(Cisco-Live) Software - Defined - Access - 2017
(Cisco-Live) Software - Defined - Access - 2017
(Cisco-Live) Software - Defined - Access - 2017
10 – 12 Oktober 2017
DNA Center
Identity Services Engine APIC-EM Network Data Platform
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Key Concepts
What is Software Defined Access?
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
What is SD-Access?
Campus Fabric + DNA Center (Automation & Assurance)
§ SD-Access – Available Aug 2017
APIC-EM
APIC-EM
2.0
1.X GUI approach provides automation &
assurance of all Fabric configuration,
ISE NDP
management and group-based policy.
DNA Center Leverages DNA Center to integrate
external Service Apps, to orchestrate
your entire LAN, Wireless LAN and
WAN access network.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Roles & Terminology
What is Software Defined Access?
1. High-Level View
2. Roles & Platforms
3. Fabric Constructs
What is SD-Access?
Fabric Roles & Terminology
§ DNA Controller – Enterprise SDN Controller
DNA
APIC-EM
Controller (e.g. DNA Center) provides GUI management
Identity and abstraction via Apps that share context
Services
ISE NDP § Identity Services – External ID System(s)
Analytics (e.g. ISE) are leveraged for dynamic Endpoint
to Group mapping and Policy definition
Engine
§ Analytics Engine – External Data Collector(s)
(e.g. NDP) are leveraged to analyze Endpoint
Fabric Border Fabric Wireless to App flows and monitor fabric status
Nodes Controller
B B § Control-Plane Nodes – Map System that
manages Endpoint to Device relationships
Control-Plane
Intermediate § Fabric Border Nodes – A Fabric device (e.g.
C Nodes
Nodes (Underlay) Core) that connects External L3 network(s)
to the SDA Fabric
Campus § Fabric Edge Nodes – A Fabric device (e.g.
Access or Distribution) that connects Wired
Fabric Edge
Nodes
Fabric Endpoints to the SDA Fabric
§ Fabric Wireless Controller – A Fabric device
(WLC) that connects Wireless Endpoints to
the SDA Fabric
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Roles & Terminology
What is Software Defined Access?
1. High-Level View
2. Roles & Platforms
3. Fabric Constructs
SD-Access Fabric
Control-Plane Nodes – A Closer Look
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 9
SD-Access – Control-Plane
Platform Support
NEW
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 1010
SD-Access Fabric
Edge Nodes – A Closer Look
Edge Node provides first-hop services for Users / Devices connected to the Fabric
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 1111
SD-Access – Edge Node
Platform Support
NEW NEW
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 1212
SD-Access Fabric
Border Nodes – A Closer Look
Border Node is an Entry / Exit point for all data traffic going In / Out of the Fabric
• Fabric Border B B
• Used for “Known” Routes in your company
• Default Border
• Used for “Unknown” Routes outside your company
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 1313
SD-Access Fabric
Border Nodes – A Closer Look
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 1414
SD-Access Fabric
Border Nodes – A Closer Look
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 1515
SD-Access – Border Node
Platform Support
NEW
• Catalyst 3850 • Catalyst 9500 • Catalyst 6800 • ASR 1000-X/HX • Nexus 7700
• 1/10G SFP+ • 40G QSFP • Sup2T/6T • ISR 4430/4450 • Sup2E
• 10/40G NM Cards • 10/40G NM Cards • 6880-X or 6840-X • 1/10G/40G • M3 Cards
• IOS-XE 16.6.1+ • IOS-XE 16.6.1+ • IOS 15.5.1SY+ • IOS-XE 16.6.1+ • NXOS 7.3.2+
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 1616
Roles & Terminology
What is Software Defined Access?
1. High-Level View
2. Roles & Platforms
3. Fabric Constructs
SD-Access Fabric
Virtual Network– A Closer Look
Virtual Network maintains a separate Routing & Switching instance for each VN
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 1818
SD-Access Fabric
Scalable Groups – A Closer Look
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 1919
SD-Access Fabric
Host Pools – A Closer Look
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 3420
Campus Fabric
Virtual Network– A Closer Look
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 2121
Fabric Fundamentals
What is Campus Fabric?
1. Fabric Basics
2. Control-Plane
3. Data-Plane
4. Policy-Plane
SD-Access
What exactly is a Fabric?
A Fabric is an Overlay
An Overlay network is a logical topology used to virtually connect devices,
built on top of some arbitrary physical Underlay topology.
An Overlay network network often uses alternate forwarding attributes to
provide additional services, not provided by the Underlay.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
23
SD-Access
Fabric Terminology
Encapsulation
Hosts
(End-Points)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
SD-Access
Fabric Underlay – Manual vs. Automated
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Fabric Fundamentals
What is Campus Fabric?
1. Fabric Basics
2. Control-Plane
3. Data-Plane
4. Policy-Plane
SD-Access
Campus Fabric - Key Components
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 2727
SD-Access Fabric
Key Components – LISP
Routing Protocols = Big Tables & More CPU LISP DB + Cache = Small Tables & Less CPU
with Local L3 Gateway with Anycast L3 Gateway
BEFORE AFTER
IP Address = Location + Identity Separate Identity from Location
Prefix RLOC
192.58.28.128 ….....171.68.228.121
189.16.17.89 ….....171.68.226.120
Prefix Next-hop 22.78.190.64 ….....171.68.226.121
189.16.17.89 ….....171.68.226.120 172.16.19.90 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121 192.58.28.128 ….....171.68.228.121
172.16.19.90 ….....171.68.226.120 192.58.28.128 ….....171.68.228.121
192.58.28.128
189.16.17.89
…....171.68.228.121
…....171.68.226.120
Prefix Next-hop 189.16.17.89 ….....171.68.226.120
Endpoint Mapping
189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121
22.78.190.64 ….....171.68.226.121 22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120
172.16.19.90 …......171.68.226.120 192.58.28.128 ….....171.68.228.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121 192.58.28.128 …....171.68.228.121
189.16.17.89 …....171.68.226.120
Database
22.78.190.64 ….....171.68.226.121
Routes are
172.16.19.90 …......171.68.226.120
192.58.28.128 …......171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 …......171.68.226.121
172.16.19.90 ….....171.68.226.120
Consolidated
192.58.28.128 ….....171.68.228.121
Prefix
189.16.17.89
Next-hop
…......171.68.226.120
to LISP DB
22.78.190.64 ….....171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 …....171.68.228.121
189.16.17.89 …....171.68.226.120 Prefix Next-hop
22.78.190.64 ….....171.68.226.121 189.16.17.89 ….....171.68.226.120
172.16.19.90 …......171.68.226.120 22.78.190.64 ….....171.68.226.121
192.58.28.128 ….....171.68.228.121 172.16.19.90 ….....171.68.226.120
189.16.17.89 …....171.68.226.120 192.58.28.128 …....171.68.228.121
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
192.58.28.128 ….....171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 …......171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
Prefix Next-hop
Prefix Next-hop 189.16.17.89 ….....171.68.226.120
189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121
22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120
172.16.19.90 ….....171.68.226.120 192.58.28.128 …....171.68.228.121
192.58.28.128 …....171.68.228.121
189.16.17.89 …....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
192.58.28.128 ….....171.68.228.121
Endpoint Routes
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 2828
Fabric Fundamentals
What is Campus Fabric?
1. Fabric Basics
2. Control-Plane
3. Data-Plane
4. Policy-Plane
SD-Access Fabric
Key Components – VXLAN
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 3030
Next-Hop MAC Address
Checksum
Source IP 32
Src RLOC IP Address
Outer IP Header Dest. IP 32
Source Port 16 Dst RLOC IP Address
Segment ID 16
8 Bytes
Original Payload VN ID 24
Allows 16M
Reserved 8 possible VRFs
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Fabric Fundamentals
What is Campus Fabric?
1. Fabric Basics
2. Control-Plane
3. Data-Plane
4. Policy-Plane
SD-Access Fabric
Key Components – CTS
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 3333
Cisco TrustSec
Simplified access control with Group Based Policy
Enforcement
Shared Application
Group Based Policies Services Servers
ACLs, Firewall Rules
Enforcement DC Switch
or Firewall
Propagation
Carry “Group” context
through the network Enterprise
using only SGT Backbone
ISE
Classification
Static or Dynamic Campus Switch Campus Switch DC switch receives policy
for only what is connected
SGT assignments
Employee Tag
Supplier Tag
Non-Compliant Employee Voice Voice Employee Supplier Non-Compliant Non-Compliant Tag
VLAN A VLAN B
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Packet Flow in SD-Access Fabric
VN & SGT in VXLAN-GPO Encapsulation
Encapsulation Decapsulation
IP Network
VXLAN VXLAN
VN ID SGT ID VN ID SGT ID
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Controller Fundamentals
What is DNA Center?
1. DNAC Architecture
2. DNAC User Interface
3. DNAC Workflows
SD-Access
DNA Center – Service Components
API
NETCONF
SNMP
SSH
AAA
RADIUS
EAPoL
Campus Fabric HTTPS
NetFlow
Syslogs
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
SD-Access Wireless:
why would you care?
CUWN Architecture - Centralized
Overview
AD
WLC
AAA LDAP IPAM
DNS
NTP DHCP Architecture Benefits:
MDM
SMTP
Policy Definition Single point of Ingress
• Overlay: works on any wired network
Enforcement Point to wired network • Simplified Access switch configuration
for Wi-Fi clients
Client keeps same IP Wireless VLANs are
address while roaming centrally defined
• Single point of Ingress for wireless traffic
• Easy seamless mobility
• Simplified IP addressing for wireless
• Centralized Management
Internet • Easy wireless Guest tunneling solution
SW DMZ
WLC Anchor WLC
SSID SSID
Employee Guest
Local mode AP
Flex mode AP
Branch
CAPWAP Control & Data
dot1q trunk © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Converged Access Architecture
Overview
AD
WLC
AAA LDAP IPAM
DNS
NTP DHCP Architecture Benefits
Guest Tunnel through MDM
SMTP
the MC • Distributed Data Plane: scalability
• One Policy enforcement point for wired
• Reduced HW footprint and less devices
to manage (branch is the sweet spot)
• One common software
MC MA
MA
Internet • Policies enforced at the edge
• Wireless traffic visibility at the edge
SW DMZ
WLC Anchor WLC • Easy wireless Guest tunneling solution
CA Network
Enforcement for wired anchored back to the
and wireless original switch
Customers may NOT like:
Switch 1 Switch 2 • Distributed Management plane
• Multiple wireless touch points
• Wired and wireless software
MA dependencies
Switch with Mobility Agent • Anchoring solutions for seamless
mobility
Local mode AP
• Support for Local mode AP only
SSID
SSID Guest CAPWAP Control & Data • Lack of feature parity with CUWN
Employee
MA to MA tunnels
Packet to wired
EoIP tunnel
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
What is the Problem?
Policy Model Today
Network Policy
Enterprise Network
SRC DST
PAYLOAD DATA DSCP PROT IP SRC IP DST
PORT PORT
• QoS
• Security
• Redirect/copy
Policy is based on “5 Tuple”
• Only Transitive information
• Traffic engineering • Survives end to end
• etc.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
What is the Problem?
Policy Model Today
Network Policy access-list 102 deny udp 167.160.188.162 0.0.0.255 gt 4230 248.11.187.246 0.255.255.255 eq 2165
access-list 102 deny udp 32.124.217.1 255.255.255.255 lt 907 11.38.130.82 0.0.31.255 gt 428
access-list 102 permit ip 64.98.77.248 0.0.0.127 eq 639 122.201.132.164 0.0.31.255 gt 1511
access-list 102 deny tcp 247.54.117.116 0.0.0.127 gt 4437 136.68.158.104 0.0.1.255 gt 1945
access-list 102 permit icmp 136.196.101.101 0.0.0.255 lt 2361 90.186.112.213 0.0.31.255 eq 116
access-list 102 deny udp 242.4.189.142 0.0.1.255 eq 1112 19.94.101.166 0.0.0.127 eq 959
access-list 102 deny tcp 82.1.221.1 255.255.255.255 eq 2587 174.222.14.125 0.0.31.255 lt 4993
access-list 102 deny tcp 103.10.93.140 255.255.255.255 eq 970 71.103.141.91 0.0.0.127 lt 848
Enterprise Network
access-list 102 deny ip 32.15.78.227 0.0.0.127 eq 1493 72.92.200.157 0.0.0.255 gt 4878
access-list 102 permit icmp 100.211.144.227 0.0.1.255 lt 4962 94.127.214.49 0.255.255.255 eq 1216
access-list 102 deny icmp 88.91.79.30 0.0.0.255 gt 26 207.4.250.132 0.0.1.255 gt 1111
access-list 102 deny ip 167.17.174.35 0.0.1.255 eq 3914 140.119.154.142 255.255.255.255 eq 4175
access-list 102 permit tcp 37.85.170.24 0.0.0.127 lt 3146 77.26.232.98 0.0.0.127 gt 1462
access-list 102 permit tcp 155.237.22.232 0.0.0.127 gt 1843 239.16.35.19 0.0.1.255 lt 4384
SRC DST
PAYLOAD DATA DSCP PROT IP SRC IP DST
PORT PORT
IP
SSID C
ADDRESSES VLAN 20 VLAN 10
User/device info?
SSID A
§ Locate you IP Address VLAN 30
§ Identify you “meaning” VLAN 40
§ Drive “treatment” OVERLOAD SSID B
§ Constrain you SSID D
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
What is the Problem?
User Group policy rollout - Today
1. Define Groups in AD
Production AAA
Servers
2. Define Policies
§ VLAN/subnet based
DHCP
Developer
Servers
3. Implement VLANs/Subnets
AD § Create VLANs
LAN Core § Define DHCP scope
§ Create subnets and L3 interfaces
§ Routing for new subnets
L3 Switch § Map SSID to Interface/VLAN
Trunk
4. Implement Policy
What if You Need to Add Another
§ Define Group & Policy?
WLAN
Trunks ACLs
§ Apply ACLs
L2 Switch
5. Many different User Interfaces
Multiple Steps and
Touch Points
….
One SSID
L2 Switch BYOD
Network Contractor
Touch Points
One SSID
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
SD-Access Wireless Architecture
Bringing the best of both architectures by...
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
SD-Access Wireless Architecture 1
Simplifying the Control Plane
DNAC
ISE / AD Automation
Policy § DNAC simplifies the Fabric deployment,
Abstraction and
§ Including the wireless integration component
Configuration
CAPWAP Automation
Cntrl plane
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
SD-Access Wireless Architecture 2
Optimizing the Data Plane
DNAC
Automation
ISE / AD § DNAC simplifies the Fabric deployment,
Policy § Including the wireless integration component
Abstraction and
Configuration
CAPWAP Automation
Cntrl plane Centralized Wireless Control Plane
LISP § WLC still provides client session management
Cntrl plane § AP Mgmt, Mobility, RRM, etc.
VXLAN § Same operational advantages of CUWN
Data plane WLC
B B Fabric enabled WLC:
WLC is part of LISP control plane
LISP control plane Management
C § WLC integrates with LISP control plane
§ WLC updates the CP for wireless clients
§ Mobility is integrated in Fabric thanks to LISP CP
SD-Access
Fabric Optimized Distributed Data Plane
§ Fabric overlay with Anycast GW + Stretched subnet
§ VLAN extension with no complications
Fabric enabled AP: § All roaming are Layer 2
AP encapsulates Fabric
SSID traffic in VXLAN
VXLAN VXLAN from the AP
(Data Plane)
§ Carrying hierarchical policy segmentation starting
from the edge of the network
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
SD-Access Wireless Architecture 2
Optimizing the Data Plane: Stretched subnets – A Closer Look
client
• Forwards client traffic based on forwarding table as programmed
by the WLC. Usually VXLAN DST is first hop switch.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
SD-Access Wireless Architecture
Simplifying policy and Segmentation
3
B
VXLAN C
(Data) FE A
SD Fabric FE B
IP payload IP 802.11
AP removes the
1 802.11 header
EID underlay
IP payload 802.3 VXLAN UDP IP
IP
AP adds the
2 802.3/VXLAN/underlay IP
header
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
SD-Access Wireless Architecture
Simplifying policy and Segmentation
3
B
VXLAN C
(Data) FE A
SD Fabric FE B
Hierarchical Segmentation:
1. Virtual Network (VN) == VRF - isolated Control Plane + Data Plane
IP payload
EID
802.3 VXLAN UDP
underlay 2. Scalable Group Tag (SGT) – User Group identifier
IP IP
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
SD-Access Wireless Architecture
Simplifying policy and Segmentation
3
B
VXLAN C
(Data) FE A
SD Fabric FE B
EID underlay
IP payload 802.3 VXLAN UDP IP
IP
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
SD-Access Wireless Architecture
Simplifying policy and Segmentation
3
B
VXLAN C
(Data) FE A
SD Fabric FE B
Client Policy
is carried end
to end in the
SGT policy is applied
overlay
EID underlay
IP payload 802.3 VXLAN UDP IP
IP
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
SD-Access Wireless Benefits
User Group policy rollout
DNA Center 1. Define Groups in AD
Production AAA
Servers
2. Design and Deploy in DNA-C
DHCP
§ Create Virtual Network for Corporate
Developer
Servers
§ Define Policies
AD
• Role/Group based
§ Apply Policies
LAN core • SGT based
Contractor
Touch Point SGT 300
One SSID
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
SD-Access Wireless Benefits
User Group policy rollout
DNA Center 1. Define Groups in AD
Production AAA
Servers
2. Design and Deploy in DNA-C
DHCP
§ Create Virtual Network for Corporate
Developer
Servers
§ Define Policies
AD
• Role/Group based
§ Apply Policies One
LAN core • SGT based Touch
Point
Production Serv. Developer Serv.
L3 Switch
IoT/HVAC Virtual Network SGT 10 SGT 20
Trunk
WLC
Guest Virtual Network Employee
SGT 100
Corporate VN
BYOD
L3 Switch SGT 200
Contractor
Touch Point SGT 300
One SSID
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
What products
make this
Architecture?
SD-Access – Fabric Wireless
Platform Support
*with Caveats
NEW
3504 WLC 5520 WLC 8540 WLC Wave 2 APs Wave 1 APs
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
SD-Access Wireless
Design Considerations
Wireless Integration in SDA Fabric
CUWN wireless Over The Top (OTT) SD-Access Wireless
ISE / AD APIC-EM ISE / AD APIC-EM
Non-Fabric Fabric
WLC enabled WLC
CAPWAP
B B Cntrl plane B B
CAPWAP
Cntrl & Data VS.
VXLAN
C Data plane C
SD-Access SD-Access
Fabric Fabric
§ CAPWAP for Control Plane and Data Plane § CAPWAP Control Plane, VXLAN Data plane
§ SDA Fabric is just a transport § WLC/APs integrated in Fabric, SD-Access advantages
§ Supported on any WLC/AP software and hardware § Requires software upgrade (8.5+)
§ Migration step to full SDA § Optimized for 802.11ac Wave 2 APs
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
CUWN Over the Top (OTT)
• Definition:
• Wireless OTT: this CAPWAP wireless overlay to Fabric: traditional CAPWAP
deployment connected to Fabric overlay. Fabric is a transport for CAPWAP
CAPWAP tunnel
SD-Access
Fabric
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Key Takeaways
SDA for Mobility
Innovate Faster with Fabric-Enabled Wireless
Simplified Optimized data plane with Easy end to end Virtualization Wired and Wireless
Provisioning Campus-Wide Roaming and Segmentation Policy Consistency
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
SD-Access Wireless
Addressing
CUCM
ISE
WAN
DHCP
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Components of DNA Assurance
Predict performance in wireless
Test your network anywhere at any time
R1
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Client as a sensor (IOS 10)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Client as a sensor (IOS 11)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Client as a sensor (IOS 11)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Key Takeaways
Software-Defined Access Summary
Manage Business Outcomes Instead of Managing the Network