SD-Access Flashcards

1
Q

What are the two main networks that the Cisco SD-Access Fabric consists of?

A

1) Underlay network – the physical topology for L2 and L3 connectivity, that can use any routing protocol.

2) Overlay network - runs on top of the overlay to create a virtualized network (a logical topology).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the role of an underlay network?

A

Establish physical connectivity from one edge device to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of the overlay network?

A

To create the logical topology on top of the underlay network, using encapsulation technology (e.g. GRE or IPSec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some requirements and considerations when migrating an existing network to Cisco SD-Access?

A

1) There should be IP reachability within the network
2) Switches in the overlay are designated and configured as edge and border nodes
3) Ensure that there is connectivity between the devices in the underlay network
4) Recommended to use IS-IS as the routing protocol (easiest to automate using Cisco DNA Center, and does not have an IP address dependency for neighbors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some advantages of using IS-IS with Cisco SD-Access in the underlay network?

A

1) Able to establish neighbors without IP dependencies
2) Can peer using loopback address
3) Agnostic treatment of IPv4, IPv6, and non-IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Cisco SD-Access use to configure the overlay network for fabric data plane encapsulation?

A

VXLAN, which encapsulates complete L2 frames for transport in the underlay. Overlay networks are identified by the VXLAN network identifier (VNI), and carries the scalable group tags (SGTs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Cisco technology is the Cisco SD-Access fabric policy plane based on?

A

Cisco TrustSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

With Cisco TrustSec, what is used to enforce access policies for users, applications, and devices?

A

A classification group (scalable group or SGT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cisco TrustSec and scalable group tags classifies traffic according to…?

A

The contextual identity of the endpoint instead of the IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When is an SGT usually assigned to a user or device? When is it enforced?

A

Assigned at the ingress (inbound into the network). Enforced elsewhere in the infrastructure (e.g. a data center). Switches, routers, and firewalls use the SGT to make forwarding decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is driven by Cisco Identity Services Engine (ISE), and what orchestrates this?

A

ISE drives:
1) AAA services, groups, policy, endpoint profiling

These are orchestrated by Cisco DNA Center’s policy authoring workflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What two technologies allows ISE and DNA Center to integrate?

A

Cisco Platform Exchange Grid (pxGrid) and REST APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the minimum recommended nodes for ISE for redundancy?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What component of ISE do Cisco SD-Access fabric edge node switches send authentication requests to?

A

The Policy Services Node (PSN) persona running on ISE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In Cisco SD-Access, what is the role of the control plane node?

A

Acts as the LISP map server/map resolver (MS/MR) that manages EID to device relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In Cisco SD-Access, what is the role of the border node?

A

Fabric device (like a core switch) that connects external L3 networks to the Cisco SD-Access fabric. Also:

1) Uses BGP to advertise EID prefixes outside the fabric. Traffic going to its EID prefixes go through this node.
2) Acts as the gateway of last resort for fabric edge nodes
3) Can extend network virtualization from inside the fabric to outside the fabric by using external VRF instances to preserve the virtualization
4) Maps SGT information from within the fabric to be appropriately maintained when it exits the fabric

17
Q

In Cisco SD-Access, what is the role of the edge node?

A

Fabric device (access or distribution) that connects wired endpoints to the Cisco SD-Access fabric. Also does the following:

1) Registers endpoints to the control plane
2) Assigns a user/device to an SGT
3) Queries the MR to determine the RLOC(s) associated with destination EIDs
4) Uses the RLOC associated with the destination IP to encapsulate traffic with VXLAN headers. Also decapsulates VXLAN traffic.

18
Q

In Cisco SD-Access, what is the role of the fabric wireless controller?

A

A fabric-enabled WLC

19
Q

In Cisco SD-Access, what is the role of the fabric mode AP?

A

A fabric-enabled AP

20
Q

In Cisco SD-Access, what is the role of the intermediate node?

A

Any underlay device

21
Q

What is a fusion router?

A

A router that is aware of the prefixes available inside each VPN instance (from static routing or route peering)

22
Q

What does a fusion router do generically? How about its role in SD-Access?

A

Generically, a fusion router is designed to route traffic between separate VRF instances, or to route traffic to/from a VRF instance to a shared pool of resources (e.g. DHCP, DNS, etc)

In SD-Access, a fusion router only provides access to shared services for the endpoints in the fabric