Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN

5,175 views

Published on

This presentation will discuss the evolving Data Centre Fabric, FabricPath, VXLAN, LISP, LISP Host Mobility, OTV LAN Extension, Mobility with Extended Subnets and Nexus Fabric.

Published in: Technology, Education

Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN

  1. 1. Flexible Data Centre Fabric -FabricPath/TRILL, OTV, LISPand VXLAN Ron Fuller– CCIE #5851 (R&S/Storage) Technical Marketing Engineer, Nexus 7000 rfuller@cisco.com
  2. 2. Agenda  The Evolving Data Centre Fabric  FabricPath  VXLAN 1K Cisco Nexus x8  LISP 6  LISP Host Mobility  OTV LAN Extension  Mobility with Extended Subnets  Nexus Fabric© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  3. 3. Goals of the Fabric Addressing Concurrent Workloads, Mobility and LatencyPort Density Priority Flow ControlAdequate Buffer Capacity Early Congestion NotificationAdequate Table Sizes FabricPath Multiple TreesLow Latency Switching ECMP L2 & L3Cut-through Switching Multi-tenancy : : : : Architecture is evolving Rapidly – in the next 24 months L2/L3 Boundary becomes less relevant Clos Topologies dominate new implementations HA models shift Server Edge becomes more intelligent DC Fabric becomes more scalable© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  4. 4. Goals of the FabricAddressing High Availability and Fate Sharing L3 L3/L2 L3/L2 L2 L2 East-West traffic – Fate Sharing Domain Larger POD East-West Traffic – Fate Sharing Domain STP is the protocol of choice N+1 redundancy 1+1 redundancy – limited forwarding paths IS-IS is the protocol of choice Broad forwarding paths East-West across L3 boundaries Broader Adjacency Support OSPF/EIGRP are protocols of choice N+1 redundancy – Broad forwarding Paths Same number of physical boxes and links Protocol behavior is L3-like North-South traffic Multi-pathing over L2 and L3 OSPF/EIGRP are protocols of choice More flexible L2 adjacency, better scale capacity N+1 redundancy – Broad forwarding paths Better latency consistency within POD© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  5. 5. Goals of the Fabric Not a L2 vs. L3 debate L2/L3  The traditional L2 vs. L3 debate has been based on a number of issues  Scalability  Availability  Requirements for the scalable design moving forward is a scalable, highly available switching fabric with the advantages of both L2 and L3© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  6. 6. “Plug-and-Play” and Mobility vs. Availability and Scaling Advantages of Layer 2 Disadvantages of Layer 2  Practically “plug-n-play” – No user  MAC address consumption configuration is required to build forwarding database  BPDU generation is CPU intensive with increasing number of VLANs  It makes it simple to support teaming or L2  VLAN sprawl causes flooding and broadcasts to multicast for clusters propagate even where they are not needed  Easy to segment traffic with VLANs  Half of the links in the topology are blocking  Very fast movement of end station addresses  Misconfigurations can cause Layer 2 loops which (ability to update MAC address tables after a may make switches unmanageable vMotion-type event) MAC Table MAC Table A A Layer 2 Domain MAC Table MAC Table MAC Table A MAC Table A A A© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  7. 7. Availability and Scaling vs. Restricted Workload Flexibility  Layer 3 Routed Topologies alleviate the consumption of L2 tables via route summarization  Layer 3 Routed topologies provide for a degree of fault isolation and  “Routed Access” provides the logical L3 extension of the design philosophy L2  “Scaling Up” of the Access Switch via such mechanism as the FEX provide a degree of workload mobility  “L2” domain extension of some form is required for most workload mobility requirements Workload Domain for most Hypervisor and Clustering based solutions is restricted by the Traditional Layer 2/3 boundary© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  8. 8. Segment-ID: Scaling Logical Groupings of Connectivity S1 Web S2 App S3 Database Server Server Server S4 802.1Q VLAN ID 802.1Q VLAN ID 802.1ad 12-bits 12-bits standardized frame format SegmentId VLAN ID VLAN ID 12-bits 24-bits 12-bits© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  9. 9. Location Identity Separation • Location reachability determined by traditional routing mechanisms in the Fabric L2/L3 Fabric • Identity is mapped to locationLocation addressesIdentity • All these technologies leverage Location/Identity Mapping FabricPath / VXLAN OTV LISP TRILL Location Switch-ID IP address IP address IP address (IS-IS) (IP protocols) (IP protocols) (IP protocols) Identity Client MAC Client MAC Client MAC Client IP/MAC (Flooding) (Flooding) (IS-IS) (Mapping DB) Multi-tenancy © 2010 Cisco and/or its affiliates. All rights reserved. 24-bit Segment Identifier Cisco Confidential 10
  10. 10. FabricPath, LISP, VXLAN & OTV Requirement Intra-DC Inter-DC Scale Layer 2 connectivity FabricPath/TRILL/VXLAN OTV/VPLS IP Mobility LISP LISP Secure Segmentation VXLAN / Segment-ID VPNs (LISP/MPLS) LISP IP mobility IP Network DC-west DC-east POD POD POD POD App App App App App App OTV/VPLS OS OS OS (Inter-DC x-L3) OS OS OS Fabric Path VXLAN/OTV Fabric Path VXLAN/OTV (Intra-DC L2) (Intra-DC x-L3)© 2010 Cisco and/or its affiliates. All rights reserved. (Intra-DC L2) (Intra-DC x-L3) Confidential Cisco 11
  11. 11. Agenda  The Evolving Data Centre Fabric  FabricPath  VXLAN 1K Cisco Nexus x8  LISP 6  LISP Host Mobility  OTV LAN Extension  Mobility with Extended Subnets  Nexus Fabric© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  12. 12. Cisco FabricPath NX-OS Innovation Enhancing L2 with L3 Switching Routing  Easy Configuration  Multi-pathing (ECMP)  Plug & Play  Fast Convergence  Provisioning Flexibility  Highly Scalable FabricPath “FabricPath brings Layer 3 routing benefits to flexible Layer 2 bridged Ethernet networks”© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  13. 13. MAC-in-MAC Optimal MAC Learning IS-IS • Creates hierarchical layer 2 • Prevent potential MAC table • Scalable routing protocol with address scheme with additional MAC overflow in large scale L2 domain proven implementation for fast header • Traditional source-learning only on convergence upon network changes • Source and destination Switch_ID Edge port for locally connected MAC • Link-state protocol ensures optimal written into outer MAC header at addresses path between any 2 nodes L2MP edge • Learning is disabled on Core port to • Built-in authentication mechanism • Forwarding inside L2MP core reduce MAC table utilization enhances network security and network is based on destination • Non-local source-MAC only learned stability Switch_ID if destination-MAC is already learned • Inherent support for ECMP and • Embedded path selector (FTAG) as local entry multi-topology maximize link provides multi-pathing for even utilization broadcast and multicast • Built-in protections (TTL and multicast RPF) minimize impact of transient network issues© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  14. 14. New Control Plane Plug-n-Play L2 IS-IS manages forwarding topology • IS-IS assigns addresses to all FabricPath switches automatically • Compute shortest, pair-wise paths • Support equal-cost paths between any FabricPath switch pairs S10 S20 S30 S40 FabricPath Routing Table Switch IF S10 L1 S20 S30 L2 L3 FabricPath S40 L4 L1 L2 L3 S200 L1, L2, L3, L4 L4 … … S400 L1, L2, L3, L4 S100 S200 S300 S400© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  15. 15. New Data Plane • The association MAC address/Switch ID is maintained at the edge S10 S20 S30 S40 Switch ID space: S300: FabricPath Routing decisions A  B S100  S300 Routing Table are made based on Switch IF the FabricPath … … routing table S100 FabricPath S200 (FP) S300 S100 L1, L2, L3, L4 MAC adress space: 1/1 1/2 S300: CE MAC Switching based on Classical Ethernet (CE) Address Table MAC IF MAC address tables A B B 1/2 … A … S100 • Core fabric leverages an independent routing topology from the edge • Scales MAC learning • Scales Core topology state© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  16. 16. New Control and Data Plane • Edge switches maintain both MAC address table and Switch ID table • Ingress switch uses MAC table to determine destination Switch ID • Egress switch uses MAC table (optionally) to determine output switchport S10 S20 S30 S40 FabricPath MAC Table on S100 MAC IF/SID Local MACs point to switchports A B e1/1 e1/2 S100 S101 FabricPath S200Remote MACs point C S101 to Switch IDs D S200 © 2010 Cisco and/or its affiliates. All rights reserved. MAC A MAC B MAC C MAC D Cisco Confidential 17
  17. 17. New Control and Data Plane • FabricPath IS-IS manages Switch ID (routing) table • All FabricPath-enabled switches automatically assigned Switch ID (no user configuration required) • Algorithm computes shortest (best) paths to each Switch ID based on link metrics • Equal-cost paths supported between FabricPath switches S10 S20 S30 S40 FabricPath Routing Table on S100 Switch IF One „best‟ path S10 L1 to S10 (via L1) S20 L2 S30 L3 L1 L2 L3 L4 S40 L4 Four equal-cost S101 L1, L2, L3, L4 paths to S101 … … FabricPath S200 L1, L2, L3, L4© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 S100 S101 S200
  18. 18. Scaling – Conversational Learning MAC IF MAC IF A e1/1 A s1,e1/1 … … … … B s8, e1/2 FabricPath B e1/2 s3 s5 s8 e1/1 e1/2 A B MAC IF … … • Edge switch only learn the MAC of remote hosts when there are two way communications between remote hosts and local hosts • Unknown unicast flooding alone won‟t have all switches within VLAN learn the source MAC • Intermediate switches don‟t learn the MAC • Hardware based MAC learning© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  19. 19. Cisco FabricPath Terminology  Interface connected to another FabricPath device  Sends/receives traffic with FabricPath header  Does not run spanning tree  Does not perform MAC learning!  Exchanges topology info through L2 ISIS adjacency FP Core Ports  Forwarding based on „Switch ID Table‟ S10 S20 S30 S40 Spine Switch FabricPath (FP) S100 S200 S300 Leaf Switch 1/1 1/2 Classical Ethernet (CE) A B CE Edge Ports  Interface connected to traditional network device  Sends/receives traffic in standard 802.3 Ethernet frame format  Participates in STP domain  Forwarding based on MAC table© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  20. 20. Configuration SimplicityAutomatically handledby IS-IS FabricPath V10 V20 V30 V30 V10 V20 V10 V30 V10 V20 V30© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  21. 21. • Multidestination traffic constrained to Root for Root for loop-free trees touching all FabricPath Tree 1 Tree 2 switches S10 S20 S30 S40 • Root switch assigned for each multidestination tree in FabricPath domain • Loop-free tree built from each Root and assigned a network-wide identifier (Ftag) FabricPath • Support for multiple multidestinationS100 S101 S200 trees provides multipathing for multi- destination traffic Two trees supported in NX-OS release 5.1 S100 S20 S100 S10 S10 S101 S30 S40 S101 S20 Root S200 S40 Root S200 S30 Logical Logical Tree 1 © 2010 Cisco and/or its affiliates. All rights reserved. Tree 2 Cisco Confidential 22
  22. 22. Multi-Topology Support FabricPath Topology „0‟ VLAN 20 (DC Wide) Common across entire Data Center FabricPath Topologies FabricPath FabricPath Topology Topology „1‟ „2‟ VLAN 20 – DC Wide VLAN 20 – DC Wide VLAN 30 – POD Local (and non-unique) VLAN 30 – POD Local (and non-unique) VLAN 10 – POD Local (and unique) VLAN 40 – POD Local (and unique) • Extending FabricPath to the edge switches without requiring a redesign of the VLAN topology • Each FP switch can have up to 2 Topology ID‟s defined (Topology ID‟s does not have to be unique). • Each Topology will have 2 Multi-Destination Trees defined© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  23. 23. Mac-in-Mac Header Classical Ethernet Frame DMAC SMAC 802.1Q Etype Payload CRC 16 bytes Original CE Frame Outer Outer FPCisco FabricPath DA SA Tag DMAC SMAC 802.1Q Etype Payload CRC (new) Frame (48) (48) (32) 6 bits 1 1 2 bits 1 1 12 bits 8 bits 16 bits 16 bits 10 bits 6 bits OOO/DL RSVDEndnode ID Endnode ID Sub Etype U/L I/G Switch ID LID Ftag TTL (5:0) (7:6) Switch ID 0x8903 • Switch ID – Unique number identifying each FabricPath switch • Sub-Switch ID – Identifies devices/hosts connected via VPC+ • LID – Local ID, identifies the destination or source interface • Ftag (Forwarding tag) – Unique number identifying topology and/or distribution tree • TTL – Decremented at each switch hop to prevent frames looping infinitely © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  24. 24. Putting it all together – Host A to Host B (1) Broadcast ARP Request Root for Root for Multidestination Tree 1 Tree 2 Trees on Switch 10 S10 S20 S30 S40 4 Tree IF DA→FFFtag → 1 po100,po200,po300 Ftag→1 po300 2 po100 SA→100.0.12 DA→FF DMAC→FF po100 po200 Ftag→1 SMAC→A SA→100.0.12 Multidestination Payload DMAC→FF Trees on Switch 100 po20 po30 po40 SMAC→A po10 po20 po30 3 Tree IF po40 po10 PayloadBroadcast → 1 po10 S100 S200 Multidestination S300 2 po10,po20,po30,po40 Trees on Switch 300 5 Tree IF 6 FabricPath MAC Table on S100 DMAC→FF e1/13 Ftag → 1 po10,po20,po30,po40 e2/29 Payload SMAC→A 2 po40 MAC IF/SID SMAC→A DMAC→FF A e1/13 (local) 2 Payload FabricPath MAC A MAC B 1 MAC Table on S200 © 2010 Cisco and/or its affiliates. All rights reserved. MAC IF/SID Cisco Confidential 25
  25. 25. Putting it all together – Host A to Host B (1) Broadcast ARP Request • S100: S100# sh mac address-table dynamic Legend: * - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC age - seconds since last seen,+ - primary entry using vPC Peer-Link VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID MAC A learned as ---------+-----------------+--------+---------+------+----+------------------ local entry on e1/13 * 10 0000.0000.000a dynamic 0 F F Eth1/13 S100# • S10 (and S20, S30, S40, S200, S300): S10# sh mac address-table dynamic MAC A not learned Legend: on other switches * - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC age - seconds since last seen,+ - primary entry using vPC Peer-Link VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID ---------+-----------------+--------+---------+------+----+------------------© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  26. 26. (2) Broadcast ARP Reply Root for Root for Multidestination Tree 1 Tree 2 S10 S20 S30 S40 Trees on Switch 10 10 Tree IFFtag → 1 po100,po200,po300 po300 2 po100 DA→MC1 DA→MC1 Ftag→1 Ftag→1 po100 po200 SA→300.0.64 SA→300.0.64 DMAC→A DMAC→A Multidestination SMAC→B Trees on Switch 100 SMAC→B po20 po30 po40 po10 po20 po30 Payload Payload 11 Tree IF po40 po10Ftag → 1 po10 S200 Multidestination S300 2 po10,po20,po30,po40 Trees on Switch 300 9 Tree IF 7 FabricPath MAC Table on S100 Payload e1/13 Unknown → 1 po10,po20,po30,po40 e2/29 DMAC→A 2 po40 SMAC→B MAC IF/SID SMAC→B Payload A e1/13 (local) 12 DMAC→A MAC A FabricPath MAC Table on S300 MAC B B 300.0.64 (remote) MAC IF/SID 8 MISS © 2010 Cisco and/or its affiliates. All rights reserved. B e2/29 (local) Cisco Confidential 27
  27. 27. Putting it all together – Host A to Host B MAC Address Table after the first ARP frame • S100: S100# sh mac address-table dynamic Legend: * - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC age - seconds since last seen,+ - primary entry using vPC Peer-Link VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID ---------+-----------------+--------+---------+------+----+------------------ S100 learns MAC B as * 10 0000.0000.000a dynamic 90 F F Eth1/13 remote entry reached 10 0000.0000.000b dynamic 60 F F 300.0.64 through S300 S100# • S300: S300# sh mac address-table dynamic Legend: * - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC age - seconds since last seen,+ - primary entry using vPC Peer-Link MAC B learned as VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID local entry on e2/29 ---------+-----------------+--------+---------+------+----+------------------ • 10 0000.0000.000b dynamic 0 F F Eth2/29© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
  28. 28. FabricPath Routing Table on S30 S10 S20 S30 S40 Switch IF … … S300 → S300 po300 16 po300 DA→300.0.64 DA→300.0.64 FabricPath Routing Ftag→1 Ftag→1 Table on S100 SA→100.0.12 SA→100.0.12 Switch IF DMAC→B DMAC→B S10 po10 SMAC→A SMAC→A po10 po20 po30 po20 po30 po40 S20 po20 Payload Payload Hash po40 po10 S30 po30 S40 po40 S200 FabricPath Routing S300 S100 po10, po20, Table on S300 S200 po30, po40 17 15 Switch IF po10, po20, … …S300 → e1/13 e2/29 S300 Payload po30, po40 S300 → S300 Use LID (64) SMAC→A DMAC→B FabricPath DMAC→B MAC Table on S100 SMAC→A FabricPath MAC A MAC B MAC IF/SID Payload MAC Table on S300 A e1/13 (local) 14 13 MAC IF/SID 18 A S100.0.12 (remote)B→ B 300.0.64 (remote) If DMAC is known, then B e2/29 (local) © 2010 Cisco and/or its affiliates. All rights reserved. learn remote MAC Cisco Confidential 29
  29. 29. Putting it all together – Host A to Host B Unicast forwarding S100# sh mac address-table dynamic Legend: * - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC age - seconds since last seen,+ - primary entry using vPC Peer-Link VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID ---------+-----------------+--------+---------+------+----+------------------ * 10 0000.0000.000a dynamic 90 F F Eth1/13 10 0000.0000.000b dynamic 60 F F 300.0.64 S300# sh mac address-table dynamic Legend: * - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC age - seconds since last seen,+ - primary entry using vPC Peer-Link VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID ---------+-----------------+--------+---------+------+----+------------------ S100 learns MAC A as remote entry reached 10 0000.0000.000a dynamic 30 F F 100.0.12 through S100 • 10 0000.0000.000b dynamic 90 F F Eth2/29© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
  30. 30. Putting it all together – Host A to Host B Unicast Forwarding S100# sh fabricpath route FabricPath Unicast Route Table a/b/c denotes ftag/switch-id/subswitch-id [x/y] denotes [admin distance/metric] ftag 0 is local ftag subswitch-id 0 is default subswitch-id Topology (ftag), Switch ID, Sub-Switch ID FabricPath Unicast Route Table for Topology-Default Administrative distance, routing metric 0/100/0, number of next-hops: 0 via ---- , [60/0], 0 day/s 04:43:51, local 1/10/0, number of next-hops: 1 Route age via Po10, [115/20], 0 day/s 02:24:02, isis_fabricpath-default 1/20/0, number of next-hops: 1 via Po20, [115/20], 0 day/s 04:43:25, isis_fabricpath-default Client protocol 1/30/0, number of next-hops: 1 via Po30, [115/20], 0 day/s 04:43:25, isis_fabricpath-default Next-hop interface(s) 1/40/0, number of next-hops: 1 via Po40, [115/20], 0 day/s 04:43:25, isis_fabricpath-default FabricPath 1/200/0, number of next-hops: 4 via Po10, [115/40], 0 day/s 02:24:02, isis_fabricpath-default S10 S20 S30 S40 via Po20, [115/40], 0 day/s 04:43:06, isis_fabricpath-default via Po30, [115/40], 0 day/s 04:43:06, isis_fabricpath-default via Po40, [115/40], 0 day/s 04:43:06, isis_fabricpath-default po10 1/300/0, number of next-hops: 4 po20 via Po10, [115/40], 0 day/s 02:24:02, isis_fabricpath-default po30 po40 via Po20, [115/40], 0 day/s 04:43:25, isis_fabricpath-default S100 S200 S300 via Po30, [115/40], 0 day/s 04:43:25, isis_fabricpath-default via Po40, [115/40], 0 day/s 04:43:25, isis_fabricpath-default© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 A B C
  31. 31. FabricPath Design STP Interaction FabricPath (no STP) FabricPath Classical Ethernet STP (STP) Domain STP Domain 1 BPDU ✖ STP BPDU Domain 2 CE Edge Ports  FabricPath domain appears as single Spanning-Tree bridge  All FabricPath bridges share a common (static) bridge ID Cisco reserved MAC c84c.75fa.6000  STP BPDUs are not carried through the FabricPath network  Configure all FabricPath edge switches using “spanning-tree vlan <x> root primary” (or manually configure bridge priority lower than any STP bridge) Each FabricPath edge switch must be the root for all connected STP domains Strongly recommended to use the same bridge priority on all FabricPath edge switches 32© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  32. 32. FabricPath L2/L3 Boundary Location Layer 3 Boundary at the Spine Layer 3 Integration at the Leaf/Edge Straightforward with two spine switches  Provides a “cleaner” spine design Considerations with more than two spines:  Traffic distributed equally across spines (no hot  HSRP: Traffic polarized to spines on a per VLAN basis spot) (South-North)  GLBP to distribute servers to different default gateways  Increased number of hops to reach gateway (latency)  Anycast FHRP future solution L3 FabricPath FabricPath L3 L3© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
  33. 33. FabricPath L2/L3 Boundary Location Classic Two Switch Spine • Simplest migration from most existing designs L3 Domain • The spine is also used for routing with + MAC learning for M1/F1 in the same VDC L3 Switch-id based • Consideration – MAC Learning and Scaling edge/spine routed traffic forwarding s M1+F1 M1+F1 • Compared to classic ethernet designs you gain: Ease of configuration MAC address table increased scalability and more efficient learning Traffic distribution on all uplinks edge Possibility to offload the spine by providing direct communication paths between the edge layer devices […] Conversational Learning Conversational Learning© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
  34. 34. FabricPath L2/L3 Boundary Location Leaf/Spine/Boundary Architecture L3 Domain• By separating the L3 function from the spine, the F1 card in L3 edge the spine performs pure switch- id forwarding M1/F1 M1/F1 FP port FP port• The L3 edge will need both M1/F1 in order to connect with Switch-id based Fabricpath ports to the spine spine spine forwarding• The M1/F1 L3 edge will need to perform learning for the remote mac addresses• L3 edge and spine can be combined in the same chassis by means of VDCs edge Conversational Conversational Learning© 2010 Cisco and/or its affiliates. All rights reserved. Learning Cisco Confidential 35
  35. 35. Nexus Edge, Core & Boundary Nodes Large Scale Fabric 4K VLAN’s, 128K MAC Address, 512K Routes blade1 blade1 blade1 blade1 blade1 blade1 slot 1 blade2 slot 1 blade2 slot 1 blade2 slot 1 blade2 slot 1 blade2 slot 1 blade2 blade1 blade1 blade1 blade1 slot 2 blade3 slot 2 blade3 slot 2 blade3 slot 2 blade3 slot 2 blade3 slot 2 blade3 blade1 blade1 slot 1 slot 1 slot 1 blade2 slot 1 blade2 slot 3 slot 3 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 1 blade2 slot 1 blade2 blade2 slot 2 blade2 slot 2 slot 2 blade3 slot 2 blade3 blade4 blade4 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 2 blade3 slot 2 blade3 blade3 blade3 slot 3 blade4 slot 3 blade4 slot 4 blade5 slot 4 blade5 slot 5 slot 5 slot 5 blade6 slot 5 blade6 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 4 blade5 slot 4 blade5 slot 5 blade6 slot 5 blade6 blade6 slot 6 blade6 slot 6 slot 6 blade7 slot 6 blade7 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 5 blade6 slot 5 blade6 slot 6 blade7 slot 6 blade7 blade7 blade7 slot 7 blade8 slot 7 blade8 slot 5 blade6 slot 5 blade6 slot 5 blade6 slot 5 blade6 slot 6 blade7 slot 6 blade7 slot 7 blade8 slot 7 blade8 slot 7 blade8 slot 7 blade8 slot 8 slot 8 slot 6 blade7 slot 6 blade7 slot 6 blade7 slot 6 blade7 slot 7 slot 7 slot 8 slot 8 slot 8 slot 8 slot 7 blade8 slot 7 blade8 slot 7 blade8 slot 7 blade8 blade8 slot 8 blade8 slot 8 slot 8 slot 8 slot 8 slot 8 blade1 blade1 blade1 blade1 blade1 blade1 slot 1 blade2 slot 1 blade2 slot 1 blade2 slot 1 blade2 slot 1 blade2 slot 1 blade2 blade1 blade1 blade1 blade1 slot 2 blade3 slot 2 blade3 slot 2 blade3 slot 2 blade3 slot 2 blade3 slot 2 blade3 blade1 blade1 slot 1 slot 1 slot 1 blade2 slot 1 blade2 slot 3 slot 3 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 1 blade2 slot 1 blade2 blade2 slot 2 blade2 slot 2 slot 2 blade3 slot 2 blade3 blade4 blade4 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 2 blade3 slot 2 blade3 blade3 blade3 slot 3 blade4 slot 3 blade4 slot 4 blade5 slot 4 blade5 slot 5 slot 5 slot 5 blade6 slot 5 blade6 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 4 blade5 slot 4 blade5 slot 5 blade6 slot 5 blade6 blade6 slot 6 blade6 slot 6 slot 6 blade7 slot 6 blade7 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 5 blade6 slot 5 blade6 slot 6 blade7 slot 6 blade7 blade7 blade7 slot 7 blade8 slot 7 blade8 slot 5 blade6 slot 5 blade6 slot 5 blade6 slot 5 blade6 slot 6 blade7 slot 6 blade7 slot 7 blade8 slot 7 blade8 slot 7 blade8 slot 7 blade8 slot 8 slot 8 slot 6 blade7 slot 6 blade7 slot 6 blade7 slot 6 blade7 slot 7 slot 7 slot 8 slot 8 slot 8 slot 8 slot 7 blade8 slot 7 blade8 slot 7 blade8 slot 7 blade8 blade8 slot 8 blade8 slot 8 slot 8 slot 8 slot 8 slot 8 blade1 blade1 blade1 blade1 blade1 blade1 slot 1 blade2 slot 1 blade2 slot 1 blade2 slot 1 blade2 slot 1 blade2 slot 1 blade2 blade1 blade1 blade1 blade1 slot 2 blade3 slot 2 blade3 slot 2 blade3 slot 2 blade3 slot 2 blade3 slot 2 blade3 blade1 blade1 slot 1 slot 1 slot 1 blade2 slot 1 blade2 slot 3 slot 3 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 1 blade2 slot 1 blade2 blade2 slot 2 blade2 slot 2 slot 2 blade3 slot 2 blade3 blade4 blade4 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 2 blade3 slot 2 blade3 blade3 blade3 slot 3 blade4 slot 3 blade4 slot 4 blade5 slot 4 blade5 slot 5 slot 5 slot 5 blade6 slot 5 blade6 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 3 blade4 slot 4 blade5 slot 4 blade5 slot 5 blade6 slot 5 blade6 blade6 slot 6 blade6 slot 6 slot 6 blade7 slot 6 blade7 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 4 blade5 slot 5 blade6 slot 5 blade6 slot 6 blade7 slot 6 blade7 blade7 blade7 slot 7 blade8 slot 7 blade8 slot 5 blade6 slot 5 blade6 slot 5 blade6 slot 5 blade6 slot 6 blade7 slot 6 blade7 slot 7 blade8 slot 7 blade8 slot 7 blade8 slot 7 blade8 slot 8 slot 8 slot 6 blade7 slot 6 blade7 slot 6 blade7 slot 6 blade7 slot 7 slot 7 slot 8 slot 8 slot 8 slot 8 slot 7 blade8 slot 7 blade8 slot 7 blade8 slot 7 blade8 blade8 slot 8 blade8 slot 8 slot 8 slot 8 slot 8 slot 8© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
  36. 36. Standards Based + Cisco Extensions• Nexus 5500, F1, F2 and all future HW are 3 Cisco Forwarding 0 3 TRILL Forwarding 0 1 1 capable of IETF Outer CDCE DA Outer MAC DA standards TRILL Outer CDCE DA Outer CDCE SA Outer MAC DA Outer MAC SA NextHop Outer CDCE SA Outer MAC SA Header• Support for TRILL in ET = DTAG FTAG TTL ET = 802.1Q Outer VLAN NX-OS is pending completion of Inner MAC DA ET = TRILL V/R/M, HopCnt TRILL extensions to the Inner MAC DA Inner MAC SA Egress RB Ingress RB Header baseline protocol Inner MAC SA Inner MAC DA ET = 802.1Q Inner VLAN Inner MAC DA Inner MAC SA Ethernet• Multi-topology, VRRP Header interaction, … Inner MAC SA Payload… ET = 802.1Q Inner VLAN Payload...© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
  37. 37. Flexibility in the Fabric - Layer 2 Routing L3 Core L2+L3 FabricPath Core FabricPath POD vPC POD vPC+ POD vPC+ POD Path Fabric Site 1 FabricPath FabricPath FabricPath FabricPath Site 4 Site 2 Path Fabric Site 3© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
  38. 38. Agenda  The Evolving Data Centre Fabric  FabricPath  VXLAN 1K Cisco Nexus x8  LISP 6  LISP Host Mobility  OTV LAN Extension  Mobility with Extended Subnets  Nexus Fabric© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39

×