Cisco Campus Fabric Introduction
Cisco Campus Fabric Introduction
Vedran Hafner
Systems engineer
Cisco
Campus Fabric
Abstract
Using Cisco technologies available today, you can overcome these challenges
and build an “Evolved” Campus Network to better meet your business objectives.
1 Key Benefits
Why do I care?
2 Key Concepts
What is a Fabric?
3 Solution Overview
What are the components?
4 Putting It Together
How do I build it?
5 Use Case
Key Benefits
Key Concepts
Solution Overview
Putting It Together
Why do I care ?
Cisco Digital Network Architecture
Overview
Network-enabled Applications
Cloud-enabled | Software-delivered
Industry Leading
Wired and Wireless | Stacking | TrustSec | SDN
+ Network Enabled Applications
Collaboration | Mobility | IoT | Security
`
Advanced Functionality Automation
Programmable Pipeline | Flexibility | Recirculation Programmable | Open
Intelligent
Policy Enforcement
Policy based on your identity, not on your address
5 - 7 April 2017 | Cisco Connect | Pula,BRKCRS-1800
Croatia 11
Key Benefits
Key Concepts
Solution Overview
Putting It Together
What is a Fabric?
What exactly is a Fabric?
A Fabric is an Overlay
An “Overlay” is a logical topology used to virtually connect devices, built
on top of an arbitrary physical “Underlay” topology.
An “Overlay” network often uses alternate forwarding attributes to provide
additional services, not provided by the “Underlay”.
Encapsulation
Hosts
(End-Points)
Key Concepts
Solution Overview
Putting It Together
Cisco
TrustSec
What is LISP?
A routing Architecture
Separate address spaces for Identity EID
and Location EID
End-point Identifiers (EID)
Routing locators (RLOC) EID
Mapping
System
A Control Plane Protocol RLOC
A system that maps end-point
identities to their current location
(RLOC) EID
EID EID
A Data Plane Protocol
Encapsulates EID-addressed packets
inside RLOC-addressed headers
5 - 7 April 2017 | Cisco Connect | Pula, Croatia 22
Locator / ID Separation Protocol
Location and Identity Separation
Traditional Behavior -
Location + ID are “Combined”
IP core
When the Device moves, it gets a
10.1.0.1
new IPv4 or IPv6 Address for its new
Device IPv4 or IPv6 Identity and Location
Address represents both 20.2.0.9
Identity and Location
Overlay Behavior -
Location & ID are “Separated”
IP core
10.1.0.1 When the Device moves, it keeps
the same IPv4 or IPv6 Address.
Device IPv4 or IPv6 It has the Same Identity
Address represents 10.1.0.1
Identity only
E E E
[ Who is lisp.cisco.com ] ?
DNS
DNS Name -to- IP
Host Server URL Resolution
[ Address is 153.16.5.29, 2610:D0:110C:1::3 ]
‒ LISP resolves Locators for queried Identities Answers the “WHERE IS” question
[ Where is 2610:D0:110C:1::3 ] ?
LISP
LISP LISP Map
Router System ID -to- Locator
Map Resolution
[ Locator is 128.107.81.169, 128.107.81.170 ]
Other References
Cisco LISP Site http://lisp.cisco.com
Cisco LISP Marketing Site http://www.cisco.com/go/lisp/
LISP Beta Network Site http://www.lisp4.net or http://www.lisp6.net
IETF LISP Working Group http://tools.ietf.org/wg/lisp/
Fundamentals of LISP https://www.youtube.com/watch?v=lKrV1qB8uqA
Key Concepts
Solution Overview
Putting It Together
Cisco
TrustSec
3
4
What is Cisco
TrustSec (CTS)?
Enforcement
access-list
access-list
102
102
deny udp 167.160.188.162 0.0.0.255 gt 4230 248.11.187.246 0.255.255.255 eq 2165
deny udp 32.124.217.1 255.255.255.255 lt 907 11.38.130.82 0.0.31.255 gt 428
IP Based Policies -
access-list
access-list
102
102
permit ip 64.98.77.248 0.0.0.127 eq 639 122.201.132.164 0.0.31.255 gt 1511
deny tcp 247.54.117.116 0.0.0.127 gt 4437 136.68.158.104 0.0.1.255 gt 1945
ACLs, Firewall Rules
access-list 102 permit icmp 136.196.101.101 0.0.0.255 lt 2361 90.186.112.213 0.0.31.255 eq 116
access-list 102 deny udp 242.4.189.142 0.0.1.255 eq 1112 19.94.101.166 0.0.0.127 eq 959
access-list 102 deny tcp 82.1.221.1 255.255.255.255 eq 2587 174.222.14.125 0.0.31.255 lt 4993
access-list 102 deny tcp 103.10.93.140 255.255.255.255 eq 970 71.103.141.91 0.0.0.127 lt 848
access-list
access-list
102
102
deny ip 32.15.78.227 0.0.0.127 eq 1493 72.92.200.157 0.0.0.255 gt 4878
permit icmp 100.211.144.227 0.0.1.255 lt 4962 94.127.214.49 0.255.255.255 eq 1216 Propagation
access-list 102 deny icmp 88.91.79.30 0.0.0.255 gt 26 207.4.250.132 0.0.1.255 gt 1111
access-list 102 deny ip 167.17.174.35 0.0.1.255 eq 3914 140.119.154.142 255.255.255.255 eq 4175 Carry “Segment”
access-list 102 permit tcp 37.85.170.24 0.0.0.127 lt 3146 77.26.232.98 0.0.0.127 gt 1462 Enterprise
access-list 102 permit tcp 155.237.22.232 0.0.0.127 gt 1843 239.16.35.19 0.0.1.255 lt 4384
Backbone context through the
network using VLAN,
Aggregation Layer IP address, VRF
Static ACL Limits of Traditional VACL
Routing Segmentation
Access Layer Classification
Redundancy • Security Policy based Static or Dynamic
DHCP Scope on Topology (Address) VLAN assignments
Address • High cost and
VLAN complex maintenance Non-Compliant Voice Employee Supplier BYOD
Enforcement
Shared Application
Group Based Policies Services Servers
ACLs, Firewall Rules
Enforcement DC Switch
or Firewall
Propagation
Carry “Group” context
through the network Enterprise
using only SGT Backbone
ISE
Classification
Static or Dynamic Campus Switch Campus Switch DC switch receives policy
for only what is connected
SGT assignments
Employee Tag
Supplier Tag
Non-Compliant Employee Voice Voice Employee Supplier Non-Compliant Non-Compliant Tag
VLAN A VLAN B
Other References
Cisco TrustSec Marketing Site http://www.cisco.com/go/trustsec/
Cisco TrustSec Config Guide cisco.com/c/en/us/td/docs/switches/lan/trustsec/configuration/guide/trustsec.html
CTS Architecture Overview cisco.com/docs/switches/lan/trustsec/configuration/guide/trustsec/arch_over.html
CTS 2.0 Design Guide cisco.com/td/docs/solutions/Enterprise/Security/TrustSec_2-0/trustsec_2-0_dig.pdf
Fundamentals of TrustSec https://www.youtube.com/watch?v=78-GV7Pz18I
Key Concepts
Solution Overview
Putting It Together
Use Case
Solution Overview
What are the components ?
Locator / ID Virtual Extenible LAN
Separation Protocol (VXLAN) Encapsulation
Cisco
TrustSec
What is Virtual
Extensible LAN
(VXLAN)
Encapsulation?
ORIGINAL
ETHERNET IP PAYLOAD
PACKET
Supports L3
Overlay
PACKET IN LISP
ETHERNET IP UDP LISP IP PAYLOAD
Supports L2
and L3
PACKET IN Overlay
ETHERNET IP UDP VXLAN ETHERNET IP PAYLOAD
VXLAN
Inner
Fabric Data-Plane provides the following:
– Underlay address advertisement and mapping
Outer
– Automatic tunnel setup (Virtual Tunnel End-Points)
– Frame encapsulation between Routing Locators
Outer
– Nearly the same, with different fields and payload
Inner
Inner
– LISP header carries IP payload (IP in IP)
– VXLAN header carries MAC payload (MAC in IP)
Inner
5 - 7 April 2017 | Cisco Connect | Pula, Croatia 46
Key Benefits
Key Concepts
Solution Overview
Putting It Together Putting It Together
Catalyst 3K Catalyst 4K
More to Come! J
• Underlay Network – Configure the Interfaces
and Protocols to bring up the Underlay network
• And More…
5 - 7 April 2017 | Cisco Connect | Pula, Croatia 56
Key Benefits
Key Concepts
Solution Overview
Putting It Together
Use Case
Use Case
OK, now that I’ve
seen all this, why
might I use this in my
network?
HQ
IP Network
3. Trial Deployments (Remember: its an Overlay)
• You can install new C-Plane, Border and Edge Nodes
without modifying your existing (Underlay) network