From de654a4def20ef457d2a35669a825b20f6482fa8 Mon Sep 17 00:00:00 2001 From: HHDocs Date: Mon, 8 Jul 2024 06:02:41 +0000 Subject: [PATCH] Deployed 40831f1 to dev with MkDocs 1.5.3 and mike 1.1.2 --- dev/architecture/fabric/index.html | 10 +++++----- dev/reference/profiles/index.html | 4 ++-- dev/search/search_index.json | 2 +- dev/sitemap.xml.gz | Bin 470 -> 470 bytes dev/user-guide/connections/index.html | 6 +++--- dev/user-guide/external/index.html | 16 +++++++++------- dev/user-guide/shrink-expand/index.html | 6 +++--- dev/vlab/demo/index.html | 6 +++--- 8 files changed, 26 insertions(+), 24 deletions(-) diff --git a/dev/architecture/fabric/index.html b/dev/architecture/fabric/index.html index 713a78d..1b2781a 100644 --- a/dev/architecture/fabric/index.html +++ b/dev/architecture/fabric/index.html @@ -1370,15 +1370,15 @@

Spine-Leaf

underlay network.

Overlay Network

The overlay network runs on top the underlay network to create a virtual network. The overlay network isolates control -and data plane traffic between different virtual networks and the underlay network. Visualization is achieved in the +and data plane traffic between different virtual networks and the underlay network. Virtualization is achieved in the Hedgehog Fabric by encapsulating workload traffic over VXLAN tunnels that are source and terminated on the leaf switches in the network. The fabric uses BGP-EVPN/VXLAN to enable the creation and management of virtual networks on top of the physical one. The fabric supports multiple virtual networks over the same underlay network to support multi-tenancy. Each virtual network in the Hedgehog Fabric is identified by a VPC. The following subsections contain a high-level overview of how VPCs are implemented in the Hedgehog Fabric and its associated objects.

VPC

-

The previous subsections have described what a VPC is, and how to attach workloads to a specific VPC. Here comes a -description of how VPCs are actually implemented on the network to provide the view of a private network.

+

The previous subsections have described what a VPC is, and how to attach workloads to a specific VPC. The following bullet points +describe how VPCs are actually implemented in the network to ensure a private view the network.