EMAIL SUPPORT

dclessons@dclessons.com

LOCATION

US

LISP

Locator ID Separation Protocol 

LISP is Location ID separation Protocol which acts as overlay for Intelligent branch Solution while implementing SD-Access.

It is very much used in SD-Access, providing overlay solution for SD-Access fabric. This LISP course will enable to learn about LISP Architecture, LISP Control Plane & data Plane, LISP traffic Flow and LISP Host mobility solution. This is the best LISP trainig course or LISP Training provides you very deep-dive concept of every topic along with CLI command line example and also helps you to understand Configure & Troubleshoot LISP Protocol.

This LISP training also contains best Cisco LISP lab configuration in all major concepts , Configuration are well written and tested as per Cisco LISP lab standard. 

Course Pedagogy:

The Course Pedagogy will help you to learn the following concepts on Configure & Troubleshoot LISP Protocol on Cisco  Nexus 7000 series Switches Hardware Platform.

  • LISP Architecture
  • LISP Control & Data Plane Fundamentals
  • LISP Host Mobility Solution
  • LISP Host mobility with Extended subnet
  • LISP Host Mobility across Subnet.

LISP is said to be Locator/ID Separation Protocol, which enables separation of Location of End points and its identity while sending the traffic. LISP can be used as Overlay protocol for SD-Access branch network.

There are two namespaces which LISP uses in it operation:

  • Identity Namespaces
  • Location Name Spaces

Identity Namespaces:

Each endpoints network host in LISP is allocated with a unique identity or address to identify endpoints from each other in Identify Namespace called as EID namespaces.  It can be looked like person name, which don’t have enough information to send traffic to destination but is used to find the desired location of Network host.

Location Namespaces:

Network devices to which host are connected are assigned address in Location namespaces. It can be looked like building are assigned a street address, this Location Namespace in LISP is also treated as routing locator (RLOC) namespaces. These address in RLOC are fully routable and all those network devices in RLOC namespaces are involved in sending data traffic to each other.

LISP protocol manages database which contains Identity and Location name space are mapped each other.

LISP Protocol is Overlay protocol which has two plane used to send data traffic successfully from source to destination. These two plane on any Overlay services are as follows:

  • Virtual network in Overlay plane.
  • Transport network in underlay plane.

This can be very well understood by below diagram

Underlay plane is traditional network consist of Switches , Router running switching and routing protocols to provide reachability between each other or each other sites. This plane does not information about end points connected to network.  In LISP term Underlay plane handles routing only between RLOC address.

Overlay plane is a virtual network service which runs on top of underlay network, when traffic is send between hosts, it is tunneled between Network Edge devices via underlay network. To tunnel host traffic, edge device must know to which Network edge the destination host is connected to and this can be achieved by Location and Identity namespace. The process of mapping identity to location so that traffic can be encapsulated to destination location is called as map & Encapsulate.

LISP basically runs between edge of network, and these LISP edge routers are called as tunnel routers and its role is determined by direction of traffic, when the traffic is at ingress it is called as Ingress tunnel Router (ITR) and when traffic is egress from LISP overlay it is said as Egress Tunnel Router (ETR).

To be on more specific side, an ITR encapsulate the EID traffic and tunnel it, transport it over RLOC underlay, in term of packet header, the inner header will be EID name space and outer header will be RLOC name space.

The resolution of Host EID name space to Location name Space is just like or similar to DNS resolution.

ITR does not have any local copy of mapping of all EID that wants to send traffic, instead when ITR receives the any traffic for particular destination EID, it request the mapping of destination EID and its location from LISP Mapping database system, When request is received by LISP mapping database system, it replies specific mapping to ITR and then ITR encapsulate and forward traffic over LISP overlay tunnel and cache this information to its local Mapping database table.

In local mapping database, EID can be single host or entire EID prefix. Following figure explains what we have learned above.

Note: ( Refer before Purchase )

  • We don't offer Any Hands-On labs for practice in this course.
  • Lab discussed here contains different Scenarios, task & Its recorded Solutions. 
  • Content of each page is 30-40% visible for Customer verification about content.
  • Before any purchase , verify content then proceed,VLT is in progress,No refund Policy. 
  • For More Detail : Mail dclessons@dclessons.com , FAQ & TC page.

GENERAL FAQ

Locator/ID Separation Protocol (LISP) is a network protocol that separates a device's identity (its Endpoint Identifier or EID) from its location (its Routing Locator or RLOC)This separation allows for more scalable and efficient routing, especially in dynamic environments. LISP achieves this by using two distinct namespaces: EIDs for end-hosts and RLOCs for the routers that forward traffic.

 It is the logical, virtualized topology which are built on the top of underlay network. SD-Access Overlay has three main building blocks:

Fabric data Plane: Using VXLAN Protocols to send and receive data packet between source & Destination with Group Policy Option (GPO). VXLAN encapsulation is IP/UDP based and is used as Data plane over LISP because it includes Layer 2 header and also have option to include VNID and Group Segment ID. It also provides advantage for both layer 2 and Layer 3 virtual Overlays.

Fabric Control Plane:  Logical mapping and resolving of users and devices with the help of LISP protocol. Fabric Control plane uses LISP technology , which every router uses in SD-Access fabric to share the all possible end host IP learned by it to Centralized Mapping DB located on MAP server or MAP resolver.

Cisco SD-Access has done lots of enhancement in original LISP specification including distributed Any Cast gateway, Virtual Network (VN) Extranet, Fabric Wireless 

Fabric Policy Plane: Business Intent is translated to Network Policy using SGT (Scalable group Tags) and Group-based policies.

For fabric Policy plane, Cisco trustSec along with SGT and SGT Exchange Protocols (SXP) provides logical group based policy creation and enforcement by separating actual end point “identity “from its actual network IP address using a new ID called as SGT.

LISP (Locator ID Separation Protocol) architecture consists of several key components that operate within the control plane and data plane:

Control Plane Components

  1. Mapping System – Maintains mappings between Endpoint Identifiers (EIDs) and Routing Locators (RLOCs).

  2. Map-Server (MS) – Stores EID-to-RLOC mappings and responds to queries from Map-Resolvers.

  3. Map-Resolver (MR) – Queries the Map-Server to resolve EID-to-RLOC mappings.

  4. Control Plane Nodes – Devices responsible for managing LISP messaging and communication.

Data Plane Components

  1. Ingress Tunnel Router (ITR) – Encapsulates packets from EIDs and forwards them to the appropriate RLOC.

  2. Egress Tunnel Router (ETR) – Decapsulates packets and delivers them to the correct EID.

  3. Proxy Tunnel Router (PxTR) – Facilitates communication between LISP and non-LISP sites.

  4. VXLAN Integration – LISP often works alongside VXLAN for overlay networking

LISP (Locator ID Separation Protocol) separates identity and location namespaces to improve routing efficiency and scalability in networking. Here's how it works:

  • Endpoint Identifiers (EIDs): These are assigned to end hosts (such as computers, printers, or IoT devices) and represent their identity in the network.

  • Routing Locators (RLOCs): These are assigned to routers and define the location of the device within the network.

By decoupling identity from location, LISP enables:

  • Improved mobility: Devices can move across different network segments without changing their identity.

  • Optimized routing: Reduces the size of global routing tables by aggregating RLOCs.

  • Efficient multihoming: Supports multiple connections to different ISPs without complex routing configurations.

In LISP (Locator ID Separation Protocol), the Ingress Tunnel Router (ITR) and Egress Tunnel Router (ETR) play crucial roles in handling packet encapsulation and decapsulation within the overlay network.

Ingress Tunnel Router (ITR)

  • Acts as the entry point for traffic originating from a LISP site.

  • Encapsulates packets from Endpoint Identifiers (EIDs) and forwards them to the appropriate Routing Locator (RLOC).

  • Queries the mapping system to resolve EID-to-RLOC mappings before sending traffic.

  • Ensures efficient routing by caching mapping information.

Egress Tunnel Router (ETR)

  • Serves as the exit point for traffic arriving at a LISP site.

  • Decapsulates packets received from an ITR and delivers them to the correct EID.

  • Registers EID-to-RLOC mappings with the Map-Server to maintain accurate location information.

  • Responds to mapping requests from ITRs to facilitate seamless communication.


Comment

  • RS

    Super Duper Explanation


  • BR

    Excellent LISP course detailed and easy to follow with clear examples.


LEAVE A COMMENT

Please login here to comment.