30 CVLAN UNI ................................................................................................................................................................................ 73