Automating Enterprise Networks with Cisco DNA Center

Size: px
Start display at page:

Download "Automating Enterprise Networks with Cisco DNA Center"

Transcription

1 White Paper Automating Enterprise Networks with Cisco DNA Center 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 30

2 Contents Introduction... 3 DNA Center automation principles... 4 DNA Center building blocks... 5 Automating the enterprise network infrastructure... 8 Standardizing the enterprise network architecture... 9 Standardizing device configurations with network profiles Onboarding and deploying network elements with DNA Center Automating network deployments and lifecycle management Automating fabric deployments for Cisco Software-Defined Access Automating DNA services based on policies DNA Center access policies and virtual network segmentation DNA Center access control policies DNA Center application and traffic copy policies DNA Center Platform For more information Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 30

3 Introduction The enterprise networking landscape has changed dramatically in recent years. Enterprises are presently relying on digitized processes powered by thousands of networked devices to drive their business operations. As a result, the number of managed endpoints has increased substantially. Endpoints have also become more diverse in kind, ranging from small networked sensors, scanners, handheld devices, notebooks, laptops, and smartphones to powerful platforms running enterprise applications. These trends have stretched many IT and networking departments, which are often challenged to manage and maintain such a fast-evolving and diverse network environment, sometimes with fewer and fewer operators. As a result, the networking industry has seen an increased demand for network automation solutions to allow the network to continue to grow, reduce the time to onboard new devices and services, and minimize configuration errors while ensuring that corporate and regulatory standards are in compliance, and that security is not compromised. This white paper provides an overview of the automation capabilities of Cisco DNA Center. DNA Center allows the operation of enterprise networks as a system, covering wireless and wired access, campus networks, and routing technologies. DNA Center also realizes Intent-Based Networking (IBN) in the enterprise. Network operators can express the intended behavior of the network based on policies. The expressed intent is activated in the network infrastructure based on automated provisioning workflows. Telemetry data is continuously collected to assure that the expressed intent is adhered to while maintaining network security, providing a continuous verification loop (Figure 1). Figure 1. The Cisco intent-based networking architecture 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 30

4 The DNA Center automation capabilities explored in this white paper focus on the activation and policy translation functions of IBN. The concepts of workflows and DNA Center applications are introduced to automate standard and nonstandard network changes, with a particular focus on the design and provisioning workflows. The white paper also examines how DNA Center helps to translate intent into network policies. An overview of the DNA Center Platform architecture is also provided. This white paper is intended for CTOs and network architects seeking to gain an introduction to the automation capabilities of DNA Center. Network operators embarking on the journey toward IBN may also benefit from this paper. For interested readers, the reference section provides additional details that explore many of the concepts outlined herein in depth. DNA Center automation principles Cisco DNA Center automation is built around the principles of network element lifecycle management and policybased automation, while supporting integrated IT process automation. Lifecycle management of network elements is supported in DNA Center with workflows and automation applications. Network architects can start with the design workflow to standardize the topologies and functionality to be deployed in their enterprise wired and wireless campuses or branch environments. Cisco DNA Center models the enterprise network as a hierarchical set of sites, each of which can be associated with one or more buildings containing multiple floors. Standardized deployment templates can be stored in a library to be applied at provisioning time. Lifecycle management also accommodates a provisioning workflow, in which network elements and services can be automatically deployed. As network elements are powered up, they may call in to Cisco DNA Center to be provisioned according to the template associated with the site or building during the design workflow. Changes made to the templates after the initial deployment can similarly be automated to help ensure continuous alignment of the network configuration with the standardized deployment templates. The principle of policy-based automation is realized in Cisco DNA Center using the policy workflow. Operators can author policies that govern the relationship between endpoint groups or applications using the DNA Center user interface. Similarly, the application policy functionality regulates the treatment that application flows receive in the network. Network architects can express the intended importance of applications in abstracted categories (such as default, business relevant, or irrelevant ), triggering the appropriate automation to configure the network elements throughout the enterprise network domain. Cisco DNA Center achieves the principle of IT process automation by enabling tight integration of its workflows and automation applications with the wider enterprise IT process ecosystem. The DNA Center workflows themselves support IT processes by defining a well-structured sequence of operations that can be automated, logged, and audited. Integrations of external tools such as IP address management or service management functions are examples of DNA Center supporting IT processes that are often performed by different teams. The tight linkage to the Cisco Identity Services Engine for access policy governance is another example of linking DNA Center into enterprise IT toolchains. Figure 2 summarizes the main functions of the DNA Center workflows Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 30

5 Figure 2. DNA Center workflows for design, policy, provisioning, and assurance DNA Center building blocks Cisco DNA Center offers a platform for automating and assuring the operation of an enterprise network. The platform is built based on automation and assurance processes with an elastic infrastructure. The design, policy, and provisioning workflows used to automate the enterprise network operations are all realized based on microservices, in which respective software functions are implemented in multiple containers communicating with each other, rather than amalgamating all workflow and automation functions into a single software binary. For example, the inventory application collects and establishes an inventory of all network elements that are governed by DNA Center. The topology application provides a graphical view of the network topology, representing the network hierarchy that consists of sites, buildings, and floors, with routers, switches, wireless access points, and other physical and virtual network elements. The three main workflows supported by Cisco DNA Center for automation are Design Policy Provision 1 1 Cisco DNA Center also offers an assurance workflow that is not within the scope of this automation white paper Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 30

6 These workflows can be viewed as a set of related automation microservices to cover the design, the policy authoring, and the provisioning (and update) phase of the network lifecycle. Supporting the top-level workflows is a set of automation tools. These allow DNA Center operators to perform specific, networkwide tasks in support of the automation workflows. The current set of automation applications includes Network Discovery: Automates the discovery of existing network elements to populate into the inventory Inventory Management: Manages the set of physical and virtual network elements that are governed by DNA Center Topology: Visualizes the physical topology of enterprise routers, switches, access points, and other physical and virtual network elements Network Plug and Play: Supports the automated configuration of network elements Image Repository: Manages software images for the various network elements License Manager: Administers and visualizes software license usage in the enterprise network Command Runner: Provides a utility to diagnose one or more network elements based on a Command-Line Interface (CLI) Template Editor: Enables the creation and authoring of CLI templates associated with network elements in a design profile Figure 3 shows the Cisco DNA Center landing page, displaying the workflows and tools. Figure 3. Cisco DNA Center landing screen depicting the workflow tabs and automation and assurance tools 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 30

7 Cisco DNA Center offers networkwide operations to drive consistency and standardization into the enterprise network. Automation operations are not limited to individual network elements. The enterprise network can also be viewed as a system consisting of routers, switches, access points, and other network elements that are connected to each other. In addition to offering atomic operations (such as managing the software images of the set of Cisco Catalyst 9000 switches, for example), DNA Center captures the relationships between network elements. Examples of this include the ability to view the network topology or to design the architecture of a site, rather than automating the constituent network element configurations. DNA Center supports network-level automation in addition to device-level automation. At the heart of DNA Center automation is a powerful automation and orchestration engine. Abstracted expressions of intent for infrastructure operations or policy are modeled within DNA Center using the YANG modeling language. The workflow engine then takes abstracted, networkwide models and derives device configurations through a set of model transformations to break the networkwide abstracted model into device-specific models and ultimately device configurations. The resulting configurations are instantiated into the network elements with a controlled orchestration using RESTful interfaces. The automation engine regulates the sequence with which devices are configured, and provides rollback capabilities in case of a configuration failure. DNA Center supports multiple configuration mechanisms, including CLI or NETCONF, depending on the current capabilities of the possibly diverse routers, switches, access points, and wireless LAN controllers in the enterprise network. The base infrastructure in the Cisco DNA Center system architecture provides the capabilities to run automation microservices in containers. Automation functions are implemented in smaller functional groups that communicate with each other and run in software containers with their own namespaces, rather than in a single software image. These containers can expand or contract based on the load that a microservice experiences (supported by the appropriate load balancing). The base infrastructure also offers common functions for automation microservices, such as databases and an associated management system for state storage, and a stream-processing information bus for the sharing of vast amounts of data between DNA Center microservices. The base platform also provides the necessary authentication and security functions for DNA Center to be operated by multiple teams, often with different privilege levels. Figure 4 illustrates the high-level system architecture of Cisco DNA Center Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 30

8 Figure 4. Cisco DNA Center high-level software architecture Automating the enterprise network infrastructure At a high level, DNA Center automation can be categorized into Network infrastructure automation Cisco DNA service automation Network infrastructure automation concentrates on bringing up, connecting, and maintaining the routers, switches, access points, and other network elements that make up the enterprise network. It includes tasks such as provisioning a network element, loading an initial configuration, updating device configurations as new services are introduced, maintaining software images, and managing licenses for the device. These automation tasks relate to the network infrastructure, as opposed to relating to the Cisco DNA services that connect endpoints to applications or to each other. Cisco DNA service automation focuses on the services that the DNA Center network delivers to endpoints and applications. Service automation instantiates policies that govern whether endpoints and applications are granted access to the network, what communication relationships they can establish with other endpoints or applications, and how the traffic flows between endpoints or applications are to be treated by the network infrastructure Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 30

9 A key aspect of automation is to increase the level of standardization in the network. Architectures with a wide variety of network elements (possibly from different vendors), software versions, device configurations, or site topologies are very hard to automate. Such variations in the network by definition typically require customized automation processes, thus diminishing the benefits of networkwide automation. Increasing the level of standardization in the network for example, by templating device configurations, reducing the catalog of allowed network elements, or minimizing the number of different software versions deployed increases the efficiency and benefit of network automation. Change requests in the network often come in varying levels of standardization. Repetitive network operations tasks are prime candidates for automation. Examples are standard network settings (IP addresses of Network Time Protocol [NTP], Dynamic Host Configuration Protocol [DHCP], and DNS servers), as well as many port/interface or VLAN settings. Such tasks may be automated with single actions or tools. Other network operations tasks are more intricate in nature, possibly requiring committee approval or proven to cause service disruptions. For example, performing a software upgrade on a critical infrastructure router or switch falls into this category. Automation can still be beneficial in those cases but may need to be designed around a workflow rather than individual tasks. Standardizing the enterprise network architecture Cisco DNA Center helps drive standardization for both single as well as workflow-based operations. The enterprise network architecture can be captured as a hierarchy consisting of connected sites, each comprising one or more buildings, possibly with multiple floors. Essential network settings such as device credentials, IP address pools, parameters for DHCP, DNS, NTP, Simple Network Management Protocol (SNMP), and other supporting network functions can also be captured networkwide or for each site to avoid misconfigurations. Other areas of standard settings supported are service provider Quality-of-Service (QoS) templates or wireless settings, which can be defined for the entire network or restricted to specific sites. Figure 5 shows an example of how standard settings can be automated with DNA Center. Figure 5. Standardizing base automation parameters in Cisco DNA Center 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 30

10 Standardizing device configurations with network profiles Network profiles allow an architect to specify well-defined deployment templates and architectures. For example, for nonfabric switching deployments, configuration templates can be associated with a profile. For wireless access points, both configuration templates and SSID parameters can be linked to a deployment profile. For virtualized branches based on the Cisco Enterprise Network Functions Virtualization (ENFV) solution, a full subworkflow can be executed in DNA Center. Cisco ENFV is based on x86 hosts running the Cisco Network Functions Virtualization Infrastructure Software (NFVIS) and operating virtualized network functions on top of a hypervisor environment. The network profile for ENFV enables the characterization of the x86 hosting platform, including the Cisco Enterprise Network Compute System (ENCS), Cisco UCS, or Cisco 4000 Series Integrated Services Routers (ISRs). The connectivity to the WAN can be determined by selecting the number of service providers connecting to the branch and the redundancy model of the branch. The initial screen of the virtual branch deployment is shown in Figure 6. Figure 6. Standardizing a NFV architecture template in the Routing and NFV workflow The virtual branch architecture can be further detailed with the number and type of Virtual Network Functions (VNFs) that are to be deployed as per the profile. Figure 7 shows the standard selections for different types of VNFs. For each type, a specific VNF product can be selected, such as the Cisco Integrated Services Virtual Router (ISRv) for a virtual router, the Cisco Adaptive Security Virtual Appliance (ASAv) for a virtual firewall, or a virtualized Wide Area Application Services (WAAS). Third-party VNFs can be characterized in these virtualized architecture templates. Non-networking VNFs can be added to the profile, such as Linux or Windows VMs. The physical resource requirements in terms of virtual CPU, virtual memory, and virtual storage are implied in the deployment profile that is associated with a VNF in this design step Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 30

11 Figure 7. Selecting NFV functions in the Cisco DNA Center Routing and NFV workflow The outcome of the DNA Center design workflow is a set of parameters for the network infrastructure elements (DNS, DHCP, and other supporting services), as well as deployment profiles for switches, wireless access points, and virtual or physical routers. These network profiles are associated with one or more sites in the network hierarchy, such that they can be applied if a device is onboarded into DNA Center. Onboarding and deploying network elements with DNA Center Network elements and enterprise network topology can be onboarded into Cisco DNA Center using multiple methods: Network discovery The network discovery tool enables the detection of existing network elements in an existing network. Devices can be searched for based on a given IP address range at Layer 3, or based on the Cisco Discovery Protocol or the Link Level Discovery Protocol (LLDP) at Layer 2. Detected devices are placed in the DNA Center inventory for subsequent network operations. Network plug and play Cisco DNA Center hosts a Plug-and-Play (PnP) server that assists in the onboarding of new devices. Any device that is network PnP capable can call in to this server to announce itself to DNA Center. Upon successful completion of the PnP process, the operator can choose to claim the network element into its inventory if the device is trusted in the network. Once added to the inventory, the device is ready for further DNA Center operations Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 30

12 Network elements can learn about the DNA Center PnP server address using various mechanisms. If the network element is staged, the PnP server address can be manually configured before shipment to a site. Alternatively, the PnP server address can be communicated as part of the device s DHCP process in DHCP option 43. The DHCP server can be configured to pass option 43 back to a DHCP request, containing the IP address of the DNA Center PnP server. Alternatively, if DHCP option 43 is not an option, DNS can assist in the determination of the appropriate DNA Center PnP server. The device can resolve the Fully Qualified Domain Name (FQDN) pnpserver.<domain.com>, which can be mapped in the DNS server against the DNA Center PnP server IP address. A cloud option from Cisco is also available, in which Cisco Software Central can be contacted to associated the network element with a DNA Center instance based on the Cisco.com credentials of the operator. LAN automation In a new campus environment, multiple switches can be added to Cisco DNA Center automatically, based on LAN automation. Upon selection of a seed device (typically the border router), the campus topology is automatically detected by the LAN automation process. LAN automation is based on PnP as a functional component. The seed device locally acts as a PnP server to provide the appropriate software images and device configurations to discovered network elements. Detected switches are configured with the appropriate IP addresses out of a given pool, as well as underlay routing based on Intermediate System-to- Intermediate System (IS-IS) to form a prescribed underlay campus transport network. Manual onboarding Network elements can also be added manually into the DNA Center inventory based on a graphical user interface. Individual devices can be added by providing the name or IP address along with necessary credentials. Multiple devices can be uploaded by providing the necessary information in a CSV file. Again, once a single or multiple devices appear in the inventory, Cisco DNA Center can be used for subsequent automation operations. Once a device has been authenticated into the network, it is added to the inventory. For the device s initial deployment to proceed in the DNA Center workflow, it must be associated with a site in the network hierarchy. This creates the required link to the desired network profile to be applied to the network element. DNA Center correlates the network profiles that have been associated with a site during the design workflow with the devices that have been associated with a site in the onboarding workflow. The desired network profile is determined, and corresponding configurations are automated into the network element. For example, for a newly onboarded Cisco ENFV system running NFVIS, DNA Center applies the desired network profile, including Instantiation of the VNFs defined in the profile Creation of the desired network connectivity to neighboring network elements and within the x86 host 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 30

13 Automating network deployments and lifecycle management Ongoing changes and modifications can be automated with Cisco DNA Center using the automation tools as well as the design and provisioning workflows. Alterations to the network design profiles for switching, wireless, and routing/nfv templates can be made using the same procedure outlined above. The profile modifications can be saved to the existing library for subsequent deployment. Similarly, the provisioning workflow can be leveraged to push modified network profiles to any associated sites. This allows network operators to determine the time a network change is deployed. The workflow prompts for the required deployment parameters, such as variables that may have been used in the template editor or any modifications to the VNF set associated with a virtualized branch design. The Inventory Management, Topology, License Manager, and Image Repository automation tools can also assist in the ongoing operations of the network. The current state of the devices under management is displayed using the Inventory Management tool. This allows operators to ensure that all devices are in a managed state (that is, are under control of Cisco DNA Center), as well as to monitor network element details such as assigned IP address for management, MAC address, uptime, configuration, and other details. Similarly, the topology tool allows operators to maintain a good understanding of the state of the physical connectivity between devices. The Image Repository tool in Cisco DNA Center offers ongoing software image lifecycle management. Software images for the various device types under management can be uploaded into DNA Center s image library. The tool provides the status for each uploaded software image, including security verification, software version number, the association with actual devices, and which role the software is being deployed for (core, distribution, access switching, border routing, etc.). Figure 8 illustrates the main user interface for the DNA Center Image Repository tool. Figure 8. DNA Center Image Repository tool 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 30

14 Importantly, the Image Repository tool offers various tasks for managing software images throughout the network. New images can be uploaded from Cisco.com, from a local network server, or from a local file. Images can be tagged as golden, indicating that the version is approved for deployment by a network engineer or architect. Software upgrades can be automated using the update device function, allowing for all or selected devices to be targeted for upgrades and reporting on the upgrade status. The automated deployment of a software image does not simply push a file onto the targeted network device. DNA Center performs sophisticated predeployment and postdeployment validation checks. For example, in predeployment validation, the Image Repository tool ensures that sufficient capacity is available on the device to receive the upgrade, and that the device is compatible with the intended software version. An example of a postdeployment check is the validation that the upgrade has been successful and that the device is operational again. The entire software image upgrade process can also be embedded into IT service management workflows, as shown in Figure 9. Figure 9. Functional elements of the Cisco DNA Center software image management process 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 30

15 Automating fabric deployments for Cisco Software-Defined Access The Cisco Software-Defined Access (SD-Access) solution can also be deployed automatically with the fabric provisioning workflow. Recall that the SD-Access solution provides intent-based networking for campus networks. Fabric edge switches are connected to fabric border nodes using a Virtual Extensible LAN (VXLAN) overlay to provide end-to-end user segmentation based on Group-Based Policy (GBP). Fabric edge switches connect wired or wireless endpoints to the SD-Access infrastructure using physical ports or fabric-enabled Access Points (APs), respectively. SD-Access fabric edges represent the policy enforcement points, governing which users and devices gain access to the network. Fabric border nodes provide connectivity to external Layer 3 domains in the enterprise network, including the WAN or the Internet. A Locator-ID Separation Protocol (LISP)-based control plane maps endpoint identifiers to device relationships, allowing for devices to seamlessly connect to the SD-Access fabric using either wired or wireless access with consistent policy. The decoupling of endpoint identification from the Layer 2 or Layer 3 transport topology allows powerful policies to be applied. The IP addresses assigned to hosts are no longer used for both device reachability and policy. Policies can be anchored against the VRF and Scalable Group Tag (SGT) information in the VXLAN header, while the IP addresses of the outer encapsulation ensure reachability from a transport perspective. Deployment of a Cisco SD-Access fabric entails the following steps: Provisioning of fabric edge nodes Provisioning of one or more fabric border nodes Provisioning of a fabric control bode Cisco DNA Center allows the automated provisioning of one or more fabric domains using the fabric provisioning workflow. The initial landing screen in DNA Center allows operators to define one or more SD-Access fabric domains, each defined with its own fabric control, fabric border, and fabric edge nodes. DNA Center can thus be used to control multiple sites with a single pane of glass, as illustrated in Figure 10. Figure 10. Fabric creation landing screen in Cisco DNA Center 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 30

16 Selection of a particular fabric domain brings up the topology of devices in the inventory. For an SD-Access fabric to be created, at least one fabric border node and one fabric control plane node can be selected graphically. One of the network elements in the topology can be graphically chosen and assigned to the role of fabric border node. The node properties permit the designation of the chosen network element as either internal or external borders. Internal fabric borders track routes that are known throughout the enterprise network domain. Internal borders export all internal IP pools to the connected domain using traditional routing protocols, and also import IP subnets known in the enterprise into the LISP control plane mapping system. External borders (or default borders) track routes that are unknown, such as prefixes located in the Internet. An external border in the SD-Access architecture acts as a gateway of last resort, exporting all internal IP address pools into traditional IP routing protocols. Unknown routes are not imported into the LISP mapping system. Details of the routing protocol, autonomous system, or process numbers are determined as part of the fabric border selection workflow. Similarly, one of the network elements in the topology can be graphically selected to perform the fabric control node functionality in SD-Access. A network element can even be chosen to act as a combined fabric border and fabric control node. Finally, one or more switches in the topology can be nominated graphically to be fabric edge nodes. Such nodes are responsible for identifying and authenticating endpoints, and registering the endpoint identifier with the fabric control plane node. Fabric edges in Cisco SD-Access also provide an anycast Layer 3 gateway for all connected devices. The same anycast Layer 3 gateway is provisioned throughout all fabric edge nodes, allowing for seamless mobility in case of a nomadic endpoint. Fabric edge nodes encapsulate incoming IP flows into the VXLAN overlay network with the appropriate segmentation information (virtual network) and SGT value. Figures 11 and 12 illustrate details of the Cisco SD-Access provisioning workflows. Figure 11. Cisco DNA Center fabric provisioning workflow 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 30

17 Figure 12. Selecting fabric edge, fabric border, and fabric controllers to build a Cisco SD-Access domain The Cisco DNA Center automation engine mechanically provisions the fabric border, fabric control, and fabric edge nodes with their respective device configurations. Fabric border nodes are configured with the appropriate routing configuration to connect to external (known or unknown) domains. Configuration to reach the fabric control plane node is also added as part of this workflow. For any virtual network, a VRF instance is created. Fabric control nodes are provisioned with the appropriate LISP configuration for the Map Server/Map Resolver (MS/MR) to run the LISP host-tracking database. For fabric edge nodes, VRFs and VLANs corresponding to the desired virtual networks are created by the SD-Access provisioning workflow. Policy Enforcement Point (PEP) configurations to authenticate endpoints are also pushed to the designated fabric edge devices. The creation of a Cisco SD-Access fabric with its constituent fabric border, fabric control, and fabric edge nodes is an operational prerequisite for the group-based SD-Access policy workflows described next. Automating DNA services based on policies DNA Center automates Cisco DNA services connecting endpoints notebooks, desktops, printers, IoT devices, etc. to each other or to applications based on policies. DNA Center supports multiple types of polices to regulate endpoints and their generated IP traffic: Access policies govern admission to the network. Endpoints are authenticated and permitted to connect to the network only if authorized. Upon successful authorization, endpoints can be segmented into virtual networks to separate traffic for security reasons. Access control policies govern communication patterns between endpoints and applications. Admitted endpoints can be segmented into virtual networks to prevent communication between certain user and endpoint groups for security purposes. Traffic flowing between two or more endpoints and between endpoints and applications can be permitted, denied, or otherwise regulated by such policies. Application and traffic policies govern how application traffic should be treated by the network infrastructure. Prioritizing certain applications over others or redirecting traffic are examples of such policies Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 30

18 Cisco DNA service automation is based on groups. Endpoints and users operating them can be grouped based on common criteria such as device types, location, function, or otherwise. Access and access control policies can be authored against groups defined in the Cisco Identity Services Engine (ISE), allowing for application groups to be learned from Cisco Application Centric Infrastructure (Cisco ACI ). Applications can be grouped within DNA Center into business-relevant, default, and irrelevant categories. Grouping of endpoints and applications facilitates the creation and scale of policies. Figure 13 depicts the initial user interface for the Cisco DNA Center policy workflows. The initial policy workflow landing screen provides a summary of the known endpoint and application groups (based on either SGTs or IP subnets) and the number of virtual network segments deployed in the network, as well as the number of deployed access control policies (for both fabric and nonfabric campus deployments). A summary statistic of the deployed traffic copy policies is also displayed on the initial DNA Center policy workflow landing screen. The Policy History list provides the DNA Center operator s recent activity in authoring or deploying policies, including metadata about the policy type, version, operator, description, scope, and timestamp. Figure 13. Cisco DNA Center Policy landing screen DNA Center access policies and virtual network segmentation Access policies in a Cisco DNA infrastructure are regulated exclusively by Cisco ISE, which acts as an Authentication, Authorization, and Accounting (AAA) server. Policies that determine which user or endpoint is admitted into the network can be expressed in the Cisco ISE user interface. Users and devices can furthermore be dynamically grouped together, each group being represented by an SGT. Group definitions can also be imported into Cisco ISE from the Cisco ACI controller that governs the data center. Application groups defined in Cisco ACI can be ingested into the list of available groups in Cisco ISE using REST API calls, and passed on to DNA Center. This allows for policies to be authored based not just on the user and endpoint groups defined in Cisco ISE, but also on application groups Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 30

19 Cisco ISE provides the capabilities to author access policies against such groups. In addition, the groups that are defined or imported into Cisco ISE can be passed to Cisco DNA Center for traffic segmentation based on virtual networks. Figure 14 illustrates how the imported groups can be associated with a virtual network in the Cisco SD- Access solution. The group definitions available in Cisco ISE are displayed for selection and graphical association with a virtual network segment. Endpoint and application groups associated with one virtual network by default cannot communicate with endpoint and application groups associated with another virtual network. Communication between virtual networks is restricted, providing complete isolation. Figure 14. Defining access control policies in Cisco DNA Center Once the desired access and virtual network segmentation policies are defined in Cisco ISE and Cisco DNA Center, respectively, they are automatically pushed to the network infrastructure elements. Optionally, as users and endpoints authenticate, Cisco ISE can use RADIUS to automatically deploy the appropriate SGT to be added to IP traffic. Cisco ISE also configures an access control list based on IP subnet or SGT (SGACL) to permit or deny endpoint traffic seeking to enter the network. The appropriate device configurations to reflect virtual networks defined in the policy authoring workflow are pushed by DNA Center to all fabric edge devices in an SD-Access campus network. For each virtual network, a VRF is created in all the SD-Access fabric edge and fabric border nodes. A virtual network is also associated with its own host IP address pool. This helps ensure seamless endpoint mobility: users and endpoints are associated with scalable groups by Cisco ISE, and DNA Center imports these groups and prepositions the correct virtual network assignments at every access switch. The user or endpoint is thus automatically placed in the desired virtual network segment regardless of where they connect into the network Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 30

20 DNA Center access control policies Communication of groups within a virtual network can further be controlled by Cisco DNA Center access control policies, which are based on contract templates. A contract defines the action to be taken against a particular port or protocol, as defined in the access contract user interface under the policy/contracts workflow. Once contracts are defined, they are applied to a source/destination tuple under the policy administration user interface. A contract can be applied to SGT-based application control policies, as well as to IP-based application control policies. Figure 15 illustrates the initial Cisco DNA Center Policy screen for specifying application contracts. The list of available contracts, a description, and the default and explicit actions, as well as possible protocol filters are summarized on the initial landing screen. Figure 16 shows further details on how an individual contract can be added to the contract template library, specifying the contract name and an implicit (default) action, as well as possibly port- or protocol-specific actions of the defined contract. Figure 15. Defining access contracts in Cisco DNA Center 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 30

21 Figure 16. Defining access contract templates in Cisco DNA Center Contracts are applied to a tuple of source/destination group (based on SGTs or IP) under the policy administration workflow, as shown in Figure 17. The initial Policy Administration landing screen lists the authored policies with their deployment status and description. New access control policies can be added to this list by selecting a source group and destination group, as well as the desired contract. Figure 18 shows the access control policy definition screen for SGT-based policies. Note that an access control policy is not by default bidirectional. Unless the option Enable Bi-directional is selected, an access control policy is defined for traffic flowing from the specified source to the specified destination only. Figure 17. Group-based access control policy status in Cisco DNA Center 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 30

22 Figure 18. Defining group-based access control policies in Cisco DNA Center Cisco DNA Center automates the deployment of access control policies into the Cisco DNA infrastructure network elements via Cisco ISE. DNA Center communicates the defined access control policies to Cisco ISE via REST API calls. The network elements are programmed by Cisco ISE using RADIUS calls with the appropriate device configurations that represent the policies. Cisco DNA Center thus offers a networkwide access control policy authoring environment, while Cisco ISE remains responsible for the instantiation of both access and access control policies into the network. DNA Center application and traffic copy policies The DNA Center application and traffic copy policies govern how application flows are treated within the Cisco DNA network. Application policies determine the quality-of-service treatments in the network. Traffic copy policies enable the DNA Center operator to selectively copy flows to a predefined destination for further inspection or processing. The application policy workflow in DNA Center uses Network-Based Application Recognition (NBAR) to classify over 1400 applications into application sets. Applications with similar traffic characteristics can be categorized into the same set to simplify the subsequent QoS treatment. Applications that are similar can be grouped into application sets. This grouping simplifies the workflow for end users. The applications known to DNA Center can thus be handled by 30+ application sets. Users can create custom applications as well as application sets if a particular application in their network cannot be identified by the NBAR protocol pack. These application sets are predefined by Cisco DNA Center in the Application Sets user interface under Policy/Application, as shown in Figure 19, allowing also for custom application sets to be created Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 30

23 Figure 19. Defining application sets for application policies in Cisco DNA Center Further abstractions of the application treatment in Cisco DNA are provided under the application workflow. The list of known applications can be grouped into control, voice/video, and data traffic classes. The subcategories for these traffic classes are Control Operations administrative management Network control Signaling Voice/video Multimedia conferencing Multimedia streaming VoIP telephony Broadcast video Real-time interactive Data Bulk data Transactional data Application sets and traffic classes provide for a two-dimensional classification of the known application space: by application traffic class (control, voice/video, or data) and by higher-level application type. The QoS behavior to be applied in the Cisco DNA infrastructure is regulated by queuing profiles. For each of the traffic classes, the desired Differentiated Services Code Point (DSCP) value or bandwidth percentage allocation can be manipulated using a graphical slider. Default values based on the Cisco Validated Design are also available Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 30

24 The application sets, traffic classes, and queuing profiles provide valuable input to the application policy definition. This policy type permits the abstracted, intent-based definition of applications into business-relevant, default, and business-irrelevant classes based on IETF Request for Comment (RFC) standards. Business relevant: These applications directly support business objectives. Applications should be classified, marked, and treated marked according to industry best practice recommendations. (RFC 4594) Default: These applications may or may not support business objectives (e.g., HTTP/HTTPS/SSL). Applications of this type should be treated with a default forwarding service. (RFC 2474) Business irrelevant: These applications do not support business objectives and are typically consumeroriented. Applications of this type should be treated with a less than best effort service. (RFC 3662) Figure 20 illustrates the details of the application policy authoring user interface. The association between application classes and policy category is displayed graphically. Each application policy is associated with one or more sites, pointing to one of the queuing profiles to be applied. Custom application policies can be created by moving individual applications or entire application sets between the business-relevant, default, and businessirrelevant classifications, and by associating them with a different set of sites or queueing profile. Figure 20. Authoring application policies in Cisco DNA Center Cisco DNA Center deploys the specified application policies into the network underlay using the DNA Center automation engine. The intent-based application policies defined in the abstract are translated into device-specific QoS configurations, taking the network topology, device types, and software versions into account. The derived configurations are then programmed into the network elements using device API calls, based on CLI, REST, or NETCONF/YANG where applicable. Traffic copy policies are another example of policy treatment, allowing the operator to selectively copy traffic flows for further processing or inspection. A Cisco DNA traffic policy takes a target flow between a source and destination and copies its packets to one of the predefined copy destinations. The steps to create a traffic copy policy in Cisco DNA Center are: 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 24 of 30

25 1. Define a copy destination. 2. Define a copy contract (possibly filtering an application). 3. Define a source/destination group flow to copy. These steps are similar to the access control policy workflow. The DNA Center operator can provide details of one or more copy destination devices by selecting one of the known devices in the inventory and selecting a port. The traffic contract definition then allows a specific traffic copy destination to be associated with a traffic contract under a given name. Finally, the traffic contract can be applied to a source/destination group pair, as shown in Figure 21. The source and destination SGT-based groups can be graphically selected, and a traffic contract applied with a name and a textual description. Figure 21. Applying traffic contracts to access control policies in Cisco DNA Center As with other types of policies in Cisco DNA Center, the resulting traffic copy policy is transformed into device-level configurations and mechanically instantiated into the relevant network elements. The DNA Center workflow engine in this case considers the list of network elements as well as the specific traffic copy destination. Cisco Encapsulated Remote Switched Port Analyzer (ERSPAN) is configured with a filter to copy packets of the desired source-destination flows toward the traffic copy destination Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 25 of 30

26 DNA Center Platform Cisco DNA Center offers integrations for network operations into broader IT process and workflow management along multiple fronts: Ecosystem integrations: DNA Center can directly integrate with other IT systems. Examples include IT Service Management (ITSM) systems to support business and operational efficiencies and IP Address Management (IPAM) systems. Integrations with reporting systems also fall into this category. Domain integrations: Integrations with other domains in the enterprise (WAN, data center), allowing network operators to exchange information with security, WAN, and data center network elements. API integrations: DNA Center provides APIs to control and drive functionality offered by DNA Center from northbound applications, Third-party device integrations: DNA Center offers a Software Development Kit (SDK) for device extensions in support of third-party network devices. The integration capabilities of DNA Center Platform allow operators to create value beyond the network infrastructure, empowering enterprises and partners to collaborate in a dynamic ecosystem. Business workflows can be automated, no longer requiring human interpretation and middleware to ensure that the business objectives are activated in the network. First, consider ITSM integration of the DNA Center Platform. This creates valuable links to incident management, change management, and problem management systems. The workflows of ITSM tools (such as approval and preapproval chains) are associated with DNA Center workflows programmatically. Change management and maintenance windows defined in the enterprise s IT processes can also be linked to the DNA Center workflows. Cisco DNA Center offers both information push and information pull capabilities for such integrations. Events and notifications for change management, issues, network events, and other problem data can be exposed using the push mechanisms with additional network context. DNA Center can also pull information and data into its environment, for example, approvals, schedules, and exceptions to complement its internal workflows. Integration with IPAM is offered to allow for networkwide management of IP address pools. Pools assigned to sites and devices can thus be synchronized with the IPAM tools. The available IP pools, free pools, pool depletion, or remaining pool size can be pulled into DNA Center to be incorporated in the provisioning workflows for network elements and SD-Access. Second, Cisco DNA Center extensions allow for complementary network domains to be interconnected. Currently, Software-Defined WAN (SD-WAN) or data center environments are typically controlled as separate domains, forcing network operators to separate the provisioning and assurance workflow per domain. The DNA Center integrations with Cisco ACI in the data center or with SD-WAN for the WAN provide a more seamless workflow experience. On the data center side, application groups defined in Cisco ACI can be imported into a DNA Center operated domain, allowing for policies to be authored against user and device groups as well as application groups. A DNA Center policy can, for example, restrict traffic from a user group defined in Cisco ISE to an application group defined in Cisco ACI throughout an SD-Access campus access network. Similarly, the DNA Center design workflow for virtual branches allows for a template to include an SD-WAN virtual router, the vedge Cloud VNF, in the design. During the provisioning of such a virtualized branch, the vedge Cloud VNF is instantiated and registered with the Cisco SD-WAN vmanage orchestrator for further configurations and policies to be applied Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 26 of 30

27 The DNA Center cross-domain integration also integrates Cisco Meraki environments. This linkage exposes Meraki devices into the DNA Center inventory, providing visibility into Meraki domains for both network elements and endpoints while incorporating common topologies into managed environments as well. Third, Cisco DNA Center APIs are exposed to facilitate the integration of its functions with external applications to a developer community. Operations such as adding devices to the network inventory, retrieving details about a site, network element, or endpoint, or managing software images can be controlled using such APIs. Support for operational tools such as the template programmer, command runner, path trace, or network discovery is also available. The APIs are easily consumable from within the DNA Center environment as well as from the outside. Figure 22 shows an example of the API catalog that is provided, listing the available APIs and the method (GET, PUT, POST, DELETE), as well as a short description. Further details can be exposed by clicking the name of the API, including the external URL to call, the runtime parameters, the return codes, and the model schema. A Try It button even permits a developer to experiment with a particular API to better understand its behavior (Figure 23). Figure 22. DNA Center Platform APIs landing screen 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 30

28 Figure 23. Cisco DNA Center API documentation, highlighting the Try It button Fourth, the SDK for DNA Center Platform provides extensibility to the supported network elements. Third-party switches and routers can be added to the list of supported Cisco devices to be managed by DNA Center. The SDK is based on Eclipse, running on Ubuntu, Microsoft Windows, or Apple Mac OS X operating systems. Help functions, step-by-step cheat sheets, and a DNA Center package creation wizard offer the necessary support to quickly develop a project. Eclipse also helps with managing the connection of the SDK environment to a DNA Center instance. The DNA Center SDK capabilities support visibility and configuration for third-party network elements. Using the SDK, these can be discovered, added to the inventory, displayed in the topology, and even polled using SNMP. SDK capabilities permit configurations to be pushed based on the third-party device s operating system, and for show commands to be applied Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 28 of 30

29 Figure 24 displays the Eclipse-based Cisco DNA Center SDK. Figure 24. Cisco DNA Center SDK to integrate third-party devices Extensive support for the Cisco DNA Center Platform is given in DevNet, the Cisco developer community, at including getting started information, examples, references, and further resources. Summary Cisco DNA Center automation extends the capabilities offered by device programmability to the network level. Rather than operating on a device-by-device basis, network automation aims to treat the network as a coherent system in itself. Operations are applied to the network to achieve a desired behavior, rather than pushing configurations to individual devices. This subtle but important distinction forms the basis for intent-based networking, in which network operators are encouraged to describe the intended behavior of the network, rather than configuring devices one by one. Intent-based networking focuses on what the network should do for users, devices, and applications, rather than how the individual elements are configured. DNA Center supports automation applications for standard processes such as creating an inventory of network elements, depicting the network topology, or performing software image management and license management tasks. In addition, it supports sophisticated workflows to operate all stages of a Cisco DNA network, starting at the design phase and continuing through the provisioning phase all the way to the day-n operations and ongoing lifecycle management phase. The DNA Center design workflows are particularly important for driving standards into a Cisco DNA network. Seemingly mundane settings such as IP addresses of common network functions (DNS, DHCP, SYSLOG, and NTP servers, for example) can be standardized and their reachability automated. The design workflow also accommodates the creation of standard site and device templates that are stored in a library to be applied in the provisioning phase of the network. The DNA Center provisioning workflow supports network plug-and-play, allowing IT staff to ship network elements to their sites and automatically provision them. Once a device calls home to the DNA Center plug-and-play server 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 29 of 30

Več kot SDN - SDA arhitektura v uporabniških omrežjih

Več kot SDN - SDA arhitektura v uporabniških omrežjih Več kot SDN - SDA arhitektura v uporabniških omrežjih Aleksander Kocelj SE Cisco Agenda - Introduction to Software Defined Access - Brief description on SDA - Cisco SDA Assurance - DEMO 2 New Requirements

More information

Software-Defined Access 1.0

Software-Defined Access 1.0 White Paper Software-Defined Access 1.0 Solution White Paper Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA https://www.cisco.com/ Tel: 408 526-4000 800 553-NETS

More information

Cisco SD-WAN and DNA-C

Cisco SD-WAN and DNA-C Cisco SD-WAN and DNA-C SD-WAN Cisco SD-WAN Intent-based networking for the branch and WAN 4x Improved application experience Better user experience Deploy applications in minutes on any platform with consistent

More information

Software-Defined Access 1.0

Software-Defined Access 1.0 Software-Defined Access 1.0 What is Cisco Software-Defined Access? The Cisco Software-Defined Access (SD-Access) solution uses Cisco DNA Center to provide intent-based policy, automation, and assurance

More information

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack White Paper Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack Introduction Cisco Application Centric Infrastructure (ACI) is a next-generation data center fabric infrastructure

More information

Routing Underlay and NFV Automation with DNA Center

Routing Underlay and NFV Automation with DNA Center BRKRST-1888 Routing Underlay and NFV Automation with DNA Center Prakash Rajamani, Director, Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session

More information

SD-Access Wireless: why would you care?

SD-Access Wireless: why would you care? SD-Access Wireless: why would you care? CUWN Architecture - Centralized Overview Policy Definition Enforcement Point for Wi-Fi clients Client keeps same IP address while roaming WLC Single point of Ingress

More information

Cisco SD-Access Building the Routed Underlay

Cisco SD-Access Building the Routed Underlay Cisco SD-Access Building the Routed Underlay Rahul Kachalia Sr. Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the

More information

Cisco DNA Center Migration to Release 1.2.5

Cisco DNA Center Migration to Release 1.2.5 Migration Guide Cisco DNA Center Migration to Release 1.2.5 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 SD-Access

More information

Problem: Traditional network management tools are limited and do not address network needs

Problem: Traditional network management tools are limited and do not address network needs Data Sheet Cisco DNA Center 1.1 Closing the loop with context Cisco DNA Center is the foundational controller and analytics platform at the heart of Cisco s intent-based network. DNA Center 1.0 supported

More information

Service Graph Design with Cisco Application Centric Infrastructure

Service Graph Design with Cisco Application Centric Infrastructure White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...

More information

Cisco Software-Defined Access

Cisco Software-Defined Access Migration Guide Cisco Software-Defined Access 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 31 Contents Cisco SD-Access... 3 Evolution of Networking

More information

Assure the Health of Your Network

Assure the Health of Your Network DNA Center Assurance Overview, on page 1 Monitor and Troubleshoot the Overall Health of Your Enterprise, on page 4 Monitor and Troubleshoot the Health of Your Network, on page 7 Monitor and Troubleshoot

More information

ACI Terminology. This chapter contains the following sections: ACI Terminology, on page 1. Cisco ACI Term. (Approximation)

ACI Terminology. This chapter contains the following sections: ACI Terminology, on page 1. Cisco ACI Term. (Approximation) This chapter contains the following sections:, on page 1 Alias API Inspector App Center Alias A changeable name for a given object. While the name of an object, once created, cannot be changed, the Alias

More information

Cisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience.

Cisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience. Cisco Securely connect any user to any application across any platform, all with a consistent user experience. Introduction Moving applications to the cloud requires faster, more reliable connectivity.

More information

Cisco.Network.Intuitive FastLane IT Forum. Andreas Korn Systems Engineer

Cisco.Network.Intuitive FastLane IT Forum. Andreas Korn Systems Engineer Cisco.Network.Intuitive FastLane IT Forum Andreas Korn Systems Engineer 12.10.2017 Ziele dieser Session New Era of Networking - Was ist darunter zu verstehen? Software Defined Access Wie revolutioniert

More information

Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design

Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design White Paper Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design Emerging IT technologies have brought about a shift from IT as a cost center to IT as a business driver.

More information

Cisco Software-Defined Access

Cisco Software-Defined Access Cisco Software-Defined Access Introducing an entirely new era in networking. What if you could give time back to IT? Provide network access in minutes for any user or device to any application-without

More information

Software-Defined Access Wireless

Software-Defined Access Wireless Introduction to, page 1 Configuring SD-Access Wireless (CLI), page 7 Enabling SD-Access Wireless (GUI), page 8 Configuring SD-Access Wireless VNID (GUI), page 9 Configuring SD-Access Wireless WLAN (GUI),

More information

Software-Defined Access Wireless

Software-Defined Access Wireless Introduction to, page 1 Configuring SD-Access Wireless (CLI), page 7 Enabling SD-Access Wireless (GUI), page 8 Configuring SD-Access Wireless VNID (GUI), page 9 Configuring SD-Access Wireless WLAN (GUI),

More information

Networking in the Digital Era

Networking in the Digital Era Networking in the Digital Era Ioana Manea Cisco Systems Engineer 19 Octombrie 2016 Digital Transformation UBER, The world s largest taxi company owns no vehicles AIRBNB, The world s largest accommodation

More information

Cisco ACI Terminology ACI Terminology 2

Cisco ACI Terminology ACI Terminology 2 inology ACI Terminology 2 Revised: May 24, 2018, ACI Terminology Cisco ACI Term Alias API Inspector App Center Application Policy Infrastructure Controller (APIC) Application Profile Atomic Counters Alias

More information

Simplify and automate your network with Cisco DNA

Simplify and automate your network with Cisco DNA Simplify and automate your network with Cisco DNA Mr. Brink Sanders Managing Director, Software and Network Transformation Cisco Asia Pacific and Japan March, 2017 Agenda Software-Defined Networking (SDN)

More information

Software-Defined Access Wireless

Software-Defined Access Wireless Introduction to, page 1 Configuring SD-Access Wireless (CLI), page 7 Introduction to The Enterprise Fabric provides end-to-end enterprise-wide segmentation, flexible subnet addressing, and controller-based

More information

Use Plug and Play to Deploy New Devices

Use Plug and Play to Deploy New Devices About Plug and Play, page 1 Prerequisites for Using Plug and Play, page 2 Plug and Play Workflow, page 2 Use the Plug and Play Dashboard to Monitor New Device Deployments, page 4 Create Plug and Play Profiles

More information

Cisco Virtual Networking Solution for OpenStack

Cisco Virtual Networking Solution for OpenStack Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

Cisco Campus Fabric Introduction. Vedran Hafner Systems engineer Cisco

Cisco Campus Fabric Introduction. Vedran Hafner Systems engineer Cisco Cisco Campus Fabric Introduction Vedran Hafner Systems engineer Cisco Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility (w/o stretching VLANs) Network

More information

Intent-Based Networking

Intent-Based Networking Intent-Based Networking Building the bridge between business and IT Introduction Networks are at the heart of the unstoppable evolution to a digital economy. Digitalization is changing the way businesses,

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Now a part of Cisco We bought Viptela Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Branch Hybrid WAN Transport IPsec Secure MPLS (IP-VPN) Private Cloud Virtual Private

More information

Cisco ISR G2 Management Overview

Cisco ISR G2 Management Overview Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and

More information

THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017

THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 The Network. Intuitive. Constantly learning, adapting and protecting. L E A R

More information

Delivering Enterprise SDN. Now. Simplify and Automate Your Network for Digital Transformation

Delivering Enterprise SDN. Now. Simplify and Automate Your Network for Digital Transformation Delivering Enterprise SDN. Now. Simplify and Automate Your Network for Digital Transformation Agenda Software-Defined Networking (SDN) Market Drivers Cisco APIC-EM Automate Network Configuration & Setup

More information

Cisco IWAN Application 2.2 on DNA Center, Quick Start Guide

Cisco IWAN Application 2.2 on DNA Center, Quick Start Guide First Published: 2018-06-04 Last Modified: 2018-06-04 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Next Gen Enterprise Management and Operations with Cisco DNA

Next Gen Enterprise Management and Operations with Cisco DNA Next Gen Enterprise Management and Operations with Cisco DNA Ramit Kanda Director PM, Enterprise Network Transformation Prakash Rajamani Director PM, Enterprise Network Transformation BRKNMS 1601 Cisco

More information

Cisco DNA Center FAQ

Cisco DNA Center FAQ F Cisco DN Center F What is Cisco DN Center? Cisco DN Center is the network management system, foundational controller, and analytics platform at the heart of Cisco s intent-based network. Beyond device

More information

Configure Devices Using Converged Access Deployment Templates for Campus and Branch Networks

Configure Devices Using Converged Access Deployment Templates for Campus and Branch Networks Configure Devices Using Converged Access Deployment Templates for Campus and Branch Networks What Are Converged Access Workflows?, on page 1 Supported Cisco IOS-XE Platforms, on page 3 Prerequisites for

More information

Virtual Security Gateway Overview

Virtual Security Gateway Overview This chapter contains the following sections: Information About the Cisco Virtual Security Gateway, page 1 Cisco Virtual Security Gateway Configuration for the Network, page 10 Feature History for Overview,

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Virtualized Network Services SDN solution for enterprises

Virtualized Network Services SDN solution for enterprises Virtualized Network Services SDN solution for enterprises Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise s locations

More information

Virtualized Network Services SDN solution for service providers

Virtualized Network Services SDN solution for service providers Virtualized Network Services SDN solution for service providers Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise customers

More information

Cisco ACI vcenter Plugin

Cisco ACI vcenter Plugin This chapter contains the following sections: About Cisco ACI with VMware vsphere Web Client, page 1 Getting Started with, page 2 Features and Limitations, page 7 GUI, page 12 Performing ACI Object Configurations,

More information

Cisco Digital Network Architecture Center User Guide, Release 1.1

Cisco Digital Network Architecture Center User Guide, Release 1.1 First Published: 2017-11-30 Last Modified: 2018-04-27 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Cisco Virtual Managed Services

Cisco Virtual Managed Services Data Sheet Cisco Virtual Managed Services SD-WAN Made Simple for Service Providers Cisco Virtual Managed Services (VMS) is a cloud native solution for service providers to automate, innovate and accelerate

More information

Simplify and Automate Your Network with Cisco DNA. Brink Sanders Managing Director, Software and Network Transformation 12 May 2017

Simplify and Automate Your Network with Cisco DNA. Brink Sanders Managing Director, Software and Network Transformation 12 May 2017 Simplify and Automate Your Network with Cisco DNA Brink Sanders Managing Director, Software and Network Transformation 12 May 2017 Agenda Software-Defined Networking (SDN) Market Drivers Cisco APIC-EM

More information

Cisco SD-Access: Enterprise Networking Made Fast and Flexible. November 2017

Cisco SD-Access: Enterprise Networking Made Fast and Flexible. November 2017 Cisco SD-Access: Enterprise Networking Made Fast and Flexible November 2017 Executive Summary Enterprise networking remains a lot harder than it needs to be. For far too long, enterprises have wrestled

More information

ForeScout CounterACT. Plugin. Configuration Guide. Version 2.1

ForeScout CounterACT. Plugin. Configuration Guide. Version 2.1 ForeScout CounterACT Core Extensions Module: DHCP Classifier Plugin Version 2.1 Table of Contents About the DHCP Classifier Plugin... 3 What to Do... 3 Requirements... 3 Verify That the Plugin Is Running...

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics Christopher Say (CCIE RS SP) Consulting System Engineer csaychoh@cisco.com Challenges in operating a hybrid data center

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become

More information

Borderless Networks. Tom Schepers, Director Systems Engineering

Borderless Networks. Tom Schepers, Director Systems Engineering Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action

More information

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer

More information

Manage Your Inventory

Manage Your Inventory About Inventory About Inventory, on page 1 Inventory and Cisco ISE Authentication, on page 2 Display Information About Your Inventory, on page 2 Types of Devices in the DNA Center Inventory, on page 6

More information

DNA Automation Services Offerings

DNA Automation Services Offerings DNA Automation Services Offerings Jamie Owen, Solutions Architect, Cisco Advanced Services Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Cisco Wide Area Bonjour Solution Overview

Cisco Wide Area Bonjour Solution Overview , page 1 Topology Overview, page 2 About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM), page 5 The Cisco Wide Area Bonjour solution is based on a distributed and hierarchical

More information

Cisco Application Centric Infrastructure

Cisco Application Centric Infrastructure Data Sheet Cisco Application Centric Infrastructure What s Inside At a glance: Cisco ACI solution Main benefits Cisco ACI building blocks Main features Fabric Management and Automation Network Security

More information

SD-WAN Deployment Guide (CVD)

SD-WAN Deployment Guide (CVD) SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces

More information

Securing BYOD with Cisco TrustSec Security Group Firewalling

Securing BYOD with Cisco TrustSec Security Group Firewalling White Paper Securing BYOD with Cisco TrustSec Security Group Firewalling Getting Started with TrustSec What You Will Learn The bring-your-own-device (BYOD) trend can spur greater enterprise productivity

More information

Cisco Enterprise Cloud Suite Overview Cisco and/or its affiliates. All rights reserved.

Cisco Enterprise Cloud Suite Overview Cisco and/or its affiliates. All rights reserved. Cisco Enterprise Cloud Suite Overview 2015 Cisco and/or its affiliates. All rights reserved. 1 CECS Components End User Service Catalog SERVICE PORTAL Orchestration and Management UCS Director Application

More information

CounterACT DHCP Classifier Plugin

CounterACT DHCP Classifier Plugin CounterACT DHCP Classifier Plugin Version 2.0.7 and Above Table of Contents About the CounterACT DHCP Classifier Plugin... 3 What to Do... 3 Requirements... 4 Install the Plugin... 4 Concepts, Components,

More information

SD-WAN on Cisco IOS XE Routers: An End-to-End View

SD-WAN on Cisco IOS XE Routers: An End-to-End View SD-WAN on Cisco IOS XE Routers: An End-to-End View Summary This white paper presents an overview of the Cisco Software-Defined WAN (SD-WAN) solution on Cisco IOS XE routers. It is a good introduction for

More information

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018 Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14

More information

APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks

APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks Saurav Prasad Technical Marketing Engineer CTHNMS-1002 Cisco Spark How Questions? Use Cisco Spark to chat with the speaker after

More information

ForeScout CounterACT. Configuration Guide. Version 4.3

ForeScout CounterACT. Configuration Guide. Version 4.3 ForeScout CounterACT Authentication Module: RADIUS Plugin Version 4.3 Table of Contents Overview... 4 Understanding the 802.1X Protocol... 4 About the CounterACT RADIUS Plugin... 6 IPv6 Support... 7 About

More information

Configure Policies. Policy Overview. Policy Dashboard

Configure Policies. Policy Overview. Policy Dashboard Policy Overview, on page 1 Policy Dashboard, on page 1 Group-Based Access Control Policies, on page 2 IP-Based Access Control Policies, on page 7 Application Policies, on page 13 Traffic Copy Policies,

More information

Cisco Digital Network Architecture Vision for Virtualization

Cisco Digital Network Architecture Vision for Virtualization Cisco Digital Network Architecture Vision for Virtualization Cisco Digital Network Architecture Vision for Virtualization 2016 Cisco and/or its affiliates. All rights reserved. As enterprise business processes

More information

Exam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.

Exam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test. Exam Code: 700-303 Number: 700-303 Passing Score: 800 Time Limit: 120 min File Version: 41.2 http://www.gratisexam.com/ Exam Code: 700-303 Exam Name: Advanced Borderless Network Architecture Systems Engineer

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Application Provisioning

Application Provisioning Overview, page 1 Application Categories, page 1 Application Containers, page 2 Catalogs, page 7 Self-Service Provisioning, page 8 Overview After you have allocated your resources among your user groups,

More information

Software-Defined Access Design Guide

Software-Defined Access Design Guide Cisco Validated design Software-Defined Access Design Guide December 2017 Solution 1.1 Table of Contents Table of Contents Cisco Digital Network Architecture and Software-Defined Access Introduction...

More information

SDN+NFV Next Steps in the Journey

SDN+NFV Next Steps in the Journey SDN+NFV Next Steps in the Journey Margaret T. Chiosi AT&T Labs Distinguished Architect SDN-NFV Realization 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks

More information

Cisco IWAN Application on DNA Center Quick Start Guide, Release 1.1 Patch 1, Limited Availability

Cisco IWAN Application on DNA Center Quick Start Guide, Release 1.1 Patch 1, Limited Availability Cisco IWAN Application on DNA Center Quick Start Guide, Release 1.1 Patch 1, Limited Availability First Published: 2017-12-22 Last Modified: 2017-12-22 Americas Headquarters Cisco Systems, Inc. 170 West

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

Managing Site-to-Site VPNs: The Basics

Managing Site-to-Site VPNs: The Basics CHAPTER 23 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels

More information

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites The recommended knowledge and skills that a learner must have before attending this course are as follows: Knowledge

More information

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5

More information

Securing Containers Using a PNSC and a Cisco VSG

Securing Containers Using a PNSC and a Cisco VSG Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 4 About

More information

ONUG SDN Federation/Operability

ONUG SDN Federation/Operability ONUG SDN Federation/Operability Orchestration A white paper from the ONUG SDN Federation/Operability Working Group May, 2016 Definition of Open Networking Open networking is a suite of interoperable software

More information

Huawei Agile Controller. Agile Controller 1

Huawei Agile Controller. Agile Controller 1 Huawei Agile Controller Agile Controller 1 Agile Controller 1 Product Overview Agile Controller is the latest user- and application-based network resource auto control system offered by Huawei. Following

More information

Deploying Devices. Cisco Prime Infrastructure 3.1. Job Aid

Deploying Devices. Cisco Prime Infrastructure 3.1. Job Aid Deploying Devices Cisco Prime Infrastructure 3.1 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION,

More information

SDN Security BRKSEC Alok Mittal Security Business Group, Cisco

SDN Security BRKSEC Alok Mittal Security Business Group, Cisco SDN Security Alok Mittal Security Business Group, Cisco Security at the Speed of the Network Automating and Accelerating Security Through SDN Countering threats is complex and difficult. Software Defined

More information

Cisco HyperFlex Systems

Cisco HyperFlex Systems White Paper Cisco HyperFlex Systems Install and Manage Cisco HyperFlex Systems in a Cisco ACI Environment Original Update: January 2017 Updated: March 2018 Note: This document contains material and data

More information

Demand-Based Control Planes for Switching Fabrics

Demand-Based Control Planes for Switching Fabrics Demand-Based Control Planes for Switching Fabrics Modern switching fabrics use virtual network overlays to support mobility, segmentation, and programmability at very large scale. Overlays are a key enabler

More information

Nuage Networks Product Architecture. White Paper

Nuage Networks Product Architecture. White Paper Nuage Networks Product Architecture White Paper Table of Contents Abstract... 3 Networking from the Application s Perspective... 4 Design Principles... 4 Architecture... 4 Integrating Bare Metal Resources...

More information

Cisco Data Center Network Manager 5.1

Cisco Data Center Network Manager 5.1 Cisco Data Center Network Manager 5.1 Product Overview Modern data centers are becoming increasingly large and complex. New technology architectures such as cloud computing and virtualization are adding

More information

Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab

Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Ali Shaikh Technical Leader Faraz Shamim Sr. Technical Leader Mossaddaq Turabi Distinguished ENgineer Cisco Spark How Questions?

More information

NERC Compliance Use Cases

NERC Compliance Use Cases NERC Compliance Use Cases Overview For network and IT teams who work in the Energy sector, the North American Energy Reliability Corporation Critical Infrastructure Protection (NERC-CIP) standards provide

More information

Identity Based Network Access

Identity Based Network Access Identity Based Network Access Identity Based Network Access - Agenda What are my issues Cisco ISE Power training What have I achieved What do I want to do What are the issues? Guest Student Staff Contractor

More information

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q&A Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q. What is the Cisco Cloud Services Router 1000V? A. The Cisco Cloud Services Router 1000V (CSR 1000V) is a router in virtual

More information

Introducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led

Introducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led Introducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led Course Description Introducing Cisco Cloud Administration (CLDADM) is a new 5-day ILT course designed to help students prepare

More information

Cisco Software-Defined Access

Cisco Software-Defined Access F Cisco Software-Defined ccess What is Cisco Software-Defined ccess? Cisco Software-Defined ccess (SD-ccess) is a central part of the Cisco Digital Network rchitecture (Cisco DN ) solution and represents

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.1.0 Table of Contents About this Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

From Zero Touch Provisioning to Secure Business Intent

From Zero Touch Provisioning to Secure Business Intent From Zero Touch Provisioning to Secure Business Intent Flexible Orchestration with Silver Peak s EdgeConnect SD-WAN Solution From Zero Touch Provisioning to Secure Business Intent Flexible Orchestration

More information

SD-Access Wireless Design and Deployment Guide

SD-Access Wireless Design and Deployment Guide SD-Access Wireless Design and Deployment Guide Executive Summary 2 Software Defined Access 2 SD Access Wireless 3 SD Access Wireless Architecture 4 Setting up SD-Access Wireless with DNAC 13 SD Access

More information

Design Your Network. Design A New Network Infrastructure. Procedure

Design Your Network. Design A New Network Infrastructure. Procedure Design A New Network Infrastructure, page 1 About Network Hierarchy, page 2 Create Sites in the Network Hierarchy, page 2 Add Floors to Buildings, page 3 Edit Floors, page 4 Place Cisco APs on a Floor,

More information

Next generation branch with SD-WAN and NFV

Next generation branch with SD-WAN and NFV Next generation branch with SD-WAN and NFV Kiran Ghodgaonkar, Senior Manager, Enterprise Marketing Mani Ganeson, Senior Product Manager PSOCRS-2004 @ghodgaonkar Cisco Spark How Questions? Use Cisco Spark

More information

Cisco EnergyWise: Power Management Without Borders

Cisco EnergyWise: Power Management Without Borders Cisco EnergyWise: Power Management Without Borders Introduction In response to energy costs, environmental concerns, and government directives, there is an increased need for sustainable and green business

More information

Cisco CCIE Data Center Written Exam v2.0. Version Demo

Cisco CCIE Data Center Written Exam v2.0. Version Demo Cisco 400-151 CCIE Data Center Written Exam v2.0 Version Demo QUESTION 1 Which IETF standard is the most efficient messaging protocol used in an lot network? A. SNMP B. HTTP C. CoAP D. MQTI Correct Answer:

More information