Uploaded by Samuel Otafy

Cisco DNA Network: LISP, VXLAN, VRF, BGP, IS-IS & Route Leakage

advertisement
Simplifying Network Management and Troubleshooting
Presented by: Ahmed ElMorsy Mohamed
Email: ahmed_elmorsy@seegypt.com
Phone: 01007880733
__________________________________________________________________
Cisco DNA Network with LISP, VXLAN, VRF, BGP, IS-IS, and Route
Leakage - Scenario Explanation for Presentation
Network setup involves Cisco DNA with multiple advanced technologies like
LISP, VXLAN, VRFs, BGP, IS-IS, and Route leakage. Here’s a structured
breakdown to help you explain the scenario clearly in your presentation.
1. Network Overview
Network consists of two main components:


Border Node: Handles external communication (Internet, Data Center,
WAN).
Fusion Node: Connects different VRFs, performs inter-VRF routing (route
leakage), and acts as the centralized route distribution point.
The network is built on Cisco SD-Access with DNA Center, using LISP,
VXLAN, VRF, BGP, IS-IS for scalability, segmentation, and automation.
2. Technologies Used and Their Roles
Technology
Role in Your Network
Used as the underlay routing protocol for
IS-IS (Intermediate System internal fabric communication. Ensures all fabric
devices (Fusion, Border, Edge nodes) can reach
to Intermediate System)
each other.
Creates a layer-2 overlay over a Layer-3
VXLAN (Virtual Extensible
network, enabling segmentation and mobility
LAN)
across different sites.
Used for host tracking and mobility within SDLISP (Locator/ID
Access. It dynamically maps users/devices (EIDs)
Separation Protocol)
to network locations (RLOCs).
Creates isolated routing instances for different
VRF (Virtual Routing &
services or tenants, ensuring security and
Forwarding)
segmentation.
Used for external routing (WAN, Data Center,
BGP (Border Gateway
Internet) and route leaking between VRFs on the
Protocol)
Fusion node.
Configured on Fusion to allow controlled
Route Leakage (Inter-VRF
communication between different VRFs (e.g.,
Routing)
Users ↔ Servers).
3. Network Architecture
Network consists of multiple layers:
A. Underlay Network (Physical Infrastructure)


Uses IS-IS as the IGP to enable connectivity across network fabric devices.
Provides reachability for VXLAN transport tunnels.
B. Overlay Network (VXLAN + LISP)


VXLAN enables Layer-2 communication over Layer-3 infrastructure.
LISP dynamically maps users (EID) to locations (RLOC) for optimized
mobility.
C. Control and Management (DNA Center)


Cisco DNA Center automates and manages the entire fabric.
It configures LISP, VXLAN, BGP, VRFs, and security policies centrally.
4. Role of Border and Fusion Nodes
Node Type
Border Node
Fusion Node
Function
- Connects the SD-Access fabric to external networks (WAN,
Data Center, Internet).
- Advertises internal routes via BGP to upstream routers.
- Acts as the LISP Egress Tunnel Router (ETR).
- Performs route leakage between VRFs (e.g., Corporate VRF
↔ Data Center VRF).
- Runs BGP for inter-VRF communication.
- Acts as the central interconnect for different segments.
5. Route Leakage (Inter-VRF Communication)
Since I have VRFs (e.g., User VRF, Server VRF, IoT VRF), I need to route
leakage to allow selected communication.
Example: Allowing Users to Reach Servers



Users are in VRF-USER.
Servers are in VRF-SERVER.
The Fusion Node runs BGP and redistributes routes to allow controlled
communication.
Configuration for Route Leakage on Fusion
cisco
CopyEdit
router bgp 65001
address-family ipv4 vrf USER-VRF
redistribute connected
redistribute static
exit-address-family
address-family ipv4 vrf SERVER-VRF
redistribute connected
redistribute static
exit-address-family
! Create route target import/export between VRFs
vrf definition USER-VRF
rd 65001:10
route-target export 65001:100
route-target import 65001:200
vrf definition SERVER-VRF
rd 65001:20
route-target export 65001:200
route-target import 65001:100
This allows specific traffic between USER VRF ↔ SERVER VRF.
6. How LISP Handles Mobility
Since SD-Access uses LISP, it allows seamless host mobility. Here’s how:
1. A user (EID) connects to the network and gets an IP in VRF-USER.
2. The user's location is registered in the LISP mapping database.
3. If the user moves to another site, LISP updates the mapping
automatically, ensuring uninterrupted access.
LISP Verification Commands

Check LISP EID-to-RLOC mappings:
cisco
CopyEdit
show lisp eid-table

Verify LISP encapsulation:
cisco
CopyEdit
show lisp statistics
7. Key Benefits of This Design




Scalability: VXLAN allows unlimited segmentation over a Layer-3
network.
Mobility: LISP dynamically maps users and ensures seamless roaming.
Security: VRFs ensure tenant isolation, while Fusion controls inter-VRF
communication.
Optimized Routing: IS-IS is used for underlay, while BGP controls
external traffic.
Download