BRKCRS 2810
BRKCRS 2810
BRKCRS 2810
BRKCRS-2810
#CLUS
Software Defined Access
Session Abstract
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Sessions are available Online @ CiscoLive.com
Monday (June 10) Tuesday (June 11) Wednesday (June 12) Thursday (June 13)
08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00 08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00 08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00 08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00
BRKARC-2020 BRKARC-2009
Troubleshoot Why SDA
BRKCRS-3811
Policy
BRKEWN-2021 BRKEWN-2020
Live Setup Wireless
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Complex
3 4
Agenda 1 2 5
Time
1 Key Benefits
Why do you care?
2 Key Concepts
What is SD-Access?
3 Fabric Fundamentals
How does it work?
4 Controller Fundamentals
How does it work?
5 Take Away
Where to get started?
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Complex
3 4
1 2 5
Time
Key Benefits
New Requirements for the Digital Age
REDUCE
Innovate FASTER Cost & Complexity
LOWER Risk
Source: 2016 Cisco Study
ACI
Data Center
LEARNING SD-Access
SD-Access
SECURITY
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Cisco Software Defined Access
The Foundation for Cisco’s Intent-Based Network
Cisco DNA Center
One Automated
Network Fabric
Policy Automation Assurance Single fabric for Wired and
Wireless with full automation
Outside
B B
Identity-Based
C
Policy and Segmentation
Policy definition decoupled
from VLAN and IP address
AI-Driven
Insights and Telemetry
SD-Access
Extension Client Mobility Analytics and visibility into
User and Application experience
Policy follows User
IoT Network Employee Network #CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
sioning
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Complex
3 4
1 2 5
Time
Key
Concepts
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
What is SD-Access?
Campus Fabric + Cisco DNA Center (Automation & Assurance)
SD-Access
APIC-EM
NCP
1.X
GUI approach provides automation &
ISE NDP
PI assurance of all Fabric configuration,
Cisco DNA
management and group-based policy
Center
Cisco DNA Center integrates multiple
management systems, to orchestrate
IP LAN, Wireless LAN and WAN access
B B
Campus Fabric
DNA Center
Identity Services Engine Network Control Platform Network Data Platform
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Cisco Digital Network Architecture (DNA)
Powering the Intent Based Network
Cisco DNA
Cloud Service Center
Management
Automation
& Assurance
Automation Analytics
Software Virtualization
Defined Access Security &
Compliance
Insights &
DNA-Ready Physical and Virtual infrastructure
Flexible Hardware & Software Actions
Catalyst 9000, IOS-XE, Access Points
Security
Cisco ISE
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
1. High-Level View
2. Roles & Platforms
3. Fabric Constructs
Roles &
Terminology
SD-Access
What exactly is a Fabric?
A Fabric is an Overlay
An Overlay network is a logical topology used to virtually connect devices,
built over an arbitrary physical Underlay topology.
An Overlay network often uses alternate forwarding attributes to provide
additional services, not provided by the Underlay.
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
SD-Access
Fabric Terminology
Encapsulation
Hosts
(End-Points)
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
SD-Access
Why Overlays?
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
SD-Access
Types of Overlays
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
SD-Access
Fabric Underlay – Manual vs. Automated
Underlay Network
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Would you like to know more?
Routed Underlay
BRKCRS-2812
SD-Access - Integrating with Existing Networks
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Would you like to know more?
Routed Underlay
BRKCRS-2816
SD-Access - Building the Routed Underlay
This session covers:
• More details about Fabric Underlay
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Cisco SD-Access
Fabric Roles & Terminology
Network Automation – Simple GUI
Automation and APIs for intent-based Automation
Identity Cisco DNA Center of wired and wireless fabric devices
Cisco ISE
Services
Network Assurance – Data Collectors
analyze Endpoint to Application flows
Assurance and monitor fabric device status
Identity Services – NAC & ID Services
(e.g. ISE) for dynamic Endpoint to Group
Fabric Border IP Fabric Wireless mapping and Policy definition
Nodes Controllers
B B Control-Plane Nodes – Map System that
manages Endpoint to Device relationships
Control-Plane
Intermediate Fabric Border Nodes – A fabric device
C Nodes
Nodes (Underlay)
(e.g. Core) that connects External L3
network(s) to the SD-Access fabric
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
1. High-Level View
2. Roles & Platforms
3. Fabric Constructs
Roles &
Terminology
SD-Access Fabric
Control-Plane Nodes – A Closer Look
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms The Channelco®
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms
Fabric Control Plane
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
SD-Access @ Cisco DNA Center
Control-Plane Nodes
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Fabric Control Plane - LISP Configuration
router lisp
site site_sda
description map-server configured from dna-center
authentication-key sda
eid-record instance-id 4097 0.0.0.0/0 accept-more-specifics
eid-record instance-id 4098 0.0.0.0/0 accept-more-specifics
eid-record instance-id 4099 0.0.0.0/0 accept-more-specifics
eid-record instance-id 4100 0.0.0.0/0 accept-more-specifics
exit-site
!
ipv4 locator reachability exclude-default
!
service ipv4
map-server
map-resolver
exit-service-ipv4
!
service ethernet
map-server
map-resolver
exit-service-ethernet
!
exit-router-lisp
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
SD-Access Fabric
Edge Nodes – A Closer Look
Edge Node provides first-hop services for Users / Devices connected to a Fabric
IP to RLOC MAC to RLOC Address Resolution
1.2.3.4 FE1 AA:BB:CC:DD FE1 1.2.3.4 AA:BB:CC:DD
B B
• Register specific Endpoint ID info (e.g. /32 or /128)
with the Control-Plane Node(s)
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms The Channelco®
Catalyst 9200 Catalyst 9300 Catalyst 9400 Catalyst 9500 Catalyst 9600
• Catalyst 9200/L* • Catalyst 9300 • Catalyst 9400 • Catalyst 9500 • Catalyst 9600
• 1/mG RJ45 • 1/mG RJ45 • Sup1/Sup1XL • 1/10/25G SFP • Sup1
• 1G SFP (Uplinks) • 10/25/40/mG NM • 9400 Cards • 40/100G QSFP • 9600 Cards
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms
Fabric Edge Node
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
SD-Access @ Cisco DNA Center
Edge Nodes
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Fabric Edge - LISP Configuration
router lisp instance-id 4097
locator-table default remote-rloc-probe on-route-change
locator-set rloc<snip> service ipv4
IPv4-interface Loopback0 priority 10 weight 10 eid-table default
! map-cache 0.0.0.0/0 map-request
locator default-set rloc_e9eed690-<snip snip>f27 exit-service-ipv4
service ipv4 !
encapsulation vxlan exit-instance-id
map-cache-limit 25000 !
database-mapping limit dynamic 5000 instance-id 4098
itr map-resolver 192.168.1.3 remote-rloc-probe on-route-change
etr map-server 192.168.1.3 key uci service ipv4
etr map-server 192.168.1.3 proxy-reply eid-table vrf DEFAULT_VN
etr map-cache 0.0.0.0/0 map-request
sgt exit-service-ipv4
use-petr 192.168.1.3 !
proxy-itr 192.168.1.7 exit-instance-id
exit-service-ipv4 !
! instance-id 4099
service ethernet remote-rloc-probe on-route-change
map-cache-limit 25000 service ipv4
database-mapping limit dynamic 5000 eid-table vrf USERS
itr map-resolver 192.168.1.3 map-cache 0.0.0.0/0 map-request
itr exit-service-ipv4
etr map-server 192.168.1.3 key uci !
etr map-server 192.168.1.3 proxy-reply exit-instance-id
etr
exit-service-ethernet
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
SD-Access Fabric
Border Nodes
Border Node is an Entry & Exit point for data traffic going Into & Out of a Fabric
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms The Channelco®
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms
Fabric Border Node
* EXTERNAL ONLY
• Catalyst 3650/3850 • Catalyst 6500/6800 • Nexus 7700 • ISR 4300/4400 • ASR 1000-X/HX
• 1/mG RJ45 • Sup2T/Sup6T • Sup2E • AppX (AX) • AppX (AX)
• 1/10G SFP • C6800 Cards • M3 Cards • 1/10G RJ45 • 1/10G ELC/EPA
• 1/10/40G NM Cards • C6880/6840-X • LAN1K9 + MPLS • 1/10G SFP • 40G ELC/EPA
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
SD-Access @ Cisco DNA Center
Border Nodes
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Example: CP + Border (External)
Fabric Border - LISP Configuration
router lisp instance-id 4097
locator-table default remote-rloc-probe on-route-change
locator-set rloc<snip> service ipv4
ipv4-interface Loopback0 priority 10 weight 10 eid-table default
auto-discover-rlocs route-export site-registrations
exit-locator-set distance site-registrations 250
! map-cache site-registration
service ipv4 exit-service-ipv4
encapsulation vxlan !
map-cache-limit 25000 instance-id 4098
database-mapping limit dynamic 5000 remote-rloc-probe on-route-change
itr map-resolver 192.168.1.3 service ipv4
etr map-server 192.168.1.3 key sda eid-table vrf DEFAULT_VN
etr map-server 192.168.1.3 proxy-reply route-import database bgp 65001 route-map database locator-set rloc<snip>
etr route-export site-registrations
sgt distance site-registrations 250
proxy-etr map-cache site-registration
proxy-itr 192.168.1.3 exit-service-ipv4
map-server !
map-resolver instance-id 4099
exit-service-ipv4 remote-rloc-probe on-route-change
! service ipv4
service ethernet eid-table vrf USERS
map-server route-import database bgp 65001 route-map database locator-set rloc<snip>
map-resolver route-export site-registrations
exit-service-ethernet distance site-registrations 250
map-cache site-registration
exit-service-ipv4
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Fabric Border - BGP Configuration
router bgp 65001
bgp router-id interface Loopback0
bgp log-neighbor-changes
neighbor 192.168.111.10 remote-as 65002
neighbor 192.168.111.10 update-source Vlan3003
!
address-family ipv4 address-family ipv4 vrf GUEST
network 192.168.1.3 mask 255.255.255.255 redistribute lisp metric 10
redistribute lisp metric 10 neighbor 192.168.111.2 remote-as 65002
neighbor 192.168.111.10 activate neighbor 192.168.111.2 update-source Vlan3001
neighbor 192.168.111.10 weight 65535 neighbor 192.168.111.2 activate
exit-address-family neighbor 192.168.111.2 weight 65535
! exit-address-family
address-family ipv4 vrf DEFAULT_VN !
redistribute lisp metric 10 address-family ipv4 vrf USERS
neighbor 192.168.111.14 remote-as 65002 redistribute lisp metric 10
neighbor 192.168.111.14 update-source Vlan3004 neighbor 192.168.111.6 remote-as 65002
neighbor 192.168.111.14 activate neighbor 192.168.111.6 update-source Vlan3002
neighbor 192.168.111.14 weight 65535 neighbor 192.168.111.6 activate
exit-address-family neighbor 192.168.111.6 weight 65535
exit-address-family
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
SD-Access Fabric
Border Nodes - Internal
B B
• Exports all internal IP Pools to outside (as
aggregate), using a traditional IP routing protocol(s).
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
SD-Access - Border Deployment
Internal Border : Connecting to Known Networks
Data
C Center
B B
Branch
Office
Known Networks
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
SD-Access - Border Deployment
Anywhere Border : SD-Access as a Transit Area
B B
SD-Access Fabric
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
SD-Access Fabric
Border Nodes - External
B B
• Exports all internal IP Pools outside (as aggregate)
into traditional IP routing protocol(s).
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
SD-Access - Border Deployment
External Border : Connecting to Unknown Networks
C Public Cloud
B B
Internet
SD-Access Fabric
Unknown Networks
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
SD-Access - Border Deployment
Why? Internal Traffic with External Borders
Edge Node
IP Network B
Edge Node
IP Network B
B
Traffic to internal domains will go
directly to the Internal Borders.
BRKCRS-2811
SD-Access - Connecting to External Networks
This session covers:
• More details about Fabric Border Nodes
• How Borders communicate to outside networks
• Various Fabric Border design approaches
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Would you like to know more?
External Connectivity
BRKCRS-2815
SD-Access - Deploy a Fabric in Large Enterprise
This session covers:
• More details about Fabric Border Nodes
• How multiple Fabrics communicate
• Various Multi-Site design approaches
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
SD-Access Fabric
Fabric Enabled Wireless – A Closer Look
Fabric Enabled WLC is integrated into Fabric for SD-Access Wireless clients
Ctrl: CAPWAP
Data: VXLAN
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms
Fabric Enabled Wireless
* No IPv6, AVC, FNF
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
SD-Access @ Cisco DNA Center
Fabric Wireless
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Would you like to know more?
Fabric Wireless
BRKEWN-2020
SD-Access - Wireless Integration
This session covers:
• More details about Fabric Wireless
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
SD-Access Extension for IoT
Securely Consolidate IT and IOT
Beta in 1.2.5
DNA Center
Extended Node Portfolio
GA in 1.3
IE3300/3400 IE4000/4010 IE5000
Enterprise Campus
Roles &
Terminology
SD-Access Fabric
Virtual Network– A Closer Look
Virtual Network maintains a separate Routing & Switching table for each instance
B B
• Nodes add a VNID to the Fabric encapsulation
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
SD-Access Fabric
How VNs work in SD-Access
provided by default
INFRA_VN
Devices (Underlay) GRT
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
SD-Access Fabric
How VNs work in SD-Access
ip vrf USERS
rd 1:4099
route-target export 1:4099
route-target import 1:4099
ip vrf DEFAULT_VN
1:4097
should use a “Fusion” router with MP-BGP & VRF import/export. rd 1:4098
route-target export 1:4098
route-target import 1:4098
route-target import 1:4097
SVI B
AF VRF B
ISIS OSPF
B AF VRF A
AF IPv4
MP-BGP
Edge Node Border Node Fusion Router Switch
VRF A
SVI A GRT
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Fabric Edge & Border - VRF Configuration
Edge-1# show vrf
Name Default RD Protocols Interfaces
DEFAULT_VN 1:4098 ipv4 LI0.4098
GUEST 1:4100 ipv4 LI0.4100
Mgmt-vrf <not set> ipv4,ipv6 Gi0/0
USERS 1:4099 ipv4 LI0.4099
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
SD-Access Fabric
Scalable Groups – A Closer Look
B B
• Nodes add a SGT to the Fabric encapsulation
SGT
SGT SGT SGT
• SGTs are used to manage address-independent 17
4
SGT
8 25
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
SD-Access @ Cisco DNA Center
Virtual Networks and Scalable Groups
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
SD-Access @ Cisco DNA Center
Group-Based Access Control Policy
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
SD-Access @ Cisco DNA Center
Group-Based Access Control Policy
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Would you like to know more?
Fabric Policy
BRKCRS-3811
SD-Access - Policy Driven Manageability
This session covers:
• More details about Group-Based Policy
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
SD-Access Fabric
Host Pools – A Closer Look
B B
• Fabric uses Dynamic EID mapping to advertise each
Host Pool (per Instance ID) Pool
Pool
Pool .4 Pool
.17 .8 .25
Pool
• Fabric Dynamic EID allows Host-specific (/32, /128 Pool Pool Pool .19 Pool
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
SD-Access Fabric
Anycast Gateway – A Closer Look
C
• Similar principle and behavior to HSRP / VRRP with Known Unknown
B B
• The same Switch Virtual Interface (SVI) is present
on EVERY Edge with the SAME Virtual IP and MAC
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
SD-Access Fabric
Layer 3 Overlay – A Closer Look
B B
• Fabric Dynamic EID mapping allows Host-specific
(/32, /128, MAC) advertisement and mobility
Dynamic
EID
• Host 1 connected to Edge A can now use the same
IP subnet to communicate with Host 2 on Edge B
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
SD-Access @ Cisco DNA Center
Host Pools & Layer-2 Extension
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Fabric Edge - VN & Pool Configuration
Edge-1# show vrf
Name Default RD Protocols Interfaces
DEFAULT_VN 1:4098 ipv4 LI0.4098
GUEST 1:4100 ipv4 LI0.4100
Mgmt-vrf <not set> ipv4,ipv6 Gi0/0
USERS 1:4099 ipv4 LI0.4099
Vl1021
Edge-1# show interface vlan1021
Building configuration...
Current configuration : 315 bytes
!
interface Vlan1021
description Configured from apic-em
mac-address 0000.0c9f.f45c
vrf forwarding USERS
ip address 10.111.255.254 255.255.0.0
ip helper-address 192.168.4.1
no ip redirects
ip local-proxy-arp
ip route-cache same-interface
no lisp mobility liveness test
lisp mobility 10_111_0_0-USERS
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Endpoint Registration
CP_Border-1# show lisp site instance 4099
LISP Site Registration Information
* = Some locators are down or unreachable
# = Some registrations are sourced by reliable transport
Site Name Last Up Who Last Inst EID Prefix
Register Registered ID
site_sda never no -- 4099 0.0.0.0/0
17:32:21 yes# 192.168.1.3 4099 10.111.0.0/16
01:40:00 yes# 192.168.1.7 4099 10.111.0.3/32
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
SD-Access Fabric
Layer 2 Overlay – A Closer Look
B B
• Uses a pre-built Multicast Underlay to setup a P2MP
tunnel between all Fabric Nodes.
L2
Overlay
• L2 Broadcast and Multicast traffic will be distributed
to all connected Fabric Nodes.
VLAN VLAN VLAN
• Can be enabled for specific Host Pools that require
L2 services (use Stretched Subnets for L3)
NOTE: L3 Integrated Routing and Bridging (IRB) is not supported at this time.
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
SD-Access @ Cisco DNA Center
Layer-2 Flooding
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
SD-Access Multicast Overlay
PIM-SM: Receiver Join to Fabric RP
Multicast Source
non
Multicast Clients (receivers) are in the Fabric Overlay
Fabric
Multicast Sources can be in the Fabric Overlay (via FE)
B and/or outside the Fabric (via FB)
FB
Fabric RP
RP
PIM-SM is enable to run in the Fabric Overlay
Underlay Overlay A Fabric Rendezvous Point (RP) needs to be present in the
Overlay, as part of the Endpoint IP space
PIM Join
1. Client sends IGMP join for any-source multicast Group (*,G)
2. The Fabric Edge (FE) node receives the IGMP join on SVI
FE
3. The IGMP join triggers a new PIM join towards the Fabric RP
IGMP Join
Multicast Client
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
SD-Access Multicast Overlay
PIM-SM: Source Register to Fabric RP
Multicast Source
non
1. The Multicast Source sends the multicast traffic to the
Fabric interfaces connected to the Fabric Border (outside), or
Multicast Traffic
another Fabric Edge (inside), as the DR for that subnet.
B
FB
Fabric RP 2. The source node receives the multicast traffic and triggers
RP an any-source PIM Join (or a PIM register, if local) towards
Underlay Overlay the Fabric RP to establish the multicast tree.
PIM Join
3. The Fabric RP now has both the Source and Receiver
information for the multicast group (G).
FE
Multicast Client
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
SD-Access Multicast Overlay
PIM-SM: RPT Forwarding & Fabric Data-Plane
Multicast Source
1. From earlier: the Fabric RP now has both the Source and
non
Fabric Receiver information for the multicast group (G).
B 2. The source node (FB or FE) will unicast the multicast traffic
FB over a VXLAN tunnel to the Fabric RP.
Fabric RP
3. Then the RP will unicast that traffic to the receiver node
RP
Multicast Client
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
SD-Access Multicast Overlay
PIM-SM: SPT Switchover and Fabric Replications
Multicast Source
non
1. Once the first multicast packet arrives on the receiver
Fabric node, the shortest path tree (SPT) switchover occurs,
which triggers a new PIM join directly to the source node.
B
FB
Fabric RP 2. The source node now knows which receiver nodes have
RP clients attached, based on the received PIM joins for the
Underlay Overlay specific multicast Group.
VXLAN 3. The source node creates a copy of the original packet for
Tunnels PIM Join each remote node, VXLAN encapsulates the traffic, and
then unicasts it to each of the remote nodes (known as
head-end replication).
FE2 FE
FE1
4. Each receiver node receives the VXLAN packets,
decapsulates, applies policy, and then sends the original
Client 2 Client 1
multicast packet to the port connected to the Client
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
SD-Access @ Cisco DNA Center
PIM-SM: Enable Fabric Rendezvous Point (RP)
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
SD-Access @ Cisco DNA Center
PIM-SM: Assign Multicast Address Pool (per VN)
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Complex
3 4
1. Control-Plane
1 2 5
Time 2. Data-Plane
3. Policy-Plane
Fabric
Fundamentals
SD-Access Fabric
Campus Fabric - Key Components
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
SD-Access Fabric
Key Components - LISP
Routing Protocols = Big Tables & More CPU LISP DB + Cache = Small Tables & Less CPU
with Local L3 Gateway with Anycast L3 Gateway
BEFORE AFTER
IP Address = Location + Identity Separate Identity from Location
Prefix RLOC
192.58.28.128 ….....171.68.228.121
Prefix Next-hop 189.16.17.89
22.78.190.64
….....171.68.226.120
….....171.68.226.121
189.16.17.89 ….....171.68.226.120 172.16.19.90 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121 192.58.28.128 ….....171.68.228.121
172.16.19.90 ….....171.68.226.120 192.58.28.128 ….....171.68.228.121
192.58.28.128 …....171.68.228.121 Prefix Next-hop 189.16.17.89 ….....171.68.226.120
Mapping
189.16.17.89 …....171.68.226.120 22.78.190.64 ….....171.68.226.121
22.78.190.64 ….....171.68.226.121 189.16.17.89 ….....171.68.226.120
172.16.19.90 ….....171.68.226.120
Endpoint
172.16.19.90 …......171.68.226.120 22.78.190.64 ….....171.68.226.121
172.16.19.90 ….....171.68.226.120 192.58.28.128 ….....171.68.228.121
192.58.28.128 ….....171.68.228.121
189.16.17.89 …....171.68.226.120 192.58.28.128 …....171.68.228.121
Database
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
Routes are
192.58.28.128 …......171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 …......171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
Consolidated
Prefix
189.16.17.89
22.78.190.64
Next-hop
…......171.68.226.120
….....171.68.226.121
to LISP DB
172.16.19.90 ….....171.68.226.120
192.58.28.128 …....171.68.228.121
189.16.17.89 …....171.68.226.120
22.78.190.64 ….....171.68.226.121 Prefix Next-hop
172.16.19.90 …......171.68.226.120 189.16.17.89 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121 22.78.190.64 ….....171.68.226.121
189.16.17.89 …....171.68.226.120 172.16.19.90 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121 192.58.28.128 …....171.68.228.121
172.16.19.90 …......171.68.226.120
192.58.28.128 ….....171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 …......171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
Prefix Next-hop
Prefix Next-hop 189.16.17.89 ….....171.68.226.120
189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121
22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120
172.16.19.90 ….....171.68.226.120 192.58.28.128 …....171.68.228.121
192.58.28.128 …....171.68.228.121
189.16.17.89 …....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
Topology Routes
192.58.28.128 ….....171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 …......171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
Endpoint Routes
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Fabric Operation
Control-Plane Roles & Responsibilities Control-Plane EID RLOC
a.a.a.0/24 w.x.y.1
b.b.b.0/24 x.y.w.2
c.c.c.0/24 z.q.r.5
d.d.0.0/16 z.q.r.5
(Control-Plane) b.b.b.0/24
c.c.c.0/24
d.d.0.0/16
x.y.w.2
z.q.r.5
z.q.r.5
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Fabric Operation
Control Plane Register & Resolution
Branch
Where is 10.2.2.2?
Cache Entry (on ITR)
10.2.2.2/32 (2.1.2.1)
Fabric Edge
Database Mapping Entry (on ETR) Fabric Edges Database Mapping Entry (on ETR)
10.2.2.4/32 ( 3.1.2.1)
10.2.2.2/32 ( 2.1.2.1)
3 EID-prefix: 10.2.2.2/32
Mapping Locator-set: Path Preference
Entry Controlled
2.1.2.1, priority: 1, weight:100
by Destination Site
1
DNS Entry:
Branch Non-Fabric Non-Fabric
D.abc.com A 10.2.2.2
10.1.0.0/24
Fabric Borders
S Fabric Edge
2
1.1.1.1
10.1.0.1 10.2.2.2 5.3.3.3
5 Fabric Edges
10.1.0.1 10.2.2.2
D
10.2.2.3/16 10.2.2.2/16 10.2.2.4/16 10.2.2.5/16
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Fabric Operation
Forwarding from Outside (Border to Edge) 3 EID-Prefix: 10.2.2.2/32
Mapping Locator-Set:
Entry 2.1.2.1, priority: 1, weight: 100
1
DNS Entry:
D.abc.com A 10.2.2.2 192.3.0.1
S
Non-Fabric
2
192.3.0.1 10.2.2.2 Fabric Borders
4.4.4.4
4 5.3.3.3
5 Fabric Edges
192.3.0.1 10.2.2.2
D
10.2.2.3/16 10.2.2.2/16 10.2.2.4/16 10.2.2.5/16
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Fabric Operation Fabric Control Plane
Host Mobility – Dynamic EID Migration Map Register 10.10.0.0/16 – 12.0.0.1
EID: 10.17.1.10/32
Node: 12.1.1.1 10.2.1.10/32 – 12.1.1.1
D 10.2.1.10/32 – 12.2.2.1
10.10.10.0/24
2.1.1.1
DC1 3.1.1.1
Fabric Borders 1.1.1.1
Mapping
System
10.2.1.10/32 – LISP0
10.2.1.10/32 - Local
IP Network
Campus Campus
Bldg 1
S Fabric Edges
1 Bldg 2
10.2.1.10 10.2.1.10
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Would you like to know more?
Locator / ID Separation Protocol (LISP)
Suggested Reading
• BRKRST-3045 - LISP - A Next Generation Networking Architecture
Other References
• Cisco LISP Site http://lisp.cisco.com
• Cisco LISP Marketing Site http://www.cisco.com/go/lisp/
• LISP Beta Network Site http://www.lisp4.net or http://www.lisp6.net
• IETF LISP Working Group http://tools.ietf.org/wg/lisp/
• Fundamentals of LISP https://www.youtube.com/watch?v=lKrV1qB8uqA
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
SD-Access Fabric
Unique Control-Plane extensions compared to LISP
Virtual Networks Layer-3 VN (VRF) only Both Layer-3 and Layer-2 VN (VRF)
support (using VXLAN)
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
1. Control-Plane
2. Data-Plane
3. Policy-Plane
Fabric
Fundamentals
SD-Access Fabric
Key Components – VXLAN
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
LISP & VXLAN Headers
Similar Format - Different Payload
OUTER
HEADER
4789
OVERLAY
HEADER
INNER
HEADER
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
VXLAN-GPO Header
Next-Hop MAC Address
Source MAC 48
Source IP 32
Src RLOC IP Address
Outer IP Header Dest. IP 32
Source Port 16 Dst RLOC IP Address
Segment ID 16
8 Bytes
Original Payload VN ID 24
Allows 16M
Reserved 8 possible VRFs
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
VXLAN-GPO Header
MAC-in-IP with VN ID & Group ID
What to look for in Frame 1: 192 bytes on wire (1536 bits), 192 bytes captured (1536 bits)
a packet capture?
Ethernet II, Src: CiscoInc_c5:db:47 (88:90:8d:c5:db:47), Dst: CiscoInc_5b:58:fb (0c:f5:a4:5b:58:fb)
Internet Protocol Version 4, Src: 10.2.120.1, Dst: 10.2.120.3
User Datagram Protocol, Src Port: 65354 (65354), Dst Port: 4789 (4789)
Source Port: 65354
Destination Port: 4789
OUTER
Length: 158 HEADER
Checksum: 0x0000 (none)
[Stream index: 0]
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Data-Plane Overview
Fabric Header Encapsulation
Inner
Fabric Data-Plane provides the following:
Outer
• Underlay address advertisement & mapping
• Automatic tunnel setup (Virtual Tunnel End-Points)
• Frame encapsulation between Routing Locators
Outer
• Nearly the same, with different fields & payload Encap
Inner
Inner
• LISP header carries IP payload (IP in IP)
• VXLAN header carries MAC payload (MAC in IP)
Decap
Triggered by LISP Control-Plane events
• ARP or NDP Learning on L3 Gateways
• Map-Reply or Cache on Routing Locators
Inner
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Would you like to know more?
Virtual eXtensible LAN (VXLAN)
Suggested Reading
• BRKRST-3045 - Intro to LISP and VXLAN - Scalable Technology Overlays for Switching
Other References
• VXLAN-GPO IETF Draft https://tools.ietf.org/html/draft-smith-vxlan-group-policy-03
• VXLAN Wikipedia https://en.wikipedia.org/wiki/Virtual_Extensible_LAN
• VXLAN IETF RFC https://tools.ietf.org/html/rfc7348
• Fundamentals of VXLAN https://www.youtube.com/watch?v=j7on2iLk5ls
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
SD-Access Fabric
Unique Data-Plane Extensions compared to VXLAN
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
1. Control-Plane
2. Data-Plane
3. Policy-Plane
Fabric
Fundamentals
SD-Access Fabric
Key Components – Group Based Policy
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
SD-Access Policy
Two Level Hierarchy - Macro Segmentation
Known Unknown
Networks Networks
SD-Access
VN VN VN
Fabric
Virtual Network (VN)
“A” “B” “C”
First level Segmentation ensures zero
communication between forwarding
domains. Ability to consolidate multiple
networks into one management plane.
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
SD-Access Policy
Two Level Hierarchy - Micro Segmentation
Known Unknown
Networks Networks
SG
SG
1
SG SG
SG
4
SG SG
SG
7
SG
SD-Access
Fabric
Scalable Group (SG)
2 3 5 6 8 9
Second level Segmentation ensures
role based access control between
two groups within a Virtual Network.
Provides the ability to segment the
network into either line of businesses
or functional blocks.
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
SD-Access Policy
Policy Types
✓
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Group Assignment
Two ways to assign SGT
Campus
Access Distribution Core DC Core DC Access
MAB
Enterprise
Backbone
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Cisco TrustSec
Security Group Tags in ISE
Define SGTs under ‘Components’ section in TrustSec Work Center (from ISE 2.0+)
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Cisco TrustSec
Define Authorization Policies for Users and Devices in ISE
Create an 802.1X or
MAB or Web Auth
policy to assign the
SGTs to the Users
and Devices, after
client Authentication
& Authorization
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
SD-Access Policy
Access Control Policies
SGACLs are
referenced
under the
Egress policy
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Policy Enforcement
Ingress Classification with Egress Enforcement
Destination Classification
CRM: SGT 20
Web: SGT 30
User Authenticated = FIB Lookup =
Classified as Marketing (5) Destination IP = SGT 20 ISE
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Cisco TrustSec
Ingress Classification & Group Tagging
Group Tag
Associated IP
cts role-based permissions from SGT, DGT, SGACL Label permit tcp dst eq 443
SG ACL
SGT/DGT
Entries
Entries
permit icmp
… …
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Group Propagation
VN & SGT in VXLAN-GPO Encapsulation
Encapsulation Decapsulation
IP Network
VXLAN VXLAN
VN ID SGT ID VN ID SGT ID
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Would you like to know more?
Cisco TrustSec (CTS)
Suggested Reading
• BRKCRS-2891 - Enterprise Network Segmentation with Cisco TrustSec
• BRKSEC-2044 - Building an Enterprise Access Control Architecture Using ISE and TrustSec
Other References
• Cisco TrustSec Marketing Site cisco.com/go/trustsec/
• Cisco TrustSec Config Guide cisco.com/c/en/us/td/docs/switches/lan/trustsec/configuration/guide/trustsec.html
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
SD-Access Fabric
Unique Policy-Plane Extensions compared to CTS
QoS (App) Policy Not Supported App based QoS policy, to optimize
application traffic priority
Traffic Copy Policy Not Supported SRC/DST based Copy policy (using
ERSPAN) to capture data traffic
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Complex
3 4
1. Architecture
1 2 5
Controller
Fundamentals
Cisco DNA Center
SD-Access – Key Components
API
Cisco ISE
Identity 2.3
& Policy Automation
NCP Assurance
NDP
API API
Identity Services Engine Network Control Platform Network Data Platform
NETCONF
SNMP
SSH
AAA
RADIUS
TACACS
Campus Fabric NetFlow
Syslog
HTTPS
#CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
www.cisco.com/c/en/us/products/cloud-systems-management/dna-center/datasheet-listing.html
(Wired + Wireless)
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
www.cisco.com/c/en/us/products/cloud-systems-management/dna-center/datasheet-listing.html
Switches,
1000 2000 5000
Routers & WLC
Endpoints
25K 40K 100K DN2-HW-APL-XL
Infrastructure
(Wired + Wireless)
112 Core - UCS M5
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Cisco DNA Center
High Availability Cluster
Telemetry Intent
Alerts
Network Control Violations Network Data
Platform Inventory, Topology, Host, Group Platform
Network State changes
Path Trace information
Campus
Fabric
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
Cisco DNA Center
NDP System Components
Network Network Cost Network Segmentation & Change Impact Other 3rd party
Assurance Analytics app Vulnerability Detection app Analytics app analytics apps
Northbound(NB) APIs
Control
Network
NDP Extensions
Controller
Platform Inventory,
Topology NDP Core Analytics Platform
etc.
Configuration Telemetry
Distributed Processing
Network Elements
(Switches, Routers, Access Points, N/W Services, Identity providers)
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
Cisco DNA Center
NDP Analytics Architecture
Data collection and ingestion Data correlation and analysis Data visualization and action
Network Assurance
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Would you like to know more?
Fabric Assurance
BRKNMS-2814
SD-Access - Integrating with Existing Networks
This session covers:
• More details about Fabric Assurance
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
Cisco DNA Center and ISE integration
Identity and Policy Automation
PxGrid
Campus Fabric REST APIs
Fabric Policy
Management Authoring
Workflows
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
Cisco DNA Center and ISE integration
ISE roles in SD-Access
Admin/Operate
Network
Devices
DNA-Center
Things
Config Sync Context
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
1. Architecture
2. User Interface
3. Workflows
Controller
Fundamentals
SD-Access
CLI and API vs. GUI
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Cisco DNA Center
4 Step Workflow
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Assure
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
Assure
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
1. Architecture
2. User Interface
3. Workflows
Controller
Fundamentals
Cisco DNA Center - Design 1
Setup Management & Underlay Reachability
1. Setup Sites, Buildings & Floors
• Organize your Regions, Cities & Buildings
• Import floorplans in CAD, PNG or JPG
• Virtual layout of Routers, Switches & APs
2. Setup Global & Site Network Settings
• Establish a common set of Global Servers
• Each Site inherits settings from level above
• Override Global settings with Site-Specific
3. Setup IP Address Pools or IPAM
• IP Address Management uses Site hierarchy
• Add or modify IP Pools manually
• You can also import from IPAM tools via APIs
4. Setup Wireless SSID Settings
• Manage Fabric Wireless WLANs per Site
• Associate the SSIDs with IP Pools
• Automated setup of the WLC & APs via APIs
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Cisco DNA Center - Policy 2
Setup VNs & EIGs and Policies
1. Setup Virtual Networks
• Add Scalable Groups to a Virtual Network
• A “Default” Virtual Network created automatically
• Option to add / remove new Virtual Networks
• Enables VN ID on SD-Access enabled Devices*
2. Setup Scalable Groups
• Option to import Groups from ISE (or AD)
• Option to create Groups via Static Mapping
• Enables SGT ID on SD-Access enabled Devices*
3. Manage Group Policies
• Groups provide native SGT based segmentation
• Intra-VN policies set to Default Permit or Deny
• Create simple To / From Group-Based Policies
4. Manage VN Policies *
• VNs provide native VRF network segmentation
• Inter-VN policies mapped to Firewall instances*
* Firewall Connect requires manual configuration. Automation planned for a later release.
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Cisco DNA Center - Provision 3
Setup Overlay Control & Data-Plane
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
Cisco DNA Center - Assurance 4
Real-Time Data-Collection & Event Correlation
1. Assurance Dashboard
• Network Health Scores (based on 360 Views)
• Graphical status view of Health and Alarms
• Track common Network Issues & Trends
• Universal search for elements of the Network
1 2 5
Time
Take
Away
Things to Remember
Session Summary
B B
Campus
Fabric DESIGN PROVISION POLICY ASSURANCE
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
For more details: cs.co/sda-compatibility-matrix
SD-Access Support
Digital Platforms for your Cisco Digital Network Architecture
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
Cisco DNA Software Subscription
ESSENTIALS ADVANTAGE
Available for Current Catalyst 3K, 4K, 6K and Next Generation Catalyst 9K Series
Cisco ONE Suite – Essentials Includes ISE Base
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
What’s New?
Introducing Cisco DNA Center 1.3
Optimized for Distribution Optimized for Expansion Optimized for Extension
DNA Center 1.2.6, ISE 2.4 p1, DNA Center 1.2.10, ISE 2.4 p6, DNA Center 1.3.0, ISE 2.6 p1,
IOS-XE 16.9.1, AireOS 8.8 IOS-XE 16.9.2s, AireOS 8.8 IOS-XE 16.11.1s, AireOS 8.9
• Distributed Campus with SDA Transit • SD-Access Extension for IoT (Beta) • SD-Access Extension for IoT (FCS)
• Layer 2 Flooding • 3 node DNAC HA for Automation • IPv6 overlay support for
• Layer 2 Hand-Off for Migration • Catalyst 9800 Wireless Controller Wired + Wireless (AireOS) Endpoints
• Native Multicast • Fabric in a Box with Embedded Wireless • Fabric Edge and Fabric in a Box
• Control Plane Resiliency (6 nodes) • Nexus 7700 Series with M3 as Border, • Fabric in a Box with Embedded Wireless
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
SD-Access Testimonials
Live Customer SD-Access Deployments
Network Services
375+ Production
Deployments
Cisco IT
www.cisco.com/c/en/us/solutions/enterprise-networks/network-architecture-customer-success-stories.html
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
Marriott Marquis San Diego
SD-Access @ CiscoLive US
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
What to Do Next?
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
SD-Access Resources
Would you like to know more?
cisco.com/go/dna
cisco.com/go/sdaccess cisco.com/go/dnacenter
• SD-Access At-A-Glance • Cisco DNA Center At-A-Glance
•
•
SD-Access
SD-Access
Ordering Guide
Solution Data Sheet
cisco.com/go/cvd •
•
Cisco
Cisco
DNA ROI Calculator
DNA Center Data Sheet
• SD-Access Solution White Paper • SD-Access Design Guide • Cisco DNA Center 'How To' Video Resources
• SD-Access Deployment Guide
• SD-Access Segmentation Guide
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
SD-Access Resources
Would you like to know more?
cs.co/sda-resources
cs.co/sda-community
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Learn more with Learning@Cisco
http://digital-learning.cisco.com
Preparing the Identity Services Engine (ISE) for SDA (CUST-SDA-ISE) v1.0
2 https://digital-learning.cisco.com/course/59741
TrustSec, ISE with DNAC, Device Profiling and Creating Groups and Policies
4
SDA 1.2 Update (A-SDA-12UPDT)
https://digital-learning.cisco.com/course/59933
SD-Access Extensions and SD-Access for Distributed Campus
Special offering: Curriculum is FREE to customers Earn up to 25 Points for CCIE CEP!! Over 33 hours of video instruction
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
Continue your education
Demos in the
Walk-in labs
Cisco campus
#CLUS Session ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
#CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
Complete your
online session • Please complete your session survey
evaluation after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live water bottle.
• All surveys can be taken in the Cisco Live
Mobile App or by logging in to the Session
Catalog on ciscolive.cisco.com/us.
Cisco Live sessions will be available for viewing
on demand after the event at ciscolive.cisco.com.
#CLUS BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
Thank you
#CLUS