28 - Examining the Cisco SD-Access solution Flashcards

1
Q

Cisco SD-Access is part of the Cisco ___. ___ also includes Software defined WAN and the Application Centric Infrastructure (ACI)

A

Digital Network Architecture (CDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The campus fabric architecture enables the use of __ networks (overlay) that are running on a __ network (underlay) to create alternative topologies to connect devices. Overlay networks are commonly used to provide L2 and L3 logical networks with virtual machine mobility in data centre fabrics (ACI, VXLAN, fabricpath) and also in WANs to provide secure tunnelling from remote sites (MPLS, DMVPN, GRE).

A

virtual, physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ network – defined by the physical switches and routers that are parts of the campus fabric. All network elements of the underlay network must establish IP connectivity via the use of a routing protocol. Theoretically any topology and routing protocol can be used, but the implementation of a well designed L3 foundation to the campus edge is highly recommended.

A

Underlay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ network – runs over the underlay to create a virtualised network. Virtual networks isolate both data plane traffic and control plane behaviour among the virtualised networks from the underlay network. Virtualisation is achieved inside the campus fabric by encapsulating user traffic over IP tunnels that are sourced and terminated that the boundaries of the fabric.

A

Overlay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__ overlays – emulate a LAN segment and can be used to transport IP and non-IP frames. __ overlays carry a single subnet over the L3 underlay. __ overlays are useful in emulating physical topologies and are subject to L2 flooding.

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ overlays – abstract IP-based connectivity from physical connectivity and allow multiple IP networks as parts of each virtual network. Overlapping IP address space is supported across different __ overlays as long as the network virtualisation is preserved outside of the fabric, using existing network virtualisation functions such as VRF-lite and MPLS L3 VPN.

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

With the demand for new services, __ is the key consideration. __ is a critical component of managing modern networks. Organisations need to appropriately protect resources and make changes efficiently in response to real-time needs. Tracking VLANs, ACLs, and IP addresses to ensure that optimal policy and security compliance can be challenging. The overlay network approach solves these problems.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The fabric underlay provisioning can be done __ and __.

A

manual, automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

With manual underlay you can reuse your __ IP network as the fabric underlay.

A

existing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the key requirements for a manual underlay?

A
  • IP reached from edge to edge, border, CP
  • Can be L2 or L3 (L3 recommended)
  • Can be any IGP (ISIS recommended for scalability and integration with DNAC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the key considerations for a manual underlay?

A
  • MTU (fabric header adds 50 bytes)

* Latency (RTT of =/< 100ms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the key requirements for an automated underlay?

A
  • User standard PnP for bootstrap
  • Assumes a new or erased configuration
  • Users a global “underlay” address pool
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the key considerations for an automated underlay?

A
  • PnP pre-setup is required

* 100% prescriptive (not custom)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the traditional internet architecture, the IP address of an endpoint denotes both its location and identity. Using the same value for both endpoint location and identity severely limits the security and management of traditional enterprise networks. ___ is a protocol that enables the separation of endpoint identification and its location.

A

Locator Identity Separation Protocol (LISP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When using LISP, the device IP address represents only the device __. When the device moves its IP address remains the same in both locations, and only the __changes.

A

identity, location ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

LISP is a routing ___ that provides new semantics for IP addressing.

A

architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The LISP routing architecture design separates the device identity, or endpoint identifier (EID), from its location, or routing locator (RLOC), into two different numbering spaces. Splitting the EID and RLOC functions yields several advantages. One such advantage is host __.

A

mobility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the LISP name spaces?

A
  • Endpoint identifier (EID) addresses – IP addresses and prefixes identifying the endpoints. EID reachability across LISP sites is achieved by resolving EID-to-RLOC mappings.
  • Routing locator (RLOC) addresses – IP addresses and prefixes identifying the different routers in the IP network. Reachability within RLOC space is achieved by traditional routing methods.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

LISP uses a ___ routing model in which traffic that is destined for an EID is encapsulated and sent to an authoritative RLOC. This process is done rather than sending directly to the destination EID. It is based on the results of a lookup in a mapping database.

A

map-and-encapsulate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

LISP uses a ___ protocol approach rather than requiring a pre-configuration of tunnel endpoints. It is designed to work in a multihoming environment, and it supports communications between LISP and non-LISP sites for interworking.

A

dynamic tunnelling encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An __ is a LISP site edge device that receives packets from site-facing interfaces (internal hosts) and encapsulates them to remote LISP sites, or natively forwards them to non-lisp sites.

A

Ingress tunnel router (ITR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An __ is a LISP site edge device that receives packets from core-facing interfaces (the transport infrastructure), de-encapsulates LISP packets and delivers them to local EIDs at the site

A

Egress tunnel router (ETR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A __ is a LISP infrastructure device that LISP-site ETRs register their EID prefixes to. The __ stores registered EID prefixes in a mapping database where they are associated to RLOCs. All LISP sites use the LISP-mapping system to resolve EID-to-RLOC mappings

A

Map server (MS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A __ is a LISP infrastructure device to which LISP site ITRs send LISP map-request queries when resolving EID-to-RLOC mappings

A

Map resolver (MR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A __ is a LISP infrastructure device that provides connectivity between non-LISP sites and lisp sites by attaching non-LSP traffic that is destined to lisp sites and encapsulating this traffic to ETRs devices that are deployed at LISP sites

A

Proxy ITR (PITR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A __ is a LISP infrastructure device that allows EIDs at LISP sites to successfully communicate with devices that are located at non-LISP sites

A

Proxy ETR (PETR)

27
Q

Also known as ALT, is a device that you deploy to build out an overlay network that provides a mechanism for managing EID prefix aggregation. It advertises EID prefixes in an alternative BGP topology over GRE, including the MR.

A

Alternative topology

28
Q

The fabric control plane is based on LISP which has its own encapsulation. LISP has one limitation that it only supports only L3 overlay. It cannot carry the MAC address as it discards the L2 ethernet header. In Cisco SD-Access fabric, the MAC address also needs to be carried and so, ___ is used in the data plane.

A

VXLAN

29
Q

__ supports both L2 and L3 overlay. It preserves the original Ethernet header.

A

VXLAN

30
Q

VXLAN is designed to provide the same L2 network services as VLAN does, but with greater __ and __.

A

extensibility, flexibility

31
Q

VLANs have several features that make them a limiting factor is date centre networks:

A
  • Inefficient use of available network links
  • Rigid requirements on device placement
  • Limited scalability
32
Q

VXLAN offers the following benefits:

A
  • Flexible placement of multitenant segments throughout the DC. VXLAN extends L2 segments over the underlay L3 network, crossing traditional L2 boundaries
  • Supports 16 million coexistent segments
  • Better utilisation of available network paths. Because VLAN uses STP which blocks redundant paths, you may not end up using half of the links. VXLAN packets are transferred through the underlying network based on its L3 header.
33
Q

The VXLAN is a L2 overlay scheme over a L3 network. It uses the __ encapsulation to extend L2 segments across the DC network.

A

MAC-in-UDP

34
Q

VXLAN uses __ devices to map devices in local segments to VXLAN segments. __ performs encapsulation and de-encapsulation of the L2 traffic. Each __ has at least two interfaces: a switch interface on the local LAN segment and an IP interface in the transport IP network.

A

VTEP

35
Q

The VXLAN is a relatively new technology, so data centres contain devices that are not capable of supporting VXLAN, such as legacy hypervisors, physical servers, and network services appliances. Those devices reside on classic VLAN segments. You would enable VLAN-VXLAN connectivity by using a ___ . A __ is a VTEP device that combines a VXLAN segment and a classic VLAN segment into one common L2 domain.

A

VXLAN L2 gateway

36
Q

A __, also known as a VXLAN router, routes between different VXLAN segments.

A

VXLAN L3 gateway

37
Q

VXLAN ___is the latest version of VXLAN. It adds special fields in the header to carry the virtual network IDs and SGTs. The outer part of the header consists of the IP and MAC. It uses a UDP header with a source and destination port. The source port is a hash value that is created using the original source information and prevents polarisation in the underlay. The destination port is always 4789. The frame can be identified as a VXLAN frame using a specific UDP designation port number. The VXALN header has special reserved fields to carry the SGT and virtual ID information.

A

Group Policy Extension (GPO)

38
Q

The campus fabric is composed of fabric __ nodes, __ nodes, __ nodes, and __ nodes.

A

control plane , edge , intermediate , border

39
Q

__ nodes – map system that manages Endpoint ID to Device relationships

A

Control plane

40
Q

__ nodes – a fabric devices (e.g core) that connects external L3 networks to the SD-Access fabric

A

Border

41
Q

__ nodes – a fabric device (e.g access or distribution) that connects wired endpoints to the SD-Access fabric

A

Edge

42
Q

Fabric ___ – WLC that is fabric-enabled

A

Wireless controller

43
Q

Fabric ___ – APs that are fabric enabled

A

Mode APs

44
Q

__ nodes – the underlay

A

intermediate

45
Q

The SD-Access fabric __ node is based on the LISP map server (MS) and map-resolver (MR) functionality combined on the same node.

A

control plane

46
Q

The control plane node enables the following functions

A
  • Host tracking database- HTDB is a central repository of EiD to fabric edge node bindings
  • Map server – the LISP MS is used to populate the HTDB from registration messages from fabric edge devices
  • Map resolver – the LISP MR is used to respond to map queries from fabric edge devices requesting RLOC-mapping information for destination EIDs.
47
Q

The SD-Access fabric edge nodes are the equivalent of an access layer switch in a traditional campus LAN design. The edge nodes implement a L3 access design with the addition of the following fabric functions:

A
  • Endpoint registration – after an endpoint is detected by the fabric edge, it is added the a local host tracking database called the EID-table.
  • Mapping of user to virtual network – endpoints are places in virtual networks by assigning the endpoint to a VLAN
  • Anycast L3 gateway – a common gateway (IP and MAC addresses) can be used at every node that shares a common EID subnet providing optimal forwarding and mobility across different RLOCs
  • LISP forwarding – instead of a typical routing-based decision, the fabric edge nodes query the map resolve to determine the RLOC associated with the destination EID and use that information as the traffic destination
  • VXLAN encapsulation /de-encapsulation – the fabric edge nodes use the RLOC associated with the destination IP address to encapsulate the traffic with VXLAN headers.
48
Q

The ___ nodes serve as the gateway between the SD-Access fabric site and the networks external to the fabric. The fabric border node is responsible for network virtualisation interworking and SGT propagation from the fabric to the rest of the network.

A

fabric border

49
Q

Border nodes implement the following functions:

A
  • Advertisement of EID subnets – SD access configures BGP as the preferred routing protocol used to advertise the EID prefixes outside the fabric and traffic destined to EID subnets from outside the fabric goes through the border nodes.
  • Fabric domain exit point - the external fabric border is the gateway of last resort for the fabric edge nodes
  • Mapping of LISP instance to VRF – the fabric border can extend network virtualisation from inside the fabric to outside the fabric by using external VRF instances to preserve virtualisation
  • Policy mapping – the fabric border node also maps SGT information from within the fabric to be appropriately maintained when exiting the fabric.
50
Q

The fabric __ nodes are part of the L3 network that interconnects the edge nodes to the border nodes. In a three-tier campus design using a core, distribution, and access, the fabric intermediate nodes are the equivalent of the distribution switches.

A

intermediate

51
Q

Integrates with the control plane for wireless and the fabric control plane. Both __ and non-fabric WLCs provide AP image and configuration management, client session management, and mobility services. __ provide additional services for fabric integration by registering MAC addresses of wireless clients into the host tracking database of the fabric control plane during wireless client join events and by supplying fabric edge RLOC location updates during client roam events

A

Fabric WLC

52
Q

APs are Cisco 802.11AC wave 2 and wave 1 APs associated with the fabric WLC that have been configured with one or more fabric-enabled SSIDs

A

Fabric mode AP

53
Q

For sites where a single switch or switch stack is supporting all the Ethernet connectivity at that site, SD-Access is available without having to deploy separate devices for each fabric role

A

Fabric in a box

54
Q

Create a ___ by assigning control plane node, edge node, and border node functionality to a single switch device

A

fabric in a box

55
Q

Cisco SD-Access automates user access policy so organisations can make sure that the right policies are established for any user or device with any application access the network. The two most important solution components are Cisco __ and Cisco __.

A

ISE, DNA centre

56
Q

How does Cisco ISE integrate in SD-Access?

A
  • Part of SD-Access for policy implementation, enabling dynamic mapping of users and devices to scalable groups and simplifying end-to-end policy enforcement
  • Users and devices shown in a simple and flexible interface
  • Integrates with Cisco DNAC by using Cisco Platform Exchange Grid (pxGrid) and REST APIs for exchange of client information and automation
57
Q

How does DNAC integrate in SD-Access?

A
  • SD access is enabled with an application package that runs as part of Cisco DNA software for designing, provisioning, applying policy, and facilitating the creation of an intelligent campus wired and wireless network with assurance.
  • Centrally manages major configuration and operations workflow areas
58
Q

What are the 5 elements of the DNA centre SD-Access workflow?

A
  • Design
  • Policy
  • Provision
  • Assurance
  • Platform
59
Q

Configures device global settings, network site profiles for physical device inventory, DNS, DHCP, IP address, software image management, plug-and-play, and user access

A

Design

60
Q

Defines business intent for provisioning the network, including creation of virtual networks, assignment of endpoints to virtual networks, and policy contract definition for groups

A

Policy

61
Q

Provisions devices for management and creates fabric domains, control plane nodes, border nodes, edge nodes, fabric wireless.

A

Provision

62
Q

Enables proactive monitoring and insights to confirm that user experience meets configured intent, using network, client, and application health dashboards, issue management, and sensor-driven testing

A

Assurance

63
Q

Allows programmatic access to the network and system integration with third-party systems using APIs, using feature set bundles, configurations, a run-time dashboard, and a developer toolkit.

A

Platform

64
Q

Some benefits of SD access wireless are:

A
  • Centralized wireless control plane
  • Optimised distributed data plane
  • Seamless L2 roaming everywhere
  • Simplified guest and mobility tunnelling
  • Policy simplification
  • Segmentation made easy