| 0 comments ]

Supporting Infrastructure Services

Add a note here This section reviews considerations for supporting infrastructure services in highly available enterprise campus networks. Considerations for building a converged network to support IP telephony are discussed. QoS attributes and aspects of the Cisco Catalyst Integrated Security features are also described.


IP Telephony Considerations

Add a note hereIP telephony services are supported at each layer of the campus network.

Add a note hereHigh availability, redundancy, and fast convergence needed by IP telephony services are supported throughout the enterprise campus network. QoS features are implemented throughout the network. The distribution layer typically supports policy enforcement.

Add a note hereHowever, because implementing IP telephony services extends the network edge, IP telephony has the most impact at the access layer of the network. The access layer supports device attachment and phone detection, inline power for devices, and QoS features including classification, scheduling, and the trust boundary.

Add a note here IP Telephony Extends the Network Edge

Add a note hereBecause the IP phone is a three-port switch, IP telephony services actually extend the network edge, as shown in Figure 2-33.

Click to collapse
Add a note hereFigure 2-33: IP Telephony Extends the Network Edge

Add a note hereThe IP phone shown in Figure 2-33 contains a three-port switch that is configured in conjunction with the access switch and Cisco Unified Communications Manager:

  • Add a note herePower negotiation

  • Add a note hereVLAN configuration

  • Add a note here802.1x interoperation

  • Add a note hereQoS configuration

  • Add a note hereDHCP and Cisco Unified Communications Manager registration

Add a note hereWhen a Cisco IP phone is connected to the network, Cisco Catalyst multiservice switches detect and integrate the phone with the network. The switches can deliver Power over Ethernet (PoE) using existing copper cabling to power the IP phones. The switches place the IP phones and attached devices in the appropriate VLAN, often using 802.1x services. The switch supports the QoS configuration needed for the IP phones, and provides connection to DHCP servers and Cisco Unified Communications Manager systems for registration.

Add a note here PoE is the ability for the LAN switching infrastructure to provide power over a copper Ethernet cable to an endpoint or powered device. This capability is also referred to as inline power, and was originally developed by Cisco Systems in 2000 to support the emerging IP telephony deployments.

Add a note hereTo support PoE delivery to power capable devices, a number of issues need to be resolved: phone detection, power delivery, power management, and cable and bandwidth management.

Add a note here PoE Requirements

Add a note hereThere are two PoE implementations available, and two ways to provide power to the IP phones:

  • Add a note hereCisco line cards support prestandard PoE, IEEE 802.3af, and a mix of devices. IEEE 802.3af-only devices will not negotiate or receive power from an original Cisco PoE-only line card.

  • Add a note hereCisco devices use a bidirectional Cisco Discovery Protocol (CDP) exchange to negotiate the exact power requirements. Power negotiation optimizes power consumption by allowing the switch to reserve only the power needed for the device.

Add a note hereThe earlier Cisco prestandard PoE devices initially receive 6.3W and then optionally negotiate their power requirements using CDP. Cisco prestandard devices use a relay in the powered device to reflect a special FastLink pulse for device detection.

Add a note hereThe devices based on the IEEE 802.3af power standard initially receive 12.95 watts of power, unless a power-sourcing equipment (PSE) device can detect a specific powered device classification. An 802.3af PSE device applies a voltage in the range of –2.8 to –10 volts on the cable and then looks for a 25K ohm signature resistor in the powered device.

Add a note hereIEEE 802.3af power may be delivered using a PoE-capable Ethernet port, which is referred to as an endpoint PSE, or by a midspan PSE that can be used to deliver PoE in the event an existing non-PoE-capable Ethernet switch is used. An endpoint PSE, such as a PoE-capable Ethernet switch, can use either active data wires of an Ethernet port or spare wires to a powered device. Some midspan PSEs can only implement power over spare pairs of copper cabling and cannot be used to deliver PoE over 1000BASE-T connections.

Add a note hereThe IEEE 802.3af power standard classes are shown here in Figure 2-34.

Click to collapse
Add a note hereFigure 2-34: PoE Power Classes

Note

Add a note hereA midspan PSE takes up rack space and adds a patch point to every PoE cable, increasing cabling costs and complexity.

Add a note here Power Budget and Management

Add a note here Power budget planning is necessary to determine what devices can be supported today and in the future.

Add a note hereThe switches manage power by what is allocated, not by what is currently used. However, the device power consumption is not constant:

  • Add a note hereCisco Unified IP Phone 7960G requires 7W when the phone is ringing at maximum volume.

  • Add a note hereCisco Unified IP Phone 7960G requires 5W when it is on or off hook.

Add a note hereDelivery of PoE using the IEEE 802.3af default classification may significantly increase the power requirements on both the PSE switch and the power infrastructure. To provide PoE in a cost-effective and efficient manner, Cisco Catalyst switches support Cisco Intelligent Power Management (Cisco IPM) in addition to IEEE 802.3af classification. This enables a powered device and PSE to negotiate their respective capabilities to explicitly manage how much power is required to power the device and also how the PSE-capable switch manages the allocation of power to individual powered devices. These Cisco IPM capabilities enable a network and facilities manager to effectively and economically manage the power resources within a wiring closet and help PSE-capable switches meet the objectives of the network.

Add a note herePower management is complex. Power management can have significant ramifications with respect to the power supply required to drive all the powered devices and line cards, how power is delivered within the switch, how the switch manages power allocation, and finally, for the power delivery requirements of the wiring closet. You need to plan for maximum theoretical draw that so there will be sufficient power available to be allocated to end devices and the line cards in the switch. Even if the PSE and powered device support power classification, the classification ranges are fairly broad and can lead to wasted power budget allocation. When there is insufficient power in a chassis, the power management system will deactivate line cards.

Add a note herePower requirements can be estimated using the Cisco Power Calculator found at http://tools.cisco.com/cpc/launch.jsp.

Add a note here The Cisco Power Calculator enables you to estimate the power supply requirements for a specific PoE and line card configuration.

Add a note hereThe Cisco Power Calculator requires a username and password. The tool allows a series of selections for the configurable products, and provides results showing the output current, output power, and system heat dissipation for a specific configuration.

Add a note hereThe calculator is an educational resource and a starting point in planning power requirements; it does not provide a final power recommendation from Cisco.

Add a note hereThe Cisco Power Calculator supports the following Cisco product series: Cisco Catalyst 6500, Catalyst 4500, Catalyst 3750, and Catalyst 3560 series switches, and the Cisco 7600 series router.

Add a note hereThe Power Consumption Summary screen shown in Figure 2-35 displays the minimum power supply required for the selected configuration and percentage of power usage. The table displays output current (amperes), output power (watts), and heat dissipation (BTUs per hour).

Click to collapse
Add a note hereFigure 2-35: Power Consumption Summary

Add a note hereThe Cisco Power Calculator recommends the smallest power supply that meets the requirements of the configuration. The tool reports single and redundant power supply options, and also the combined power configuration mode as appropriate.

Add a note hereThe power supply details area shown here in Figure 2-36 displays power utilization with various-sized power supplies.

Click to collapse
Add a note hereFigure 2-36: Power Supply Details

Add a note hereThe Configuration Details section of the Cisco Power Calculator output shown in Figure 2-37 displays the current, power, and heat dissipation for each component.

Click to collapse
Add a note hereFigure 2-37: Configuration Details

Add a note here Multi-VLAN Access Port

Add a note hereThe concept of an access port has been extended to a multi-VLAN access port in the enterprise campus.

Add a note here Multiservice switches support a new parameter for IP telephony support that makes the access port a multi-VLAN access port. The new parameter is called an auxiliary VLAN. Every Ethernet 10/100/1000 port in the switch is associated with two VLANs:

  • Add a note here A native VLAN for data service that is identified by the port VLAN ID (PVID)

  • Add a note hereAn auxiliary VLAN for voice service that is identified by the voice VLAN ID (VVID)

  • Add a note hereDuring the initial CDP exchange with the access switch, the IP phone is configured with a VVID.

  • Add a note hereThe IP phone is also supplied with a QoS configuration using CDP. Voice traffic is separated from data and supports a different trust boundary.

Add a note hereData packets between the multiservice access switch and the PC or workstation are on the native VLAN. All packets going out on the native VLAN of an IEEE 802.1Q port are sent untagged by the access switch. The PC or workstation connected to the IP phone usually sends untagged packets.

Add a note hereVoice packets are tagged by the IP phone based on the CDP information from the access switch.

Add a note hereThe multi-VLAN access ports are not trunk ports, even though the hardware is set to the dot1q trunk. The hardware setting is used to carry more than one VLAN, but the port is still considered an access port that is able to carry one native VLAN and the auxiliary VLAN. The switchport host command can be applied to a multi-VLAN access port on the access switch.


Note

Add a note hereThe switch downloads both the data (native) VLAN and the auxiliary (voice) VLAN to the phone. The IP phone marks any traffic on the voice VLAN by modifying the priority bits in the 802.1Q/p tag to CoS 5 (binary 111), which can later be easily mapped to a Layer 3 marking (for example, DSCP 46 or EF). The trust can also be extended to any CoS markings that may have been set by the attached PC (or can mark these values up or down as desired).


QoS Considerations

Add a note hereTypical campus networks are built with oversubscription in mind. The network usually has multiple possible congestion points where important traffic may be dropped without QoS.

Add a note hereMost campus links are underutilized. Some studies have shown that 95 percent of campus access layer links are utilized at less than 5 percent of their capacity.

Add a note hereThe rule-of-thumb recommendation for data oversubscription is 20:1 for access ports on the access-to-distribution uplink. The recommendation is 4:1 for the distribution-to-core links. When you use these oversubscription ratios, congestion may occur infrequently on the uplinks. QoS is needed for these occasions. If congestion is frequently occurring, the design does not have sufficient uplink bandwidth.

Add a note here Recommended Practices for QoS

Add a note here QoS helps manage oversubscription and speed-transitions in the design. The following are recommended best practices for QoS:

  • Add a note hereDeployed end-to-end to be effective

  • Add a note hereEnsures that mission-critical applications are not impacted by link or transmit queue congestion

  • Add a note hereEnforces QoS policies at aggregation and rate transition points

  • Add a note hereUses multiple queues with configurable admission criteria, and scheduling effective QoS is deployed end-to-end with each layer supporting a role

Add a note hereInternet worms and denial-of-service (DoS) attacks can flood links even in a high-speed campus environment. QoS policies protect voice, video, and mission-critical data traffic while giving a lower class of service to suspect traffic.

Add a note hereAggregation and rate transition points must enforce QoS policies to support preferred traffic and manage congestion. In campus networks, multiple queues with configurable admission criteria and scheduling are required on the LAN ports.

Add a note here Transmit Queue Congestion

Add a note hereThe type of congestion that is most common in a campus network is called transmit-queue (Tx-queue) starvation.

Add a note hereBoth LANs and WANs are subject to Tx-queue congestion:

  • Add a note hereDuring a transition from LAN to WAN, a router has to make the rate transition from 10/100 Ethernet to WAN speeds. When this happens, the router must queue the packets and apply QoS to ensure that important traffic is transmitted first. Tx-queue starvation occurs when incoming packets are received faster than outgoing packets are transmitted. Packets are queued as they wait to serialize out onto the slower link.

  • Add a note hereIn the campus, as the LAN infrastructure transitions from 10 Gb/s or 1 Gb/s uplinks in the distribution layer to 10/100 Gb/s to the desktop, packets must be queued as they wait to serialize out the 10 or 100 Mb/s link.

Add a note hereThe difference between a WAN router and a campus switch is the number of interfaces and the amount of memory associated with each. In the campus, the amount of Tx-queue space is much smaller than the amount of memory available in a WAN router. Because of the small amount of memory, the potential for dropped traffic because of Tx-queue starvation is relatively high.

Add a note here QoS Role in the Campus

Add a note hereQoS features are used to prioritize traffic according to its relative importance and provide preferential treatment using congestion management techniques.

Add a note hereUsing QoS in the campus network design ensures that important traffic such as voice and video is placed in a queue that is configured so that it optimizes memory usage.

Add a note hereHowever, the network should provide an adequate level of service for all network traffic, including lower-priority, best-effort traffic under normal circumstances. For best-effort traffic, there is an implied good-faith commitment that there are at least some network resources available.

Add a note here QoS is also needed to identify and potentially punish out-of-profile traffic such as potential worms, distributed denial of service (DDoS) attacks, and peer-to-peer media-sharing applications that may be placed in a scavenger class and marked with differentiated services code point (DSCP) class selector 1 (CS1). The scavenger class is intended to provide deferential services, or less-than best-effort services, to certain applications. During periods of congestion, scavenger-class traffic is the first to experience Tx-queue starvation and packet loss when the bandwidth is reserved for higher-priority traffic. As demand increases or capacity is reduced, best-effort traffic may also be affected. The minimum goal of high-availability network design is to ensure that high-priority voice, video, and mission-critical data applications are never affected by network congestion.

Add a note here Campus QoS Design Considerations

Add a note hereCampus QoS design is primarily concerned with classification, marking, and policing, as illustrated in Figure 2-38.

Image from book
Add a note hereFigure 2-38: Campus QoS Design Considerations

Add a note hereQueuing is enabled at any node that has the potential for congestion. The edge traffic classification scheme is mapped to the upstream queue configuration. The applications are classified and marked as close to their sources as technically and administratively feasible. Traffic flows are policed as close to their sources as possible.

Add a note hereMultiple queues are the only way to guarantee voice quality, protect mission-critical data, and throttle abnormal sources:

  • Add a note hereVoice needs to be assigned to the hardware priority queue. VoIP deployments require provisioning-explicit priority servicing for VoIP traffic and a guaranteed bandwidth service for call-signaling traffic. Strict-priority queuing is limited to 33 percent of the capacity of the link.

  • Add a note hereAt least 25 percent of the bandwidth of the link is reserved for the default best-effort class, which is the default class for data traffic. Under normal circumstances, the network should provide an adequate level of service for best-effort traffic.

  • Add a note here Scavenger traffic needs to be assigned its own queue with a low threshold to trigger aggressive drops. Applications assigned to this class have little or no contribution to the organizational objectives of the enterprise. Assigning a minimal bandwidth queue to scavenger traffic forces it to be squelched to virtually nothing during periods of congestion, but allows it to be available if bandwidth is not being used for business purposes, which might occur during off-peak hours.


Cisco Catalyst Integrated Security Features

Add a note hereThe Cisco Catalyst Integrated Security capabilities provide campus security on the Cisco Catalyst switches through the use of integrated tools:

  • Add a note herePort security prevents MAC flooding attacks.

  • Add a note hereDHCP snooping prevents client attacks on the DHCP server and switch.

  • Add a note hereDynamic ARP Inspection adds security to ARP using the DHCP snooping table to minimize the impact of ARP poisoning and spoofing attacks.

  • Add a note hereIP Source Guard prevents IP spoofing addresses using the DHCP snooping table.

Add a note here Port Security Prevents MAC-Based Attacks

Add a note herePort security can be used to prevent MAC-based attacks.

Add a note hereA MAC-based attack occurs when an attacker sends out floods of MAC addresses to a switch to overload the CAM table. When the CAM table limit is reached, the switch can no longer keep track of legitimate addresses and starts flooding all information to all ports.

Add a note herePort security enables a network administrator to restrict the MAC addresses allowed or the maximum number of MAC addresses on a per-port basis. The allowed MAC addresses on a given port can be either statically configured by the administrator or dynamically learned by the switch. A security violation occurs when either the maximum number of MAC addresses on a given port is exceeded or a frame with a nonsecure source MAC address is seen on that port. The port is then shut down, or alternatively, a Simple Network Management Protocol (SNMP) trap is generated. Aging with either inactivity or a predefined time interval can be configured with port security for the dynamic or static secure MAC addresses.


Note

Add a note hereWhen a port security violation occurs, the port will take one of three actions, depending on how the port is configured: The port will be shut down (Shutdown), frames will simply be ignored (Protect), or the frames will be ignored and the violation counter incremented (Restrict).

Add a note here DHCP Snooping Protects Against Rogue and Malicious DHCP Servers

Add a note here DHCP snooping can be used to protect against rogue and malicious DHCP servers.

Add a note hereIn some cases, an intruder can attach a server to the network and have it assume the role of the DHCP server for that segment. This enables the intruder to give out false DHCP information for the default gateway and domain name servers, which points clients to the hacker’s machine. This misdirection enables the hacker to become a “man in the middle” and to gain access to confidential information, such as username and password pairs, while the end user is unaware of the attack. DHCP snooping can prevent this. DHCP snooping is a per-port security mechanism used to differentiate an untrusted switch port connected to an end user from a trusted switch port connected to a DHCP server or another switch. It can be enabled on a per-VLAN basis. DHCP snooping allows only authorized DHCP servers to respond to DHCP requests and to distribute network information to clients. It also provides the ability to rate-limit DHCP request on client ports, thereby mitigating the effect of DHCP DoS attacks from an individual client or access port.

Add a note here Dynamic ARP Inspection Protects Against ARP Poisoning

Add a note hereDynamic ARP Inspection can provide protection against ARP poisoning.

Add a note hereARP does not have any authentication. It is quite simple for a malicious user to spoof addresses by using tools such as ettercap, dsniff, and arpspoof to poison the ARP tables of other hosts on the same VLAN. In a typical attack, a malicious user can send unsolicited ARP replies (gratuitous ARP packets) to other hosts on the subnet with the attacker’s MAC address and the default gateway’s IP address. Frames intended for default gateways sent from hosts with poisoned ARP tables are sent to the hacker’s machine (allowing the packets to be sniffed) or an unreachable host as a DoS attack. ARP poisoning leads to various man-in-the-middle attacks, posing a security threat in the network.

Add a note hereDynamic ARP Inspection helps prevent the man-in-the-middle attacks by not relaying invalid or gratuitous ARP replies out to other ports in the same VLAN. Dynamic ARP Inspection intercepts all ARP requests and all replies on the untrusted ports. Each intercepted packet is verified for valid IP-to-MAC bindings, which are gathered via DHCP snooping. Denied ARP packets are either dropped or logged by the switch for auditing, so ARP poisoning attacks are stopped. Incoming ARP packets on the trusted ports are not inspected. Dynamic ARP Inspection can also rate-limit ARP requests from client ports to minimize port scanning mechanisms.

Add a note here IP Source Guard Protects Against Spoofed IP Addresses

Add a note hereIP Source Guard is a unique Cisco IOS Software feature for Catalyst switches that helps mitigate IP spoofing.

Add a note hereIP Source Guard prevents a malicious host from attacking the network by hijacking its neighbor’s IP address. IP Source Guard provides per-port IP traffic filtering of the assigned source IP addresses at wire speed. It dynamically maintains per-port VLAN ACLs based on IP-to-MAC-to-switch port bindings. The binding table is populated either by the DHCP snooping feature or through static configuration of entries. IP Source Guard is typically deployed for untrusted switch ports in the access layer.

Add a note here Example Catalyst Integrated Security Feature Configuration

Add a note here This configuration snippet shows the commands to enable the Catalyst Integrated Security features.

Add a note hereip dhcp snooping
ip dhcp snooping vlan 2-10
ip arp inspection vlan 2-10
!c
interface fastethernet3/1
switchport port-security
switchport port-security max 3
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
ip arp inspection limit rate 100
ip dhcp snooping limit rate 100
ip verify source port-security
!
interface gigabit1/1
ip dhcp snooping trust
ip arp inspection trust

Summary

Add a note here This chapter examined design models for high availability and fast convergence for the hierarchical layers of the Cisco Enterprise Campus Architecture. High availability in the campus minimizes convergence time after link and node failures with appropriate redundancy.

Add a note hereVLANs should not span access switches in the campus for predictable fast convergence. Layer 2 designs use RTSP when STP is required, define primary and secondary root switches, and use the Cisco STP toolkit to harden Layer 2. Trunks and channels are tuned for predictable fast convergence. Aggressive mode UDLD is configured on all fiber links.

Add a note hereOversubscription and bandwidth are managed to minimize complexity and provide deterministic behavior. Layer 3 designs should load balance traffic over redundant equal-cost links built on triangles, not squares. Routing protocols should peer only on transit links, and summarize at the distribution layer. HSRP and GLBP support fast convergence for end devices.

Add a note hereThe Layer 2 to Layer 3 boundary is typically at the distribution layer, but it can be placed at the access layer. Campus network designs should avoid daisy chaining access layer switches, provide appropriate redundancy, and avoid asymmetric flooding.

Add a note hereInfrastructure service considerations such as IP telephony and QoS impact the end-to-end network. The access layer supports device attachment, inline power for devices, and multi-VLAN access ports. End-to-end QoS helps manage oversubscriptions and network speed transitions. Tx-queue starvation is the most common campus congestion issue. Cisco Catalyst Integrated Security features provide security at the network edge.

0 comments

Post a Comment