Network Virtualization using Extreme Fabric Connect
Table Of Contents
- Table of Contents
- Table of Contents
- Table of Contents
- Table of Figures
- Table of Figures
- Table of Tables
- Conventions
- Introduction
- Reference Architecture
- Guiding Principles
- Architecture Components
- User to Network Interface
- Network to Network Interface
- Backbone Core Bridge
- Backbone Edge Bridge
- Customer MAC Address
- Backbone MAC Address
- SMLT-Virtual-BMAC
- IS-IS Area
- IS-IS System ID
- IS-IS Overload Function
- SPB Bridge ID
- SPBM Nick-name
- Dynamic Nick-name Assignment
- Customer VLAN
- Backbone VLAN
- Virtual Services Networks
- I-SID
- Inter-VSN Routing
- Fabric Area Network
- Fabric Attach / Auto-Attach
- FA Server
- FA Client
- FA Proxy
- FA Standalone Proxy
- VPN Routing and Forwarding Instance
- Global Router Table
- Distributed Virtual Routing
- Zero Touch Fabric (ZTF)
- Foundations for the Service Enabled Fabric
- IP Routing and L3 Services over Fabric Connect
- L2 Services Over SPB IS-IS Core
- Fabric Attach
- IP Multicast Enabled VSNs
- Extending the Fabric Across the WAN
- Distributed Virtual Routing
- Quality of Service
- Consolidated Design Overview
- High Availability
- Fabric and VSN Security
- Fabric as Best Foundation for SDN
- Glossary
- Reference Documentation
- Revisions
Network Virtualization Using Extreme Fabric Connect
© 2019 Extreme Networks, Inc. All rights reserved. 6
Figure 31 Switched UNI ........................................................................................................................................................................... 74
Figure 32 Transparent UNI ...................................................................................................................................................................... 75
Figure 33 E-TREE Private-VLAN L2 VSN ..........................................................................................................................................76
Figure 34 Fabric Attach Ecosystem .................................................................................................................................................... 77
Figure 35 Fabric Attach Model .............................................................................................................................................................. 77
Figure 36 Fabric Attach LLDP Element Signalling TLV ...............................................................................................................79
Figure 37 Fabric Attach LLDP Service Signalling TLV ................................................................................................................ 80
Figure 38 FA Client Requests VLAN:I-SID Binding ....................................................................................................................... 80
Figure 39 FA Zero-Touch-Client Assigns VLAN:I-SID Binding to Discovered FA client ................................................. 81
Figure 40 VLAN:I-SID Binding is RADIUS Assigned via NAC ..................................................................................................... 81
Figure 41 VLAN:I-SID Binding via Manual Configuration ............................................................................................................. 81
Figure 42 Fabric Attach Message Authentication ..........................................................................................................................83
Figure 43 FA Message Authentication Hardening RADIUS MAC-Based Authentication .............................................. 84
Figure 44 FA Signalling of Management VLAN from FA Server ..............................................................................................85
Figure 45 IP Multicast with SPB ............................................................................................................................................................ 90
Figure 46 IP Multicast Over L3 VSN that Comprises L2 VSNs ................................................................................................. 93
Figure 47 PIM Gateway to Legacy IP Multicast Routed Networks ......................................................................................... 95
Figure 48 Redundant PIM Gateway Deployment Model ............................................................................................................ 98
Figure 49 Inter-VSN IP Multicast with MVR on FA Proxy......................................................................................................... 100
Figure 50 Inter-VSN IP Multicast with Fabric-wide MVR L2 VSN ........................................................................................... 101
Figure 51 WAN Extending the Fabric or the VSN Services ..................................................................................................... 102
Figure 52 Fabric Extend Pairing of ONA with VSP4000 ..........................................................................................................104
Figure 53 Fabric Extend IP Mode (VXLAN / IPsec) MTU Considerations ........................................................................... 105
Figure 54 Fabric Extend over WAN L3 Any-to-Any IPVPN Service ..................................................................................... 107
Figure 55 Fabric Extend Deployment Model over WAN L3 IPVPN Service ...................................................................... 108
Figure 56 Fabric Extend over the Public Internet with IPSec .................................................................................................. 109
Figure 57 Fabric Extend Deployment Model over Public Internet with IPSec ................................................................... 110
Figure 58 Fabric Extend over WAN L2 Any-to-Any E-LAN Service ...................................................................................... 111
Figure 59 Fabric Extend Deployment Model over WAN L2 E-LAN Service ........................................................................ 111
Figure 60 Fabric Extend over WAN L2 Point-to-Point E-LINE Services .............................................................................. 112
Figure 61 VXLAN Gateway Capabilities ............................................................................................................................................ 114
Figure 62 Extending an L2 VSN Across Fabrics with VXLAN Gateway ............................................................................... 115
Figure 63 Extending an L3 VSN across Fabrics with VXLAN Gateway ................................................................................ 116
Figure 64 Traffic Tromboning Challenges in a Non-DVR Enabled Data Center ............................................................... 118
Figure 65 DVR Model and Scaling ....................................................................................................................................................... 119
Figure 66 – DVR Gateway IP Provisioning on DVR Controllers Only....................................................................................... 123
Figure 67 – How DVR Ensures MAC Learning of DVR Gateway MAC ..................................................................................... 123
Figure 68 DVR’s Distributed Anycast Gateway in Action ......................................................................................................... 124
Figure 69 DVR East-West Traffic Forwarding for L3 Flows ..................................................................................................... 125
Figure 70 DVR Using RARP with VMware Vmotion .................................................................................................................... 126
Figure 71 DVR Using GARP with Microsoft Hyper-V Live Migration.................................................................................... 126
Figure 72 DVR with VM Migration Across DVR domains .......................................................................................................... 127
Figure 73 Eliminating North-South Tromboning with DVR, Over Campus Fabric ......................................................... 128
Figure 74 Eliminating North-South Tromboning with DVR, Over Legacy WAN ............................................................. 129
Figure 75 QoS DiffServ Model ............................................................................................................................................................... 131
Figure 76 QoS Fields in an SPBM Mac-in-Mac Frame ................................................................................................................. 133
Figure 77 QoS SPB Model ...................................................................................................................................................................... 134
Figure 78 SPB QoS Provider Model ................................................................................................................................................... 134