DNA Center APIs and vManage Flashcards

1
Q

Here is a basic description of each of the layers in SDN:

A

Data (or forwarding) plane: Contains network elements (any physical or virtual device that deals with customer traffic).

Control plane: Represents the core layer of the SDN architecture. It contains SDN controllers, which provide centralized control of the devices in the data plane.

Application plane: Contains SDN applications that communicate their network requirements toward the controller.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Communication with the data plane is defined with the southbound interfaces, while services are offered to the application plane using the northbound interface.

A

Northbound API

    Currently, very little has been done for unification; different applications use different APIs.

Southbound API

    OpenFlow: Configure the flow tables in switches

    NETCONF: Configure devices with XML, transactional

    OpFlex
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Southbound APIs

A

OpenFlow: OpenFlow describes an industry-standard API, which the Open Networking Foundation (ONF) defines. It configures the flow tables in the switches and, as a result, defines the flow path through the network. The actual configuration of the devices is accomplished with the use of NETCONF.

NETCONF: NETCONF is a network management protocol that the IETF standardized. It provides mechanisms to install, manipulate, and delete the configuration of network devices via remote procedure call (RPC) mechanisms. The messages are encoded by using XML. Not all devices support NETCONF—the devices that do support it advertise their capabilities via the interface.

OpFlex: OpFlex is an open-standard protocol that provides a distributed control system that is based on a declarative policy information model. The main difference between OpFlex and OpenFlow lies with their respective SDN models. OpenFlow uses an imperative SDN model, where a centralized controller sends detailed and complex instructions to the control plane of the network elements to implement a new application policy. In contrast, OpFlex uses a declarative SDN model. The controller, which, in this case, is called by its marketing name, Cisco APIC (Cisco Application Policy Infrastructure Controller), sends a more abstract policy to the network elements. The controller trusts the network elements to implement the required changes using their own control planes.

Note

NETCONF is a protocol that allows you to modify the configuration of a networking device, whereas OpenFlow is a protocol that allows you to modify its forwarding table. If you need to reconfigure a device, NETCONF is the way to go. If you want to implement a new functionality that is not easily configurable within the software that your networking device is running, you should be able to modify the forwarding plane directly by using OpenFlow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Northbound APIs

A

Northbound APIs or northbound interfaces are responsible for the communication between the SDN controller and the services that run over the network. Northbound APIs enable your applications to manage and control the network. So rather than adjusting and tweaking your network repeatedly to get a service or application running correctly, you can set up a framework that allows the application to demand the network setup that it needs. These applications range from network virtualization and dynamic virtual network provisioning to more granular firewall monitoring, user identity management, and access policy control.

Unfortunately, there is currently no single northbound interface that you can use for communication between the controller and applications. Instead, you use various different northbound APIs, each working only with a specific set of applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HTTP 200-series Status Codes

A

200 OK

The request was successful. The result is contained in the response body.

201 Created

The POST/PUT request was fulfilled, and a new resource has been created. Information about the resource is in the response body

202 Accepted

The request was accepted for processing, but the processing has not been completed.

204 No Content

The request was successful; however no content was returned.

206 Partial Content

The GET request included a Range Header, and the server responded with the partial content matching the range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HTTP 400-series Status Codes

A

400 Bad Request

The client made a request that the server could not understand (for example, the request syntax is incorrect).

401 Unauthorized

The client’s authentication credentials included with the request are missing or invalid.

403 Forbidden

The server recognizes the authentication credentials, but the client is not authorized to perform this request.

404 Not Found

The client made a request for a resource that does not exist.

409 Conflict

The target resource is in a conflicted state (for example, an edit conflict where a resource is being edited by multiple users). Retrying the request later might succeed.

415 Unsupported Media Type

The client sent a request body in a format that the server does not support (for example, XML to a server that only accepts JSON).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HTTP 500-series Status Codes

A

500 Internal Server Error

The server could not fulfill the request.

501 Not Implemented

The server has not implemented the functionality required to fulfill the request.

503 Service Unavailable

The server is (temporarily) unavailable.

504 Gateway Timeout

The server did not respond within the time restrictions, so it timed out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

REST API Security

A

In the figure, Cisco DNA Center is using a REST API to push TrustSec configuration to the Cisco Identity Services Engine (ISE). For this communication, ISE acts as the HTTPS server. Communications between Cisco DNA Center and ISE will be encrypted using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), ensuring that if the data flow is captured, data cannot be easily viewed by prying eyes.

Another security feature provided by HTTPS is the need for Cisco ISE, as the server, to provide an X509 v3 identity certificate prior to secured communications. Cisco DNA Center must verify the identity certificate by validating the signature attached to the certificate before the secure tunnel will be established. This can be done by installing the trusted root certificate of the root CA that signed the certificate, or in the case of a self-signed certificate, installing the identity certificate itself. The identity certificate ensures that Cisco DNA Center is pushing configuration to the trusted device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly