Network Virtualization using Extreme Fabric Connect
Table Of Contents
- Table of Contents
- Table of Contents
- Table of Contents
- Table of Figures
- Table of Figures
- Table of Tables
- Conventions
- Introduction
- Reference Architecture
- Guiding Principles
- Architecture Components
- User to Network Interface
- Network to Network Interface
- Backbone Core Bridge
- Backbone Edge Bridge
- Customer MAC Address
- Backbone MAC Address
- SMLT-Virtual-BMAC
- IS-IS Area
- IS-IS System ID
- IS-IS Overload Function
- SPB Bridge ID
- SPBM Nick-name
- Dynamic Nick-name Assignment
- Customer VLAN
- Backbone VLAN
- Virtual Services Networks
- I-SID
- Inter-VSN Routing
- Fabric Area Network
- Fabric Attach / Auto-Attach
- FA Server
- FA Client
- FA Proxy
- FA Standalone Proxy
- VPN Routing and Forwarding Instance
- Global Router Table
- Distributed Virtual Routing
- Zero Touch Fabric (ZTF)
- Foundations for the Service Enabled Fabric
- IP Routing and L3 Services over Fabric Connect
- L2 Services Over SPB IS-IS Core
- Fabric Attach
- IP Multicast Enabled VSNs
- Extending the Fabric Across the WAN
- Distributed Virtual Routing
- Quality of Service
- Consolidated Design Overview
- High Availability
- Fabric and VSN Security
- Fabric as Best Foundation for SDN
- Glossary
- Reference Documentation
- Revisions
Network Virtualization Using Extreme Fabric Connect
© 2019 Extreme Networks, Inc. All rights reserved. 75
Caution
Transparent UNIs should not be assigned to the same I-SID as CVLAN or Switched UNI.
Figure 32 Transparent UNI
E-TREE / L2 VSNs with Private-VLAN UNI
An E-TREE service type is an enhanced version of an E-LAN L2 VSN that uses a CVLAN UNI where the
VLAN used is a Private-VLAN. A Private-VLAN is a special VLAN construct where port members can be
assigned one of three possible roles:
• Promiscuous role: Devices connected to these ports are able to communicate with every other
device in the same L2 segment. Promiscuous ports are usually untagged ports that are only
members of the Private-VLAN.
• Isolated role: Devices connected to these ports are only able to communicate with devices hanging
off Promiscuous ports. Isolated ports are usually untagged ports that are only members of the
Private-VLAN.
• Trunk role: These ports must be used to q-tag extend a Private-VLAN between two switches. A
Trunk port is always q-tagged and can carry one or more Private-VLANs as well as other regular
VLAN ids.
When a Private-VLAN is created, it is necessary to provide two VLAN-IDs: a Primary VID and a Secondary
VID. In general, a Promiscuous port will always transmit traffic on the primary VID but will receive traffic
from both the primary and secondary VIDs. An Isolated port will transmit traffic into the secondary VID and
will only receive traffic from the primary VID. Both VIDs share the same MAC table and are both q-tagged
on Trunk ports. This is the industry standard IEEE 802.1Q implementation of Private-VLANs used by many
networking vendors as well as server hypervisor vendors such as VMware with ESX.
Extreme Networks Fabric Connect conforms to this implementation and enhances it to seamlessly operate
over the SPB Fabric by being able to assign an L2 VSN I-SID to a Private-VLAN with end-point provisioning.