sd access ise Flashcards

1
Q

over lay tunnels

A

GRE-vxlan
mpls - bgp evpn
ipsec - sd-wan
capwap -ACI
LISP - OTV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GRE

A

VXLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MPLS

A

BGP EVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IPSEC

A

SD-WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CAPWAP

A

ACI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

LISP

A

OTV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

diffrent fabrics are connected trhough what

A

transit controller access node TC ip based vrf lite mpls or
sd-access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SD access roles

A

cattalyst center GUI and API for intent based automation of fabric devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fabric Border Nodes

A

a fabric device that connects external L3 and l2 networks to the cisco SD-ACCESS fabric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Edge nodes

A

A fabric device that connects wired endpoinst to the cisco SD-Aess fabric and optionally enforces microsegmentation policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

control plane node

A

Map system that tracks endpoint to tfrabric node relatiossip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SD access roles

A

Catalyst Center - GUI API
Fabric Border Nodes - ASBR for l2 l3
Edge Nodes - Endpoint connections
Controler Plane Node - Maps endpoint to fabric node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Border node

A

usually the “default gateway”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Edge node

A

Authenticate and aauthorize endpoints with ISE 801.x ISE = Radius tacas
Register endpoint IDS EID . IPV4 mac address to control plane node
Encapsulation Decapsulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

control plane node.

A

maintains host tracking dataabase
receibed EID reigstrations from border node and edge nodes
Performs lisp lookups endpoint and border node subscribes to CP
Basically RR .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is LISP

A

Location id separation protocol
routing protocol in control point of sd access
decopuples endpoint idfrom ip location .
Assigns RLOC (routing locator ) to all network devices at different locations within fabric.

17
Q

LISP example

A

ip to rloc: 1.2.3.4/32 -> en1
mac to rloc AA:BB:CC:DD -> en1
address resolution 1.2.3.4 -> AA:BB:CC:DD

if user changes destionation RLOC keeps track of endoint of user

18
Q

RLOC = endpoint EID = user

A

user does not have to know where other users physical location is (rloc) is only need to know eid ask control plane for rloc

19
Q

optional components

A

Extended node a l2 only switch extends fabcric connectivity and optionaly enforces micro segmentatoin.

19
Q

Fabric wireless controller and fabric APS

A

connects wirteslls endpoints ot the sd-access fabric

20
Q

intermediate nodes

A

moves data between fabric nodes can be one or many hops

20
Q

IS ISE required to perform micro segmentation in an SD-ACCESS fabric

A

yes

21
Q

what 2 types of virtual networks exists

A

l2 eqvivlent to vlan and l3 eqvivelent for VRF

22
Q

all endpoints which conntect to sd-access fabric have to do what

A

connect in to an virtual network

23
Q

in which virtual networks are which devices in

A

fabric devices underlay GRT
Fabric acces points extended NODES = INFRA_VN

User-defined vns optional

DEFAULT-VN default VN not deployed by bdefault.

24
Q

explain macro and micro segmentation

A

macro 2 different vn do not talk to eachtoher
micro groups inside 1 vn do not talk to eachother = security gruop tag SGt .
You can also make it so that individual devices cannot talk to eachother inside a sgt (security group tag

25
Q

what are SD-Access fabric SGT
and what do they do where are they assigned?

A

Edge Nodes and Fabric APs assign a unique Security Group Tag (SGT) to each end endpoint in concert with ISE.

Edge Nodes and Fabric APs add an SGT to the fabric encapsulation.

SGTs are used to implement IP-address-independent traffic policies.

SGTs can be extended to numerous other networking technologies e.g., Cisco Secure Firewall, Cisco SD-WAN, some third-party devices, etc.

26
Q

Catalyst scenter security groups
you edit them here

A

many different security groups for deifferent users

create vn campus_vn

then yo ucan assign security group to vn

27
Q

what ar the minium requirements of sd-access fabric route roles

A

one controll node one
one Fabric Border Nodes
one fabric edge node

28
Q

setsps of setting up a network with catalyst center

A

import devices to catalyst center
provision them to a site building 22
then you go to frabric sites and createa site
make building 22 to be a fabric site
assign created virutal networks to this fabric site to make sure they have access to the different VNenable lisp pub sub border node
add ip address pool to virtual network. and select traffic type.

29
Q

you can colocate a border node edge node control node all in one

A
30
Q

when using ise how is the authentication different from using cisco trustec

A

trustsec propogates sgt hop by hop every device must support it
with ise can take differnet paths.

31
Q
A