Fabric Technologies - Software-Defined Access
28 important questions on Fabric Technologies - Software-Defined Access
What features, capabilities and functionalities does SD-Access use to address the current campus network needs?
2. Network Assurance and Analytics (Using telemetry it enables proactive prediction of network and security related incidents.)
3. Host Mobility (Host mobilitiy for both wired and wireless users)
4. Identity services (Cisco Identity Services Engine ISE identifies users and devices on the network.)
5. Policy Enforcement (Using Security Group Access Control List SGACLs is much more simpler and more scalable.)
6. Secure segmentation (Easier to segment the network)
7. Network Virtualization (Support of multiple VRFs known as Virtual Networks VNs across the whole access layer with own set of policies.)
What is a Campus Fabric Solution and when is it considered SD-Access?
A Campus Fabric Solution is considered SD-Access when it is managed by Cisco DNA Center
What are the 4 basic layers of the Cisco SD-Access fabric architecture?
2. Network Layer
3. Controller Layer
4. Management Layer
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
What is part of the Cisco SD-Access physical layer?
Cisco Routers (Supported models)
Cisco Wireless (WLCs and APs)
Cisco Controller Appliances (DNA Center and ISE controller appliances)
What 2 sublayers does the Cisco SD-Access Network Layer consists of and what are their roles?
2. Overlay network Layer (Overlay network virtually connecting all network devices forming a fabric.)
What is the recommended design for the SD-Access Underlay Network?
IS-IS offers operational advantages such as neighbor establishment without IP dependencies, peering capability using loopback addresses and agnostic treatment of IPv4, IPv6 and non-IP traffic.
A Layer 2 underlay network running Spanning Tree is possible but not recommended.
What 2 models of underlay networks are supported?
Managed manually rather than Cisco DNA Center. Allows customization of the network (Other routing protocol for example)
2. Automated Underlay
All aspects of the Underlay network is managed by Cisco DNA Center LAN Automation. It configured the IS-IS routed access campus design and other routing options. No customization possible.
What are the 3 basic planes of operation in the SD-Access Fabric?
2. Data Plane (Based on VXLAN)
3. Policy Plane (Based on Cisco TrusSec)
SD-Access Fabric refers to the Overlay Network, what is needed for it to be called SD-Access Fabric?
When the Overlay Network is managed manually it is called a Campus Fabric Solution.
What are several enhancements which Cisco SD-Access added to the original LISP specification?
2. VN Extranet
3. Fabric Wireless
What is important to note about the SD-Access Fabric Data Plane taking into account LISP is used in the SD-Access Fabric Control Plane.
This is because VXLAN supports encapsulation the original ethernet header, thus supporting MAC-in-IP encapsulation.
What is different about the VXLAN specification for SD-Access?
Accomplished by adding new fields to the first 4 bytes of the VXLAN header to transport up to 64000 SGT tags.
New format is called VXLAN Group Policy Option (VXLAN-GPO)
What is Cisco TrustSec Security Group Tags referred to in Cisco SD-Access?
What is the SD-Access Fabric Policy Plane based on?
Policies can then be applied on groups of users and devices that have the same tags.
What are 5 advantages to Cisco SD-Access provided by TrustSec SGT tags.
2. Network address-independent group-based policies based on SGT tags.
3 Dynamics enforcement of group-based policies, regardless of location.
4. Policy constructs over a legacy or third-party network using VXLAN
5. Extended policy enforcement to external networks (Cloud or datacenter) by transporting the tags using SGT Exchange Protocol (SXP)
What are the 5 basic device roles in the fabric overlay?
2. Fabric Border Node (Connects external Layer 3 network to the SD-Access Fabric)
3. Fabric Edge Node (Connects wired endpoints to the SD-Access fabric)
4. Fabric WLAN Controller (WLC) (Connects APs and wireless endpoints to the SD-Access fabric)
5. Intermediate Nodes (Intermediate routers or switches that don't provide a SD-Access Fabric role other than the underlay services)
What is a Fabric Control Plane Node?
Maps all EID locations to the current fabric edge or border nodes.
What is a Fabric Border Node?
What 3 types of Fabric Border nodes are there?
2. Default Border (Connects only to unkown areas. With default route to reach internet or public cloud.)
3. Internal + Default Border (Connects to both internal well known areas as external unkown areas)
What is special about the Fabric Wireless Controller and makes it different from a standard WLC?
It Connects to the SD-Access fabric through an internal border node.
It also performs PxTR registrations to the fabric control plane (on behalf of the fabric edges) and can be thought of as a fabric edge for wireless clients.
What is special about the Fabric Wireless Controller and makes it different from a standard WLC?
It Connects to the SD-Access fabric through an internal border node.
It also performs PxTR registrations to the fabric control plane (on behalf of the fabric edges) and can be thought of as a fabric edge for wireless clients.
What are the 3 main subsystems of the Controller Layer
Integrated directly into Cisco DNA Center that provides all the underlay and fabric automation and orchestration services for the physical and network layers.
2. Cisco Network Data Platform
A data collection and analytics and assurance subsystem integrated directly into Cisco DNA Center.
3. Cisco Identity Services Engine (ISE)
Basic role is to provide all the identity and policy services for the physical and network layer.
The SD-Access Fabric management layer is provided by Cisco DNA Center. It groups tools in various Workflows, which 4 Workflows can be defined?
2. Cisco DNA Policy Workflow
3. Cisco DNA Provision Workflow
4. Cisco DNA Assurance Workflow
What are 4 design tools of the Cisco DNA Design Workflow?
2. Network Settings (Network servers like DNS, DHCP etc and IP and Wireless management)
3. Image Repository (Software images, maintenance update and version compliance)
4. Network Profiles (LAN, WAN and WLAN connection profiles such as an SSID and apply them to sites)
What are 6 tools of the Cisco DNA Policy Workflow?
2. Group-based access control
3. IP-based access control
4. Application
5. Traffic Copy (E-R-SPAN)
6. Virtual Network
What are 4 tools of the Cisco DNA Provision Workflow?
2. Fabrics
3. Fabric Devices
4. Host Onboarding
What are 4 tools of the Cisco Assurance Workflow?
2. Client 360
3. Devices 360
4. Issues
In SD-Access, what is a Fusion router?
It does this by using VRF leaking across SD-Access Fabric Domains.
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding