You've reached the end of your free preview.
Want to read all 250 pages?
Unformatted text preview: Planning and Engineering — Network
Design
Avaya Virtual Services Platform 9000 3.3
NN46250-200, 04.01
May 2012 © 2012 Avaya Inc. Copyright All Rights Reserved. Except where expressly stated otherwise, no use should be made of
materials on this site, the Documentation, Software, or Hardware
provided by Avaya. All content on this site, the documentation and the
Product provided by Avaya including the selection, arrangement and
design of the content is owned either by Avaya or its licensors and is
protected by copyright and other intellectual property laws including the
sui generis rights relating to the protection of databases. You may not
modify, copy, reproduce, republish, upload, post, transmit or distribute
in any way any content, in whole or in part, including any code and
software unless expressly authorized by Avaya. Unauthorized
reproduction, transmission, dissemination, storage, and or use without
the express written consent of Avaya can be a criminal, as well as a
civil offense under the applicable law. Notice
While reasonable efforts have been made to ensure that the
information in this document is complete and accurate at the time of
printing, Avaya assumes no liability for any errors. Avaya reserves the
right to make changes and corrections to the information in this
document without the obligation to notify any person or organization of
such changes.
Documentation disclaimer
“Documentation” means information published by Avaya in varying
mediums which may include product information, operating instructions
and performance specifications that Avaya generally makes available
to users of its products. Documentation does not include marketing
materials. Avaya shall not be responsible for any modifications,
additions, or deletions to the original published version of
documentation unless such modifications, additions, or deletions were
performed by Avaya. End User agrees to indemnify and hold harmless
Avaya, Avaya's agents, servants and employees against all claims,
lawsuits, demands and judgments arising out of, or in connection with,
subsequent modifications, additions or deletions to this documentation,
to the extent made by End User. Third-party components
Certain software programs or portions thereof included in the Product
may contain software distributed under third party agreements (“Third
Party Components”), which may contain terms that expand or limit
rights to use certain portions of the Product (“Third Party Terms”).
Information regarding distributed Linux OS source code (for those
Products that have distributed the Linux OS source code), and
identifying the copyright holders of the Third Party Components and the
Third Party Terms that apply to them is available on the Avaya Support
Web site: . Link disclaimer Trademarks Avaya is not responsible for the contents or reliability of any linked Web
sites referenced within this site or documentation provided by Avaya.
Avaya is not responsible for the accuracy of any information, statement
or content provided on these sites and does not necessarily endorse
the products, services, or information described or offered within them.
Avaya does not guarantee that these links will work all the time and has
no control over the availability of the linked pages. The trademarks, logos and service marks (“Marks”) displayed in this
site, the Documentation and Product(s) provided by Avaya are the
registered or unregistered Marks of Avaya, its affiliates, or other third
parties. Users are not permitted to use such Marks without prior written
consent from Avaya or such third party which may own the Mark.
Nothing contained in this site, the Documentation and Product(s)
should be construed as granting, by implication, estoppel, or otherwise,
any license or right in and to the Marks without the express written
permission of Avaya or the applicable third party. Warranty
Avaya provides a limited warranty on its Hardware and Software
(“Product(s)”). Refer to your sales agreement to establish the terms of
the limited warranty. In addition, Avaya’s standard warranty language,
as well as information regarding support for this Product while under
warranty is available to Avaya customers and other parties through the
Avaya Support Web site: . Please note that if
you acquired the Product(s) from an authorized Avaya reseller outside
of the United States and Canada, the warranty is provided to you by
said Avaya reseller and not by Avaya. Avaya is a registered trademark of Avaya Inc.
All non-Avaya trademarks are the property of their respective owners,
and “Linux” is a registered trademark of Linus Torvalds.
Downloading Documentation
For the most current versions of Documentation, see the Avaya
Support Web site: . Licenses Contact Avaya Support THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA
WEBSITE, ARE
APPLICABLE TO ANYONE WHO DOWNLOADS, USES AND/OR
INSTALLS AVAYA SOFTWARE, PURCHASED FROM AVAYA INC.,
ANY AVAYA AFFILIATE, OR AN AUTHORIZED AVAYA RESELLER
(AS APPLICABLE) UNDER A COMMERCIAL AGREEMENT WITH
AVAYA OR AN AUTHORIZED AVAYA RESELLER. UNLESS
OTHERWISE AGREED TO BY AVAYA IN WRITING, AVAYA DOES
NOT EXTEND THIS LICENSE IF THE SOFTWARE WAS OBTAINED
FROM ANYONE OTHER THAN AVAYA, AN AVAYA AFFILIATE OR AN
AVAYA AUTHORIZED RESELLER; AVAYA RESERVES THE RIGHT
TO TAKE LEGAL ACTION AGAINST YOU AND ANYONE ELSE
USING OR SELLING THE SOFTWARE WITHOUT A LICENSE. BY
INSTALLING, DOWNLOADING OR USING THE SOFTWARE, OR
AUTHORIZING OTHERS TO DO SO, YOU, ON BEHALF OF
YOURSELF AND THE ENTITY FOR WHOM YOU ARE INSTALLING,
DOWNLOADING OR USING THE SOFTWARE (HEREINAFTER
REFERRED TO INTERCHANGEABLY AS “YOU” AND “END USER”),
AGREE TO THESE TERMS AND CONDITIONS AND CREATE A
BINDING CONTRACT BETWEEN YOU AND AVAYA INC. OR THE
APPLICABLE AVAYA AFFILIATE ( “AVAYA”). Avaya provides a telephone number for you to use to report problems
or to ask questions about your Product. The support telephone number
is 1-800-242-2121 in the United States. For additional support
telephone numbers, see the Avaya Web site: . 2 Planning and Engineering — Network Design
Comments? [email protected] May 2012 Contents
Chapter 1: Purpose of this document............................................................................... 7
Chapter 2: New in this release........................................................................................... 9
Features.................................................................................................................................................... 9
Other changes........................................................................................................................................... 9
Chapter 3: Network design fundamentals........................................................................ 11
Chapter 4: Hardware fundamentals and guidelines........................................................ 13
Chassis considerations............................................................................................................................. 13
Modules..................................................................................................................................................... 14
Optical device guidelines.......................................................................................................................... 15
1000BASE-X and 10GBASE-X reach....................................................................................................... 16
Dispersion considerations for long reach.................................................................................................. 16
10/100BASE-X and 1000BASE-TX reach................................................................................................ 17
10/100/1000BASE-TX Auto-Negotiation recommendations..................................................................... 18
Auto MDIX................................................................................................................................................. 18
CANA........................................................................................................................................................ 19
Chapter 5: Platform redundancy....................................................................................... 21
Power redundancy.................................................................................................................................... 21
Input/output port redundancy.................................................................................................................... 21
Control plane redundancy......................................................................................................................... 22
Switch Fabric redundancy......................................................................................................................... 22
Configuration redundancy......................................................................................................................... 23
Link redundancy........................................................................................................................................ 23
Switch redundancy.................................................................................................................................... 23
High Availability mode............................................................................................................................... 23
Chapter 6: Link redundancy............................................................................................... 27
Physical layer redundancy........................................................................................................................ 27
Multilink Trunking...................................................................................................................................... 31
802.3ad-based link aggregation................................................................................................................ 32
Chapter 7: Redundant network design............................................................................. 35
Network Load Balancing........................................................................................................................... 35
Chapter 8: Lossless networks........................................................................................... 39
Chapter 9: Layer 2 switch clustering and SMLT.............................................................. 49
Modular design for redundant networks.................................................................................................... 49
Network edge redundancy........................................................................................................................ 53
Split MultiLink Trunk configuration............................................................................................................ 54
SMLT full-mesh recommendations with OSPF......................................................................................... 63
Chapter 10: Layer 3 switch clustering and RSMLT.......................................................... 65
Routed SMLT............................................................................................................................................ 65
Switch clustering topologies and interoperability with other products....................................................... 72
Chapter 11: Layer 3 switch clustering and multicast SMLT............................................ 75
General guidelines.................................................................................................................................... 75
Multicast triangle topology......................................................................................................................... 77
Square and full-mesh topology multicast guidelines................................................................................. 79
SMLT and multicast traffic issues.............................................................................................................. 82 Planning and Engineering — Network Design May 2012 3 Chapter 12: Layer 2 loop prevention................................................................................. 85
Loop prevention and detection.................................................................................................................. 85
CPU protection and loop prevention compatibility.................................................................................... 90
Chapter 13: Spanning tree................................................................................................. 91
Spanning tree and protection against isolated VLANs.............................................................................. 91
MSTP and RSTP considerations.............................................................................................................. 92
Chapter 14: Layer 3 network design................................................................................. 95
VRF Lite.................................................................................................................................................... 95
Subnet-based VLAN guidelines................................................................................................................ 107
Open Shortest Path First........................................................................................................................... 107
Border Gateway Protocol.......................................................................................................................... 112
IPv6 BGP+........................................................................................................................................ 118
IP routed interface scaling......................................................................................................................... 118
IPv6........................................................................................................................................................... 119
Chapter 15: SPBM design guidelines................................................................................ 123
802.1aq standard...................................................................................................................................... 123
Provisioning............................................................................................................................................... 125
Implementation options............................................................................................................................. 126
Reference architectures............................................................................................................................ 132
Best practices............................................................................................................................................ 143
Migration best practices............................................................................................................................ 145
SPBM restrictions and limitations.............................................................................................................. 147
Chapter 16: IP multicast network design.......................................................................... 151
Multicast and MultiLink Trunking considerations....................................................................................... 151
Multicast scalability design rules............................................................................................................... 151
IP multicast address range restrictions..................................................................................................... 153
Multicast MAC address mapping considerations...................................................................................... 154
Dynamic multicast configuration changes................................................................................................. 156
IGMPv3 backward compatibility................................................................................................................ 156
TTL in IP multicast packets....................................................................................................................... 157
Multicast MAC filtering.............................................................................................................................. 157
Guidelines for multicast access policies.................................................................................................... 158
Split-subnet and multicast......................................................................................................................... 158
Protocol Independent Multicast-Sparse Mode guidelines......................................................................... 159
Protocol Independent Multicast-Source Specific Multicast guidelines...................................................... 171
IGMP and PIM-SM interaction.................................................................................................................. 172
Layer 3 multicast extended VLANs........................................................................................................... 172
Multicast for multimedia............................................................................................................................ 175
Chapter 17: System and network stability and security.................................................. 177
Control plane rate limit (CP-Limit)............................................................................................................. 177
DoS protection mechanisms..................................................................................................................... 178
Damage prevention................................................................................................................................... 179
Security and redundancy.......................................................................................................................... 181
Data plane security................................................................................................................................... 181
Control plane security............................................................................................................................... 185
Additional information................................................................................................................................ 191
Chapter 18: QoS design guidelines................................................................................... 193 4 Planning and Engineering — Network Design May 2012 QoS mechanisms...................................................................................................................................... 193
QoS interface considerations.................................................................................................................... 196
Network congestion and QoS design........................................................................................................ 198
QoS examples and recommendations...................................................................................................... 199
Chapter 19: Layer 1, 2, and 3 design examples............................................................... 203
Layer 1 examples...................................................................................................................................... 203
Layer 2 e...
View
Full Document
- Fall '19
- IP multicast, Multicast, Avaya