28 - Examining the Cisco SD-Access solution Flashcards
Cisco SD-Access is part of the Cisco ___. ___ also includes Software defined WAN and the Application Centric Infrastructure (ACI)
Digital Network Architecture (CDN)
The campus fabric architecture enables the use of __ networks (overlay) that are running on a __ network (underlay) to create alternative topologies to connect devices. Overlay networks are commonly used to provide L2 and L3 logical networks with virtual machine mobility in data centre fabrics (ACI, VXLAN, fabricpath) and also in WANs to provide secure tunnelling from remote sites (MPLS, DMVPN, GRE).
virtual, physical
___ network – defined by the physical switches and routers that are parts of the campus fabric. All network elements of the underlay network must establish IP connectivity via the use of a routing protocol. Theoretically any topology and routing protocol can be used, but the implementation of a well designed L3 foundation to the campus edge is highly recommended.
Underlay
___ network – runs over the underlay to create a virtualised network. Virtual networks isolate both data plane traffic and control plane behaviour among the virtualised networks from the underlay network. Virtualisation is achieved inside the campus fabric by encapsulating user traffic over IP tunnels that are sourced and terminated that the boundaries of the fabric.
Overlay
__ overlays – emulate a LAN segment and can be used to transport IP and non-IP frames. __ overlays carry a single subnet over the L3 underlay. __ overlays are useful in emulating physical topologies and are subject to L2 flooding.
Layer 2
___ overlays – abstract IP-based connectivity from physical connectivity and allow multiple IP networks as parts of each virtual network. Overlapping IP address space is supported across different __ overlays as long as the network virtualisation is preserved outside of the fabric, using existing network virtualisation functions such as VRF-lite and MPLS L3 VPN.
Layer 3
With the demand for new services, __ is the key consideration. __ is a critical component of managing modern networks. Organisations need to appropriately protect resources and make changes efficiently in response to real-time needs. Tracking VLANs, ACLs, and IP addresses to ensure that optimal policy and security compliance can be challenging. The overlay network approach solves these problems.
security
The fabric underlay provisioning can be done __ and __.
manual, automated
With manual underlay you can reuse your __ IP network as the fabric underlay.
existing
What are the key requirements for a manual underlay?
- IP reached from edge to edge, border, CP
- Can be L2 or L3 (L3 recommended)
- Can be any IGP (ISIS recommended for scalability and integration with DNAC
What are the key considerations for a manual underlay?
- MTU (fabric header adds 50 bytes)
* Latency (RTT of =/< 100ms)
What are the key requirements for an automated underlay?
- User standard PnP for bootstrap
- Assumes a new or erased configuration
- Users a global “underlay” address pool
What are the key considerations for an automated underlay?
- PnP pre-setup is required
* 100% prescriptive (not custom)
In the traditional internet architecture, the IP address of an endpoint denotes both its location and identity. Using the same value for both endpoint location and identity severely limits the security and management of traditional enterprise networks. ___ is a protocol that enables the separation of endpoint identification and its location.
Locator Identity Separation Protocol (LISP)
When using LISP, the device IP address represents only the device __. When the device moves its IP address remains the same in both locations, and only the __changes.
identity, location ID
LISP is a routing ___ that provides new semantics for IP addressing.
architecture
The LISP routing architecture design separates the device identity, or endpoint identifier (EID), from its location, or routing locator (RLOC), into two different numbering spaces. Splitting the EID and RLOC functions yields several advantages. One such advantage is host __.
mobility
What are the LISP name spaces?
- Endpoint identifier (EID) addresses – IP addresses and prefixes identifying the endpoints. EID reachability across LISP sites is achieved by resolving EID-to-RLOC mappings.
- Routing locator (RLOC) addresses – IP addresses and prefixes identifying the different routers in the IP network. Reachability within RLOC space is achieved by traditional routing methods.
LISP uses a ___ routing model in which traffic that is destined for an EID is encapsulated and sent to an authoritative RLOC. This process is done rather than sending directly to the destination EID. It is based on the results of a lookup in a mapping database.
map-and-encapsulate
LISP uses a ___ protocol approach rather than requiring a pre-configuration of tunnel endpoints. It is designed to work in a multihoming environment, and it supports communications between LISP and non-LISP sites for interworking.
dynamic tunnelling encapsulation
An __ is a LISP site edge device that receives packets from site-facing interfaces (internal hosts) and encapsulates them to remote LISP sites, or natively forwards them to non-lisp sites.
Ingress tunnel router (ITR)
An __ is a LISP site edge device that receives packets from core-facing interfaces (the transport infrastructure), de-encapsulates LISP packets and delivers them to local EIDs at the site
Egress tunnel router (ETR)
A __ is a LISP infrastructure device that LISP-site ETRs register their EID prefixes to. The __ stores registered EID prefixes in a mapping database where they are associated to RLOCs. All LISP sites use the LISP-mapping system to resolve EID-to-RLOC mappings
Map server (MS)
A __ is a LISP infrastructure device to which LISP site ITRs send LISP map-request queries when resolving EID-to-RLOC mappings
Map resolver (MR)
A __ is a LISP infrastructure device that provides connectivity between non-LISP sites and lisp sites by attaching non-LSP traffic that is destined to lisp sites and encapsulating this traffic to ETRs devices that are deployed at LISP sites
Proxy ITR (PITR)