SD-Access Design Flashcards

1
Q

What is a fabric border node responsible for?

Fabric border node are equivalent to what traditional campus layer?

A

Gateway between the fabric domain and connects traditional Layer-3 networks outside of the fabric. Allowing traffic to egress and ingress the fabric site to a Campus Fabric domain.

Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a fabric intermediate node responsible for?

fabric intermediate nodes are equivalent to what traditional campus layer?

A

Layer-3 underlay transport service that interconnects the Fabric Edge and Fabric Border nodes.

Distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a fabric edge node responsible for?

Fabric edge nodes are equivalent to what traditional campus layer?

A

Encapsulating/decapsulating and forwarding traffic to and from endpoints connected to the fabric edge.

Access layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a fabric edge node responsible for?

A

admitting, encapsulating/decapsulating and forwarding traffic to and from endpoints connected to the fabric edge.

Fabric edge nodes are the equivalent of an access layer switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a consideration in design when using IPv6 overlay tunnels?

A

overlay tunnels should support both IPv4 and IPv6 protocol stack or just require a IPv6 protocol stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IPv6 tunnels can be configured only between?

A

border devices or a border device and a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is LISP and what layer is it in a SD-Wan architecture?

A

Handles the mapping and resolution of endpoint address of users/devices and runs on the control plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does LISP stand for?

A

Locator / ID Separator Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What two things does LISP use for traffic forwarding for host mobility even if the IP address moves within the edge of the network?

A

(RLOC) Routing Locator

(EID) Endpoint Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Routing Locator (RLOC)?

A

Attached router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Endpoint Identifier (EID)?

A

IP or MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the default routing protocol for large networks including fabric based networks?

A

IS-IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does LISP simplify routing environments?

A

removes the need for routers to know every possible IP destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two methods of integrating wireless into an SD-WAN fabric?

A

Fabric mode wireless

Over the Top (OTT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is TrustSec?

A

enforcement technology that allows endpoint security management without the need to maintain access list on all network devices where endpoints are connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does TrustSec assign to users or device traffic at ingress (inbound into the network) and then enforces the access elsewhere?

A

Scalable Group Tags (SGT) / Security Groups