In the following documentation, you will find the recommended configuration procedure for Bridge Domains. In it, you will find several application scenarios and the resulting settings for ARP flooding and other parameters as well.
This document also includes a detailed explanation of what the ARP flooding parameter does and how it actually works. This should give a well-rounded view of what should be done in most cases.
Iâd like to ask about this passage:
"With SDN, we use a central controller for the control plane. Depending on the vendorâs SDN solution, this could mean that the SDN controller takes over the control plane 100% or that it only has insight in the control plane of all network devices in the network. "
So there are no routing and MAC address tables on the networking devices? If thatâs the case, then do the routers and switches have to query the SDN every single time a packet or frame has to be forwarded? How do they know how to locate the SDN if all of their local tables are empty? Or isnât it the case that there are still local routing and MAC address (and ARP) tables on the devices, but their entries arenât populated by the given device, but by the SDN?
Network devices still maintain MAC address tables as well as routing tables to fulfil their functionality. When we say that there is a âcentral controller for the control planeâ it doesnât mean that the central controller performs all of the control plane functions. Conversely, it centralizes the management of the control plane.
So you donât have to go into every router to configure OSPF or BGP, and you donât have to go into every switch to configure port security, or you donât have to go into every firewall and apply security policies. All of these are configured at the controller, and the controller will then instruct all of the network devices on how to modify their configurations to fulfil the requirements.
Practically, this means that you as a network administrator will be able to manage the network (composed of dozens of switches, routers, firewalls, access points etcâŠ) from a single control panel rather than needing to go into every device separately to modify its operation. Does that make sense?