- Preface
- Product Overview
- Command-Line Interfaces
- Configuring the Switch for the First Time
- Administering the Switch
- Configuring Virtual Switching Systems
- Programmability
- Configuring the Cisco IOS In-Service Software Upgrade Process
- Configuring the Cisco IOS XE In Service Software Upgrade Process
- Configuring Interfaces
- Checking Port Status and Connectivity
- Configuring Supervisor Engine Redundancy Using RPR and SSO on Supervisor Engine 6-E and Supervisor Engine 6L-E
- Configuring Supervisor Engine Redundancy Using RPR and SSO on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Supervisor Engine 8-E
- Configuring Cisco NSF with SSO Supervisor Engine Redundancy
- Environmental Monitoring and Power Management
- Configuring Power over Ethernet
- Configuring Cisco Network Assistant
- Configuring VLANs, VTP, and VMPS
- Configuring IP Unnumbered Interface
- Configuring Layer 2 Ethernet Interfaces
- Configuring EVC-Lite
- Configuring SmartPort Macros
- Configuring Cisco IOS Auto Smartport Macros
- Configuring STP and MST
- Configuring Flex Links and MAC Address-Table Move Update
- Configuring Resilient Ethernet Protocol
- Configuring Optional STP Features
- Configuring EtherChannel and Link State Tracking
- Configuring IGMP Snooping and Filtering, and MVR
- Configuring IPv6 Multicast Listener Discovery Snooping
- Configuring 802.1Q Tunneling, VLAN Mapping, and Layer 2 Protocol Tunneling
- Configuring Cisco Discovery Protocol
- Configuring LLDP, LLDP-MED, and Location Service
- Configuring UDLD
- Configuring Unidirectional Ethernet
- Configuring Layer 3 Interfaces
- Configuring Cisco Express Forwarding
- Configuring Unicast Reverse Path Forwarding
- Configuring IP Multicast
- Configuring ANCP Client
- Configuring Bidirectional Forwarding Detection
- Configuring Campus Fabric
- Configuring Policy-Based Routing
- Configuring VRF-lite
- Configuring Quality of Service
- Configuring AVC with DNS-AS
- Configuring Voice Interfaces
- Configuring Private VLANs
- Configuring MACsec Encryption
- Configuring 802.1X Port-Based Authentication
- X.509v3 Certificates for SSH Authentication
- Configuring the PPPoE Intermediate Agent
- Configuring Web-Based Authentication
- Configuring Wired Guest Access
- Configuring Auto Identity
- Configuring Port Security
- Configuring Auto Security
- Configuring Control Plane Policing and Layer 2 Control Packet QoS
- Configuring Dynamic ARP Inspection
- Configuring the Cisco IOS DHCP Server
- Configuring DHCP Snooping, IP Source Guard, and IPSG for Static Hosts
- DHCPv6 Options Support
- Configuring Network Security with ACLs
- Support for IPv6
- Port Unicast and Multicast Flood Blocking
- Configuring Storm Control
- Configuring SPAN and RSPAN
- Configuring ERSPAN
- Configuring Wireshark
- Configuring Enhanced Object Tracking
- Configuring System Message Logging
- Onboard Failure Logging (OBFL)
- Configuring SNMP
- Configuring NetFlow-lite
- Configuring Flexible NetFlow
- Configuring Ethernet OAM and CFM
- Configuring Y.1731 (AIS and RDI)
- Configuring Call Home
- Configuring Cisco IOS IP SLA Operations
- Configuring RMON
- Performing Diagnostics
- Configuring WCCP Version 2 Services
- Configuring MIB Support
- Configuring Easy Virtual Networks
- ROM Monitor
- Acronyms and Abbreviations
- Index
- About Campus Fabric
- Campus Fabric Configuration Guidelines
- Limitations and Restrictions
- How to Configure Campus Fabric
- Configuring Fabric Edge Devices
- Security Group Tags and Policy Enforcement in Campus Fabric
- Auto-Configured Commands on Fabric Edge Devices
Configuring Campus Fabric
Campus Fabric provides the basic infrastructure for building virtual networks based on policy-based segmentation constructs.
Note Beginning with Cisco IOS Release 3.9.1E, Campus Fabric is supported on Cisco Catalyst 4500-E series switches on Supervisor Engine 8-E.
Campus Fabric is not supported on Supervisor Engines 7-E, 7L-E, 8L-E, and on Cisco Catalyst 4500-X series switches.
This chapter includes the following major sections:
- About Campus Fabric
- Campus Fabric Configuration Guidelines
- Limitations and Restrictions
- Understanding Fabric Domain Elements
- Configuring Fabric Edge Devices
- Security Group Tags and Policy Enforcement in Campus Fabric
- Multicast Using Campus Fabric Overlay
- Dataplane Security
- Campus Fabric Configuration Examples
Note For complete syntax and usage information for the switch commands used in this chapter, see the
Cisco IOS Command Reference Guides for the Catalyst 4500 Series Switch.
About Campus Fabric
Campus Fabric Overlay provisioning uses three components to enable flexible attachment of users and devices, and enhanced security through user-based and device-group based policies:
This feature is supported on the Enterprise Services software image.
Understanding Fabric Domain Elements
The following figure displays the elements that make up the fabric domain.
- Fabric Edge Devices — Provide connectivity to users and devices that connect to the fabric domain. Fabric edge devices identify and authenticate endpoints, and register endpoint ID information in the fabric host-tracking database. They encapsulate at ingress and decapsulate at egress, to forward traffic to and from endpoints connected to the fabric domain.
- Fabric Control-Plane Devices — Provide overlay reachability information and endpoints-to-routing-locator mapping, in the host-tracking database. The control-plane device receives registrations from fabric edge devices with local endpoints, and resolves requests from edge devices to locate remote endpoints. You can configure a total of 3 control-plane devices, internally (a fabric border device) and externally (a designated control-plane device such as a Cisco CSR1000v), to allow redundancy on your network.
- Fabric Border Devices — Connect traditional Layer 3 networks or different fabric domains to the local domain, and translate reachability and policy information, such as VRF and SGT information, from one domain to another. You can configure up to 2 border devices to allow redundancy on your network.
- Virtual Contexts — Provide virtualization at the device level, using virtual routing and forwarding (VRF) to create multiple instances of Layer 3 routing tables. Contexts or VRFs provide segmentation across IP addresses, allowing for overlapped address space and traffic separation. You can configure up to 32 contexts in the fabric domain.
- Host-Pools — Group endpoints in the fabric domain into IP pools, and identify them with a VLAN ID and an IP subnet.
Supported Platforms in Campus Fabric
|
|
|
|
---|---|---|---|
Campus Fabric Configuration Guidelines
Consider the following guidelines and limitations when configuring campus fabric elements:
- Configure no more than 3 control-plane devices in each fabric domain.
- Configure no more than 2 border devices in each fabric domain.
- Each fabric edge device supports up to 2000 endpoints.
- Each control-plane device supports up to 5000 fabric edge device registrations.
- Configure no more than 32 virtual contexts in each fabric domain.
- Ensure that you use 10-Gigabit-Ethernet supervisor uplinks when configuring underlay connectivity.
Limitations and Restrictions
- You can configure Cisco Catalyst 4500-E series switches as edge devices only.
- Campus Fabric is not supported in Virtual Switching System (VSS) mode and in VSS wireless mode.
- Virtual Extensible LAN (VXLAN) encapsulation is supported on the Supervisor uplink modules only. Ensure that you use supervisor uplink modules for underlay connections between fabric elements.
- Campus Fabric is supported only on Cisco Catalyst 4500-E series switches, on Supervisor Engine 8-E.
- IPv6 hosts are not supported in the fabric domain.
- Policy-based routing (PBR) and Web Cache Communication Protocol (WCCP) are not supported within the fabric domain.
- Cisco TrustSec SGT Exchange Protocol (SXP) cannot be used to propagate SGTs across devices within the fabric domain.
- On the edge device, Cisco TrustSec links are not supported only on uplink interfaces connected to the underlay.
- Layer 3 source group tags cannot be applied to uplink interfaces connected to the underlay.
- Multicast in Campus Fabric is supported with PIM Sparse mode and PIM SSM. Dense mode is not supported.
- Multicast Rendezvous-point (RP) redundancy is not supported in the fabric domain.
- Auto-RP is not supported in the fabric domain.
How to Configure Campus Fabric
Configuring Campus Fabric involves the following stages:
- Network Provisioning — Setting up the management plane and the underlay mechanism.
- Overlay Provisioning — Setting up the fabric overlay.
- Policy Management — Setting up virtual contexts or VRFs, endpoint groups and policies.
- Endpoint On-boarding — Setting up authentication and IP pools.
- Monitoring and Troubleshooting — Verifying reachability to all fabric devices.
Configuring Fabric Edge Devices
You can configure Cisco Catalyst 4500-E series switches as edge devices only.
Before You Begin
- Configure a loopback0 IP address for each edge device to ensure that the device is reachable. Ensure that you apply the ip lisp source-locator loopback0 command to the uplink interface.
- Ensure that your underlay configuration is set up.
- Configure control-plane devices and border devices in your fabric domain. Cisco Catalyst 4500-E series switches cannot be configured as control-plane or border devices. For more information on configuring control-plane and border devices, see the How to Configure Fabric Overlay section in Software Configuration Guide, Cisco IOS XE Denali 16.3.x (Catalyst 3850 Switches)
Security Group Tags and Policy Enforcement in Campus Fabric
Campus Fabric overlay propagates source group tags (SGTs) across devices in the fabric domain. Packets are encapsulated using virtual extensible LAN (VXLAN) and carry the SGT information in the header. When you configure a Cisco Catalyst 4500-E series switch as an edge device, the ipv4 sgt command is auto-generated. The SGT mapped to the IP address of the edge device is carried within the encapsulated packet and propagated to the destination device, where the packet is decapsulated and the Source Group Access Control List (SGACL) policy is enforced.
For more information on Cisco TrustSec and Source Group Tags, see Cisco TrustSec Switch Configuration Guide.
Auto-Configured Commands on Fabric Edge Devices
As a part of Fabric Overlay provisioning, some LISP-based configuration, SGT (security group tag) configuration and endpoint to uplink interface mapping configuration is auto-generated, and is displayed in your running configuration.
For example, consider this configuration scenario for an edge device (loopback address 2.1.1.1/32):
This is sample output for the fabric edge configuration:
Multicast Using Campus Fabric Overlay
You can use Campus Fabric overlay to carry multicast traffic over core networks that do not have native multicast capabilities. Campus Fabric overlay allows unicast transport of multicast traffic with head-end replication at the edge device.
Note Only Protocol Independent Multicast (PIM) Sparse Mode and PIM Source Specific Multicast (SSM) are supported in Campus Fabric. Dense mode is not supported in Campus Fabric.
Configuring Multicast PIM Sparse Mode in Campus Fabric
Configuring Multicast PIM SSM in Campus Fabric
Dataplane Security
Campus Fabric Data Plane Security ensures that only traffic from within a fabric domain can be decapsulated, by an edge device at the destination. Edge and border devices in the fabric domain validate that the source Routing Locator (RLOC), or the uplink interface address, carried by the data packet is a member of the fabric domain.
Data Plane Security ensures that the edge device source addresses in the encapsulated data packets cannot be spoofed. Packets from outside the fabric domain carry invalid source RLOCs that are blocked during decapsulation by edge and border devices.
Configuring Dataplane Security on Fabric Edge Devices
You can configure Cisco Catalyst 4500-E series switches as edge devices only.
Before You Begin
- Configure a loopback0 IP address for each edge device to ensure that the device is reachable. Ensure that you apply the ip lisp source-locator loopback0 command to the uplink interface.
- Ensure that your underlay configuration is set up.
- Configure control-plane devices and border devices in your fabric domain. Cisco Catalyst 4500-E series switches cannot be configured as control-plane or border devices. For more information on configuring dataplane security control-plane and border devices, see the How to Configure Fabric Overlay section in Software Configuration Guide, Cisco IOS XE Denali 16.3.x (Catalyst 3850 Switches).
To configure dataplane security in static mode:
Campus Fabric Configuration Examples
This is sample output for the show running-configuration command for an edge configuration:
This is sample output for the show running-configuration command for the following control-plane configuration: