Manual Chapter :
Introduction to BIG-IP Service Function Chaining
Applies To:
Show VersionsBIG-IP LTM
- 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0, 15.1.9, 15.1.8, 15.1.7, 15.1.6, 15.1.5, 15.1.4, 15.1.3, 15.1.2, 15.1.1, 15.1.0, 15.0.1, 15.0.0, 14.1.5, 14.1.4, 14.1.3, 14.1.2, 14.1.0
BIG-IP PEM
- 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0, 15.1.9, 15.1.8, 15.1.7, 15.1.6, 15.1.5, 15.1.4, 15.1.3, 15.1.2, 15.1.1, 15.1.0, 15.0.1, 15.0.0, 14.1.5, 14.1.4, 14.1.3, 14.1.2, 14.1.0
Introduction to BIG-IP Service Function Chaining
Introducing Service Function Chaining
A
service function chain
(SFC) defines an ordered set of abstract service
functions and ordering constraints. These service functions and constraints are applied
to packets, frames, and/or flows, as a result of traffic-flow classification.Components of a service function chain
A service chain deployment contains these logical components:
- Service Classifier Function (SCF)
- A node responsible for matching traffic flows against policies, specifying the chain, and inserting the Network Service Header (NSH) encapsulation.
- Service Function Forwarder (SFF)
- A node responsible for forwarding traffic to one or more connected service functions, according to information carried in the NSH encapsulation. An SFF also handles traffic coming back from a service function.
- Service Function (SF)
- A function responsible for specific treatment of received packets.
Service function chaining models
The current service function deployment models are relatively static, coupled to network
topology and physical resources. This greatly reduces or eliminates the ability of an
operator to introduce new services or dynamically create service function chains.
In the traditional operation, adding or removing a service function requires the network
administrator to change the underlying network topology. Changing the topology:
- Causes downtime
- Is prone to errors
- Results in a topology that is still static
For example, consider a service provider that provides these two services to customers:
- Unlimited 4G LTE data plan
- Parental control
A network without SFC
Here is a network topology that provides the unlimited data plan
service and parental control service, but without SFC.
All customer traffic passes through
BIG-IP Policy Enforcement Manager (PEM), followed by the node that throttles
bandwidth and applies parental control before hitting the internet.
This
topology has drawbacks:
- Traffic passes through all nodes, whether the service is purchased or not by the customer.
- Each service node must identify the customer and the services purchased, whether the service is to be applied or not. This results in redundant work for the service node.
- Even when the service is not applied, system resources are still consumed.
A network with SFC
This image depicts a network topology that
provides the unlimited data plan service and parental control service, but includes
SFC.
- The orange line denotes the traffic flow for customers who purchased parental control only.
- The blue line denotes the traffic flow for customers who didn’t purchase any service (the parental control or the unlimited data plan).
SFC ensures that each flow is subjected to only the services purchased for that
flow.