41-5
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 41 Configuring Campus Fabric
Configuring Fabric Edge Devices
Security Group Tags and Policy Enforcement in Campus Fabric
Campus Fabric overlay propagates source group tags (SGTs) across devices in the fabric domain.
Packets are encapsulated using virtual extensible LAN (VXLAN) and carry the SGT information in the
header. When you configure a Cisco Catalyst 4500-E series switch as an edge device, the
ipv4 sgt
command is auto-generated. The SGT mapped to the IP address of the edge device is carried within the
encapsulated packet and propagated to the destination device, where the packet is decapsulated and the
Source Group Access Control List (SGACL) policy is enforced.
For more information on Cisco TrustSec and Source Group Tags, see
Cisco TrustSec Switch
Configuration Guide
.
Auto-Configured Commands on Fabric Edge Devices
As a part of Fabric Overlay provisioning, some LISP-based configuration, SGT (security group tag)
configuration and endpoint to uplink interface mapping configuration is auto-generated, and is displayed
in your running configuration.
For example, consider this configuration scenario for an edge device (loopback address 2.1.1.1/32):
device(config)#fabric auto
device(config-fabric-auto)#domain default
device(config-fabric-auto-domain)#control-plane 192.168.1.4 auth-key example-key1
device(config-fabric-auto-domain)#control-plane 192.168.1.5 auth-key example-key2
device(config-fabric-auto-domain)#border 192.168.1.6
Step 5
Switch(config-fabric-auto-domain)#
border
ipv4 address
Specifies the IP address of the border device, to allow the edge device to
communicate with the fabric border device.
You can specify up to 2 border IP addresses for the edge device.
Step 6
Switch(config-fabric-auto-domain)#
context name
eg-context
ID
ID
Creates a new context in the fabric domain and assigns an ID to it.
Contexts or VRFs provide segmentation across IP addresses, allowing for
overlapped address space and traffic separation. You can configure up to
32 contexts in the fabric domain. This step is mandatory if you want to
associate a context to a host-pool.
Step 7
Switch(config-fabric-auto-domain)#
host-pool name
name
Creates an IP pool to group endpoints in the fabric domain, and enters
host-pool configuration mode.
Step 8
Switch(config-fabric-auto-domain-ho
st-pool)# host-vlan
ID
Configures a VLAN ID to associate with the host-pool.
Step 9
Switch(config-fabric-auto-domain-ho
st-pool)# context name
name
(Optional) Associates the context or VRF you created with the host-pool.
Step 10
Switch(config-fabric-auto-domain-ho
st-pool)# gateway
IP address/mask
Configures the routing gateway IP address and the subnet mask for the
host-pool. This address and subnet mask are used to map the endpoint to
the uplink interface connecting to the underlay.
Step 11
Switch(config-fabric-auto-domain-ho
st-pool)# use-dhcp
IP address
Configures a DHCP server address for the host-pool. You can configure
multiple DHCP addresses for your host-pool. To delete a DHCP server
address, use the
no use-dhcp
IP address
command.
Step 12
Switch(config-fabric-auto-domain-ho
st-pool)# end
Returns to Privileged EXEC mode.
Step 13
Switch# show fabric domain
Displays your fabric domain configuration.
Command
Purpose
Summary of Contents for Catalyst 4500 Series
Page 2: ......
Page 4: ......
Page 2086: ...Index IN 46 Software Configuration Guide Release IOS XE 3 9 0E and IOS 15 2 5 E ...