SlideShare a Scribd company logo
CISCO OTV
Data Center | www.netprotocolxpert.in
STP SEPARATION
 Edge Devices do take part in STP by sending and receiving BPDUs on their
internal interface as would any other layer2 switch.
 But an OTV Edge Device will not originate or forward BPDUs on the overlay
network. OTV thus limits the STP domain to the boundaries of each site. This
means a STP problem in the control plane of a given site would not produce
any effect on the remote data centers. This is one of the biggest benefits of OTV
in comparison to other DCI technologies. This is made possible because MAC
reachability information is advertised and learned via the control plane protocol
instead of learned using typical MAC flooding behaviour.
 With the STP separation between sites, the ability for different sites to use
different STP technologies is made possible with OTV. I.e., one site can run
MSTP while another runs RSTP. In the real world this is a nifty enhancement.
MULTI-HOMING
 OTV allows multiple Edge Devices to co-exist in the same site for load-sharing
purposes. (With NX-OS 5.1 that is limited to 2 OTV Edge Devices per site.)
 With multiple OTV Edge Devices per site and no STP across the overlay to shut
down redundant links, the possibility of an end-to-end site loops are created. The
absence of STP between sites holds valuable benefits, but a loop prevention
mechanism is still required, so an alternative method was used. The boys who wrote
OTV, decided on electing a master device responsible for traffic forwarding (similar
to some non-STP protocols).
 With OTV this master elected device is called an AED (Authoritative Edge Device).
 An AED is an Edge Device that is responsible for forwarding the extended VLAN
frames in and out of a site, from and to the overlay network. It is a very important to
understand this before carrying on. Only the AED will forward traffic out of the site
onto the overlay. With optimal traffic replication in a transport network, a site’s
broadcast and multicast traffic will reach every Edge Device in the remote site. Only
the AED in the remote site will forward traffic from the overlay into the remote site.
The AED thus ensures that traffic crossing the site-overlay boundary does not get
duplicated or create loops when a site is multi-homed.
 Coming back to the original cause, an AED enables the load-sharing of traffic if
multiple Edge Devices are present in a site. An AED is elected dynamically or
statically and currently on a per-VLAN basis. There is talk of a per-flow option,
but that is still future talk. The load-sharing is thus achieved by one AED being
authoritative for some extended VLANs and another AED for the other extended
VLANs.
 The AED is elected using a deterministic algorithm, by assigning ordinal numbers
(indicates numerical order in a certain position) to each Edge Device in the local
site based on the OTV System-ID (by default, derived from the system MAC
address). The result for two AEDs in a site will be the split of odd and even VLAN
between the two devices. More specifically, the Edge Device with a lower System-
ID will become authoritative for all the even extended VLANs, whereas the Edge
Device with higher System-ID will be authoritative the odd extended VLANs.
Since all traffic may only leave via the AED for a given extended VLAN, it is
strongly recommended to setup a vPC peer-link between the Edge Devices for
optimal redirection. The vPC peer-link will leveraged in the initial release to steer
the traffic to the AED device.
 From a redundancy perspective, if one AED fails, the remaining AED will realize the failure
and assume authority for all extended VLANs.
 The Site VLAN must be defined even if only one Edge Device is present in a site?
The Site VLAN is a VLAN used for communication between local OTV Edge Devices within
a site (not via the Overlay). It is used to facilitate the role election of the AED. The Site
VLAN should NOT be extended across the overlay. It does not need to match between
sites, but it is recommended to use the same VLAN. The VLAN used as the Site VLAN must
be active else overlay will stay down and not pass traffic.
 Finally the AED is also responsible for advertising the MAC reachability information for the
extended VLANs it is authoritative for.
HANDLING OF TRAFFIC TYPES
 An AED will decide to forward a Layer-2 unicast, multicast, or broadcast packet over
the overlay interface when the overlay control plane has placed the overlay interface in
the forwarding table. OTV attempts optimize inter-site traffic, while retaining resiliency,
stability, and scalability. Let look at the forwarding behaviour of different traffic types.
 Known unicast layer2 frames destined via the overlay will be sent directly to the join
interface of the AED in the remote site, that advertised the reachability for the
destination MAC addresses.
 An unknown unicast frame, is a frame received with a destination MAC address that has
not been learned yet and as a result is flooded out all other valid STP interface (or
Internal interfaces in the case of OTV). This is normal Ethernet behaviour. But with OTV
unknown unicast layer2 frames are not flooded between OTV sites. This is generally not
an issue since hosts become known the moment they emit one packet. The time for
the MAC reachability information to be propagated between all sites is nominal. The
assumption with OTV is that no host on the network is completely silent. Again there is
talk of a feature available in future NX-OS releases to enable selective flooding. On NX-
OS 5.1 all unknown unicast frames will be blocked from crossing the logical overlay.
 A broadcast layer2 frame originated at an OTV site will be delivered to all remote
sites. Broadcast frames are forwarded in the same manner as the OTV hellos,
leveraging the same ASM multicast group in the transport network. In future NX-
OS releases, there will broadcast based policy control mechanisms such as
broadcast suppression, broadcast white-listing, etc.
 Multicast layer2 frames will have the layer2 source group addresses mapped to a
SSM (Source Specific Multicast) groups in the transport network. The SSM groups
used are configured as the OTV data-group. These dynamic mappings are
communicated via the OTV control plane between sites. Multicast traffic via the
overlay will be destined to the SSM group multicast addresses joined.
 ARP optimization is another traffic enhancement OTV offers to reduce the amount
of broadcast traffic between sites. IP ARP is a layer2 broadcast frame used to
determine the MAC address of the host with a particular IP address. ARP requests
are sent across the OTV overlay to all remote sites, with the hope that it reaches
the host with that particular IP. The intended host will respond to the originating
host’s ARP request using an ARP reply, which will pass via the original OTV Edge
Device that forwarded the ARP request. That OTV Edge Device will record the ARP
reply. OTV Edge Devices are capable of snooping ARP reply traffic and caching the
contained mapping information in a local data table called ARP ND (Neighbor-
Discovery). Any subsequent ARP broadcast requests that has a match in the ARP
ND will be served from there and will not be sent across the overlay.
 One caveat to be aware of is the relation between the MAC aging-timer and the ARP
cache timer. The ARP cache timer should always be lower than the MAC aging-timer,
else traffic might be black-holed. Using the default NX-OS values and provided the
default gateway resides on a Nexus 7000, this should never be an issue with the default
set values.
 The defaults on Nexus 7000 platforms for these timers are:
 OTV ARP aging-timer: 480 seconds / 8 minutes
 MAC aging-timer: 1800 seconds / 30 minutes
MAC MOBILITY
 One of the great features of Ethernet is the ability to adapt dynamically to MAC
addresses moving around. This ability must also be achieved when a MAC moves from
one OTV site to another. VMotion is one common example of MAC mobility. VMotion
occurs when the virtual machine moves from one site to another. OTV uses a metric
value to support seamless MAC mobility.
 If an AED has a MAC address stored in the MAC forwarding table which points to the
overlay interface, it means that an Edge Device in another site has explicitly advertised
the MAC address as being local to its site. When that MAC appears in a new site, which
were previously advertised by another site, the AED on the new site will advertise the
MAC address (newly learned on the internal interface) with a metric value of 0. When
the Edge Device in the site the MAC has moved from hears the advertisement, it will
withdraw the MAC address that it had previously advertised. Once the MAC address is
withdrawn, the Edge Device where the MAC has moved to will change the metric value
to 1. All remote sites sending to this MAC address will start using the new Edge Device
as soon as they hear its MAC advertisement with metric 0.
 Care should be taken when using static MAC addresses.
FHRP ISOLATION
 Most of this post has focused on activity at layer2. Lets take a step up to the
layer3 breakouts and focus more specifically on the FHRPs (First Hop
Redundancy Protocols). HSRP (Host Standby Routing Protocol), VRRP (Virtual
Router Redundancy Protocol) and GLBP (Gateway Load Balancing Protocol) are
very often implemented to provide a common IP address to be used as a
default gateway and provide redundancy and load-balancing to the clients in
that subnet. These are established technologies that work well within the local
segment of a network. Since OTV is extending VLANs over multiple sites, the
size of the ‘local’ segment is extended and not so ‘local’ anymore. The FHRP
protocols are also extended between sites which opens the likely possibility that
the FHRP ‘active’ device responsible for forwarding traffic beyond layer2
boundaries might not be locally located any more. Inter-VLAN traffic could
traverse a remote site where the FHRP gateway resides even though both the
source and destination hosts reside in the local site. A increase in latency
between sites could additionally offset the stability of the FHRP protocols.
Cisco OTV 
 This problem is addressed by what is called FHRP isolation, which
limits/isolates all FHRP frames to each local site. With the absence of
site-to-site FHRP communication, each site would choose a local FHRP
‘active’ member as the default gateway. This means that the outbound
traffic will be able to follow the optimal and shortest path, always
leveraging the local default gateway.
 FHRP Isolation (current day) is done manually and will be done (future
days) using fewer commands.
LIMITATIONS
 We have covered some of the limitations of the still youthful OTV. But before
we recap, there is one more to cover.
 OTV SVI coexistence
With the current implementations of NX-OS, the OTV encapsulation (i.e., the
Edge Device) and the SVI exit point for a given VLAN must be separate
devices. This separation can be achieved by using separate physical devices,
or alternatively the OTV Edge Devices can be deployed as separate VDC
(Virtual Device Contexts).
THERE ARE TWO SUPPORTED IMPLEMENTATION OF USING OTV VDC’S:
• OTV Appliance on a Stick : A common set of uplinks from the Routing VDC are
used for both the routing and DCI extension.
• Inline OTV Appliance: A dedicated link from the OTV VDC is used for the DCI
extension.
NX-OS OTV limitations hopefully removed soon in future releases:
 Unicast support for the transport network.
 Support for an IPv6 transport network.
 The join interface must be a physical interface, a Loopback interface would be
preferred.
 Per-Flow based AED load-balancing.
 Selective Flooding Mechanism.
 Broadcast Suppression.
 FHRP Isolation done using native commands.
 More than two Edge Devices per site.
 More than six Edge Devices in all sites.
 More than three supported OTV sites.
 More that 128 VLANs per overlay.

More Related Content

PPTX
OTV(Overlay Transport Virtualization)
NetProtocol Xpert
 
PDF
Emua quick installation manual for bts3900 l
alex natel
 
PPTX
Worst Splunk practices...and how to fix them
Splunk
 
PPTX
Fabric Path PPT by NETWORKERS HOME
networkershome
 
PDF
EtherChannel
Thomas Moegli
 
PDF
Docker vs kvm
Wilson Cunalata
 
PDF
Attach flow & srb
Mausam Panchal
 
PDF
vPC_Final
Pratik Bhide
 
OTV(Overlay Transport Virtualization)
NetProtocol Xpert
 
Emua quick installation manual for bts3900 l
alex natel
 
Worst Splunk practices...and how to fix them
Splunk
 
Fabric Path PPT by NETWORKERS HOME
networkershome
 
EtherChannel
Thomas Moegli
 
Docker vs kvm
Wilson Cunalata
 
Attach flow & srb
Mausam Panchal
 
vPC_Final
Pratik Bhide
 

What's hot (20)

PDF
SP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail Ali
MyNOG
 
PDF
Segment Routing
APNIC
 
PPTX
Volte troubleshooting
Jamil Awan
 
PPTX
Session 2
ahmed elmeghiny
 
PPTX
2G & 3G Overview
Bernard Collins
 
DOCX
4g interview-question
Manpreet Singh
 
PDF
Enabling the rise of the smartphone: Chronicling the developmental history at...
Qualcomm Research
 
PDF
Administração de Redes LTE_Acessibilidade
Leonardo Camilo
 
PPT
Setu Samudram Ppt
SRIBATSA PATTANAYAK
 
PDF
VoLTE Flows and CS network
Karel Berkovec
 
PDF
51602253 bts-power-control
Abdou Obado
 
PPTX
Cisco CCNA-Router on Stick
Hamed Moghaddam
 
PPTX
Charging architecture and principles
Mohamed Shokry
 
PDF
SIGTRAN - An Introduction
Tareque Hossain
 
PDF
Configuring Netgate Appliance Integrated Switches on pfSense 2.4.4 - pfSense ...
Netgate
 
PDF
Route Redistribution
Netwax Lab
 
DOC
Lab 6.4.1 InterVLAN routing
Muhd Mu'izuddin
 
PPTX
MX960 Router
Kashif Latif
 
PPTX
pfSense Installation Slide
Sopon Tumchota
 
SP Routing Innovation with Segment Routing, VXLAN and EVPN - Ismail Ali
MyNOG
 
Segment Routing
APNIC
 
Volte troubleshooting
Jamil Awan
 
Session 2
ahmed elmeghiny
 
2G & 3G Overview
Bernard Collins
 
4g interview-question
Manpreet Singh
 
Enabling the rise of the smartphone: Chronicling the developmental history at...
Qualcomm Research
 
Administração de Redes LTE_Acessibilidade
Leonardo Camilo
 
Setu Samudram Ppt
SRIBATSA PATTANAYAK
 
VoLTE Flows and CS network
Karel Berkovec
 
51602253 bts-power-control
Abdou Obado
 
Cisco CCNA-Router on Stick
Hamed Moghaddam
 
Charging architecture and principles
Mohamed Shokry
 
SIGTRAN - An Introduction
Tareque Hossain
 
Configuring Netgate Appliance Integrated Switches on pfSense 2.4.4 - pfSense ...
Netgate
 
Route Redistribution
Netwax Lab
 
Lab 6.4.1 InterVLAN routing
Muhd Mu'izuddin
 
MX960 Router
Kashif Latif
 
pfSense Installation Slide
Sopon Tumchota
 
Ad

Viewers also liked (8)

PPTX
OTV Configuration
NetProtocol Xpert
 
PPTX
Securing management, control & data plane
NetProtocol Xpert
 
PPTX
TCLSH and Macro Ping Test on Cisco Routers and Switches
NetProtocol Xpert
 
PPTX
Cisco ISR 4351 Router
NetProtocol Xpert
 
PPTX
OTV PPT by NETWORKERS HOME
networkershome
 
PPTX
Common Layer 2 Threats, Attacks & Mitigation
NetProtocol Xpert
 
PPTX
Cisco ASR 1001-X Router
NetProtocol Xpert
 
PPTX
MPLS Layer 3 VPN
NetProtocol Xpert
 
OTV Configuration
NetProtocol Xpert
 
Securing management, control & data plane
NetProtocol Xpert
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
NetProtocol Xpert
 
Cisco ISR 4351 Router
NetProtocol Xpert
 
OTV PPT by NETWORKERS HOME
networkershome
 
Common Layer 2 Threats, Attacks & Mitigation
NetProtocol Xpert
 
Cisco ASR 1001-X Router
NetProtocol Xpert
 
MPLS Layer 3 VPN
NetProtocol Xpert
 
Ad

Similar to Cisco OTV  (20)

PPTX
Otv notes
Krunal Shah
 
PDF
IP essentials
Luca Matteo Ruberto
 
PPTX
OSPF Basics
Martin Bratina
 
PDF
220375-use-secure-web-appliance-best-practices.pdf
tungtk1
 
ODP
OLPC Mesh networking improvements
OSLL
 
PPT
Multi protocol label switching (mpls)
Online
 
PDF
Mw2522122216
IJERA Editor
 
DOCX
Ethernet lan
Yolanda Konde
 
PDF
2009 2-ospf-report
Jayendra Singh Rathore
 
PDF
An experimental overview on software defined optical transmission and sdngmpl...
CPqD
 
DOCX
I and z
Ramlee Nooh
 
PDF
Chapter 5
asguna
 
PPTX
Chapter 3 1-network_design_with_internet_tools - Network Design
nakomuri
 
PDF
63151777 core-design
kamalmishra1105
 
PPTX
CISSP - Chapter 4 - Network Topology
Karthikeyan Dhayalan
 
PDF
CisCon 2018 - Overlay Management Protocol e IPsec
AreaNetworking.it
 
PDF
Multi port network ethernet performance improvement techniques
IJARIIT
 
PDF
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
IAEME Publication
 
PPT
Network Topologies
Jason Hando
 
Otv notes
Krunal Shah
 
IP essentials
Luca Matteo Ruberto
 
OSPF Basics
Martin Bratina
 
220375-use-secure-web-appliance-best-practices.pdf
tungtk1
 
OLPC Mesh networking improvements
OSLL
 
Multi protocol label switching (mpls)
Online
 
Mw2522122216
IJERA Editor
 
Ethernet lan
Yolanda Konde
 
2009 2-ospf-report
Jayendra Singh Rathore
 
An experimental overview on software defined optical transmission and sdngmpl...
CPqD
 
I and z
Ramlee Nooh
 
Chapter 5
asguna
 
Chapter 3 1-network_design_with_internet_tools - Network Design
nakomuri
 
63151777 core-design
kamalmishra1105
 
CISSP - Chapter 4 - Network Topology
Karthikeyan Dhayalan
 
CisCon 2018 - Overlay Management Protocol e IPsec
AreaNetworking.it
 
Multi port network ethernet performance improvement techniques
IJARIIT
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
IAEME Publication
 
Network Topologies
Jason Hando
 

More from NetProtocol Xpert (20)

PPTX
Basic Cisco ASA 5506-x Configuration (Firepower)
NetProtocol Xpert
 
PPTX
Storm-Control
NetProtocol Xpert
 
PPTX
Dynamic ARP Inspection (DAI)
NetProtocol Xpert
 
PPTX
IP Source Guard
NetProtocol Xpert
 
PPTX
DHCP Snooping
NetProtocol Xpert
 
PPTX
Password Recovery
NetProtocol Xpert
 
PPTX
Application & Data Center
NetProtocol Xpert
 
PPTX
Point to-point protocol (ppp), PAP & CHAP
NetProtocol Xpert
 
PPTX
Avoid DNS lookup when mistyping a command
NetProtocol Xpert
 
PPTX
Private VLANs
NetProtocol Xpert
 
PPTX
MTU (maximum transmission unit) & MRU (maximum receive unit)
NetProtocol Xpert
 
PPTX
Regular expression examples
NetProtocol Xpert
 
PPTX
Eigrp is restricted to stub connections
NetProtocol Xpert
 
PPTX
Converting ipv4 to ipv6 and vice versa
NetProtocol Xpert
 
PPTX
Password recovery cisco catalyst 3850
NetProtocol Xpert
 
PPTX
Cisco 2960x switch password recovery
NetProtocol Xpert
 
PPTX
VMware ESXi 6.0 Installation Process
NetProtocol Xpert
 
PPTX
EtherChannel Configuration
NetProtocol Xpert
 
PPTX
EIGRP (Enhanced Interior Gateway Routing Protocol)
NetProtocol Xpert
 
PPTX
OSPF External Route Summarization
NetProtocol Xpert
 
Basic Cisco ASA 5506-x Configuration (Firepower)
NetProtocol Xpert
 
Storm-Control
NetProtocol Xpert
 
Dynamic ARP Inspection (DAI)
NetProtocol Xpert
 
IP Source Guard
NetProtocol Xpert
 
DHCP Snooping
NetProtocol Xpert
 
Password Recovery
NetProtocol Xpert
 
Application & Data Center
NetProtocol Xpert
 
Point to-point protocol (ppp), PAP & CHAP
NetProtocol Xpert
 
Avoid DNS lookup when mistyping a command
NetProtocol Xpert
 
Private VLANs
NetProtocol Xpert
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
NetProtocol Xpert
 
Regular expression examples
NetProtocol Xpert
 
Eigrp is restricted to stub connections
NetProtocol Xpert
 
Converting ipv4 to ipv6 and vice versa
NetProtocol Xpert
 
Password recovery cisco catalyst 3850
NetProtocol Xpert
 
Cisco 2960x switch password recovery
NetProtocol Xpert
 
VMware ESXi 6.0 Installation Process
NetProtocol Xpert
 
EtherChannel Configuration
NetProtocol Xpert
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
NetProtocol Xpert
 
OSPF External Route Summarization
NetProtocol Xpert
 

Recently uploaded (20)

PPT
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PDF
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
PPTX
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PDF
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 

Cisco OTV 

  • 1. CISCO OTV Data Center | www.netprotocolxpert.in
  • 2. STP SEPARATION  Edge Devices do take part in STP by sending and receiving BPDUs on their internal interface as would any other layer2 switch.  But an OTV Edge Device will not originate or forward BPDUs on the overlay network. OTV thus limits the STP domain to the boundaries of each site. This means a STP problem in the control plane of a given site would not produce any effect on the remote data centers. This is one of the biggest benefits of OTV in comparison to other DCI technologies. This is made possible because MAC reachability information is advertised and learned via the control plane protocol instead of learned using typical MAC flooding behaviour.  With the STP separation between sites, the ability for different sites to use different STP technologies is made possible with OTV. I.e., one site can run MSTP while another runs RSTP. In the real world this is a nifty enhancement.
  • 3. MULTI-HOMING  OTV allows multiple Edge Devices to co-exist in the same site for load-sharing purposes. (With NX-OS 5.1 that is limited to 2 OTV Edge Devices per site.)  With multiple OTV Edge Devices per site and no STP across the overlay to shut down redundant links, the possibility of an end-to-end site loops are created. The absence of STP between sites holds valuable benefits, but a loop prevention mechanism is still required, so an alternative method was used. The boys who wrote OTV, decided on electing a master device responsible for traffic forwarding (similar to some non-STP protocols).  With OTV this master elected device is called an AED (Authoritative Edge Device).
  • 4.  An AED is an Edge Device that is responsible for forwarding the extended VLAN frames in and out of a site, from and to the overlay network. It is a very important to understand this before carrying on. Only the AED will forward traffic out of the site onto the overlay. With optimal traffic replication in a transport network, a site’s broadcast and multicast traffic will reach every Edge Device in the remote site. Only the AED in the remote site will forward traffic from the overlay into the remote site. The AED thus ensures that traffic crossing the site-overlay boundary does not get duplicated or create loops when a site is multi-homed.
  • 5.  Coming back to the original cause, an AED enables the load-sharing of traffic if multiple Edge Devices are present in a site. An AED is elected dynamically or statically and currently on a per-VLAN basis. There is talk of a per-flow option, but that is still future talk. The load-sharing is thus achieved by one AED being authoritative for some extended VLANs and another AED for the other extended VLANs.  The AED is elected using a deterministic algorithm, by assigning ordinal numbers (indicates numerical order in a certain position) to each Edge Device in the local site based on the OTV System-ID (by default, derived from the system MAC address). The result for two AEDs in a site will be the split of odd and even VLAN between the two devices. More specifically, the Edge Device with a lower System- ID will become authoritative for all the even extended VLANs, whereas the Edge Device with higher System-ID will be authoritative the odd extended VLANs. Since all traffic may only leave via the AED for a given extended VLAN, it is strongly recommended to setup a vPC peer-link between the Edge Devices for optimal redirection. The vPC peer-link will leveraged in the initial release to steer the traffic to the AED device.
  • 6.  From a redundancy perspective, if one AED fails, the remaining AED will realize the failure and assume authority for all extended VLANs.  The Site VLAN must be defined even if only one Edge Device is present in a site? The Site VLAN is a VLAN used for communication between local OTV Edge Devices within a site (not via the Overlay). It is used to facilitate the role election of the AED. The Site VLAN should NOT be extended across the overlay. It does not need to match between sites, but it is recommended to use the same VLAN. The VLAN used as the Site VLAN must be active else overlay will stay down and not pass traffic.  Finally the AED is also responsible for advertising the MAC reachability information for the extended VLANs it is authoritative for.
  • 7. HANDLING OF TRAFFIC TYPES  An AED will decide to forward a Layer-2 unicast, multicast, or broadcast packet over the overlay interface when the overlay control plane has placed the overlay interface in the forwarding table. OTV attempts optimize inter-site traffic, while retaining resiliency, stability, and scalability. Let look at the forwarding behaviour of different traffic types.  Known unicast layer2 frames destined via the overlay will be sent directly to the join interface of the AED in the remote site, that advertised the reachability for the destination MAC addresses.  An unknown unicast frame, is a frame received with a destination MAC address that has not been learned yet and as a result is flooded out all other valid STP interface (or Internal interfaces in the case of OTV). This is normal Ethernet behaviour. But with OTV unknown unicast layer2 frames are not flooded between OTV sites. This is generally not an issue since hosts become known the moment they emit one packet. The time for the MAC reachability information to be propagated between all sites is nominal. The assumption with OTV is that no host on the network is completely silent. Again there is talk of a feature available in future NX-OS releases to enable selective flooding. On NX- OS 5.1 all unknown unicast frames will be blocked from crossing the logical overlay.
  • 8.  A broadcast layer2 frame originated at an OTV site will be delivered to all remote sites. Broadcast frames are forwarded in the same manner as the OTV hellos, leveraging the same ASM multicast group in the transport network. In future NX- OS releases, there will broadcast based policy control mechanisms such as broadcast suppression, broadcast white-listing, etc.  Multicast layer2 frames will have the layer2 source group addresses mapped to a SSM (Source Specific Multicast) groups in the transport network. The SSM groups used are configured as the OTV data-group. These dynamic mappings are communicated via the OTV control plane between sites. Multicast traffic via the overlay will be destined to the SSM group multicast addresses joined.  ARP optimization is another traffic enhancement OTV offers to reduce the amount of broadcast traffic between sites. IP ARP is a layer2 broadcast frame used to determine the MAC address of the host with a particular IP address. ARP requests are sent across the OTV overlay to all remote sites, with the hope that it reaches the host with that particular IP. The intended host will respond to the originating host’s ARP request using an ARP reply, which will pass via the original OTV Edge Device that forwarded the ARP request. That OTV Edge Device will record the ARP reply. OTV Edge Devices are capable of snooping ARP reply traffic and caching the contained mapping information in a local data table called ARP ND (Neighbor- Discovery). Any subsequent ARP broadcast requests that has a match in the ARP ND will be served from there and will not be sent across the overlay.
  • 9.  One caveat to be aware of is the relation between the MAC aging-timer and the ARP cache timer. The ARP cache timer should always be lower than the MAC aging-timer, else traffic might be black-holed. Using the default NX-OS values and provided the default gateway resides on a Nexus 7000, this should never be an issue with the default set values.  The defaults on Nexus 7000 platforms for these timers are:  OTV ARP aging-timer: 480 seconds / 8 minutes  MAC aging-timer: 1800 seconds / 30 minutes
  • 10. MAC MOBILITY  One of the great features of Ethernet is the ability to adapt dynamically to MAC addresses moving around. This ability must also be achieved when a MAC moves from one OTV site to another. VMotion is one common example of MAC mobility. VMotion occurs when the virtual machine moves from one site to another. OTV uses a metric value to support seamless MAC mobility.  If an AED has a MAC address stored in the MAC forwarding table which points to the overlay interface, it means that an Edge Device in another site has explicitly advertised the MAC address as being local to its site. When that MAC appears in a new site, which were previously advertised by another site, the AED on the new site will advertise the MAC address (newly learned on the internal interface) with a metric value of 0. When the Edge Device in the site the MAC has moved from hears the advertisement, it will withdraw the MAC address that it had previously advertised. Once the MAC address is withdrawn, the Edge Device where the MAC has moved to will change the metric value to 1. All remote sites sending to this MAC address will start using the new Edge Device as soon as they hear its MAC advertisement with metric 0.  Care should be taken when using static MAC addresses.
  • 11. FHRP ISOLATION  Most of this post has focused on activity at layer2. Lets take a step up to the layer3 breakouts and focus more specifically on the FHRPs (First Hop Redundancy Protocols). HSRP (Host Standby Routing Protocol), VRRP (Virtual Router Redundancy Protocol) and GLBP (Gateway Load Balancing Protocol) are very often implemented to provide a common IP address to be used as a default gateway and provide redundancy and load-balancing to the clients in that subnet. These are established technologies that work well within the local segment of a network. Since OTV is extending VLANs over multiple sites, the size of the ‘local’ segment is extended and not so ‘local’ anymore. The FHRP protocols are also extended between sites which opens the likely possibility that the FHRP ‘active’ device responsible for forwarding traffic beyond layer2 boundaries might not be locally located any more. Inter-VLAN traffic could traverse a remote site where the FHRP gateway resides even though both the source and destination hosts reside in the local site. A increase in latency between sites could additionally offset the stability of the FHRP protocols.
  • 13.  This problem is addressed by what is called FHRP isolation, which limits/isolates all FHRP frames to each local site. With the absence of site-to-site FHRP communication, each site would choose a local FHRP ‘active’ member as the default gateway. This means that the outbound traffic will be able to follow the optimal and shortest path, always leveraging the local default gateway.  FHRP Isolation (current day) is done manually and will be done (future days) using fewer commands.
  • 14. LIMITATIONS  We have covered some of the limitations of the still youthful OTV. But before we recap, there is one more to cover.  OTV SVI coexistence With the current implementations of NX-OS, the OTV encapsulation (i.e., the Edge Device) and the SVI exit point for a given VLAN must be separate devices. This separation can be achieved by using separate physical devices, or alternatively the OTV Edge Devices can be deployed as separate VDC (Virtual Device Contexts).
  • 15. THERE ARE TWO SUPPORTED IMPLEMENTATION OF USING OTV VDC’S: • OTV Appliance on a Stick : A common set of uplinks from the Routing VDC are used for both the routing and DCI extension. • Inline OTV Appliance: A dedicated link from the OTV VDC is used for the DCI extension.
  • 16. NX-OS OTV limitations hopefully removed soon in future releases:  Unicast support for the transport network.  Support for an IPv6 transport network.  The join interface must be a physical interface, a Loopback interface would be preferred.  Per-Flow based AED load-balancing.  Selective Flooding Mechanism.  Broadcast Suppression.  FHRP Isolation done using native commands.  More than two Edge Devices per site.  More than six Edge Devices in all sites.  More than three supported OTV sites.  More that 128 VLANs per overlay.