17
Cross-fabric service chain
Figure 18 Cross-fabric service chain
Data packets must pass different service nodes when they are transmitted on a traditional network.
This ensures that the network provides users with secure, quick, and stable network services in
accordance with the design requirements. The network traffic passes through these service nodes
(typically, security devices such as firewalls, load balancers, and third-party security devices) in
accordance with the preset order required by the service logic. This workflow constitutes a service
chain.
In the IMC Orchestrator SDN network, the Overlay network is separated from the Underlay network,
and the Overlay network is carried by the Underlay network. HPE IMC Orchestrator can guide traffic
to pass through service nodes and forward traffic to these service nodes in a flexible, convenient,
efficient, and secure way. The entire process is irrelevant to the network topology and constitutes
the service function chaining of the Overlay network defined in SDN.
According to the deployment method, cross-fabric service chains include the following types:
• The security nodes of a service chain are in one fabric. Only one DC/fabric service chain is
selected. Traffic on the service chain is marked and forwarded as follows:
a. The local Service-leaf device classifies the traffic, attaches a service chain label to the
traffic, and specifies a next hop.
b. The ED node forwards DCI traffic.
Additionally, the ED can act as a proxy forwarding node, which can identify the service chain
label in the traffic, and specify the next hop for the traffic. For example, if the source signature
group and the service chain are in the same DC, the reverse service chain must support the
proxy forwarding node to identify the service chain label in the traffic, remark the service chain
label, and specify the next hop.
• The security nodes of a service chain are in two DCs/fabrics. Traffic on the service chain is
marked and forwarded as follows: