SD WAN Flashcards
Legacy networks run on expensive hardware such as routers and switches, which require time-consuming configuration and maintenance. In addition, these networks require expensive transport connections or carrier circuits to secure and segment the network. These carrier circuits might also not offer the bandwidth that is now required by users and modern applications hosted in private or public data centers.
Cost
Legacy networks operate on the old model of a distributed control plane, which means that every node in the network must be configured with routing and security rules. Remote site management, change control, and network maintenance represent major logistical challenges.
Complexity
Legacy networks that run on dedicated carrier circuits depend on the carrier to install new circuits, which can take several months. This process can dramatically delay the launch of new branch locations.
Lengthy installation times
Legacy networks that run on carrier circuits sacrifice control to the ISP, from network design to configuration to monitoring. Requesting changes from the ISP also requires extra time and is prone to communication errors.
Control
Legacy networks typically backhaul all branch traffic to the main data center for inspection and filtering. However, with advancements in cloud technologies, and wider adoption of cloud-delivered services, traffic flows have changed, with more traffic now being destined to the internet. This means that backhauling all traffic through a centralized security stack is no longer efficient. Backhauling traffic in this way increases latency and can decrease the user’s overall quality of experience.
Security
Legacy networks require complex end-to-end quality of service (QoS) configurations to ensure business-critical applications are prioritized. Manually updating or modifying these configurations is a lengthy process that can be error-prone.
Application Awareness
Every router at the edge of a network has two sides for routing
WAN and LAN
One to the transport network
WAN
Service side of the network
LAN
The Cisco SD-WAN network fabric, also called an ______ network, forms a software overlay that runs over standard network transport services, including the public Internet, MPLS, 5G/LTE, and satellite.
Overlay
______ and ______ advertisements to establish and maintain the flow of traffic throughout the network.
Routing, Routing
______ segmentation using virtual routing and forwarding (VRF), to isolate various flows of traffic
Layer 3
______ to ______concepts for setting up and maintaining bidirectional connections between pairs of protocol entities.
Peer, Peer
On-premises and cloud security options, as well as ______ plane and _______ plane authentication and encryption.
Data, Control
_______ for routing and data traffic.
Policies
______ connectivity options supporting a range of transports.
Flexible
Simplified management via a single pane of ______ platform.
Glass
Cisco SD-WAN network separates the data plane from the control plane and _______ much of the routing that used to require dedicated hardware.
Virtualizes
Centralized controllers, called ______ controllers, oversee the control plane of the Cisco SD-WAN fabric, efficiently managing provisioning, maintenance, and security for the entire Cisco SD-WAN overlay network.
vSmart
______ orchestrator, automatically authenticates all other Cisco SD-WAN devices when they join the Cisco SD-WAN overlay network.
vBond
The ______ plane manages the rules for routing traffic through the overlay network, and the data plane passes the actual data packets among the WAN Edge devices.
Control
Cisco _______ provides a simple, yet powerful, set of graphical dashboards for monitoring network performance on all devices in the overlay network, from a centralized monitoring station.
vManage
The ______ network carries packets from one WAN Edge device to another.
Transport
The ______ protocol is enabled by default and runs over each of these tunnels, detecting loss, latency, jitter, and path failures.
Bidirectional Forwarding Detection (BFD)
The WAN Edge routers securely communicate to other WAN Edge routers using ______ tunnels over each transport.
IPsec
_______ runs between vSmart controllers and between vSmart controllers and WAN Edge routers where control plane information, such as route prefixes, next-hop routes, crypto keys, and policy information, is exchanged over a secure DTLS or TLS connection.
Overlay Management Protocol (OMP)
______ is the transport VPN.
VPN 0
______ is the management VPN.
VPN 512
_______ contains the interfaces that connect to the WAN transports.
VPN 0
_______ carries the out-of-band management traffic to and from the Cisco SD-WAN devices.
VPN 512
Secure sessions with the controller are set up automatically, using ______ and certificate infrastructure.
RSA
The _______ centrally influences access control; that is, it determines which prefixes are allowed to talk to each other inside a VPN.
Controller
The _______ optimizes user experience by influencing transport link choice based on _______ or other attributes
Controller, service-level agreement (SLA)
The ______ can centralize services such as firewalls, identity provider (IdPs), and intrusion detection systems (IDSs).
Network
_______ facilitates the mutual discovery of the control and management elements of the fabric by using a zero-trust certificate-based allowed list model.
Cisco vBond orchestrator
For situations in which Cisco vSmart controllers, the Cisco vManage system, or the WAN Edge routers themselves are behind the ______, the Cisco vBond orchestrator facilitates the function of ______ traversal, by allowing the learning of public (post-___) and private (pre-___) IP addresses.
Network Address Translator (NAT)
Cisco vSmart controllers facilitate fabric discovery by running ___ among themselves, and between themselves and the WAN Edge routers.
OMP
Cisco vSmart controllers facilitate fabric discovery by running ______ among themselves, and between themselves and the WAN Edge routers.
Overlay Management Protocol
Control _______ acting on the control plane information are locally enforced on the Cisco vSmart controllers.
Policies
The use of a centralized control plane dramatically reduces the control plane load traditionally associated with building large-scale IPsec networks, solving the _______complexity problem.
n^2
When delivered as a cloud service, Cisco vSmart controllers are ______ hosted in the Cisco cloud.
Redundantly
Cisco vManage provides the single pane of _______ for day-0, day-1, and day-2 operations.
Glass
The Cisco vManage GUI allows segregated administrative access by implementing ______ for proper roles and responsibilities.
Role-based access control (RBAC)
Performance statistics can be exported into external systems or to Cisco ______ tool for further processing and closer examination.
vAnalytics
______ is a TCP-based, highly scalable control plane protocol that unifies all control plane functions under the single protocol umbrella.
Overlay Management Protocol
OMP operates inside bidirectionally certificate-authenticated _____ or Datagram Transport Layer Security (DTLS) connections established among the Cisco vSmart controllers and between the Cisco vSmart controllers and the WAN Edge routers.
Transport Layer Security (TLS)
By using the concepts of ______ families and route attributes, OMP advertises all pertinent control plane information between the WAN Edge routers to establish direct IPsec communication between the WAN Edge routers without relying on Internet Key Exchange (IKE) protocol.
Address
The use of OMP and Cisco vSmart controllers creates a ________ control plane in which WAN Edge routers establish control plane connectivity only to a handful of Cisco vSmart controllers and not to every other WAN Edge router in the topology.
linear-complexity
Data plane and application-aware routing policies are implemented on the ______ routers.
Wan Edge
WAN Edge routers export performance statistics, and alerts and events to a centralized Cisco ______ system for a single point of management.
vManage
WAN Edge routers use OSPF, EIGRP and BGP routing protocols for learning ______ information from service (LAN)–side interfaces and for pre-existing network integration with non-SD-WAN sites.
Reachability
For _______ redundant service (LAN)–side interfaces, WAN Edge routers implement Virtual Router Redundancy Protocol (VRRP) first-hop redundancy protocol, which can operate on a per-VLAN basis.
Layer 2
_______ deployment relies on the use of signed certificates installed in the onboard Trusted Platform Module (TPM) to establish a unique router identity
Zero-touch
The ______ l form factor can be deployed in public clouds, such as AWS and Microsoft Azure, or as an Cisco Enterprise Network Virtualization (Enterprise NFV) on the vCPE/uCPE platforms using Kernel-based virtual machine (KVM) or ESXi hypervisors.
Virtual
The Cisco vEdge Cloud is a ______ version of the WAN Edge router, inheriting all the capabilities offered on the Cisco physical branch routers
virtualized
The Cisco vEdge Cloud can be used as a virtual network function (VNF) for a virtual customer-premises equipment (vCPE) _______ at the branch.
deployment
The controllers can be deployed ______ or in a hosted environment
on-premises
The centralized Cisco ______ controllers oversee the control plane of the Cisco SD-WAN fabric…
vSmart
_______ orchestrator automatically authenticates all other Cisco SD-WAN devices in the overlay network.
vBond
_______ is a centralized network management system for all overlay network components.
vMnanage
The ______ pane, which runs across the top of the Monitor Overview screen, displays the number of Cisco vBond, Cisco vSmart, and Cisco vManage controllers.
Device
_______ displays the number of WAN Edges in the overlay network.
Device
______ pane displays the total number of reboots in the last 24 hours for all devices in the network, including soft and cold reboots and reboots that occurred as a result of power-cycling a device.
Reboot
_______ tab to list all the system IP and hostname of the device on which the _______ occurred, the ______ index, and the core time and filename.
Crash
______displays the hostname and system IP of the device on which the ______ is installed, the ______ serial number, and its expiration date and status.
Certificate
The WAN Edge ______ pane indicates whether WAN Edge devices are connected to the required number of Cisco vSmart controllers.
Health
When a site has multiple WAN Edge routers, ______ pane displays the state for the entire site, not for individual devices
BFD Connectivity
Monitor > Devices > Device 360 screen or the Tools > ______ l screen.
SSH Terminal
The WAN Edge ______ pane provides four counts.
Inventory
Total number of WAN Edge routers whose authorized serial number has been uploaded on the Cisco vManage server.
Configuration > Devices
Total number of authorized WAN Edge routers in the overlay network.
Configuration > Certificates > WAN Edge List
These routers are marked as Valid and are now operational in the network.
Deployed
You can configure these routers at a staging site before shipping them to the actual branch and making them a part of the overlay network.
Staging
The _______ Health pane displays the aggregated average loss, latency, and jitter for all links and all combinations of colors (for example, all LTE-to-LTE links and all LTE-to-3G links).
Transport
_______ pane shows the 10 tunnels with the greatest average loss over the last 24 hours.
Application-Aware Routing
In the WAN Edge list, click on the More options icon to access ______ device information
Real Time
Use the _______ Terminal screen to establish an ______ session to a Cisco SD-WAN device.
SSH
These are routers marked as Valid in the Configuration > Certificates > ______ page
WAN Edge List
The Monitor > Devices > ______ window for the vSmart controller is displayed and shows the vSmart Control Connections by default.
Device 360
From the left side menu select ________ to view interface statistics.
Interface
By default, the Device Options search field displays System Information, which includes the device’s hostname, site ID, and other information.
Real Time
In the Device Options search field, select ______.
Interface Detail
Select ________ in the Select Filter popup window.
Do Not Filter
Click on ______ in the top-left corner of the page to return to the main Monitor > Overview dashboard.
Cisco SD-WAN
At the vSmart command prompt, issue the ______ command.
Show System Status
The output of the ______ command displays interface configuration and statistics.
Show Interface
At the Monitor > Devices dashboard, click on the ______ Hostname to open the Monitor > Devices > Device 360 dashboard.
DC-Edge2
The Monitor > Device > Device 360 > _______ window for the vBond is displayed by default.
Control Connections