Design Reference
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this release
- Chapter 3: Network design fundamentals
- Chapter 4: Hardware fundamentals and guidelines
- Chapter 5: Optical routing design
- Chapter 6: Platform redundancy
- Chapter 7: Link redundancy
- Chapter 8: Layer 2 loop prevention
- Chapter 9: Spanning tree
- Chapter 10: Layer 3 network design
- Chapter 11: SPBM design guidelines
- Chapter 12: IP multicast network design
- Multicast and VRF-lite
- Multicast and MultiLink Trunking considerations
- Multicast scalability design rules
- IP multicast address range restrictions
- Multicast MAC address mapping considerations
- Dynamic multicast configuration changes
- IGMPv3 backward compatibility
- IGMP Layer 2 Querier
- TTL in IP multicast packets
- Multicast MAC filtering
- Guidelines for multicast access policies
- Multicast for multimedia
- Chapter 13: System and network stability and security
- Chapter 14: QoS design guidelines
- Chapter 15: Layer 1, 2, and 3 design examples
- Chapter 16: Software scaling capabilities
- Chapter 17: Supported standards, RFCs, and MIBs
- Glossary
• IPv4 multicast routed traffic on the Global Router (IP shortcuts with IP multicast over
SPBM)
• IPv4 multicast routed traffic using a VRF (Layer 3 VSN with IP multicast over SPBM)
Campus architecture
For migration purposes, you can add SPBM to an existing network that has SMLT configured.
In fact, if there are other protocols already running in the network such as Open Shortest Path
First (OSPF), you can leave them in place too. SPBM uses IS-IS, and operates independently
from other protocols. However, Avaya recommends that you eventually eliminate SMLT in the
core and other unnecessary protocols. This reduces the complexity of the network and makes
it much simpler to maintain and troubleshoot.
Whether you configure SMLT in the core or not, the main point to remember is that SPBM
separates services from the infrastructure. For example, in a large campus, a user may need
access to other sites or data centers. SPBM enables you to grant that access by associating
the user to a specific I-SID. This mechanism enables the user to work without getting access
to confidential information of another department.
The following figure depicts a topology where the BEBs in the edge and data center distribution
nodes are configured in SMLT clusters. Prior to implementing SPBM, the core nodes would
also have been configured as SMLT clusters. When migrating SPBM onto this network design,
it is important to note that you can deploy SPBM over the existing SMLT topology without
network interruption. After the SPBM infrastructure is in place, you can create VSN services
over SPBM or migrate them from the previous end-to-end SMLT-based design.
Figure 38: SPBM campus without SMLT
After migrating all services to SPBM, the customer VLANs (C-VLANs) will exist only on the
BEB SMLT clusters at the edge of the SPBM network. The C-VLANs will be assigned to an I-
SPBM design guidelines
86 Network Design Reference for Avaya VSP 4000 February 2014
Comments? infodev@avaya.com