Communications & Collaborations Group (CCG)
Hypervisor
Virtualization Benefits
1) Hardware resource consolidation
2) Utilization optimization
3) Physical resource sharing
Network Virtualization Components
1) Access Control - Access control is responsible for authenticating and authorizing devices connecting at the edge of the network. Access control allows customers to assign devices to a specific network “segment,” which usually corresponds to deploying a device in a dedicated VLAN.
2) Path Isolation - Path isolation is an overlay network and refers to the creation of independent logical traffic paths to isolate traffic between users belonging to separate groups (for example, guests and partners) over a shared physical network infrastructure.
3) Services Edge - Services edge is responsible for centralizing policy enforcement points where it is possible to control and restrict communications between separate logical partitions or access to services that can be dedicated or shared between virtual networks.
Path Isolation Mechanisms
1) dynamic ACLs
2) VRF-List with GRE tunnels
3) MPLS VPN
VRF
Data Path Virtualization
VRF-Lite
Control Plane
Forwarding Plane
VRF-Lite Advantages
1) Allows for true routing and forwarding separation—Dedicated data and control planes are defined to handle traffic belonging to groups with various requirements or policies. This represents an extra level of segregation and security because no communication between devices belonging to different VRFs is allowed unless explicitly configured.
2) Simplifies the management and troubleshooting of the traffic belonging to the specific VRF because separate forwarding tables are used to switch that traffic—These data structures are different from the ones associated with the global routing table. This also guarantees that configuring the overlay network does not cause issues (such as routing loops) in the global table.
3) Enables the support for alternate default routes—The advantage of using separate control and data plane is that it allows for defining a separate default route for each virtual network (VRF). This can be useful, for example, in providing guest access in deployment when there is a requirement to use the default route in the global routing table just to create a black hole for unknown addresses to aid in detecting certain types of worm and network scanning attacks.
Generic Routing Encapsultion (GRE)
You may have to adjust the MTU (Maximum Transmission Unit) on GRE tunnels by using the ip mtu interface configuration command. This MTU must match on both sides.
GRE Header Contents
The GRE header contains a flag field and a protocol type field to identify the Layer 3 protocol being transported. It may contain a tunnel checksum, tunnel key, and tunnel sequence number.
Supported Tunnel Interface Headers
A passenger protocol or encapsulated protocol such as IPv4 or IPv6; this protocol is the one that is being encapsulated
A carrier or encapsulation protocol (GRE, in this case) A transport delivery protocol, such as IP, which is the protocol that carries the encapsulated protocol