Cisco Digital Network Architecture (DNA) Center Flashcards

1
Q

Cisco Digital Network Architecture (DNA) Cente

A

a powerful management system that leverages artificial intelligence (AI) to connect, secure, and automate network operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNA Center Benefits

A

Get the network up and running faster with intelligent and automated provisioning.

Save valuable human capital with automation of routine administrative tasks.

Reduce outages and minimize business impact with AI-driven insights and predictive performance analytics.

Realize efficiencies of business process automation using an integrated Cisco and third-party ecosystem and leveraging the Cisco DNA Center application programming interfaces (APIs).

Deliver optimal user experience with deep insights into application performance and end-users’ application experience.

Secure the digital enterprise with intuitive security policy management, strong AI-driven enforcement, and zero-trust network access.

Help the organization achieve sustainability goals by managing IT energy and enabling smart buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNA Center Components

A

These are Cisco DNA Center components:

Design with physical maps and logical topologies.

Policy to define user and device profiles that facilitate highly secure access and network segmentation.

Provisioning for policy-based automation to deliver services to the network.

Assurance to combine deep insights with rich context to deliver a consistent experience and proactively optimize your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DNA Center Capabilities

A

AIOps is an AI-driven visibility, observability, insights, and troubleshooting to ensure the health of your users, applications, and infrastructure.

NetOps is an automation to simplify the creation and maintenance of your networks with flexibility to move from manual to AI-assisted to selectively autonomous network management.

SecOps is an AI-driven security to classify endpoints and enforce security policies for a complete zero trust workplace solution.

DevOps is a mature APIs, software development kits (SDKs), and closed-loop integrations to simplify and streamline ecosystem integration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNA Center NetOps Tools

A

These are Cisco DNA Center NetOps tools:

Inventory updates, EoX, credential status, port groups

Discovery improvements

Multiple access point (AP) groups and policy tags on the same floor

Granular software upgrade workflow and troubleshooting

CLI template compliance and compliance reports

Return Materials Authorization (RMA) support for modular switches and zero touch fabric RMA

Flexible AP refresh workflow

Enhanced learn device configuration workflow

AP provisioning enhancements

Enhanced User Defined Network (UDN) administration and troubleshooting

6 GHZ radio configuration

Historical trends for Cisco DNA license consumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intent-Based Networking (IBN)

A

provides three principal functional building blocks, as shown in the following figure—the capability to capture intent, functions to automate the deployment of the expressed intent throughout the network infrastructure, and the ability to provide assurance that the desired intent is being realized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IBN Translation

A

Translation: Translation involves several functions in an intent-based model. One or more operators or groups of operators have the capability to characterize their desired intent, which may take the form of an easy-to-use GUI, an abstracted model (such as Yet Another Next Generation [YANG] or JavaScript Object Notation [JSON]/XML) that is intuitive and related to the business objectives, or even a predefined syntax or language. It can be defined by application developers as part of a continuous integration and delivery process, or in the future, it may even be achieved through text-to-speech expressions, in which operators verbally speak intent, and the intent-based system executes and provides verbal or other feedback. This abstract and business-near expression of what the network should do differentiates an intent-based approach from traditional network architectures.

Another capability of translation is to harmonize the captured intent into a common model-based policy, often with the help of a controller-based architecture. Intent expressed by various input mechanisms, potentially across multiple network domains, is translated into such standard model-based policies—a foundational step to use automation and allow sophisticated consistency and integrity checks to be applied. An important challenge relates to moving from a traditional network deployment to an IBN deployment. In this case, there are already policies in effect in the current network, but the network operator may or may not have a list or full visibility of all the currently deployed policies. Therefore, it is important to perform automatic host discovery and policy discovery to identify the policies in operation, to provide the operator with full visibility of all the running policies for review, and then to activate the desired policies automatically in the IBN deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IBN Activation

A

Activation: Activation functions ensure that the derived model-based policies are disseminated throughout any of the relevant network domains. The physical or virtual network functions in an IBN can be managed in different operational domains (data center, WAN, branches, campuses) by the same or different operational teams. The orchestration function in an intent-based network allows for the dissemination of model-based policies into the relevant domains—meaning that policies can also be limited in scope to particular parts of the network.

Activation may also employ additional functions to further derive the appropriate device configurations. A domain controller can correlate the information about the network elements, their capabilities, and the topology. Additional checks for consistency at the configuration level may also be applied before programming the network elements using standards-based APIs, such as Network Configuration Protocol (NETCONF), YANG, or Representational State Transfer (REST).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IBN Assurance

A

Assurance: Assurance is a critical function of intent-based networking. It uses contextual analysis of data to provide validation that the intent has been applied as intended, and also continuously verifies that the desired outcomes are actually being achieved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IBN Assurance Aspects

A

Continuous verification: Continuously verify the IBN system behavior before, during, and after deployment. Check that the system behavior is aligned to the expressed intent at any point in time. This capability requires ongoing observation of the network element states and events. Intent-based telemetry data specifically measures the performance of the expressed intent and is continuously collected and reported to the IBN assurance functions. Assurance algorithms, ranging from formal mathematical models to approaches based on telemetry and machine learning, guarantee that the network state and behavior are coherent with the desired intent at both the domain and cross-domain levels.

Insights and visibility: Derive insights based on analytics—correlate events and apply machine learning and artificial intelligence for validation, understanding, and prediction. In addition to verifying the current network state and its alignment with the expressed intent, assurance functions can derive more sophisticated insights and visibility into the behavior of an intent-based network. For example, they might predict violations of the expressed intent prior to changes being applied, understand or forecast trends, identify anomalies, and predict and validate system-level network performance.

Corrective actions: Apply a closed-loop cycle to realize corrective action and optimization. Anomalies, violations, and simple out-of-SLA situations that are detected can be programmatically fixed, leveraging the activation building block to create a systemwide adjustment. An intent-based network thus enables a mechanism to automate the remediation of any intent-based policy violations or to allow continuous optimizations to be automated to guarantee that the expressed intent is realized by the network. Note that, depending on the policy, the actions may be automatically executed or may be provided to the operator as recommendations, in which case the operator decides on execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNA Center Design Workflow

A

The following is the suggested workflow for Cisco DNA Center design:

Create a hierarchy that consists of areas, buildings, and floors.

Define global network settings, for example, authentication, authorization, and accounting (AAA), DHCP, DNS, and Network Time Protocol (NTP).

Define the “golden image” to ensure consistency in your network.

Create templates to automate applying commonly used configuration to the devices.

Define network profiles to apply the templates to the devices.

Assign devices to specific locations, for example, a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Hierarchy Elements

A

Areas or sites do not have a physical address, such as the United States. You can think of areas as the largest element. Areas can contain buildings and subareas. For example, an area that is called United States can contain a subarea that is called California, and the subarea California can contain a subarea that is called San Jose.

Buildings have a physical address and contain floors and floor plans. When you create a building, you must specify a physical address, and latitude and longitude coordinates. Buildings cannot contain areas. By creating buildings, settings can be applied to a specific area.

Floors are within buildings and consist of cubicles, walled offices, wiring closets, and so on. You can add floors only to buildings.

By default, there is one site that is called “Global,” but more sites, buildings, and areas can be added to the network hierarchy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNA AAA

A

For AAA services, Cisco ISE or any other AAA servers can be added to perform network, client, and endpoint authentication:

Both RADIUS and TACACS are supported for network authentication.

Only RADIUS is supported for client authentication.

Only one Cisco ISE deployment is supported per Cisco DNA Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNA Center - NetOps - Network Settings: Override Global Servers

A

Adding a common set of servers to Cisco DNA Center results in the default settings for the entire network.

There are two primary areas from which you can define the settings within your network:

Global settings: Settings that are defined in global settings affect your entire network.

Site settings: Settings that are defined in site settings override the global settings and are applied to the site only. All sublevel sites are also affected.

Each site inherits the settings from the level above. Inherited settings can be overridden at any level, providing flexibility in the network design.

The inheritance logo indicates that the setting is inherited. If the logo is not present, the setting is overridden.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNA Center - NetOps - Network Settings: Device Credentials

A

Device credentials refer to the CLI, Simple Network Management Protocol (SNMP), and HTTPS credentials that are configured on network devices.

Cisco DNA Center uses these credentials to either discover or collect information about the devices in your network:

CLI credentials must be preconfigured on the network device and must match the credentials in Cisco DNA Center.

SNMP credentials can be populated to the network device once the device is added to the Cisco DNA Center.

HTTPS credentials are used to discover Cisco Enterprise Network Functions Virtualization Infrastructure Software (NFVIS) devices only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNA Center - NetOps - SWIM Overview

A

The image repository for the SWIM is also a part of the design application. It allows network operators to standardize software images across the organization and create a software image compliance policy based on the network device role, the site, or a combination of both. SWIM can be used as a part of the Day-N monitoring and upgrading tool, or for Day-0 device onboarding.

Cisco DNA Center stores all of the software images, Software Maintenance Updates (SMUs), subpackages, and ROM monitor images for the devices in your network. You can view, import, and delete software images, and provision them to the devices in your network.

The Integrity Verification application monitors software images that are stored in Cisco DNA Center for unexpected changes or invalid values that could indicate that your devices are compromised. When importing an image, the system compares its software and hardware platform checksum values to the values identified for the platform in the Known Good Values (KGV) file to ensure that they match. Cisco produces and publishes a KGV data file that contains KGVs for many of its products.

Cisco DNA Center allows you to designate software images and SMUs as golden. A golden software image or SMU is a validated image that meets the compliance requirements for a particular device type. Designating a software image or SMU as golden standardizes the image and saves you time by eliminating the need to make repetitive configuration changes, and also ensures consistency across your devices. You can also specify a golden image for a specific device role (all, access, border router, core, distribution, and unknown).

A software image can be added to Cisco DNA Center in these ways:

Uploading it from the local repository.

Downloading it from the Cisco website or any other third-party site.

17
Q

DNA Center - NetOps - Template Editor

A

Cisco DNA Center provides an interactive editor that is called Template Editor to author CLI templates. Template Editor is a centralized CLI management tool that you can use to design and build generic configurations and apply the configurations to one or more devices in a given site.

Template Editor provides the following options:

Create, edit, and delete templates

Validate errors in the template

Simulate the templates

Version control the templates for tracking purposes

Add interactive commands, variables, and macros to the configuration

The templates are based on the Apache Velocity template engine.

18
Q

DNA Center - NetOps - Network Profiles

A

The Network Profiles function allows you to use Day-0 or Day-N templates for configuring the network devices that are attached to the profile.

There are different types of network profiles for the following device families. The available options depend on the version of Cisco DNA Center you are using:

Assurance

Firewall

Routing

Switching

Telemetry Appliance

Wireless

19
Q

Cisco DNA Center SecOps tools

A

These are Cisco DNA Center SecOps tools:

IP based endpoint classification.

Extended node onboarding with Essentials license.

Talos Integration and detect connection to low reputation sites.

Allowed Access Point List is now shown on the Rogue and aWIPS Dashboard.

20
Q

Cisco Network PnP

A

The Cisco Network PnP solution includes the following components:

PnP agent: This agent is embedded in Cisco devices and communicates to the Cisco Network PnP application by using the open PnP protocol over HTTPS during device deployments. The PnP agent, which is using DHCP, DNS, or other such methods, tries to acquire the IP address of the PnP server with which it wants to communicate. After a server is found and a connection is established, the agent communicates with the PnP server to perform deployment-related activities.

PnP server: The Cisco PnP server is a central server that encodes the logic of managing and distributing deployment information (images and configurations) for the devices being deployed. The PnP server communicates with the PnP agent on the device by using the PnP protocol. Cisco DNA Center is the software-defined networking (SDN) Controller from Cisco and is meant for enterprise networks (access, campus, WAN, and wireless). The platform hosts multiple applications (SDN applications) that use open northbound REST APIs and drive core network automation solutions. The platform also supports several southbound protocols that enable it to communicate with various network devices, which customers already have in place, and extend SDN benefits to both greenfield and brownfield environments.

PnP protocol: The PnP protocol defines the transport bindings and schemas for various messages that get exchanged between the PnP agent and the PnP server over HTTPS.

21
Q

SWIM Automation

A

Intent-based network upgrades: Allow for image standardization, which is much desired by all network administrators.

Upgrade pre- and post-checks: Allow network administrators control and visibility over network upgrades.

Patching support: Patches are maintained the same way regular images are managed to maintain operational consistency across the fabric.

22
Q

Policy-Based Automation

A

There are three types of policies in Cisco Software-Defined Access (SD-Access):

Access control policy: to configure who can access what. This policy includes permit and deny rules for group-to-group access.

Application policy: to configure how to treat traffic. This policy includes quality of service (QoS) and application caching.

Traffic copy policy: to configure which traffic is to be monitored. You can enable Switched Port Analyzer (SPAN) services for specific groups or traffic.

23
Q

Cisco DNA Center—AIOps Overview

A

Cisco has a strategy to help customers connect, secure, and automate agile networks to accelerate the digital transformation of their environment. Integrated Cisco DNA Platform Suite securely connects people to people, people to applications, and devices to applications.

This is accomplished with AI-driven visibility, observability, and insights to ensure the health of users, applications, and infrastructure. AIOps with the Cisco DNA Center utilizes industry-leading Cisco AI network analytics with machine learning, machine reasoning, and visual analytics to eliminate excess noise, quickly identify issues, and remediate problems faster. This new agile approach of integrating AIOps, NetOps, SecOps, and DevOps personas evolves IT into a competitive advantage.

24
Q

Cisco DNA Center AIOps characteristics

A

Enables visibility of the entire network through multiple lenses, such as geography, hierarchy, and topology, as well as at the site, building, and floor levels.

Provides observability of device health, client health, and application health utilizing Key Performance Indicators (KPIs), which enables AI-driven issue identification and AI-driven root cause analysis. Cisco DNA Center combined with Machine Reasoning Engine (MRE) is like having 30-years of Cisco experience at hand.

Delivers insights on trends and changes in the environment over time and creates system-generated issues to proactively identify abnormal behavior.

25
Q

Cisco DNA Center AIOps tools

A

These are Cisco DNA Center AIOps tools:

Cisco DNA Center Insights

AI enhanced RRM Simulator

Wireless client and AP troubleshooting

Unmonitored device troubleshooting

Global Assurance Event Viewer

Intel Connectivity Analytics

Wireless Maps Enhancements

26
Q

Cisco DNA Center DevOps tools

A

These are Cisco DNA Center DevOps tools:

Dashboard for Splunk Enterprise

New APIs

Rogue AP API enhancements

27
Q

Cisco DNA Center Platform Benefits

A

Cisco DNA Center platform has the following benefits:

Bridge business and IT: You can continuously align the network to IT and business applications via open interfaces.

Streamline operations: You can integrate with other IT and network systems and processes to remove operational bottlenecks.

Manage heterogeneous networks: You can simplify the monitoring and management of third-party vendor network devices.

Unlock boundless possibilities: You can continue to build IT and business innovation, which is based on an open platform and vibrant ecosystem.

27
Q

Cisco DNA Center Platform Capabilities

A

The Cisco DNA Center open platform for IBN provides 360-degree extensibility across multiple components. It includes the following capabilities:

Intent-based APIs use the controller to enable business and IT applications to deliver intent to the network and to use network analytics and insights for IT and business innovation. These APIs allow Cisco DNA Center to receive input from various sources, both internal to IT and from line-of-business applications, which are related to application policy, provisioning, SWIM, and assurance. Through open interfaces, IT staff can better align the needs of business applications such as Oracle, Microsoft Exchange, and Salesforce.com, and IT applications such as billing and compliance, to help ensure that each of them is getting the appropriate resources from the network. These APIs also allow Cisco DNA Center to share network insights that can provide important intelligence that is related to business and IT operations, security, compliance, and the worker and customer experience.

Process adapters allow integration with other IT and network systems to streamline IT operations and processes. Process adapters provide a set of integrations with specific service types, such as ITSM, IP address management (IPAM), and other reporting systems. These adapters can be customized for use in specific use cases or with specific system vendors. Therefore, ITSM systems, such as ServiceNow, IPAM systems, such as Infoblox, and reporting systems, such as Tableau can be tightly integrated to streamline workflows between these systems and Cisco DNA Center.

Domain adapters allow integration with other infrastructure domains, such as data center, WAN, and security, to deliver a consistent intent-based infrastructure across the entire IT environment. Domain adapters provide integrations with other network domain controllers, data center domain controllers, security systems, and so on. The first domains to be integrated with Cisco DNA Center are the Cisco Meraki dashboard and Cisco Stealthwatch security analytics system.

SDKs allow management to be extended to network devices of third-party vendors to offer support for diverse environments. These southbound SDKs allow for the creation of device packs that allow Cisco DNA Center to recognize and manage previously unknown devices. In their first iteration, these SDKs support level one operations such as discovery, inventory, topology, availability, and health scores.

28
Q

Cisco DNA Center inventory

A

The Discovery feature scans the network and adds the discovered devices into the inventory. When Discovery is completed, the inventory function retrieves and saves details such as host IP addresses, MAC addresses, and network attachment points of the devices in its database.

Define credential sets: The first step is defining the credential sets that Cisco DNA Center needs to use to discover the devices.

You must specify the credentials based on the types of devices to discover:

Network devices: CLI and SNMP credentials (NETCONF for Cisco Catalyst 9800 Wireless Controllers)

Compute devices (NFVIS): CLI, SNMP, and HTTP or HTTPS credentials

You can configure multiple credential sets on Cisco DNA Center to automate the scan and avoid having to specify the credentials for every device. If there is a group of several devices with the same credentials, all that you must do is configure a credential set on the Cisco DNA Center to discover them. The Discovery process iterates through all sets of credentials that are configured for the Discovery job until it finds a set that works for the device.

Discover or manually add devices: Once all the required credential sets are defined, you can add devices to the inventory in two ways: discover devices automatically or add them manually. Discovery can be done using an IP range, Cisco Discovery Protocol, or Link Layer Discovery Protocol (LLDP). The discovery process will connect to and discover each device and add the devices to the Cisco DNA Center inventory.

Define the network hierarchy: The network hierarchy in Cisco DNA Center is intended to represent your network. You can import an existing network hierarchy from Cisco Prime Infrastructure, or you can use the Design application and manually define your network hierarchy. You can define your physical locations, such as areas or buildings, and add floors and floor plans. By default, there is one site that is called Global.

Assign devices to sites: Once you have defined your network hierarchy and discovered your devices, you must assign your devices to sites, buildings, or floors to apply site-specific network settings to each device.

These settings include services such as:

AAA servers

Domain name and DNS servers

DHCP servers

NTP servers

The discovery workflow also uses the Device Controllability feature to configure the required network settings on devices if these settings are not already present on the device.

29
Q

Network Discovery

A

There are three ways to discover devices:

Use Cisco Discovery Protocol to provide a seed IP address.

Use LLDP to provide a seed IP address.

Specify an IP address range (up to 4096 devices).

30
Q

Loopback Preference

A

If you choose to use a device loopback IP address as the preferred management IP address, Cisco DNA Center determines the preferred management IP address as follows:

If the device has one loopback interface, Cisco DNA Center uses that loopback interface IP address.

If the device has multiple loopback interfaces, Cisco DNA Center uses the loopback interface with the highest IP address.

If there are no loopback interfaces, Cisco DNA Center uses the Ethernet interface with the highest IP address (subinterface IP addresses are not considered).

If there are no Ethernet interfaces, Cisco DNA Center uses the serial interface with the highest IP address.

After a device is discovered, you can update the management IP address from the Inventory window.

31
Q

Device Controllability

A

Device controllability is a feature that enables Cisco DNA Center to configure the required network settings on devices if these settings are not already present on the device. Device controllability helps in the deployment of network settings that Cisco DNA Center needs to manage devices.

When a device is discovered, Cisco DNA Center configures the following functions:

SNMP credentials and SNMP trap receiver

NETCONF credentials

IP device tracking

Certificate trustpoint

Cisco TrustSec credentials

Wireless network assurance

Device controllability is enabled by default. If you need to, you can disable device controllability and re-enable it at any time. When device controllability is disabled, Cisco DNA Center does not configure any of the above functions on devices while running discovery, or at run time.

32
Q

Telemetry

A

Telemetry is a tool that allows you to monitor devices in the network.

If the telemetry is enabled, you need to configure the following functions:

Syslog server settings

NetFlow collector settings

Cisco DNA Center also collects information about user experience, for the following reasons:

To proactively identify issues, if any, with Cisco DNA Center.

To better understand Cisco DNA Center features that are most frequently used.

To improve and enhance the overall user experience.

The telemetry is enabled by default, but it is possible to disable it manually.

33
Q

Inventory: Actions

A

Update Credentials: You can update the discovery credentials of chosen network devices. The updated settings override the global and job-specific settings for the chosen devices. To update the credentials, make sure that the device is listed in the Inventory table and that you have the administrator or policy administrator permissions and the appropriate role-based access control (RBAC) scope to perform the task.

Update Management IP: You can update the management IP address of a device. Make sure that the new management IP address is reachable from Cisco DNA Center and that the device credentials are correct. Otherwise, the device might enter an unmanaged state. You cannot update more than one device at a time. Also, you cannot update the management IP address of a Meraki device.

Update Resync Interval: You can configure device resynchronization from the Inventory window, choosing a custom resynchronization interval. You can disable the resynchronization feature if it is required.

Resync: You can immediately resynchronize device information for chosen devices, regardless of their resynchronization interval configuration. A maximum of 40 devices can be resynchronized at the same time.

Delete: You can delete devices from the Cisco DNA Center database, if they have not already been added to a site. You must have administrator permissions and access to all devices to perform this task.

Launch Command Runner: From Cisco DNA Center, you can launch the Command Runner tool for chosen devices.

Cisco DNA Center maintains the inventory by polling the devices at regular intervals, and only the devices that have been active within the last 24 hours are displayed, to prevent stale device data, if any, from being displayed. By default, a device is polled every 25 minutes (the maximum interval is 24 hours). On average, polling 500 devices takes approximately 20 minutes.

34
Q

Cisco DNA Center Configuration Management Overview

A

skipped this section

35
Q

Onboarding of Network Devices Using Cisco DNA Center

A

skipped this section

36
Q

Cisco DNA Center SWIM

A

skipped this section

37
Q

Cisco DNA Center (Assurance) AIOps Key Features and Use Cases

A

skipped this section

38
Q

Cisco DNA Center (Assurance) AIOps Implementation Workflow

A

skipped this section