BRKCRS 2811
BRKCRS 2811
BRKCRS 2811
How
1. Find this session in the Cisco Live Mobile App
2. Click “Join the Discussion”
3. Install Spark or go directly to the space
4. Enter messages/questions in the space
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco’s Intent-based Networking
Learning
DNA Centre
The Network. Intuitive.
Policy Automation Analytics
Intent Context
Network Infrastructure
Powered by Intent.
Informed by Context.
Switching Routers Wireless
Security
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Software Defined Access
Networking at the speed of Software!
DNA Centre
Identity-Based
Policy & Segmentation
Policy Automatio Analytic
n s Decoupled security policy from
VLAN and IP Address
B B
C Outside Automated
Network Fabric
Single Fabric for Wired & Wireless
with workflow Automation
Insights
SDA
Extension
& Telemetry
User Mobility
Policy stays
Analytics and Insights into
with user User and Application behaviour
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
IoT Network Employee Network BRKCRS-2811
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
What is SD-Access?
Campus Fabric + DNA Centre (Automation & Assurance)
SD-Access – Available Aug 2017
DNAC
APIC-EM
1.X
GUI approach provides automation &
assurance of all Fabric configuration,
ISE NDP management and group-based policy.
DNA Centre Leverages DNA Centre to integrate
external Service Apps, to orchestrate
your entire LAN, Wireless LAN and
WAN access network.
DNA Centre
Open APIs | Developers Environment
Automation
Insights &
Experiences
Cloud-enabled | Software-delivered
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Roles & Terminology
What is Software Defined Access?
What is SD-Access?
Fabric Roles & Terminology
DNA DNA Controller – Enterprise SDN Controller
APIC-EM
DNAC (e.g. DNA Centre) provides GUI management
Identity Controller
and abstraction via Apps that share context
Services
ISE Identity Services – External ID System(s)
Analytics (e.g. ISE) are leveraged for dynamic Endpoint
to Group mapping and Policy definition
Engine
Analytics Engine – External Data Collector(s)
(e.g. NDP) are leveraged to analyse Endpoint
Fabric Border Fabric Wireless to App flows and monitor fabric status
Nodes Controller
B B Control-Plane Nodes – Map System that
manages Endpoint to Device relationships
Control-Plane
Intermediate Fabric Border Nodes – A Fabric device (e.g.
C Nodes
Nodes (Underlay) Core) that connects External L3 network(s)
to the SDA Fabric
Campus Fabric Edge Nodes – A Fabric device (e.g.
Fabric Edge Access or Distribution) that connects Wired
Nodes
Fabric Endpoints to the SDA Fabric
Fabric Wireless Controller – A Fabric device
(WLC) that connects Wireless Endpoints to
the SDA Fabric
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Agenda
1
SDA Fabric Border Functionality
• Different use cases for the SDA Border
• Border Automation models
2
SDA Fabric Border Deep Dive
• Border ( Internal)
• Default Border ( External )
• Border + Default Border ( Internal + External)
• Border Layer 3 Hand off with VRF-Lite
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Current State Topology of the Campus Network
VXLAN Fabric
ACI Fabric Role Platform
Access Node • Cat3K/9300
• Cat4K/9400
Internet Edge
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
End state Topology of the SD-Access Fabric
VXLAN Fabric
ACI Fabric
Internet Internet Edge
Edge/
Border Guest
WLCs
Internet
IWAN HR
VXLAN eBGP-
IPV4/ IWAN HR
Centralised EVPN MPLS
MPLS
WLCs
WAN IWAN MC
edge
Shared Services VRF-Lite /Border
DC and WAN
Services Edge
Border
Intermediate
Nodes CarrierE
IWAN Sites
Intermediate
Nodes
WAN
Sites
Edge
Nodes
FEW
WLC
SDA Fabric Domain BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
SDA Fabric Border Functionality
What do Customers Need to Know
About the Fabric Border?
SD-Access Border
Border Nodes – A Closer Look
Border Node is an entry & exit point for all data traffic going in & out of the Fabric
B B
• Fabric Border
• Used for “Known” Routes in your company
• Default Border
• Used for “Unknown” Routes outside your company
Fabric Edge Nodes
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
SD-Access Border
Border Nodes – Border and Default Border
Known Unknown
Networks Networks
B B
Border Default Border
• Connects the Campus Fabric to • Connects the Campus Fabric to
Known networks. (Use case 2.1 Un-Known networks (Use case 1)
and 2.2) • not part of the company network
• part of your company network
• Un-known networks are generally the
• Known networks are generally WAN, Internet and/or Public Cloud.
DC, Shared Services, etc.
• Responsible for advertising prefixes only
• Responsible for advertising prefixes to from (export) the local fabric to external
(import) and from (export) the local domain.
fabric and external domain.
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Why Border Vs Default Border
SD-Access Fabric
Why Border vs Default Border?
Edge Node
IP Network B
DC Edge Datacentre
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
SD-Access Fabric
Why Border vs Default Border?
Edge Node
IP Network B
Border WAN/Branch
Border Datacentre
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
SD-Access Border Deployment Options
Use Case 1 : SDA fabric Connecting to Unknown Networks
B B
Un-Known Networks
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
SD-Access Border Deployment Options
Use Case 1 : SDA fabric Connecting to Unknown Networks – A Closer Look
Public Cloud
C
B B
Internet
Fabric Edge Nodes
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
SD-Access Border
Use Case 1 : SDA fabric Connecting to Unknown Networks
• Default Border is a “Gateway of Last Resort” for
unknown destinations
• Connects to any “unknown” IP prefixes (e.g. Internet,
Public Cloud, 3rd Party, etc.) C
Known Unknown
Networks Networks
• Exports all internal IP Pools outside (as aggregate) into B B
traditional IP routing protocol(s).
• Default Border is a “default” domain exit point, if no
other (specific) entry present in Map System.
• Outside hand-off requires mapping the prefix context
(VRF & SGT) from one domain to another.
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
SD-Access Border Deployment Options
Use Case 1 : SDA fabric Connecting to Unknown Networks – Automation
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
SD-Access Border Deployment Options
Use Case 1 : SDA fabric Connecting to Unknown Networks – Automation
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
SD-Access Border Deployment Options
Use Case 2.1 : SDA fabric Connecting to known Networks
B B
Known Networks
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
SD-Access Deployment Options
Use Case 2.1 : SDA fabric Connecting to known Networks – A Closer Look
DC
C
B B
Branch
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
SD-Access Border Deployment Options
Use Case 2.2 : SDA fabric as a Transit Network
B B
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
SD-Access Border
Use Case 2 : SDA fabric Connecting to known Networks
B B
• Exports all internal IP Pools to outside (as aggregate),
using a traditional IP routing protocol(s).
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
SD-Access Border Deployment Options
Use Case 2 : SDA fabric Connecting to known Networks – Automation
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
SD-Access Border Deployment Options
Use Case 2 : SDA fabric Connecting to known Networks – Automation
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
SD-Access Border Deployment Options
Use Case 3 : SDA fabric Connecting to known and Un-known Networks
Data Centre
C
WAN
B B
Internet
Fabric Edge Nodes
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
SD-Access Border Deployment Options
Use Case 3 : SDA fabric Connecting to Everything– Automation
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
SDA Fabric Border Deep Dive
A look Under the Hood !!
Fabric Border (Internal)
SD-Access Border Automation
SD-Access simplifies Border provisioning with 2 steps
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
SD-Access Border
Border - Forwarding from Fabric Domain to External Domain
3 EID-prefix: 192.1.1.0/24
Path Preference
Mapping Locator-set: Controlled
Entry 2.1.1.1, priority: 1, weight: 100 (D1) by Destination Site
192.1.1.0/24
Branch
Border 5.1.1.1
Control Plane
5 2.1.1.1
nodes
SDA Fabric
4
1.1.1.1 2.1.1.1
10.1.1.1 192.1.1.1
1.1.1.1 Edge 1.1.2.1 1.1.3.1 Edge 1.1.4.1
2
10.1.1.1 192.1.1.1
1 S
DNS Entry: Campus
Campus
10.1.1.0/24 10.3.0.0/24 Bldg 2
D.abc.com A 192.1.1.1 Bldg 1
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
SD-Access Border
Border - Forwarding from External Domain to Fabric Domain
1
Routing Entry: 3 EID-prefix: 10.1.1.1/32
Send traffic to exit point of Path Preference
Mapping Locator-set: Controlled
domain(Internal Border)
Entry 1.1.1.1, priority: 1, weight: 100 (D1) by Destination Site
192.1.1.0/24
Branch
Border 5.1.1.1
Control Plane
2 2.1.1.1
nodes
4 SDA Fabric
2.1.1.1 1.1.1.1
192.1.1.1 10.1.1.1
1.1.1.1 Edge 1.1.2.1 1.1.3.1 Edge 1.1.4.1
5
192.1.1.1 10.1.1.1
D
Campus Campus
10.1.1.0/24 10.3.0.0/24 Bldg 2
Bldg 1
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
fabric outside
SD-Access Border Config
Advertise Fabric Prefixes to the external network
10.1.1.1/24 1.1.1.1/32 2.1.1.1/32 192.1.1.1/24
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
fabric outside
SD-Access Border Config
Register External (known) prefixes in the Fabric
10.1.1.1/24 1.1.1.1/32 2.1.1.1/32 192.1.1.1/24
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
punt
fabric outside
SD-Access Border Config
Activate LISP forwarding for Internal prefixes
10.1.1.1/24 1.1.1.1/32 2.1.1.1/32 192.1.1.1/24
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
router lisp
• Add a Map Cache + Map-Request for locator-table default
Dynamic EIDs locator-set border
IPv4-interface Loopback0 priority 10 weight 10
• trigger a lookup for traffic coming from outside !
eid-table vrf USER instance-id 10
• Repeat for other IP Subnets and ipv4 map-cache site-registration
VRF’s in Fabric exit
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Default Border (External)
SD-Access Default Border Automation
SD-Access simplifies Default Border provisioning with 2 steps
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
SD-Access Border
Default Border - Forwarding to External Domain
2 EID-Prefix: Not found , map-cache miss
Mapping Locator-Set: ( use-petr)
Entry 3.1.1.1, priority: 1, weight: 100 (D1)
INTERNET
193.3.0.0/24 D
4 Default
Border
10.2.0.1 193.3.0.1
3.1.1.1
5.1.1.1
Control Plane
nodes
3 5.2.2.2
SDA Fabric
1.1.2.1 3.1.1.1
10.2.0.1 193.3.0.1
1
10.2.0.1 193.3.0.1
Campus S Campus
Bldg 1 10.2.0.0/24 10.3.0.0/24 Bldg 2
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
fabric outside
SD-Access Default Border Config
Advertise Fabric Prefixes to the external network
10.1.1.1/24 1.1.1.1/32 3.1.1.1/32 192.1.1.1/24
172.1.1.1/24
IP Network
10.1.1.0/24 150.1.1.0/24
192.1.1.0/24
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
punt
fabric outside
SD-Access Default Border Config
Activate LISP forwarding for Internal prefixes
10.1.1.1/24 1.1.1.1/32 3.1.1.1/32 192.1.1.1/24
172.1.1.1/24
IP Network
10.1.1.0/24 150.1.1.0/24
192.1.1.0/24
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
SD-Access Default Border Config
Configure Edge devices to use the default border
10.1.1.1/24 1.1.1.1/32 3.1.1.1/32 172.1.1.1/24
IP Network
10.1.1.0/24 150.1.1.0/24
192.1.1.0/24
router lisp
• Fabric edge node has a default route to locator-table default
the External Border. locator-set edge
IPv4-interface Loopback0 priority 10 weight 10
!
ipv4 use-petr 3.1.1.1
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Border + Default Border (Internal +
External)
SD-Access Border + Default Border Automation
SD-Access simplifies Default Border provisioning with 2 steps
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
fabric outside
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
SD-Access Border + Default Border Config
Configure Edge devices to use the default border
10.1.1.1/24 1.1.1.1/32 3.1.1.1/32 172.1.1.1/24
IP Network
10.1.1.0/24 150.1.1.0/24
192.1.1.0/24
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
SDA Fabric Border Design
Considerations
Fabric Border Platform Support and
Recommendations
SD-Access – Border Node
Platform Support
Catalyst 3K Catalyst 9K Catalyst 6K ASR1K & ISR4K Nexus 7K
• Catalyst 3850 • Catalyst 9300 • Catalyst 6800 • ASR 1000-X/HX • Nexus 7700
• 1/10G SFP+ • Catalyst 9400 • Catalyst 6500 • ISR 4451/4431 • Sup2E
• 10/40G NM Cards • Catalyst 9500 • Sup2T/6T • 1/10G/40G • M3 Cards
• IOS-XE 16.6.1+ • 40G QSFP • 6880-X or 6840-X • IOS-XE 16.6.1+ • NXOS 7.3.2+
• 10/40G NM Cards • IOS 15.5.1SY+
• IOS-XE 16.6.1+
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
SD-Access – Border Node Scale
Platform Scale
Catalyst
Catalyst3850
3K Catalyst
Catalyst 9500
9500 Catalyst
Catalyst 6K
6K ASR1K
ASR1K & ISR4K
ISR4K Nexus
Nexus 7K
7K
Virtual Networks: 64 Virtual Networks: 256 Virtual Networks: 512 Virtual Networks: 4K Virtual Networks: 500
SGT’s in Fabric: 4K SGT’s in Fabric: 32K SGT’s in Fabric: 30K SGT’s in Fabric: 64K SGT’s in Fabric: 64K
SGT ACL’s: 1350 SGT ACL’s: 32K SGT ACL’s: 30K SGT ACL’s: 64K SGT ACL’s: 64K
Security ACL’s: 3K Security ACL’s: 18K Security ACL’s: 32K Security ACL’s: 4K Security ACL’s: 128K
IPv4 TCAM: 16K/8K IPv4 TCAM: 96K/48K IPv4 TCAM: 256K IPv4 TCAM: 1M IPv4 TCAM: 1M
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
SD-Access – Control-Plane Node Scale
Platform Scale
ASR1K/ISR4K and
Catalyst 3850 Catalyst 9500 Catalyst 6K
CSR1Kv
• 4K Host entries • 96K Host entries • 25K Host entries • 200K Host entries
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Fabric Border Design Options
SD-Access Fabric
Border Nodes – Collocated vs. Distributed
B C B C
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Border Design Options
Use case 1: Border with Collocated Control Plane Node
10.1.1.1/24 1.1.1.1/32 2.1.1.1/32 192.1.1.1/24
B C
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
NOTE: Control Plane node scale is different on different platforms (select accordingly)
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Border Design Options
Use case 2: Border with Distributed Control Plane
C Node
5.1.1.1/32
Control-Plane Node
• The Border node and Control plane node are different devices
• Device 1 - Border node must perform export (and/or import) of routes between domains
• Device 2 - Control Plane node maintains the database of every prefix/subnet in the Fabric Domain
• Additional configurations are required
• Need additional protocol (iBGP) to share EID mapping information from Border to Control Plane node.
• Multiple Border nodes can connect to the same Control Plane nodes (single or set of)
NOTE: Control Plane node scale is different on different platforms (select accordingly)
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Fabric Border with
Collocated Control-Plane Node
SD-Access Border Automation
SD-Access simplifies Co-located Border and Control Plane provisioning with 1 steps
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
B C
CP RIB
SD-Access Fabric Config
Export EID mappings from the LISP MS to the Border RIB
10.1.1.1/24 1.1.1.1/32 2.1.1.1/32 192.1.1.1/24
B C
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
B C
fabric outside
SD-Access Fabric Config
Advertise Fabric Prefixes to the external network
10.1.1.1/24 1.1.1.1/32 2.1.1.1/32 192.1.1.1/24
B C
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
B C
fabric outside
SD-Access Fabric Config
Register external known prefixes into the Fabric
10.1.1.1/24 1.1.1.1/32 2.1.1.1/32 192.1.1.1/24
B C
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Fabric Border with
Distributed Control-Plane Node
SD-Access Border Automation
SD-Access simplifies Distributed Border and Control Plane provisioning with 2 steps
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
SD-Access Border Automation
SD-Access simplifies Distributed Border and Control Plane provisioning with 2 steps
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
B C
CP RIB
Export EID mappings
Control Plane Node – EID to RIB C
5.1.1.1/32
Control-Plane Node
router lisp
• Control Plane operates as an IPv4 locator-table default
LISP Map-server & Map-resolver locator-set control_node
IPv4-interface Loopback0 priority 10 weight 10
• Fabric EID prefixes are exported !
eid-table vrf USER instance-id 10
from Control plane node to its own RIB ipv4 route-export site-registrations
(routing information base) with AD of ipv4 distance site-registrations 250
“250” !
site Campus
• Add the IP prefixes to be mapped authentication-key cisco
eid-prefix instance-id 10 0.0.0.0/0 accept-more-specifics
• accept more-specific updates (e.g. /32) eid-prefix instance-id 10 10.1.1.0/24 accept-more-specifics
!
ipv4 map-server
ipv4 map-resolver
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
fabric outside B C
router lisp
• The Border receives the EID prefix locator-table default
information from the Control Plane node locator-set border
through the iBGP connection. IPv4-interface Loopback0 priority 10 weight 10
!
• Border also imports the external prefixes eid-table vrf USER instance-id 10
ipv4 route-import database ospf 123 locator-set border
into the LISP domain. !
router bgp 65555
• Does not apply to Default Border !
neighbor 5.1.1.1 remote-as 65555
!
address-family vpvnv4
neighbor 5.1.1.1 activate
neighbor 5.1.1.1 send-community both
!
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
fabric outside B C
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
punt
B C
fabric outside
SD-Access Fabric Border Config
Activate LISP forwarding for Internal prefixes C
5.1.1.1/32
Control-Plane Node
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Border Resiliency Options
Multiple Borders - Loop Prevention
10.1.1.1/24
B
10.1.1.0/24
Border Node eBGP
Host Pool 10 Edge Node 1
SDA FABRIC
192.1.1.0/24
10.1.1.1/24
B eBGP
Shared Services
10.1.1.0/24
• eBGP is preferred to break any loops caused by the bidirectional advertisement (redistribution) of routes
from the fabric to external domain (and vice-versa), when using multiple Internal Borders for redundancy.
• eBGP uses AS-Path loop prevention.
• If you are using any other protocol than eBGP, some appropriate loop prevention mechanism needs to be used
(distribute-list, prefix-list, or route tags with route-map, etc).
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Fabric Border
One Box -vs- Two Box
SD-Access Fabric
Border Nodes – One Box vs. Two Box
OUT OUT
B
B
One Box Design IN
Two Box Design
IN
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Border Design Options
One Box Border - Control Plane
CONTROL-PLANE
1
LISP External Domain(BGP/IGP)
C
B
B
External
Domain
B
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Border Design Options
One Box Border - Data Plane
C
B
B
External
Domain
B
DATA-PLANE
2 External Domain(IP/MPLS/VXLAN)
VXLAN
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Border Design Options
One Box Border - Policy semantics in the Data Plane
C
B
B
External
Domain
B
Policy Metadata
3
SGT in VXLAN External Domain(IP ACL/SGT)
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Border Design Options
Two Box Border - Control Plane
CONTROL-PLANE
11
LISP BGP External Domain(BGP/IGP)
C
B
B External
Domain
B
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Border Design Options
Two Box Border - Data Plane
C
B
B External
Domain
B
DATA-PLANE
12
VXLAN VRF-LITE External Domain(IP/MPLS/VXLAN)
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Border Design Options
Two Box Border - Policy semantics in the Data Plane
C
B
B External
Domain
B
POLICY-METADATA
13
SGT in VXLAN SGT Tagging External Domain ( IP ACL/SGT)
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Fabric Border Automation
C
B
B
External
Domain
B
SDA Fabric
VXLAN VRF-LITE
DATA-PLANE
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Fabric Border Automation
Layer 3 VRF-LITE Hand-Off
16.6.2
3 Select the Layer
3 hand off
CORE
SJC22
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Border Resiliency (HA)
Resiliency at the Border
Track or propagate events across domains
External
Border
Router
B IP Network
Border External
SDA Fabric Router External Domain
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Resiliency at the Border
Use Case 1 : Track failures in the External Domain
CONTROL-PLANE LISP IGP/MP-BGP/BGP-EVPN
External
Border
Router
B IP Network
Border External
SDA Fabric Router External Domain
VXLAN/+SGT IP/MPLS/VXLAN
DATA-PLANE
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Failures & Changes in the External Domain
External advertisements to reflect state of the External Domain
Border
B IP Network
Border
SDA Fabric External Domain
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Resiliency at the Border
Use Case 1 : Track failures in the External Domain
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Resiliency at the Border
Use Case 2.1 : Track failures in the Fabric Domain @ Border and CP Co-located
CONTROL-PLANE LISP IGP/MP-BGP/BGP-EVPN
External
Border
Router
B IP Network
Border External
SDA Fabric Router External Domain
VXLAN/+SGT IP/MPLS/VXLAN
DATA-PLANE
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Failures & Changes in the SD-Access Fabric
Internal redistribution of Fabric state into External Domain @ Border and CP Co-located
I. Border and Control plane Node Co-located
Border
B
IP Network
Border
SDA Fabric External Domain
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Failures & Changes in the SD-Access Fabric
Internal redistribution of Fabric state into External Domain @ Border and CP Co-located
Since Border and Control Plane node are Co-located, when a Failure happens
the state of the network needs to be tracked and informed to the control plane
node so that the fabric border can withdraw its route advertisements.
To Track the state of the Network we can use either an EEM script or Object
tracking.
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Resiliency at the Border
Use Case 2.1 : Track failures in the Fabric Domain @ Border and CP Co-located
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Resiliency at the Border
Use Case 2.2 : Track failures in the Fabric Domain @ Border and CP Distributed
CONTROL-PLANE LISP IGP/MP-BGP/BGP-EVPN
C Border External
Router
B IP Network
BFD
Adjacency
Border External
SDA Fabric Router External Domain
VXLAN/+SGT IP/MPLS/VXLAN
DATA-PLANE
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Failures & Changes in the SD-Access Fabric
Internal redistribution of Fabric state into External Domain @ Border and CP Distributed
B
C
Border
BFD B
Adjacency IP Network
Border
SDA Fabric External Domain
• SDA fabric domain prefixes are advertised via BGP from Control Plane node to Border node
• BGP adjacencies between Control Plane and Border node are monitored with BFD
• Upon BFD adjacency fail, prefixes associated with the Border are withdrawn immediately
• Fast Convergence (150-200ms)
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
SDA Fabric Border External
Connectivity
How do Things Connect to the Fabric
Border?
Shared Services
with Border
Border Deployment Options
Shared Services (DHCP, AAA, etc) with Border
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Border Deployment Options
Shared Services (DHCP, AAA, etc) with Border
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Border Deployment Options
Shared Services (DHCP, AAA, etc) with Border in Global Routing Table
B B APIC
EM
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
SD-Access Fabric Config
Shared Services (DHCP, AAA, etc) with Border in Global Routing Table
5.1.1.1/32 C
Control-Plane Node
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
SD-Access Fabric Config
Shared Services (DHCP, AAA, etc) with Border in Global Routing Table
5.1.1.1/32 C Control-Plane Node
B
IP Network
10.1.1.0/24 EIGRP 172.10.10.0/24
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Border Resiliency Options
* Recap
Multiple Borders - Loop Prevention
10.1.1.1/24 1.1.1.1/32 2.1.1.1/32 192.1.1.1/24
B
10.1.1.0/24
eBGP
Host Pool 10 Edge Node 1 Border Node
IP Network
192.1.1.5/24 192.1.1.0/24
10.1.1.1/24 1.1.2.1/32 3.1.1.1/32
Shared Services
B eBGP
10.1.1.0/24
• eBGP is preferred to break any loops caused by the bidirectional advertisement (redistribution) of routes
from the fabric to external domain (and vice-versa), when using multiple Internal Borders for redundancy.
• eBGP uses AS-Path loop prevention.
• If you are using any other protocol than eBGP, some appropriate loop prevention mechanism needs to be used
(distribute-list, prefix-list, or route tags with route-map, etc).
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Border Deployment Options
Shared Services (DHCP, AAA, etc) with Border in dedicated VRF
B B APIC
EM
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Border Deployment Options
Shared Services (DHCP, AAA, etc) with Border in dedicated VRF
5.1.1.1/32 C
Control-Plane Node
Host Pool 10 Edge Node 1 Border Node Fusion Router Shared Services
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
WAN Connectivity
with Border
Border Deployment Options
WAN Connectivity with Border- IWAN2.x and MPLS
B B
IWAN 2.x/MPLS
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
Border Design Options
IWAN2.x Connectivity with Border - Control Plane
CONTROL-PLANE
11
LISP BGP DMVPN
C
B
B iWAN 2.x
12
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
* Recap
Border Design Options
IWAN2.x Connectivity with Border - Data Plane
DATA-PLANE
11
VXLAN VRF-LITE DMVPN
C
B
B iWAN 2.x
12
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Border Design Options
IWAN2.x Connectivity with Border - Policy Metadata
POLICY-METADATA
11
SGT in VXLAN SGT Tagging SGT in DMVPN
C
B
B iWAN 2.x
12
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
Border Deployment Options
MPLS WAN Connectivity with Border CONTROL-PLANE
B B
MPLS Domain
BRANCH
VXLAN+SGT ISE with SXP bindings for SGT exchange IP/MPLS + SGT
DATA+POLICY PLANE
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
Border Deployment Options
Viptela SD-WAN hand off
CONTROL-PLANE
LISP VRF-LITE
Viptela Control Plane VRF-LITE
LISP
WAN App
C Border vEdge
vEdge Border C
B B B
B
SD-WAN
DNA Centre
DATA+POLICY PLANE
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
Multiple Fabric Domains Connectivity
with Border
Border Deployment Options
Multiple Fabric Domains
B B B B
VRF- LITE
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
Border Deployment Options
Multiple Fabric Domains
CONTROL-PLANE
11
LISP BGP/IGP LISP
B B B B
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
Border Deployment Options
Multiple Fabric Domains
DATA-PLANE
12
VXLAN VRF-LITE/IP/MPLS VXLAN
B B B B
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Border Deployment Options
Multiple Fabric Domains
POLICY-METADATA
12
SGT in VXLAN SGT Tagging/SXP SGT in VXLAN
B B B B
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Border Deployment Options
Multiple Fabric Domains
CONTROL-PLANE
1
LISP DMVPN/GRE LISP
c c
B B B B
IP Network
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Border Deployment Options
Multiple Fabric Domains
CONTROL-PLANE
11 LISP LISP
c c
B N7K
B B
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
C9K
Border Deployment Options IOS-XE 16.8
SD-Access Multi-Site
East Site
West Site
Transit Site
Control Plane
Edge
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Control Plane
Edge
SD-Access Multi-Site
West site Prefixes Only East + West East site Prefixes Only
West Site
Transit Site East Site
BR-W BR-E
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
Service Chaining
with Border
Border Deployment Options
Service Chaining with Border
B
B
B
Firewall
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Border Deployment Options
Service Chaining with Border - Firewall
CONTROL-PLANE
1
LISP BGP/IGP
B
B
B
Firewall
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Border Deployment Options
Service Chaining with Border – Data-Plane (Routed firewall)
DATA-PLANE
2
VXLAN VRF-LITE
B
B
B
Firewall
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Border Deployment Options
Service Chaining with Border – Policy Metadata
POLICY-METADATA
3
SGT in VXLAN SGT in-line Tagging
B
B
B
Firewall
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
Border Deployment Options
Service Chaining with Internal Border – Cisco Firewall, Checkpoint
ISE
POLICY-METADATA
3
SGT in VXLAN SGT in-line Tagging
Group Tags
SXP/PXGRID
B
B
B
Firewall
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Data Centre Connectivity
with Border
Border Deployment Options
Data Centre Connectivity With Border – ACI Fabric
CONTROL-PLANE
1 LISP BGP/IGP
B
ACI Fabric
Border
Map Server B
Border
SDA Fabric Border Leaf’s
DATA-PLANE
2
VXLAN+SGT VRF-LITE
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
Recap - ACI Fabric Integrated VXLAN Overlay
Decoupled Identity, Location and Policy
ACI Spine Nodes
ACI Fabric
VTEP VXLAN IP Payload
Forwarding within the Fabric is between VTEPs (ACI VXLAN tunnel endpoints) and leverages an
extended VXLAN header format referred to as the ACI VXLAN policy header
Any workload any where, Consistent Latency, Mapping of tenant MAC or Ip address to location is
performed by VTEP using distributed mapping database
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
Recap: What is an L3Out?
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
SD-Access SGTs Provisioned in ACI
SD-Access Domain ACI
ISE
ISE dynamically provisions
SGTs and IP mappings
(SXP service) into APIC-
DC
EXT- EXT-
EPG1 EPG3
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
ACI EPGs Automatically Propagated into SD-Access
ACI
ISE
VM1
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
Enabling Group-based Policy in each Domain
DB DB
SG-FW
SG-ACL
Contract
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
Hardware and Software recommendations
Shipping
NOW!
ACI Fabric
ACI Software ISE APIC
Hardware
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
SD-Access SGT Info Used in ACI Policies
ISE
SD-Access Policy Domain ACI Policy Domain
ISE Retrieves:
Controller Layer
ISE Exchanges:
Controller Layer
EPG Name:
SGT PCI EPG
Name: Auditor
EPG Binding = 10.1.100.52
SGT Binding = 10.1.10.220
PCI EPG
EPG Name = Auditor 10.1.100.52
Groups= 10.1.10.220
Network Layer
Network Layer
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Internet Connectivity
with Border
Border Deployment Options
Internet Connectivity With Border
CONTROL-PLANE
1 LISP BGP
Border
Map Server B
Border
SDA Fabric Internet
DATA-PLANE
2 VXLAN+SGT IP
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Cloud Connectivity
with Border
Border Deployment Options
Cloud Connectivity With Border Cloud Edge gets
CONTROL-PLANE ISE
3 Group Based Policy
from ISE
1 LISP LISP
Group Policy
SXP
B
IP/MPLS
Border
Network CLOUD
Map Server B
Cloud Edge
CSR1Kv
Border
SDA Fabric ✔
DATA-PLANE
2 * Roadmap
VXLAN+SGT VXLAN+SGT
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
Take Away
When To Get Started?
SD-Access Support
Fabric ready platforms for your digital ready network
NEW
AIR-CT8540 CDB
ASR-1000-HX NEW
Catalyst 9500
AIR-CT3504
ISR 4430 NEW
3560-CX
BRKCRS-
2811 NEW
Wave 2 APs (1800,2800,3800)
Catalyst 4500E Catalyst 6800 Nexus 7700 ISR 4450
IE (2K/3K/4K/5K)
Catalyst 3650 and 3850 ISRv/CSRv Wave 1 APs* (1700,2700,3700)
* with Caveats
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
What to Do Next?
Get SD-Access Capable Devices Get DNA Centre Appliances Cisco Services can help you
with DNA Advantage OS License with DNA Centre Software to Test - Migrate - Deploy
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
The First Step…
#NewEra
#CiscoDNA
#NetworkIntuitive
BRKCRS-2810 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
SD-Access - Cisco on Cisco
Live SD-Access Deployment @ Cisco Systems
750
Wired & Wireless
SJC23 users
2 7 24
Fabric Border Fabric Fabric
Control-Plane Edge Access
Nodes Nodes Points
3 Virtual
Networks
16 Scalable
Groups
2 Wireless
SSIDs
8 Address
Pools
Built and managed by the Cisco Engineering team, in conjunction with Cisco IT Services
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
What to Do Next?
Technical Advisor y
Get SD-Access Capable Devices Get DNA Centre Appliances Cisco Services can help you
with DNA Advantage OS License with DNA Centre Software to Test / Migrate / Deploy
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
Cisco Spark
Questions?
Use Cisco Spark to communicate
with the speaker after the session
How
1. Find this session in the Cisco Live Mobile App
2. Click “Join the Discussion”
3. Install Spark or go directly to the space
4. Enter messages/questions in the space
cs.co/ciscolivebot#BRKCRS-2811
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Continue Your Education
• World of Solutions
• Meet The Engineer
• Related Sessions
• Hands-On Labs
• Lunch & Learn
DNA Centre
Simple Workflows
BRKCRS-2811 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
Q&A
Complete Your Online
Session Evaluation
• Give us your feedback and
receive a Cisco Live 2018 Cap
by completing the overall event
evaluation and 5 session
evaluations.
• All evaluations can be completed
via the Cisco Live Mobile App.
Don’t forget: Cisco Live sessions will be
available for viewing on demand after the
event at www.CiscoLive.com/Global.
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Thank you