Let us see where they fit in the data center architectures as listed in here.
You might have heard the term 'Network Services Layer'. This particular area contains network security devices, ADCs and WAN optimization devices. Many traditional data centers don't have this layer, but newer data centers have this layer. This layer works in conjunction with Core switching layer.
Core switches are expected to be configured to pass the selective traffic to network services layer. There is no change expected in access switch layer or SAN switch layer. One can have security at these layers too for additional security, but I guess it will be some more time before data center administrators add any additional security at access level.
Before getting into the details of capabilities of core switches, devices in network switch layer, let us first visit the addressing of typical data centers:
Many time private IP addresses are used for servers. Though public IP address can be assigned to server(s) if there is only one for a domain name or in case of DNS load balancing, it is my observation that many times only private IP addresses are assigned. There are several reasons:
- If there is a need in future to expand to multiple servers due to load or high availability considerations, no changes would be necessary except for some configuration in ADCs and bring up new server (or virtual machine).
- Many times, servers need to communicate with other internal servers such as database servers, SANs, application servers etc.. . Private network gives comfort of security as well as reduce the need for number of public IP addresses.
- For a given domain name, multiple services may need to be exposed. Also, for each service, different physical server or different virtual machine may be required. Private IP addressing with ADCs translating to right private IP address on incoming connections help in facilitating this. If public IP address is used, then all services need to be put in same physical server or virtual machine.
It is important to understand how ADCs are deployed first:
Small data centers don't have two tier architecture of switches. Jut a simple ADC is good enough. This acts as switch as well as Load balancer. ADCs have L2 switch and one or more Ethernet MACs. Ethernet MACs are connected to the network that gets connected to the WAN links and servers get connected to the L2 switch. Basically, in simple deployments ADC acts as access layer switch on server side and Core router/switch on the core network side. Let us call this as 'simple data center'.
In complex data centers or in public data centers, two tier architectures are required. In this case, core switches are configured to pass the traffic coming from core network to the ADCs and traffic from server network to ADCs for load balancing purposes. Traffic from server network might go to ADCs without any special configuration in core switches if the client to server packets were translated with SNAT. Due to this SNAT, server to client traffic will have DIP as the ADC ip address and hence packets will go to ADCs without any special configuration in the core switches. Data centers are complex because it needs to handle large amount of traffic and/or has large number of server farms. Due to this, some times one ADC may not be enough to take the load of all server farms. Multiple ADC devices are used in those cases with each ADC handling traffic belonging to few server farms. In these cases, core switches are expected to provide facilities to segment the traffic on server farm basis and redirect the traffic to ADCs for balancing the traffic across servers within server farm. To give an example: If a data center has 100 server farms and 10 ADCs, then the core switch should have capability of segmenting the traffic 100 ways and passing 10 sets of traffic to appropriate ADCs. This is typically achieved via VLANs.
As discussed above each server farm is identified on incoming traffic (from core network) by public IP address (resolved IP of domain name) and the port. If there are 100 server farms, then 100 VLAN IDs are required. Core switches can be configured to generate VLAN ID based on the incoming traffic. Core switches have this capability called 'rules'. Rule can be created with selectors (in this case destination IP and destination port) and action as 'redirect' with VLAN ID and Port on which to transmit. Switches, when the traffic matches with this kind of rule, adds VLAN ID to the packet and transmits the packets on the port indicated in the rule.
Let us take an example of public data center. Let us assume that there are two domain names - www.example1.com (P1 public IP address) and www.example2.com (P2 public IP address) www.example1.com has two services - Port 80 and Port 25. www.example2.com has one one service - Port 80. Example1 company wanted four servers - P11, P12, P13, P14 to serve Port 80 content and 1 server for Port 25. Example2 has two servers P21 and P22 to server port 80 content. It was decided to use ADC1 and ADC2 with ADC1 handling two server farms of www.example1.com and ADC2 handling www.example2.com server farm. Let us also assume that ADCs are deployed in two-arm mode. On one arm it expects client-to-traffic to land and another arm it expects server to client traffic land. Let us assume that VLAN11 and VLAN12 are for client and server traffic of www.example1.com. And VLAN21 and VLAN22 are for client and server traffic of www.example2.com. Let us also assume that two physical ports PR11 & PR12 and PR21 & PR22 are used to connect to ADC1 and ADC2 respectively.
In above deployment, core switch cluster is expected to be configured with following rules:
- On ports that are towards the Internet:
- Source IP : ANY Destination IP: P1 Destination Port : 80 or 25 --------> Add VLAN11 and send on PR11.
- Source IP : ANY Destination IP: P2 Destination Port : ANY --------> Add VLAN21 and send on PR21.
- On ports that are toward the Servers
- Source IP: P11 Subnet, Destination IP: ANY, Source Port 80, 25 ----> Add VLAN12 and send on PR12.
- Source IP: P21 Subnet, Destination IP: ANY -------> Add VLAN22 and send on PR22.
Network Security Devices and WAN Optimization devices also can be deployed in similar way. It is good if all functions are available in the same device. This would only require one set of VLAN configuration in the switch. If these devices are independent to each other, then switch need to configure multiple VLANs to pass traffic from one device to another via switch. If routing is allowed, then the one device can have route to another device and switch will pass the traffic from one system to another as any switch do.
In above example, ADC1 is handling two server farms. But it is also possible to divide these two servers across two different ADCs even though they belong to same domain. As long as service is different, it should be possible. It is also possible to use one ADC for multiple domain names too. In this case, ADCs or network security devices provide 'virtual instance' to ensure that traffic of two different domain names are independent and isolated. I am too lazy to type in the configuration required on switches for these two configurations, but I think you got the picture :-)