Chapter 3) Implementing Data Center Overlay Protocols Flashcards

1
Q

Describe the function of MAC routing in regards to OTV.

A

MAC routing is the process of using a control plane protocol is used to exchange MAC reachability information between network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the function of an ED in regards to OTV

A

An edge device (ED) connects a regular LAN to the WAN/MAN core and is
responsible for performing all the OTV functions. L2 traffic destined for a remote network is encapsulated into an L3 packet before being sent across the OTV transport infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the function of an OTV join interface.

A

The join interface is the outside-facing interface on an OTV edge device (ED). This interface is used to discover other EDs and form adjacencies. Join interfaces are also responsible for receiving regular traffic and MAC reachability information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the function of an OTV overlay interface.

A

OTV overlay interfaces are purely logical multicast-capable interface. This interface is responsible for encapsulating regular L2 into IP packet headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of the OTV control plane?

A

The OTV control plane is built between OTV edge devices and is used to advertise MAC reachability information rather than relying on conventional data plane learning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 2 types of ways that devices can form OTV adjacencies?

A

Edge devices can be made adjacent in two ways, depending on the nature of the transport network interconnecting the various sites:

  • Using a specific multicast group to exchange the control protocol messages between the OTV edge devices (Multicast).
  • Or by configuring an ED as an adjacency server, which all other EDs in the overlay will register with (Unicast Only).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What routing protocol is used to implement the OTV control plane?

A

The OTV control plan is formed using IS-IS. There is not dependency on any other routing protocols such as OSPF, RIP, BGP, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does data get sent to multiple recipients when using an adjacency server in an OTV overlay?

A

Since the adjacency server mode only supports unicast, regular broadcast and multicast messages cannot be forwarded onto the overlay. When a multicast or broadcast message is sent to the overlay, multiple copies of the same message are created and individually unicasted to each recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What bit is set for all control and data plane packets passing over the OTV overlay?

A

All OTV control and data plane packets originate from an OTV edge device with the Don’t
Fragment (DF) bit set. In a Layer 2 domain, the assumption is that all intermediate LAN segments support at least the configured interface MTU size of the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are ASM and SSM multicast groups used in the OTV overlay?

A

Any source multicast (ASM) groups are used to transport the OTV control protocol between sites, whereas the source specific multicast (SSM) are used to carry Layer 2 multicast streams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of failure isolation in regards to OTV overlays?

A

To limit the amount of broadcast traffic that is delivered to sites across the overlay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 4 main functions are used in OTV to provide failure isolation?

A

OTV achieves this goal by providing four main functions:

1) Spanning Tree Protocol (STP) isolation
2) Unknown unicast traffic suppression
3) ARP optimization
4) Broadcast policy control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 4 main functions are used in OTV to provide failure isolation?

A

OTV achieves this goal by providing four main functions:

1) Spanning Tree Protocol (STP) isolation
2) Unknown unicast traffic suppression
3) ARP optimization
4) Broadcast policy control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of STP Isolation in regards to OTV overlays?

A

STP Isolation is used to prevent BDPUs from crossing over the overlay. EDs do not forward BDPUs, and as such, each site has its own individual spanning tree configuration that is independent from other sites in the OTV overlay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the pur

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the pur

A
14
Q

What technology is used in OTV overlays to prevent the creation of end-to-end loops?

A

Multihoming is used to prevent end-to-end loops without sending STP frames across the overlay.

15
Q

What happens when a frame destined for an unknown unicast host is received by an OTV ED?

A

Just like a regular L2 network, the ED will flood the request out of all internal interfaces on the LAN. However, this request will not be broadcast to the overlay.

16
Q

How does ARP Optimization function in regards to OTV overlays?

A

When ARP requests are broadcasted across the OTV overlay, the intended host will respond with it’s IP address similarly to a traditional L2 LAN. The OTV ED that sent the initial ARP request will then cache the reply from the responding host.

OTV EDs can snoop ARP mappings in the ARP ND (Neighbor Discovery) table. Effectively syncing the ARP tables across the EDs in the overlay. When another host in the overlay needs to perform a lookup on this same host, the ARP information is cached in the EDs ARP ND table.

17
Q

What are the Cisco Nexus default timers for the OTV ARP & MAC aging timers?

A

The Cisco NX-OS defaults are as follows:

  • OTV ARP aging timer: 480 seconds / 8 minutes
  • MAC aging timer: 1800 seconds / 30 minutes
18
Q

What is the purpose of an AED election in regard to OTV overlays?

A

Authoritative edge devices (AEDs) are used when a LAN has a connect to 2 or more EDs. The AED role is negotiated on a per-VLAN basis and is responsible for the following:

  • Forwarding layer 2 traffic onto the overlay.
  • Advertising MAC reachability information to other remote EDs.
19
Q

Define the terms site adjacency and overlay adjacency in regards to OTV edge devices (EDs).

A

The two OTV adjacency types are used to prevent the creation of an end-to-end loop in the overlay:

  • Site Adjacency: each OTV ED maintains an adjacency with all other EDs at the same site. These EDs use the site VLAN for discovering and establishing adjacencies with one another.
  • Overlay Adjacency: the join interfaces across the overlay are used to create an adjacency. Site identifiers are used to identify which EDs belong to each site. EDs at the same site will have the same site identifier.
20
Q

What is the purpose of an OTV AED VLAN Split?

A

At a DC site that has more than 1 edge device (ED), and authoritative ED will be elected (AED). However, to enable load balancing between 2 devices, an AED VLAN split can be configured to allow one ED to forward traffic on even VLANs, while another ED is responsible for forwarding traffic on odd VLANs.

21
Q

What is the purpose of FHRP isolation in regards to OTV overlays?

A

Since different sites can have the same IP & VLAN scheme , FHRP messages should be filtered across the overlay. This will prevent the creation of suboptimal routes when traffic passes across the overlay.

22
Q

What transport protocol is used with A VXLAN?

A

The transport protocol over the physical data center network is IP plus UDP. VXLAN defines a MAC-in-UDP encapsulation scheme where the original Layer 2 frame has a VXLAN header added and is then placed in a UDP-IP packet.

23
Q

What is the purpose of a VNID in regards to VXLANs? How many bits are in a VNID and how many LANs are supported?

A

A VXLAN VNID (VXLAN Network Identifier) is used to identify Layer 2 segments and provide layer 2 isolation between segments. A VNID is a 24-bit value that can support up to 16 million LAN segments.

24
Q

What is the purpose of a VXLAN VTEP?

A

A VXLAN tunnel endpoint (VTEP) is used to map tenants end devices to VXLAN segments and to perform VXLAN encapsulation and decapsulation .

25
Q

What is the purpose of an infrastructure VLAN IP address in regards to VXLANs?

A

The interface IP address faces toward the outside of the transport-IP network and performs the following functions:

  • Identifies the VTEP device on the overlay
  • Encapsulating regular L2 frames and transmitting them onto the transport network
  • Discovering remote VTEPs
  • Learning MAC Address to VTEP mappings
26
Q

What is the purpose of a VNI in regards to VXLANs?

A

A virtual network identifier (VNI) is used to identify a specific virtual network in the data plan.

27
Q

What are the 2 VNI scopes used in VXLANs?

A

Network-wide scoped VNIs: used to identify the specific Layer 3 virtual network across all network edge devices.
Locally assigned VNIs: the identifier has local significance to the network edge device that advertises the route.

28
Q

What are the two widely adopted VXLAN Control Planes?

A

Two widely adopted control planes are used with VXLAN:

  • VXLAN Flood and Learn Multicast-Based Control Plane.
  • VXLAN MPBGP EVPN Control Plane.
29
Q

What protocol is used with VTEPs to join the multicast group?

A

VTEPs use Internet Group Management Protocol (IGMP) messages to join the transport overlay network by sending protocol independent multicast (PIM) messages.

30
Q

How is broadcast, unknown unicast, and multicast traffic sent to limit layer 2 flooding in the VXLAN overlay?

A

Multicast groups are used to limit Layer 2 flooding to devices that have end systems participating in the same VXLAN segment.

31
Q

What node role (as described in the BGP MLPS EVPN model) is equivalent to the VTEP/NVE device?

A

The PE (Provider Edge) node role.

32
Q

What BGP device is used to reduce the amount of full mesh BGP sessions between VTEPs?

A

A BGP route reflector (RR) is used to create a single session between each VTEP and the RR.

33
Q

What are the 2 types of VXLAN gateways used to connect to classic ethernet segments?

A

Layer 2 Gateway: A Layer 2 VXLAN gateway is a device that encapsulates a classical Ethernet (CE) frame into a VXLAN frame and decapsulates a VXLAN frame into a CE frame.

Layer 3 Gateway: a VXLAN router is required for communication between devices that are in different VXLAN segments. The VXLAN router translates frames from one VNI to another.