Network Virtualization using Extreme Fabric Connect
Table Of Contents
- Table of Contents
- Table of Contents
- Table of Contents
- Table of Figures
- Table of Figures
- Table of Tables
- Conventions
- Introduction
- Reference Architecture
- Guiding Principles
- Architecture Components
- User to Network Interface
- Network to Network Interface
- Backbone Core Bridge
- Backbone Edge Bridge
- Customer MAC Address
- Backbone MAC Address
- SMLT-Virtual-BMAC
- IS-IS Area
- IS-IS System ID
- IS-IS Overload Function
- SPB Bridge ID
- SPBM Nick-name
- Dynamic Nick-name Assignment
- Customer VLAN
- Backbone VLAN
- Virtual Services Networks
- I-SID
- Inter-VSN Routing
- Fabric Area Network
- Fabric Attach / Auto-Attach
- FA Server
- FA Client
- FA Proxy
- FA Standalone Proxy
- VPN Routing and Forwarding Instance
- Global Router Table
- Distributed Virtual Routing
- Zero Touch Fabric (ZTF)
- Foundations for the Service Enabled Fabric
- IP Routing and L3 Services over Fabric Connect
- L2 Services Over SPB IS-IS Core
- Fabric Attach
- IP Multicast Enabled VSNs
- Extending the Fabric Across the WAN
- Distributed Virtual Routing
- Quality of Service
- Consolidated Design Overview
- High Availability
- Fabric and VSN Security
- Fabric as Best Foundation for SDN
- Glossary
- Reference Documentation
- Revisions
Network Virtualization Using Extreme Fabric Connect
© 2019 Extreme Networks, Inc. All rights reserved. 7
Figure 79 SPB QoS Uniform Model .................................................................................................................................................... 135
Figure 80 QoS Marking Over Fabric Extend ................................................................................................................................... 137
Figure 81 Zoom on Distribution BEB with UNI/FA Interfaces ................................................................................................ 138
Figure 82 Distribution BEB with SMLT Clustering........................................................................................................................ 139
Figure 83 Zoom on Data Center Distribution BEB / DVR Controller ....................................................................................140
Figure 84 Data Center Top of Rack (ToR) BEB with SMLT clustering .................................................................................. 141
Figure 85 Multi-Link Trunking (MLT) Used in Core and Access ............................................................................................. 145
Figure 86 Split Multi-Link Trunking (SMLT) Used in SPB Fabric Access ............................................................................. 147
Figure 87 SMLT with VRRP Backup-Master ................................................................................................................................... 149
Figure 88 SMLT with RSMLT-Edge ..................................................................................................................................................... 151
Figure 89 L3 ECMP Translation into SPB Equal Cost Shortest Paths ................................................................................... 152
Figure 90 L2 VSN Load Balancing into SPB Equal Cost Shortest Paths ............................................................................. 154
Figure 91 IP Multicast Load Balancing into SPB Equal Cost Shortest Path Trees ........................................................... 155
Figure 92 Loop Forming on Access VLAN ...................................................................................................................................... 157
Figure 93 Access VLANs Collapsed Together ............................................................................................................................... 158
Figure 94 Stealth Networking with IP Shortcuts (L3 VSN) ...................................................................................................... 164
Figure 95 L3 VSN Topology as Seen by IP Scanning Tools ...................................................................................................... 165
Figure 96 Isolation of the Global Routing Table (VRF0) ........................................................................................................... 167
Figure 97 DHCP Services for L2 Virtual Service Networks ....................................................................................................... 168
Figure 98 GRT (VRF0) L2 VSN ............................................................................................................................................................ 169
Figure 99 L3 VSN Topologies with Multicast Enabled................................................................................................................ 170
Figure 100 L3 VSN Extension ............................................................................................................................................................. 171
Figure 101 Orchestration of Applications and Services at Cloud Scale ............................................................................ 172
Table of Tables
Table 1 – SPB IEEE Relevant Standards .................................................................................................................................................. 12
Table 2 – SPB vs Traditional L3 Virtualization Technologies .......................................................................................................... 15
Table 3 – SPB vs Traditional L2 Virtualization Technologies .......................................................................................................... 18
Table 4 – SPB vs Competing Data Center Fabric Technologies ................................................................................................. 24
Table 5 – Properties of Fabric Connect vs. Fabric Attach ............................................................................................................. 30
Table 6 – Data Center Fabric Properties with and without DVR ................................................................................................. 35
Table 7 – Popular Hypervisor NIC Teaming Hashing Modes ......................................................................................................... 37
Table 8 – Available FA Client Types ....................................................................................................................................................... 49
Table 9 – IS-IS Internal and External IP Route Tie Breaking ......................................................................................................... 68
Table 10 – Extreme VOSS VSP Default Protocol Preferences ...................................................................................................... 69
Table 11 – Fabric Attach Management VLAN ID Values ...................................................................................................................85
Table 12 – QoS Markings and Queuing Profiles ................................................................................................................................. 132
Table 13 - Stealth Properties for SPB VSN Types ............................................................................................................................. 163