SlideShare a Scribd company logo
4
Most read
10
Most read
11
Most read
TechWiseTV Workshop: Software-Defined Access
© 2017 Cisco and/or itsaffiliates. All rightsreserved. 2
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
 Campus Fabric – Shipping Now
CLI or API form of the new overlay
Fabric solution for your enterprise
Campus access networks.
CLI approach provides backwards
compatibility and customization,
Box-by-Box. API approach provides
automation via NETCONF / YANG.
APIC-EM, ISE, NDP are all separate.
BB
What is SD-Access?
Campus Fabric + DNA Center (Automation & Assurance)
APIC-EM
1.X
 SD-Access – Available Aug 2017
GUI approach provides automation &
assurance of all Fabric configuration,
management and group-based policy.
Leverages DNA Center to integrate
external Service Apps, to orchestrate
your entire LAN, Wireless LAN and
WAN access network.
Campus
Fabric
ISE NDP
APIC-EM
2.0
ISE NDP
DNA Center
3
C
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
APIC-EM
ISE NDP
 Control-Plane Nodes – Map System that
manages Endpoint to Device relationships
 Fabric Edge Nodes – A Fabric device (e.g.
Access or Distribution) that connects Wired
Endpoints to the SDA Fabric
 Identity Services – External ID Systems
(e.g. ISE) are leveraged for dynamic Endpoint
to Group mapping and Policy definition
 Fabric Border Nodes – A Fabric device (e.g.
Core) that connects External L3 network(s)
to the SDA Fabric
Identity
Services
Intermediate
Nodes (Underlay)
Fabric Border
Nodes
Fabric Edge
Nodes
 DNA Controller – Enterprise SDN Controller
provides GUI management and abstraction
via Service Apps, that share information
DNA
Controller
 Analytics Engine – External Data Collectors
(e.g. NDP) are leveraged to analyze Endpoint
to App flows and monitor fabric status
Analytics
Engine
C
Control-Plane
Nodes
B
What is SD-Access?
Fabric Roles & Terminology
B
 Fabric Wireless Controller – A Fabric device
(WLC) that connects Wireless Endpoints to
the SDA Fabric
4
Fabric Wireless
Controller
Campus
Fabric
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
SD-Access – Control-Plane
Platform Support
5
Catalyst 9500
• Catalyst 9500
• 10/40G SFP/QSFP
• 10/40G NM Cards
• IOS-XE 16.6.1+
Catalyst 3K
• Catalyst 3850
• 1/10G SFP
• 10/40G NM Cards
• IOS-XE 16.6.1+
Catalyst 6K
• Catalyst 6800
• Sup2T/6T
• 6880-X or 6840-X
• IOS 15.5.1SY+
ASR1K, ISR4K & CSRv
• CSRv
• ASR 1000-X/HX
• ISR 4430/4450
• IOS-XE 16.6.1+
NEW
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
SD-Access – Border Node
Platform Support
6
Catalyst 9500
• Catalyst 9500
• 40G QSFP
• 10/40G NM Cards
• IOS-XE 16.6.1+
Nexus 7K
• Nexus 7700
• Sup2E
• M3 Cards
• NXOS 7.3.2+
Catalyst 3K
• Catalyst 3850
• 1/10G SFP+
• 10/40G NM Cards
• IOS-XE 16.6.1+
ASR1K & ISR4K
• ASR 1000-X/HX
• ISR 4430/4450
• 1/10G/40G
• IOS-XE 16.6.1+
Catalyst 6K
• Catalyst 6800
• Sup2T/6T
• 6880-X or 6840-X
• IOS 15.5.1SY+
NEW
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
SD-Access – Edge Node
Platform Support
7
Catalyst 9400
• Catalyst 9400
• Sup1E
• 9400 Cards
• IOS-XE 16.6.1+
Catalyst 4K
• Catalyst 4500
• Sup8E/9E (Uplinks)
• 4700 Cards (Down)
• IOS-XE 3.10.1+
Catalyst 3K
• Catalyst 3650/3850
• 1/MGIG RJ45
• 10/40G NM Cards
• IOS-XE 16.6.1+
Catalyst 9300
• Catalyst 9300
• 1/MGIG RJ45
• 10/40/mG NM Cards
• IOS-XE 16.6.1+
NEW NEW
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
SD-Access – Fabric Wireless
Platform Support
* Some caveats with Wave 1 APs. Check release notes.
8
Wave 2 APs
• 1800/2800/3800
• 11ac Wave2 APs
• 1G/mGIG RJ45
• AireOS 8.5+
5500 WLC
• AIR-CT5520
• No 5508
• 1G/10G SFP+
• AireOS 8.5+
8500 WLC
• AIR-CT8540
• 8510 supported
• 1G/10G SFP+
• AireOS 8.5+
Wave 1 APs*
• 1700/2700/3700
• 11ac Wave1 APs*
• 1G RJ45
• AireOS 8.5+
3504 WLC
• AIR-CT3504
• 1G/mGig
• AireOS 8.5+
NEW NEW
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
1. Control-Plane based on LISP
2. Data-Plane based on VXLAN
3. Policy-Plane based on CTS
SD-Access
Key Components
Key Differences
• L2 + L3 Overlay -vs- L2 or L3 Only
• Host Mobility with Anycast Gateway
• Adds VRF + SGT into Data-Plane
• Virtual Tunnel Endpoints (No Static)
• No Topology Limitations (Basic IP)
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
Endpoint
Routes are
Consolidated
to LISP DB
Topology + Endpoint Routes
BEFORE
IP Address = Location + Identity
Prefix Next-hop
189.16.17.89 …......171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 …....171.68.228.121
189.16.17.89 …....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
192.58.28.128 ….....171.68.228.121
189.16.17.89 …....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
192.58.28.128 ….....171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 …......171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
Prefix Next-hop
189.16.17.89 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 …....171.68.228.121
189.16.17.89 …....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
192.58.28.128 ….....171.68.228.121
189.16.17.89 …....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
192.58.28.128 ….....171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 …......171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
Prefix Next-hop
189.16.17.89 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 …....171.68.228.121
189.16.17.89 …....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
192.58.28.128 ….....171.68.228.121
189.16.17.89 …....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
192.58.28.128 …......171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 …......171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
Routing Protocols = Big Tables & More CPU
with Local L3 Gateway
Host
Mobility
Location ID Separation Protocol
Map-Based On-Demand Host-Routing
Mapping
Database
Only Local Routes
Prefix RLOC
192.58.28.128 ….....171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
192.58.28.128 ….....171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
Prefix Next-hop
189.16.17.89 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 …....171.68.228.121
Prefix Next-hop
189.16.17.89 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 …....171.68.228.121
Prefix Next-hop
189.16.17.89 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 …....171.68.228.121
AFTER
Separate Identity from Location
Topology Routes
Endpoint Routes
LISP DB + Cache = Small Tables & Less CPU
with Anycast L3 Gateway
1. Control-Plane based on LISP
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
Map Server / Resolver
• EID to RLOC Mappings
• Can be distributed across
multiple LISP devices
Tunnel Router - XTR
• Edge Devices Encap / Decap
• Ingress / Egress (ITR / ETR)
Proxy Tunnel Router - PXTR
• Connects between LISP
and non-LISP domains
• Ingress / Egress (PITR / PETR)
EID = End-point Identifier
• Host Address or Subnet
RLOC = Routing Locator
• Local Router Address
Prefix Next-hop
w.x.y.1 e.f.g.h
x.y.w.2 e.f.g.h
z.q.r.5 e.f.g.h
z.q.r.5 e.f.g.h
Non-LISP
RLOC Space
EID RLOC
a.a.a.0/24 w.x.y.1
b.b.b.0/24 x.y.w.2
c.c.c.0/24 z.q.r.5
d.d.0.0/16 z.q.r.5
EID RLOC
a.a.a.0/24 w.x.y.1
b.b.b.0/24 x.y.w.2
c.c.c.0/24 z.q.r.5
d.d.0.0/16 z.q.r.5
EID RLOC
a.a.a.0/24 w.x.y.1
b.b.b.0/24 x.y.w.2
c.c.c.0/24 z.q.r.5
d.d.0.0/16 z.q.r.5
Locator / ID Separation Protocol
LISP Roles & Responsibilities
EID Space
Map System
EID Space
ETR
ITR
PXTR
11
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
SD-Access Fabric
Key Components – Virtual eXtensible LAN
ORIGINAL
PACKET
PAYLOADETHERNET IP
PACKET IN
LISP
PAYLOADIPLISPUDPIPETHERNET
PAYLOADETHERNET IPVXLANUDPIPETHERNET
PACKET IN
VXLAN
Supports L2
& L3 Overlay
Supports L3
Overlay
1. Control-Plane based on LISP
2. Data-Plane based on VXLAN
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
VXLAN-GPO Header
MAC-in-IPwith VN ID & Group ID
Underlay
Outer IP Header
Outer MAC Header
UDP Header
VXLAN Header
Overlay
14 Bytes
(4 Bytes Optional)
Ether Type
0x0800
VLAN ID
VLAN Type
0x8100
Source MAC
Dest. MAC 48
48
16
16
16
20 Bytes
Dest. IP
Source IP
Header
Checksum
Protocol 0x11 (UDP)
IP Header
Misc.Data
72
8
16
32
32
8 Bytes
Checksum 0x0000
UDP Length
Dest Port
Source Port 16
16
16
16
8 Bytes
Reserved
VN ID
Segment ID
VXLAN Flags
RRRRIRRR
8
16
24
8
Src VTEP MAC Address
Next-Hop MAC Address
Allows 16M
possible VRFs
UDP 4789
Hash of inner L2/L3/L4 headers of original frame.
Enables entropy for ECMP load balancing.
Inner (Original) IP Header
Original Payload
Inner (Original) MAC Header
Allows 64K
possible SGTs
Dst RLOC IP Address
Src RLOC IP Address
13
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
PAYLOADETHERNET IPVXLANUDPIPETHERNET
SD-Access Fabric
Key Components – Cisco TrustSec
VRF + SGT
Virtual Routing & Forwarding
Scalable Group Tagging
1. Control-Plane based on LISP
2. Data-Plane based on VXLAN
3. Policy-Plane based on CTS
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
Cisco TrustSec
Simplified access control with Group Based Policy
VLAN BVLAN A
Campus Switch
DC Switch
or Firewall
Application
Servers
ISE
Enterprise
Backbone
Enforcement
Campus Switch
Voice Employee Supplier Non-CompliantVoiceEmployeeNon-Compliant
Shared
Services
Employee Tag
Supplier Tag
Non-Compliant Tag
DC switch receives policy
for only what is connected
Classification
Static or Dynamic
SGT assignments
Propagation
Carry “Group” context
through the network
using only SGT
Enforcement
Group Based Policies
ACLs, Firewall Rules
15
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
Packet Flow in Fabric
VXLAN Encapsulation
IP Network
Edge Node 1 Edge Node 2
Encapsulation Decapsulation
VXLAN
VN ID SGT ID
VXLAN
VN ID SGT ID
Propagation
Carry VN and Group
context across the network
Enforcement
Group Based Policies
ACLs, Firewall Rules
Classification
Static or Dynamic VN
and SGT assignments
16
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
Cisco APIC-EM 2.0
App Policy Infra Controller –EN Module
Cisco ISE 2.3
Identity Services Engine
Cisco NDP 1.0
Network Data Platform
Cisco Switches |Cisco Routers | Cisco Wireless
DNA Center 1.0
AAA
RADIUS
EAPoL
HTTPS
NetFlow
Syslogs
NETCONF
SNMP
SSH
API API
API
API
API
Campus Fabric
SD-Access
DNA Center – Service Components
Design | Provision | Policy | Assurance
17
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
Policy
• Virtual Networks
• ISE, AAA, Radius
• Endpoint Groups
• Group Policies
As s ure
Design
• Global Settings
• Site Profiles
• DDI, SWIM, PNP
• User Access
Provision
• Fabric Domains
• CP, Border, Edge
• FEW / OTT WLAN
• External Connect
Assurance
• Network Health
• 360o Views
• FD, Device, Client
• Path Traces
Planning & Preparation
Installation & Integration
18
As s ure As s ure
Prov is ion As s ure
DNA Center
SD-Access 4 Step Workflow
© 2017 Cisco and/or itsaffiliates. All rightsreserved.
The First Step…
19
Thank you for watching!

More Related Content

What's hot (20)

PDF
Building DataCenter networks with VXLAN BGP-EVPN
Cisco Canada
 
PDF
VXLAN BGP EVPN: Technology Building Blocks
APNIC
 
PPTX
Vxlan deep dive session rev0.5 final
KwonSun Bae
 
PPTX
CCNA ppt Day 1
VISHNU N
 
PPTX
Vpc notes
Krunal Shah
 
PPT
Ccna Presentation
bcdran
 
PPTX
ccna networking ppt
Er. Anmol Bhagat
 
PPT
Avaya VoIP on Cisco Best Practices by PacketBase
PacketBase, Inc.
 
PPTX
Cisco Application Centric Infrastructure
islam Salah
 
PDF
VLAN on mikrotik
Achmad Mardiansyah
 
PPTX
CCNP ROUTE V7 CH5
Chaing Ravuth
 
PPTX
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
Robb Boyd
 
PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
ssuser5824cf
 
PPTX
MP BGP-EVPN 실전기술-1편(개념잡기)
JuHwan Lee
 
PDF
Cisco IPv6 Tutorial
kriz5
 
PPTX
Campus_Network_Design_with_ArubaOS-CX_-_Leading_Practices
RoanVillalobos1
 
PDF
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Bruno Teixeira
 
PDF
Troubleshooting BGP
Duane Bodle
 
PPTX
Ccna PPT
AIRTEL
 
PPTX
CCNA Course Training Presentation
Rohit Singh
 
Building DataCenter networks with VXLAN BGP-EVPN
Cisco Canada
 
VXLAN BGP EVPN: Technology Building Blocks
APNIC
 
Vxlan deep dive session rev0.5 final
KwonSun Bae
 
CCNA ppt Day 1
VISHNU N
 
Vpc notes
Krunal Shah
 
Ccna Presentation
bcdran
 
ccna networking ppt
Er. Anmol Bhagat
 
Avaya VoIP on Cisco Best Practices by PacketBase
PacketBase, Inc.
 
Cisco Application Centric Infrastructure
islam Salah
 
VLAN on mikrotik
Achmad Mardiansyah
 
CCNP ROUTE V7 CH5
Chaing Ravuth
 
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
Robb Boyd
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
ssuser5824cf
 
MP BGP-EVPN 실전기술-1편(개념잡기)
JuHwan Lee
 
Cisco IPv6 Tutorial
kriz5
 
Campus_Network_Design_with_ArubaOS-CX_-_Leading_Practices
RoanVillalobos1
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Bruno Teixeira
 
Troubleshooting BGP
Duane Bodle
 
Ccna PPT
AIRTEL
 
CCNA Course Training Presentation
Rohit Singh
 

Similar to TechWiseTV Workshop: Software-Defined Access (20)

PDF
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco Canada
 
PDF
Cisco Software Defined Access - новая архитектура для корпоративных кампусных...
Cisco Russia
 
PPTX
The Data Center Network Evolution
Cisco Canada
 
PPTX
Automate programmable fabric in seconds with an open standards based solution
Tony Antony
 
PPTX
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
Nur Shiqim Chok
 
PPTX
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
NetworkCollaborators
 
PDF
Pro curve cisco
hoanhanh
 
PDF
Gain Insight and Programmability with Cisco DC Networking
Cisco Canada
 
PDF
Gain Insight and Programmability with Cisco DC Networking
Cisco Canada
 
PDF
Cisco DC Networking: Gain Insight and Programmability with
Cisco Canada
 
PDF
Cisco Connect 2018 Malaysia - software-defined access-a transformational appr...
NetworkCollaborators
 
PDF
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
NetworkCollaborators
 
PDF
Elephant & mice flows
Jeff Green
 
PDF
18-20180514_SRv6_RIPE.pdf
YunLiu75
 
PDF
Brkaci 1090
almaz tt
 
PDF
Integration and Interoperation of existing Nexus networks into an ACI Archite...
Cisco Canada
 
PDF
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
NetworkCollaborators
 
PPTX
Nexus 7000 Series Innovations: M3 Module, DCI, Scale
Tony Antony
 
PDF
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...
Cisco Canada
 
PDF
Introduction to Segment Routing
MyNOG
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco Canada
 
Cisco Software Defined Access - новая архитектура для корпоративных кампусных...
Cisco Russia
 
The Data Center Network Evolution
Cisco Canada
 
Automate programmable fabric in seconds with an open standards based solution
Tony Antony
 
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
Nur Shiqim Chok
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
NetworkCollaborators
 
Pro curve cisco
hoanhanh
 
Gain Insight and Programmability with Cisco DC Networking
Cisco Canada
 
Gain Insight and Programmability with Cisco DC Networking
Cisco Canada
 
Cisco DC Networking: Gain Insight and Programmability with
Cisco Canada
 
Cisco Connect 2018 Malaysia - software-defined access-a transformational appr...
NetworkCollaborators
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
NetworkCollaborators
 
Elephant & mice flows
Jeff Green
 
18-20180514_SRv6_RIPE.pdf
YunLiu75
 
Brkaci 1090
almaz tt
 
Integration and Interoperation of existing Nexus networks into an ACI Archite...
Cisco Canada
 
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
NetworkCollaborators
 
Nexus 7000 Series Innovations: M3 Module, DCI, Scale
Tony Antony
 
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...
Cisco Canada
 
Introduction to Segment Routing
MyNOG
 
Ad

More from Robb Boyd (20)

PDF
Enterprise-Grade Trust: Collaboration Without Compromise
Robb Boyd
 
PDF
TechWiseTV Workshop - Q&A - Cisco Catalyst 9600: Deep Dive and Design Conside...
Robb Boyd
 
PDF
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
Robb Boyd
 
PDF
TechWiseTV Workshop - Q&A - Cisco Catalyst 9100 Access Points for Wi-Fi 6
Robb Boyd
 
PDF
TechWiseTV Workshop - Q&A - Application Hosting on the Cisco Catalyst 9000 Sw...
Robb Boyd
 
PPTX
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
Robb Boyd
 
PPTX
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
Robb Boyd
 
PDF
TechWiseTV Workshop 314 - Q&A Cisco SD-WAN Security
Robb Boyd
 
PPTX
The Enhanced Cisco Container Platform
Robb Boyd
 
PPTX
TechWiseTV Workshop: Improving Performance and Agility with Cisco HyperFlex
Robb Boyd
 
PPTX
TechWiseTV Workshop: SD-WAN Security
Robb Boyd
 
PPTX
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
Robb Boyd
 
PPTX
Protect Kubernetes Environments with Cisco Stealthwatch Cloud
Robb Boyd
 
PPTX
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Robb Boyd
 
PPTX
Infrastructure Solutions for Deploying AI/ML/DL Workloads at Scale
Robb Boyd
 
PDF
TechWiseTV Workshop Q&A: Cisco UCS C4200
Robb Boyd
 
PDF
TechWiseTV Workshop: Cisco UCS C4200
Robb Boyd
 
PDF
TechWiseTV Workshop: ASR 9000
Robb Boyd
 
PDF
TechWiseTV Workshop: Q&A Cisco Hybrid Cloud Platform for Google Cloud
Robb Boyd
 
PDF
TechWiseTV Workshop: Cisco SD-WAN
Robb Boyd
 
Enterprise-Grade Trust: Collaboration Without Compromise
Robb Boyd
 
TechWiseTV Workshop - Q&A - Cisco Catalyst 9600: Deep Dive and Design Conside...
Robb Boyd
 
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
Robb Boyd
 
TechWiseTV Workshop - Q&A - Cisco Catalyst 9100 Access Points for Wi-Fi 6
Robb Boyd
 
TechWiseTV Workshop - Q&A - Application Hosting on the Cisco Catalyst 9000 Sw...
Robb Boyd
 
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
Robb Boyd
 
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
Robb Boyd
 
TechWiseTV Workshop 314 - Q&A Cisco SD-WAN Security
Robb Boyd
 
The Enhanced Cisco Container Platform
Robb Boyd
 
TechWiseTV Workshop: Improving Performance and Agility with Cisco HyperFlex
Robb Boyd
 
TechWiseTV Workshop: SD-WAN Security
Robb Boyd
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
Robb Boyd
 
Protect Kubernetes Environments with Cisco Stealthwatch Cloud
Robb Boyd
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Robb Boyd
 
Infrastructure Solutions for Deploying AI/ML/DL Workloads at Scale
Robb Boyd
 
TechWiseTV Workshop Q&A: Cisco UCS C4200
Robb Boyd
 
TechWiseTV Workshop: Cisco UCS C4200
Robb Boyd
 
TechWiseTV Workshop: ASR 9000
Robb Boyd
 
TechWiseTV Workshop: Q&A Cisco Hybrid Cloud Platform for Google Cloud
Robb Boyd
 
TechWiseTV Workshop: Cisco SD-WAN
Robb Boyd
 
Ad

Recently uploaded (20)

PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
July Patch Tuesday
Ivanti
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
July Patch Tuesday
Ivanti
 

TechWiseTV Workshop: Software-Defined Access

  • 2. © 2017 Cisco and/or itsaffiliates. All rightsreserved. 2
  • 3. © 2017 Cisco and/or itsaffiliates. All rightsreserved.  Campus Fabric – Shipping Now CLI or API form of the new overlay Fabric solution for your enterprise Campus access networks. CLI approach provides backwards compatibility and customization, Box-by-Box. API approach provides automation via NETCONF / YANG. APIC-EM, ISE, NDP are all separate. BB What is SD-Access? Campus Fabric + DNA Center (Automation & Assurance) APIC-EM 1.X  SD-Access – Available Aug 2017 GUI approach provides automation & assurance of all Fabric configuration, management and group-based policy. Leverages DNA Center to integrate external Service Apps, to orchestrate your entire LAN, Wireless LAN and WAN access network. Campus Fabric ISE NDP APIC-EM 2.0 ISE NDP DNA Center 3 C
  • 4. © 2017 Cisco and/or itsaffiliates. All rightsreserved. APIC-EM ISE NDP  Control-Plane Nodes – Map System that manages Endpoint to Device relationships  Fabric Edge Nodes – A Fabric device (e.g. Access or Distribution) that connects Wired Endpoints to the SDA Fabric  Identity Services – External ID Systems (e.g. ISE) are leveraged for dynamic Endpoint to Group mapping and Policy definition  Fabric Border Nodes – A Fabric device (e.g. Core) that connects External L3 network(s) to the SDA Fabric Identity Services Intermediate Nodes (Underlay) Fabric Border Nodes Fabric Edge Nodes  DNA Controller – Enterprise SDN Controller provides GUI management and abstraction via Service Apps, that share information DNA Controller  Analytics Engine – External Data Collectors (e.g. NDP) are leveraged to analyze Endpoint to App flows and monitor fabric status Analytics Engine C Control-Plane Nodes B What is SD-Access? Fabric Roles & Terminology B  Fabric Wireless Controller – A Fabric device (WLC) that connects Wireless Endpoints to the SDA Fabric 4 Fabric Wireless Controller Campus Fabric
  • 5. © 2017 Cisco and/or itsaffiliates. All rightsreserved. SD-Access – Control-Plane Platform Support 5 Catalyst 9500 • Catalyst 9500 • 10/40G SFP/QSFP • 10/40G NM Cards • IOS-XE 16.6.1+ Catalyst 3K • Catalyst 3850 • 1/10G SFP • 10/40G NM Cards • IOS-XE 16.6.1+ Catalyst 6K • Catalyst 6800 • Sup2T/6T • 6880-X or 6840-X • IOS 15.5.1SY+ ASR1K, ISR4K & CSRv • CSRv • ASR 1000-X/HX • ISR 4430/4450 • IOS-XE 16.6.1+ NEW
  • 6. © 2017 Cisco and/or itsaffiliates. All rightsreserved. SD-Access – Border Node Platform Support 6 Catalyst 9500 • Catalyst 9500 • 40G QSFP • 10/40G NM Cards • IOS-XE 16.6.1+ Nexus 7K • Nexus 7700 • Sup2E • M3 Cards • NXOS 7.3.2+ Catalyst 3K • Catalyst 3850 • 1/10G SFP+ • 10/40G NM Cards • IOS-XE 16.6.1+ ASR1K & ISR4K • ASR 1000-X/HX • ISR 4430/4450 • 1/10G/40G • IOS-XE 16.6.1+ Catalyst 6K • Catalyst 6800 • Sup2T/6T • 6880-X or 6840-X • IOS 15.5.1SY+ NEW
  • 7. © 2017 Cisco and/or itsaffiliates. All rightsreserved. SD-Access – Edge Node Platform Support 7 Catalyst 9400 • Catalyst 9400 • Sup1E • 9400 Cards • IOS-XE 16.6.1+ Catalyst 4K • Catalyst 4500 • Sup8E/9E (Uplinks) • 4700 Cards (Down) • IOS-XE 3.10.1+ Catalyst 3K • Catalyst 3650/3850 • 1/MGIG RJ45 • 10/40G NM Cards • IOS-XE 16.6.1+ Catalyst 9300 • Catalyst 9300 • 1/MGIG RJ45 • 10/40/mG NM Cards • IOS-XE 16.6.1+ NEW NEW
  • 8. © 2017 Cisco and/or itsaffiliates. All rightsreserved. SD-Access – Fabric Wireless Platform Support * Some caveats with Wave 1 APs. Check release notes. 8 Wave 2 APs • 1800/2800/3800 • 11ac Wave2 APs • 1G/mGIG RJ45 • AireOS 8.5+ 5500 WLC • AIR-CT5520 • No 5508 • 1G/10G SFP+ • AireOS 8.5+ 8500 WLC • AIR-CT8540 • 8510 supported • 1G/10G SFP+ • AireOS 8.5+ Wave 1 APs* • 1700/2700/3700 • 11ac Wave1 APs* • 1G RJ45 • AireOS 8.5+ 3504 WLC • AIR-CT3504 • 1G/mGig • AireOS 8.5+ NEW NEW
  • 9. © 2017 Cisco and/or itsaffiliates. All rightsreserved. 1. Control-Plane based on LISP 2. Data-Plane based on VXLAN 3. Policy-Plane based on CTS SD-Access Key Components Key Differences • L2 + L3 Overlay -vs- L2 or L3 Only • Host Mobility with Anycast Gateway • Adds VRF + SGT into Data-Plane • Virtual Tunnel Endpoints (No Static) • No Topology Limitations (Basic IP)
  • 10. © 2017 Cisco and/or itsaffiliates. All rightsreserved. Endpoint Routes are Consolidated to LISP DB Topology + Endpoint Routes BEFORE IP Address = Location + Identity Prefix Next-hop 189.16.17.89 …......171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 …....171.68.228.121 189.16.17.89 …....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 …......171.68.226.120 192.58.28.128 ….....171.68.228.121 189.16.17.89 …....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 …......171.68.226.120 192.58.28.128 ….....171.68.228.121 189.16.17.89 ….....171.68.226.120 22.78.190.64 …......171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 ….....171.68.228.121 Prefix Next-hop 189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 …....171.68.228.121 189.16.17.89 …....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 …......171.68.226.120 192.58.28.128 ….....171.68.228.121 189.16.17.89 …....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 …......171.68.226.120 192.58.28.128 ….....171.68.228.121 189.16.17.89 ….....171.68.226.120 22.78.190.64 …......171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 ….....171.68.228.121 Prefix Next-hop 189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 …....171.68.228.121 189.16.17.89 …....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 …......171.68.226.120 192.58.28.128 ….....171.68.228.121 189.16.17.89 …....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 …......171.68.226.120 192.58.28.128 …......171.68.228.121 189.16.17.89 ….....171.68.226.120 22.78.190.64 …......171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 ….....171.68.228.121 Routing Protocols = Big Tables & More CPU with Local L3 Gateway Host Mobility Location ID Separation Protocol Map-Based On-Demand Host-Routing Mapping Database Only Local Routes Prefix RLOC 192.58.28.128 ….....171.68.228.121 189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 ….....171.68.228.121 192.58.28.128 ….....171.68.228.121 189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 ….....171.68.228.121 Prefix Next-hop 189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 …....171.68.228.121 Prefix Next-hop 189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 …....171.68.228.121 Prefix Next-hop 189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 …....171.68.228.121 AFTER Separate Identity from Location Topology Routes Endpoint Routes LISP DB + Cache = Small Tables & Less CPU with Anycast L3 Gateway 1. Control-Plane based on LISP
  • 11. © 2017 Cisco and/or itsaffiliates. All rightsreserved. Map Server / Resolver • EID to RLOC Mappings • Can be distributed across multiple LISP devices Tunnel Router - XTR • Edge Devices Encap / Decap • Ingress / Egress (ITR / ETR) Proxy Tunnel Router - PXTR • Connects between LISP and non-LISP domains • Ingress / Egress (PITR / PETR) EID = End-point Identifier • Host Address or Subnet RLOC = Routing Locator • Local Router Address Prefix Next-hop w.x.y.1 e.f.g.h x.y.w.2 e.f.g.h z.q.r.5 e.f.g.h z.q.r.5 e.f.g.h Non-LISP RLOC Space EID RLOC a.a.a.0/24 w.x.y.1 b.b.b.0/24 x.y.w.2 c.c.c.0/24 z.q.r.5 d.d.0.0/16 z.q.r.5 EID RLOC a.a.a.0/24 w.x.y.1 b.b.b.0/24 x.y.w.2 c.c.c.0/24 z.q.r.5 d.d.0.0/16 z.q.r.5 EID RLOC a.a.a.0/24 w.x.y.1 b.b.b.0/24 x.y.w.2 c.c.c.0/24 z.q.r.5 d.d.0.0/16 z.q.r.5 Locator / ID Separation Protocol LISP Roles & Responsibilities EID Space Map System EID Space ETR ITR PXTR 11
  • 12. © 2017 Cisco and/or itsaffiliates. All rightsreserved. SD-Access Fabric Key Components – Virtual eXtensible LAN ORIGINAL PACKET PAYLOADETHERNET IP PACKET IN LISP PAYLOADIPLISPUDPIPETHERNET PAYLOADETHERNET IPVXLANUDPIPETHERNET PACKET IN VXLAN Supports L2 & L3 Overlay Supports L3 Overlay 1. Control-Plane based on LISP 2. Data-Plane based on VXLAN
  • 13. © 2017 Cisco and/or itsaffiliates. All rightsreserved. VXLAN-GPO Header MAC-in-IPwith VN ID & Group ID Underlay Outer IP Header Outer MAC Header UDP Header VXLAN Header Overlay 14 Bytes (4 Bytes Optional) Ether Type 0x0800 VLAN ID VLAN Type 0x8100 Source MAC Dest. MAC 48 48 16 16 16 20 Bytes Dest. IP Source IP Header Checksum Protocol 0x11 (UDP) IP Header Misc.Data 72 8 16 32 32 8 Bytes Checksum 0x0000 UDP Length Dest Port Source Port 16 16 16 16 8 Bytes Reserved VN ID Segment ID VXLAN Flags RRRRIRRR 8 16 24 8 Src VTEP MAC Address Next-Hop MAC Address Allows 16M possible VRFs UDP 4789 Hash of inner L2/L3/L4 headers of original frame. Enables entropy for ECMP load balancing. Inner (Original) IP Header Original Payload Inner (Original) MAC Header Allows 64K possible SGTs Dst RLOC IP Address Src RLOC IP Address 13
  • 14. © 2017 Cisco and/or itsaffiliates. All rightsreserved. PAYLOADETHERNET IPVXLANUDPIPETHERNET SD-Access Fabric Key Components – Cisco TrustSec VRF + SGT Virtual Routing & Forwarding Scalable Group Tagging 1. Control-Plane based on LISP 2. Data-Plane based on VXLAN 3. Policy-Plane based on CTS
  • 15. © 2017 Cisco and/or itsaffiliates. All rightsreserved. Cisco TrustSec Simplified access control with Group Based Policy VLAN BVLAN A Campus Switch DC Switch or Firewall Application Servers ISE Enterprise Backbone Enforcement Campus Switch Voice Employee Supplier Non-CompliantVoiceEmployeeNon-Compliant Shared Services Employee Tag Supplier Tag Non-Compliant Tag DC switch receives policy for only what is connected Classification Static or Dynamic SGT assignments Propagation Carry “Group” context through the network using only SGT Enforcement Group Based Policies ACLs, Firewall Rules 15
  • 16. © 2017 Cisco and/or itsaffiliates. All rightsreserved. Packet Flow in Fabric VXLAN Encapsulation IP Network Edge Node 1 Edge Node 2 Encapsulation Decapsulation VXLAN VN ID SGT ID VXLAN VN ID SGT ID Propagation Carry VN and Group context across the network Enforcement Group Based Policies ACLs, Firewall Rules Classification Static or Dynamic VN and SGT assignments 16
  • 17. © 2017 Cisco and/or itsaffiliates. All rightsreserved. Cisco APIC-EM 2.0 App Policy Infra Controller –EN Module Cisco ISE 2.3 Identity Services Engine Cisco NDP 1.0 Network Data Platform Cisco Switches |Cisco Routers | Cisco Wireless DNA Center 1.0 AAA RADIUS EAPoL HTTPS NetFlow Syslogs NETCONF SNMP SSH API API API API API Campus Fabric SD-Access DNA Center – Service Components Design | Provision | Policy | Assurance 17
  • 18. © 2017 Cisco and/or itsaffiliates. All rightsreserved. Policy • Virtual Networks • ISE, AAA, Radius • Endpoint Groups • Group Policies As s ure Design • Global Settings • Site Profiles • DDI, SWIM, PNP • User Access Provision • Fabric Domains • CP, Border, Edge • FEW / OTT WLAN • External Connect Assurance • Network Health • 360o Views • FD, Device, Client • Path Traces Planning & Preparation Installation & Integration 18 As s ure As s ure Prov is ion As s ure DNA Center SD-Access 4 Step Workflow
  • 19. © 2017 Cisco and/or itsaffiliates. All rightsreserved. The First Step… 19
  • 20. Thank you for watching!