Cisco Active Network Abstraction Reference Guide, 3.7.2
Cisco ANA VNE Topology

Table Of Contents

Cisco ANA VNE Topology

Supported Topology Types

ATM

BFD

BGP

Business

Ethernet

LAG

Frame Relay

MPLS

PPP or HDLC

MLPPP

VLAN

Physical Layer

Pseudowire

GRE Tunnel

VPN

Discovery Techniques

ATM VC Counters

Same Active VCs

VC Traffic Signature

CDP (Cisco Discovery Protocol)

LLDP (Link Layer Discovery Protocol)

PNNI Information

BFD Session Source and Destination

BGP Information

MAC

REP

LACP

OAM

MLPPP Endpoint Identifier

GRE Tunnel Information

Pseudowire Information

VLAN ID Matching

Route Targets

Physical Layer Counters

IP Testing

STP (Spanning Tree Protocol)


Cisco ANA VNE Topology


This chapter describes the types of topologies Cisco ANA supports and how Cisco ANA discovers and displays them, as follows:

Supported Topology Types

Discovery Techniques

Supported Topology Types

The following topology types are supported by Cisco ANA 3.7.2:

ATM

BFD

BGP

Business

Ethernet

LAG

Frame Relay

MPLS

PPP or HDLC

Physical Layer

Pseudowire

GRE Tunnel

VPN

ATM

ATM topology represents a link between two ATM ports which are connected in the network. In the VNE model, the endpoints of the link are ATM IMOs (ATM Interface (IAtm)) which represent the ATM port or interface.

Link type: ATM or PNNI

Discovery technique for ATM link:

ATM VC Counters

CDP (Cisco Discovery Protocol)

Static

Verification Technique: Physical Layer Counters

Discovery technique for PNNI link:

PNNI Information

BFD

BFD topology represents a BFD session with verified BFD connectivity between two endpoints in the network. In the VNE model, the endpoints of the link are the BFD Service IMOs (BFD Service (IBfdService)), which represent the BFD service running on the router.

Link type: BFD

Discovery and verification technique: BFD Session Source and Destination

BGP

BGP topology represents a TCP connection between two BGP entities which facilitate the "BGP neighborhood" in the network. In the VNE model, the endpoints of the link are the MPBgp IMOs (Multi Protocol BGP Entity), which represent the BGP service running on the router.

Link type: BGP

Discovery and verification technique: BGP Information

Business

Business topology does not represent any specific link or relationship in the network. It can represent the relationship between any two objects in the model, which can be business objects or network objects. These links are created in the Cisco ANA gateway.

Ethernet

Ethernet topology represents a link between two Ethernet ports which are connected in the network. In the VNE model the endpoints of the link are Ethernet IMOs (Ethernet Interface (IEthernet)), which represent the Ethernet ports.

Cisco ANA conducts discovery of Ethernet data link layer topology by using various types of data. This includes information from, for example, OAM, CDP, LLDP, STP, and can include MAC learning information. All types of data are collected and, based on priority, used to verify the adjacency between two ports.

Many service providers configure customer access to VLAN ports using L2PT. This avoids the need to process Layer 2 protocols such as CDP. In these scenarios, discovery may create links between ports which are not directly connected, because the Layer 2 protocol information is tunneled and does not reflect the actual physical links. This problem can be overcome by configuring static links on these ports. These static links will override any incorrect dynamically discovered links.

Link type: Ethernet

Discovery techniques:

OAM

MAC

CDP (Cisco Discovery Protocol)

LLDP (Link Layer Discovery Protocol)

STP (Spanning Tree Protocol)

REP

Static

Verification Technique: All of the above discovery techniques and Physical Layer Counters.

LAG

LAG topology represents a link between two LAG or EtherChannel ports which are connected in the network. The underlying physical links do not have to be discovered for the LAG link to be discovered.

In the VNE model the endpoints of the link are indicated in the Data Link Aggregation Container (IDataLinkAggregationContainer) IMO, which points to the LAG or EtherChannel ports.

Link type: LAG

Discovery and verification techniques:

MAC

STP (Spanning Tree Protocol)

REP

LACP

Static

Frame Relay

Frame Relay topology represents a link between two Frame Relay ports which are connected in the network. In the VNE model the endpoints of the link are FrameRelay IMOs (Frame Relay Interface (IFrameRelay/IFrTrunk)), which represent the Frame Relay ports.

Frame Relay links between Cisco devices with CDP enabled can be discovered dynamically. For all other cases, static or manual configuration can be used.

Link type: Frame Relay

Discovery techniques:

CDP (Cisco Discovery Protocol)

Static

Verification Techniques: The above discovery techniques and Physical Layer Counters.

MPLS

MPLS topology represents adjacent MPLS interfaces in the network. These MPLS interfaces forward MPLS (labeled) traffic between them. Labels may be learned using discovery protocols, such as LDP or TDP (Cisco), or may be manually configured. In the VNE model the endpoints of the link are MPLS IMOs (MPLS Interface (IMpls)), which represent the MPLS interfaces.

Cisco ANA discovers MPLS network layer topology by searching for the existence of the local IP subnet in any one-hop-away remote side's MPLS Interface. In particular, it compares the local and remote IP subnets gathered from the upper IP network layers.

Link type: MPLS

Discovery and verification techniques: IP Testing

PPP or HDLC

PPP or HDLC topology represents a link between two PPP or HDLC ports which are connected in the network. In the VNE model the endpoints of the link are PPP and HDLC IMOs (HDLC Encapsulation (IEncapsulation), which represent the ports.

Cisco ANA performs discovery of PPP or HDLC topologies by searching for the local IP subnet in any one-hop-away remote side's PPP or HDLC interface. In particular, it compares the local and remote IP subnets gathered from the upper IP Network layers.

Discovery techniques:

IP Testing

CDP (Cisco Discovery Protocol)

Static

Verification Techniques: The above discovery techniques and Physical Layer Counters.

MLPPP

The Multilink PPP Interface object models a multilink PPP bundle, which is a named virtual interface with multiple member links.

Discovery and Verification Technique: MLPPP Endpoint Identifier.

VLAN

Discovery and Verification Technique: VLAN ID Matching.

Physical Layer

Physical Layer topology represents a link between the physical layers of two ports connected in the network. In the VNE model the endpoints are IMOs which inherit from the physical layer (Layer 1) IMOs (Serial Interface (IPhysicalLayer)), such as SONET/SDH Physical (ISonetSdh) and DS3 Channelized Interface (IDS3PdhChannelized), which represent physical layers of a port.

In Cisco ANA's topology discovery implementation, physical layer (Layer 1) discovery is coupled with data link layer (Layer 2) discovery. By default, the physical layer does not have techniques for discovery, but rather complements the discovery of Layer 2, in the following ways:

Ports from the same device are not connected (this validation is done in the physical layer).

If static topology is configured, it is used in the physical layer.

Pseudowire

Pseudowire topology represents a link between the endpoints of an MPLS-based pseudowire tunnel in the network. In the VNE model the endpoints of the link are PTP Layer 2 MPLS tunnel IMOs (PTP Layer 2 MPLS Tunnel Interface (IPTPLayer2MplsTunnel)), which represent the pseudowire tunnel endpoints.

Cisco ANA discovers PWE3 Network layer topology by searching for matches between the local and remote router IP addresses in any one-hop-away remote side's PTP Layer 2 MPLS tunnel interface. In particular, it compares the local and remote router IP addresses and tunnel identifications.

Link type: Tunnel

Discovery and verification technique: Pseudowire Information.

GRE Tunnel

GRE Tunnel topology represents a link between the endpoints of a GRE tunnel in the network. In the VNE model the endpoints of the link are TunnelGre IMOs (Generic Routing Encapsulation (GRE) Tunnel Interface (ITunnelGRE)), which represent the GRE tunnel endpoints.

Link type: GRE tunnel

Discovery and verification technique: GRE Tunnel Information.

VPN

VPN topology represents a link between two VRFs that are part of a VPN, meaning that VPN traffic can pass between customer sites connected to these VRFs. In the VNE model the endpoints of the link are VRF IMOs (Virtual Routing Forwarding (VRF) Entity (IVrf)), which represent the VRF forwarding entities in the network element.

Cisco ANA discovers MPLS-BGP-based VPN network topology by searching for the existence of the local VRF entity's imported route targets in any remote side's VRF entity exported route targets.

Link type: VPN or VPNv6

Discovery and verification techniques: Route Targets for either IPv4 or IPv6 address families.

Discovery Techniques

Discovery takes place in two phases:

1. Discovery of existing links.

2. For discovered links, verification that the links still exist.

This section describes the various discovery techniques used by Cisco ANA, as follows:

ATM VC Counters

CDP (Cisco Discovery Protocol)

LLDP (Link Layer Discovery Protocol)

PNNI Information

BFD Session Source and Destination

BGP Information

MAC

REP

LACP

OAM

MLPPP Endpoint Identifier

GRE Tunnel Information

Pseudowire Information

VLAN ID Matching

Route Targets

Physical Layer Counters

IP Testing

STP (Spanning Tree Protocol)


Note All the supported discovery techniques are enabled by default. Only MAC discovery can be disabled using the registry. See the Cisco Active Network Abstraction 3.7.2 Administrator Guide for more information.


ATM VC Counters

Same Active VCs

In this technique, each side identifies a set of active ATM Virtual Connections (VCs) and looks for a match with the same set on another port in the network. An active VC is a VC that has a configured level of traffic.

This technique supports configurations that have either the same VCs or the same VPs on both sides. It does not support a mixture of VCs on one side and VPs on the other side.

VC Traffic Signature

Traffic signature is based on traffic pattern analysis. The underlying assumption of traffic pattern analysis is that network traffic variety ensures that every active link or active ATM VC in the network maintains a differential traffic "fingerprint".

Consequently, any two connected ports or VCs will have similar trend functions, which can be matched within reliable statistical significance.

CDP (Cisco Discovery Protocol)

For Cisco devices, if CDP is enabled, its information will be used for discovery and verification. This includes any upper layer techniques, such as VC-related techniques in ATM or MAC in Ethernet. In this technique, the matching criteria is the CDP neighbor information.

LLDP (Link Layer Discovery Protocol)

If LLDP is enabled, its information will be used for discovery and verification. In this technique, the matching criteria is the LLDP neighbor information.

PNNI Information

In this technique, each port in the ATM switch is identified with two values:

Node ID.

Port ID.

BFD Session Source and Destination

In this technique, the BFD session's source and destination addresses are verified by matching them against the source and destination addresses of the potential adjacent neighbors. The matching is session source to neighbor destination and session destination to neighbor source, respectively, as one side's source is the other side's destination. This method assumes that multiple BFD sessions running on the same router cannot have the same source and destination address.

BGP Information

In this technique, for each BGP Neighbor Entry the local BGP identifier is compared to the remote BGP identifier or a potential neighbor. This topology technique assume uniqueness of the BGP identifier in the network.

MAC

In this technique, the Ethernet port MAC is checked to see if it is the only one learned on the other Ethernet port (using bridge and ARP tables).

This technique discovers links between two routers and links between the router and switch, but not between two switches (includes the generic VNE).

REP

If REP is enabled between switches, the information that is provided by the 'show REP topology' command is used to connect the topology according to the REP configuration.

LACP

If the LAG is configured as LACP, actor and partner system ID are compared between the two devices (local actor = remote partner and vice versa).

OAM

If OAM is configured between two devices, local and remote OAM MACs are compared between the two devices (local OAM MAC = remote OAM MAC and vice versa).

This protocol has the highest priority and hence will be the first to be checked if it is enabled.

MLPPP Endpoint Identifier

In this technique, the Local and the Remote MLPPP End Point Identifier are verified by matching them against the Remote and the Local MLPPP End Point Identifier of the potential adjacent neighbors.

The matching is from the Local MLPPP End Point Identifier to the neighbor Remote MLPPP End Point Identifier respectively.

GRE Tunnel Information

GRE Tunnel Information—In this technique, each GRE tunnel is identified by the following criteria:

1. Source IP.

2. Destination IP.

Matching between two tunnels T1 and T2 is done by comparing the T1 source to the T2 destination and the T1 destination to the T2 source.

Pseudowire Information

In this technique, each pseudowire is identified by the following criteria:

Local and Remote router IP.

Tunnel ID.

Matching between two pseudowire tunnels Pw1 and Pw2 is conducted by comparing:

The Pw1 local IP to the Pw2 remote IP and the Pw1 remote IP to the Pw2 local IP.

Tunnel ID.

VLAN ID Matching

In this technique, the VLAN configuration aspects of each pair of VLAN-enabled physically connected Ethernet ports will be inspected to identify which VLAN tagged traffic crosses this link. The type of VLAN configurations that are inspected include:

Switchport in all configuration modes (Access, Trunk, Dot1q_Tunnel), including the VLAN allowed and VLAN mapping.

L2 sub-interfaces/service instances configured on the Ethernet port, specifically the VLAN tag matching criteria.

L3 sub-interfaces configured on the Ethernet port, specifically the VLAN tag matching criteria.

Route Targets

Route Targets—In this technique, each VRF is identified with the set of its import and export route targets (for either IPv4 or IPv6 address families).

The matching criteria between two VRF entities will be matching at least one pair of import or export route targets of the one VRF to the export or import route targets of the other VRF.

Physical Layer Counters

The physical layer is used for topology verification (that is, if a link has already been discovered, it is tested periodically). This verification is done in the physical layer using counters. Physical layer counters are based on the port traffic signature, using octet-based or octet- and packet-based traffic.

IP Testing

Cisco ANA uses IP testing (IPv4) to discover the topology for PPP/HDCL and MPLS technologies. In both cases, the IP test checks the IP configuration on the relevant interface(s) and verifies that there is a match. In this context, finding a match means that the IP configuration is compared using the primary IP subnet configured on the local and remote interfaces, and the local IP subnet is equal to or contained in the remote IP subnet.

Note that there is an inherent limitation in using only the primary address and mask to define the IP subnet to be compared. This can cause issues if two interfaces are connected but have more than one address and, in either or both cases, the primary is from a different subnet. For example: We have two devices, Device1 and Device2. POS2/1 on Device1 is connected to POS1/1 on Device2. Device1's configuration is:


interface POS2/1
 description Connected to POS1/1 on Device2
 encapsulation ppp ip address 10.0.0.1 255.255.255.252
 ip address 11.0.0.1 255.255.255.252 secondary

Device2's configuration is:


interface POS1/1 description Connected to POS2/1 on Device1
 encapsulation ppp ip address 11.0.0.2 255.255.255.252
 ip address 10.0.0.2 255.255.255.252 secondary

In this case, the two devices will not be connected.

STP (Spanning Tree Protocol)

If STP is enabled between switches, the STP port information is used in the following way: bridge ID, designated bridge, and port identifier are compared with the relevant remote information. If a match is found, a link is created.

This STP discovery technique will work correctly only when the same STP protocol is running on both ports.