Cisco Digital Network Architecture Vision for Virtualization

Size: px
Start display at page:

Download "Cisco Digital Network Architecture Vision for Virtualization"

Transcription

1 Cisco Digital Network Architecture Vision for Virtualization Cisco Digital Network Architecture Vision for Virtualization 2016 Cisco and/or its affiliates. All rights reserved.

2 As enterprise business processes are increasingly digitized, new demands on the enterprise network architecture arise. Cisco s Digital Network Architecture (DNA) is built to facilitate fast and flexible network services that support digitalized business processes. DNA centers around a network infrastructure that is not only fully programmable and open to third party innovation, but can also fully and seamlessly integrate the cloud as an infrastructure component. The DNA controller facilitates simple, automated, and programmatic deployment of network services. It brings the notion of user and application aware policies into the foreground of network operations. With DNA, the network can provide continuous feedback to simplify and optimize network operations and to support digitalized applications to become inherently network aware. This document provides additional details about the virtualization building block of the Digital Network Architecture. The document presents the technical details underpinning the transport virtualization for service segmentation. It also describes the network function virtualization building blocks in detail, including the choice of operating system to simplify virtualization and the orchestration and controller functions. Index Terms Digitalize Services, Cloud, Virtualization, Controllers, Policy, Application-aware networking, Simplicity, Orchestration, Automation, Openness I. Overview As enterprise business processes are increasingly digitized, new demands on the enterprise network architecture arise. Cisco Digital Network Architecture provides a framework for enabling fast and flexible network services that support digitalized business processes. This architecture provides a network infrastructure that is fully programmable and open to third-party innovation and that also fully and transparently integrates the cloud as an infrastructure component. The DNA controller facilitates simple, automated, and programmatic deployment of network services and brings the concept of userand application-aware policies into the foreground of network operations. In Digital Network Architecture, the network provides continuous feedback to simplify and optimize network operations and to help make digitalized applications become inherently network aware. Figure 1 shows the main architectural concepts of the architecture. An overview of is given in [1]. This document provides technical details about how virtualization is implemented in DNA. Virtualization can be categorized into transport virtualization (network segmentation) and network function virtualization. The technical details for both are described here. The document first discusses network function virtualization (NFV), introducing the possible deployment models and the building block components. The next section presents the principles of transport virtualization (segmentation), providing architectural details to segment both the data plane and the control plane. The document concludes with a discussion of the outlook for the evolution of virtualization techniques in Digital Network Architecture Cisco and/or its affiliates. All rights reserved. 2

3 Figure 1. Main Concepts of Cisco Digital Network Architecture Cloud Enabled Network Enabled Applications Collaboration Mobility IoT Security Open APIs Developers Environment Automation Abstraction & Policy Control from Core to Edge Open Standards-Based Analytics Structured Data, Contextual Insights Programmability & Virtualization Physical & Virtual Infrastructure App Hosting Segmentation IOS ASIC This paper is written for CXOs, network architects, and network engineers wanting to understand the technical details underpinning the virtualization aspects of Digital Network Architecture. Engineering-minded decision makers seeking to understand how the architecture supports the business benefits of Cisco DNA may also benefit from this paper. II. Network Function Virtualization Architecture In Digital Network Architecture, network function virtualization, or NFV, allows the flexible placement of Layer 4 through 7 (L4-L7) functions anywhere in the architecture, assuming that the required x86 computing resources are available. These x86 resources can be provided in various form factors to meet the needs of the different domains in the network and to support a variety of use cases. In a data center, existing x86 servers can also host virtual network functions (VNFs) alongside digitalized applications. In the WAN, branch routers such as the Cisco 4000 Series Integrated Services Routers (ISRs) have x86 cores available for this purpose and can be extended with an x86 compute blade: the Cisco UCS E-Series Servers. Network elements are also planned with additional x86 resources (generic compute, memory, storage resources) to accommodate the virtualization of network functions and application hosting. Digital Network Architecture supports two types of operating systems for virtualization: the enhanced Cisco IOS XE network operating system and Cisco NFV Infrastructure Software (NFVIS). Figure 2 shows several deployment options. Use cases in which only a few VNFs are required can be deployed using enhanced Cisco IOS XE in existing network routers or switches. Cisco IOS XE is based on Linux, and this deployment variant feature to allow the VNFs to run in a virtual machine next to the router s Cisco IOS XE software processes. For deployments that require additional x86 resources, a Cisco UCS E-Series blade can be inserted in the chassis of a 4000 Series ISR. In this case, NFVIS supports the virtualization of network functions, as discussed later in this document. Another deployment scenario relies on x86 servers that are co-located with a physical router or switch. In this case, the router or switch is responsible for the IP transport function, whereas the L4-L7 network functions are running in VNFs on the x86 server. This deployment model even allows other router systems (such as the Cisco ISR Generation 2 [ISR G2] routers and the Cisco ASR 1000 Series Aggregations Services Routers) to participate in a virtualized architecture. In a fully virtualized deployment, even the routing function is virtualized. NFVIS controls the hardware elements of an x86-based server, with the associated flexibility to configure as many CPU, memory, and storage resources as required. Figure 2 Enterprise NFV Deployment Models Full NfV L4-7 NfV Router-integrated NFV Router-based NFV VM 1 VM n VM 1 VM n VM 1 VM n NFVIS Licensing PnP Client Monitor LCM Web UI Security NFVIS Licensing Monitor PnP Client Web UI Linux LCM Security NFVIS Licensing Monitor PnP Client Web UI Linux LCM Security IOS XE Container VM 1 VM n Linux eios XE eios XE eios XE 2016 Cisco and/or its affiliates. All rights reserved. 3

4 A. Enterprise NFV: NFVIS Operating System As illustrated in Figure 2, several deployment models are based on NFVIS in the virtualization architecture. NFVIS extends a standard Linux OS distribution by packaging additional functions to simplify the deployment and operation of VNFs. NFVIS delivers the following components and functions: Linux: This common standard OS drives the underlying hardware platforms (Cisco Unified Computing System [Cisco UCS] servers, Cisco UCS E-Series Servers, x-86 enhanced network elements, etc.). Virtualization support: The hypervisor for virtualization is based on the Linux Kernel-based Virtual Machine (KVM) and includes Quick Emulator (QEMU), the libvirt tool, and other associated processes. Virtual switching: Open vswitch (OVS) is supported to enable multiple VNFs to share physical interface resources and to allow traffic to be passed within the x86 host between VNFs. Virtual machine lifecycle management: Management support is provided to deploy VNFs dynamically and to control their liveliness. Plug-and-play (PnP) capability: The PnP client automates the deployment of any host that uses NFVIS. The PnP client can communicate with a PnP server running in the DNA controller and be loaded with the correct host configuration. ConfD: This client enables various open APIs for the controller and orchestration systems. Representational state transfer (REST), commandline interface (CLI), and NETCONF YANG capabilities are supported. Webserver: The webserver enables connectivity to NFVIS through HTTP/HTTPS, which is used particularly to support local management tools. Device management: Tools packaged in NFVIS, including a resource manage, support device management. Statistics collection: Tools such as syslogd, snmpd, and collectd assist in statistics collection and reporting. Service chaining: This function enables service chaining based on the network services header (NSH). Note that NFVIS does not have an integrated virtual router. Virtual routing in an NFVIS system either is provided in a VNF such as in a virtual ISR (ISRv) or is offered by a traditional hardware-based router such as the ISR or ASR 1000 Series. With the packaging described here, NFVIS takes advantage of the popularity of the standard Linux distribution with a KVM hypervisor, but it significantly expands the capabilities to facilitate deployment and operations of VNFs. This approach allows operators to concentrate on delivering digitalized services, rather than on integrating and testing various software components. A particular benefit of NFVIS is the packaging and systems integration of all the required functions and processes for NFV. Figure 3 shows NFVIS in the context of the Digital Network Architecture enterprise virtualization solution. As discussed earlier, NFVIS is the common operating system for NFV running on various hardware platforms. The overall enterprise NFV solution also provides the actual VNFs and the control layer: that is, integration with the enterprise controller and the orchestration system. The various VNFs are not integral parts of NFVIS, but they can be instantiated on demand to offer their respective functions. Both Cisco and third-party VNFs are supported. Examples of such VNFs are the ISRv for virtual routing, the IP Security (IPsec) gateway, and other advanced features offered in Cisco IOS XE. Other examples include the Cisco Adaptive Security Virtual Appliance (ASAv [2] firewall), the Cisco Firepower solution for intrusion prevention systems (IPSs) and intrusion detection systems (IDSs), Cisco Virtual Wide Area Application Services (vwaas) for WAN optimization, etc. Similar VNFs from other vendors can also be instantiated as part of the enterprise NFV solution in Digital Network Architecture, again demonstrating the openness of the architecture. Note also that ordinary digitalized applications can be hosted on a host powered by NFVIS. The DNA controller, as shown in Figure 3, is responsible for the deployment and integration of NFVIS hosts in DNA. Here, the PnP client-server interaction is critical to automate the onboarding process. The controller also manages the configuration of both NFVIS and the VNFs and extracts the telemetry data that may be required for network analytics. Standards-based interfaces such as REST and NETCONF/YANG are used in the communication between the controller layer and an NFVIS host; hence, the ConfD client is included as part of the NFVIS package Cisco and/or its affiliates. All rights reserved. 4

5 Figure 3. Enterprise NFV Using NFVIS: Building Blocks ISRv ISR4K + UCS-E Enterprise Orchestration Enterprise Controller ASAv vwaas vfirepower VNF n App 1 App 2 App n NFVIS UCS The DNA orchestration layer also handles both physical and virtual services. If digitalized services are implemented using virtualization, the architecture is responsible for instantiating the VNFs at the right time in the right location to provide connectivity to these newly instantiated VNFs. It is also responsible for instantiating or modifying existing policy enforcement points (PEPs) to help ensure that the service makes use of these newly instantiated VNFs. Consider the example of a virtualized branchlocation environment in DNA. In a fully virtualized branch environment, an x86-host is located in the enterprise branch to accommodate all functions in a virtual form factor. Figure 4 shows details of a possible configuration, using a Cisco UCS C-Series Rack Server host with multiple physical LAN and WAN interfaces running NFVIS. Several VNFs are instantiated in this example: an ISRv for WAN connectivity (configured for the Cisco Intelligent WAN [IWAN] solution), a vwaas to offer WAN optimization, and a Cisco Firepower appliance for the IPS and IDS functions. Additional VNFs provide Cisco network analysis module (NAM), wireless support (Cisco Wireless LAN Controller [WLC]), virtualized storage, and host application (Microsoft Windows) functions. The VNFs are connected to the NFVIS virtual switch to link them to either the physical interfaces or to each other. In the example, the ISRv is chained to the vwaas and IPS by forcing the traffic through bridge BR1 and then bridge BR0. The other services are directly reachable from the LAN interfaces through BR0. Figure 4 System Architecture for a Virtualized Branch Location in Cisco Digital Network Architecture ISRv IWAN WAAS IPS(t) NAM WLC Win vstorage NFVIS Hypervisor (KVM) Tap7 Tap6 Tap5 Tap4 Tap3 Tap2 Tap1 Tap0 vswitch BR1 BR0 WAN NIC WAN NIC LAN NIC GE5 GE4 GE0 GE1 GE2 GE3 (t) = transparent, Lines connect to SIDE of the text box Non-transparent VNFs: connectors drawn at the BOTTOM of the text box Cisco and/or its affiliates. All rights reserved. 5

6 Figure 5 shows the workflow to arrive at the forwarding state for branch virtualization. In the initial state, the branch does not have routing or L4-L7 functions deployed or configured. Only the end devices, access switches, and WAN links are present (the latter are not connected). As the first step, a branch profile is configured in the orchestration system, specifying the types of network functions that should be deployed in the branch. Actual device configurations are also associated with each function in the profile. To complete the orchestration setup, the profile is associated with a particular branch instance: for example, by correlating the serial number of an x86 host to be deployed with the geographic location of the branch site. This profile and instance setup is communicated to the DNA controller. Upon successful deployment and power-up of the x86 host (such as a Cisco UCS C-Series Server or a Cisco 4000 Series ISR with a Cisco UCS E-Series blade) at the branch, a PnP process is triggered. Upon bootup, the NFVIS system contacts the DNA controller to request its configuration. Because the controller has received the branch profile and associated device configurations from the initial setup process, it is aware of this branch site and can successfully complete the launch of the NFVIS system in the branch by pushing its device configuration. Assuming that the PnP process is completed successfully, the controller notes the site availability in its inventory for subsequent monitoring and management operations. The controller also notifies the orchestrator about the successful instantiation of the hosts, which triggers the next step in the workflow. At this point, the NFVIS host is operational, but without any VNFs deployed. Before actually instantiating the VNFs for the branch according to the profile, a resource check is performed. The orchestrator requests instantaneous resources from the branch through the controller. Assuming again that sufficient resources are available to instantiate the profile, the orchestrator then triggers the creation and configuration of the virtual switching infrastructure required on the NFVIS host using the controller. Next, requests are initiated to deploy actual instances according to the profile. In this step, the ISRv, vwaas, IPS and IDS, vnam, WLC, Windows, and additional VNFs or applications would successively be deployed and connected to the respective virtual bridges in the OVS. As these VNFs are deployed, the associated device configurations are also pushed to the VNFs according to the profile specified in the orchestrator. The device configurations for the VNFs activate the forwarding path on which the packets flow. Note that all interactions between the DNA orchestrator, the DNA controller, NFVIS, and the VNFs are based on the standard APIs that are part of the solution. Figure 5 Workflow to Launch a Virtual Branch Instance in Cisco Digital Network Architecture NFVIS-Host DNA Controller DNA Orchestrator Operator Configures Branch Profiles Operator defines device Configurations & imports into orchestrator Profile applied to Branch instance Register NFVIS configuration for S/No with Controller PnP Agent contacts Controller with S/No of NFVIS NFVIS-Host & config in inventory Device shipped to Branch ACK NFVIS-host Configuration pushed to host Invoke REST API to get NFVIS Platform details (based on IP address) NFVIS returns host resource details Invoke REST API to create OVS Notification of NFVIS instantiation Request resources status of NFVIS instance (mem, CPU..) Resource profile passed to orchestrator Create OVS bridges Create OVS Bridges(s) ACK OVS Bridge creation ACK Invoke REST API to deploy VNF & pass config Deploy VNFs & pass Day 0/1 config VNFs Deployed ACK ACK 2016 Cisco and/or its affiliates. All rights reserved. 6

7 B. Enterprise NFV: Enhanced Cisco IOS XE Operating System Virtualization of network functions by using NVFs is also supported in the enhanced Cisco IOS XE operating system. Cisco IOS XE was designed specifically to run on Linux. In contrast to the traditional Cisco IOS Software that powers routers and switches, Cisco IOS XE supports full modularity. The software infrastructure is composed of the following elements: Cisco IOS Software control plane Fast-forwarding packet processing data plane Middleware software processes to optimize the interprocess communication between the control plane and the data plane KVM hypervisor to enable virtual network functions or application hosting Consider a more detailed comparison between the traditional Cisco IOS Software architecture and the enhanced Cisco IOS XE architecture. In the former, Cisco IOS Software runs the control plane for the network (routing protocols), drives the hardware (interrupts, memory management, and CPU scheduling), and processes packets in the data plane. All functions are run within a single Cisco IOS Software process. In contrast, with enhanced Cisco IOS XE, the controlplane software is separated from the data plane and the underlying systems management. Cisco IOS XE is a modular operating system in which the hardware management functions are performed by the underlying Linux OS. The Cisco IOS XE control plane is responsible only for running the network control functions, providing consistency and backward compatibility with the traditional Cisco IOS Software system. Because of this Linux-based software architecture in Cisco IOS XE, a KVM hypervisor can be configured directly on the underlying Linux system. This approach allows the underlying hardware resources to be shared not only among the native Cisco IOS XE processes, but also by VNFs that run on top of such a hypervisor. Figure 6 illustrates the Cisco IOS XE architecture at a high level. In particular, it shows the KVM hypervisor environment for running VNFs and hosting applications. This architecture is particularly useful for operators who want to retain their Cisco IOS Software network functions. Any routing or switching functions available in Cisco IOS XE natively will be run by the fast-forwarding packet processing control plane, benefiting from the optimized forwarding path and the multitude of data plane features that can be configured in combination. However, L4-L7 networking functions such as WAAS, advanced firewalls, and IPS and IDS can now also be instantiated in a virtual machine. This feature enables operators to choose best-in-class functions and offers a smooth migration path to virtualization. Cisco IOS XE is complemented by the DNA controller which provides the link to software-defined networking (SDN) based management tools. Particularly noteworthy again is the open API in Cisco IOS XE, which allows the controller to configure and influence the operations of a Cisco IOS XE system programmatically. In addition to CLI calls, Cisco IOS XE supports REST and NETCONF YANG. The main characteristics of Cisco IOS XE are: Software modularity based on Linux Network function virtualization Application hosting Model-based APIs SDN-based management Fog and edge computing Figure 6 Enhanced Cisco IOS XE Enterprise NFV: Building Blocks IOSd Control Plane Cisco Apps (WAAS, Snort) LINUX OS KVM/LXC Customer and 3 rd Party Applications Virtual Ethernet Platform-Specific Data Plane AppNav 2016 Cisco and/or its affiliates. All rights reserved. 7

8 III. Transport Virtualization (Segmentation) Architecture Network segmentation is the capability to split a physical network into multiple logical partitions to separate the traffic from different groups of users and devices. The need for network segmentation in the enterprise is not new, but it is becoming more important as a result of the following recent trends: Internet of Things (IoT) and bring your own IoT (BYOI) Mobility in the next-generation workspace Cloud-enabled services and applications For example, with IoT a lot of traditionally non-ip things (such as healthcare instruments and heating, ventilation, and air conditioning [HVAC] and lighting apparatus) are becoming IP enabled and connected to the network. The enterprise infrastructure needs network partitioning to keep these various systems and their administrative and security policies completely separated. Guest access and user and device mobility are other simple but important use cases in which role-based access to internal resources needs to be guaranteed independent of where endpoints connect. Other common use cases for network segmentation are focused on security: Security for multitenant dwellings: For example, airports with multiple airlines, public-sector buildings with multiple agencies, and enterprise buildings in which departmental separation is required (engineering, sales, human resources, etc.) Regulation compliance: Health Insurance Portability and Accountability Act (HIPPAA) requirements in healthcare, Payment Card Industry (PCI) requirements in retail sales, Sarbanes-Oxley requirements in finance, and many others Security for mergers and acquisitions: For example, the need to keep policies differentiated while dealing with overlapping IP addresses Cloud computing security: Security needs in a multitenant private or public cloud environment To meet new customer requirements and provide a solution to address these important industry trends, network segmentation and virtualization is built into DNA to create logical separation of services at Layer 2 and Layer 3. A. Network Segmentation Architecture The Cisco segmentation architecture is based on three main components: network access control, network service edge, and network path isolation (Figure 7) Figure 7. Segmentation Access Control Network Path Isolation Service Edge MPLS EVN VRF lite Functions Policy Based Access Device Authentication and Authorization Classification and VLAN, SGT, ACL enforcement Map VRFs to VLANs in Access and Service Edge VRF segmentation and transport Traffic Isolation Shared or dedicated Services Inter VRFs routing Isolated App environment 2016 Cisco and/or its affiliates. All rights reserved. 8

9 1) Network Access Control The access control function assigns an identity to the users and things that connect to the network so they can be successfully assigned to a corresponding group. A group is used as a pointer to a set of permissions to allow differentiated access for clients and devices. In the context of network segmentation, the identity also provides the linkage to path isolation and virtualization techniques so that permission is enforced throughout the network and not only at the access network device. Access control consists of three main functions: Authentication: Authentication governs who (devices and users) can access the network. Authentication can be performed dynamically through IEEE 802.1x, Web Authentication (Web-Auth), or network-based classification using network sensors. Alternatively, authentication can be performed statically. Authorization: Authorization defines the policies associated with the authenticated endpoint. Policy enforcement: Policy enforcement associates a parameter to identify the endpoint in the rest of the network. This parameter can be a VLAN, a Virtual Routing and Forwarding (VRF) instance, an access control list (ACL), or a security group tag (SGT). It also enforces the policy in DNA by means of the policy enforcement point. Cisco Identity Service Engine (ISE) is the central platform for policy definition and management. It gathers advanced contextual data about who and what is accessing the network and then defines rolebased access policies. 2) Network Service Edge The service edge is the place (central or distributed) at which an enterprise deploys shared resources (Dynamic Host Configuration Protocol [DHCP], Domain Name Service [DNS], Internet access, etc.) or protected resources (for example, human resources databases). By default, the different logical networks (virtual private networks [VPNs]) built on top of the physical infrastructure are completely isolated from each other, so a mechanism to break this behavior is needed to allow shared resources. The technical solutions to implement shared services across virtualized networks include prefix leaking between routing tables using Border Gateway Protocol (BGP) and Cisco Easy Virtual Network (EVN) route replication and the use of a multiple-context firewall. Providing a separate firewall for each VPN allows the application and management of security policies for each virtual network independently, and it is hence the recommended deployment model. Analysis and discussion of the various deployment modes for protecting access to shared services is beyond the scope of this document. Details can be found in [3]. 3) Network Path Isolation Network path isolation (or network virtualization) refers to the creation of multiple logical network partitions overlaid on top of a common physical network infrastructure. Each partition is logically isolated from the others and must appear to the end device or user as a fully dedicated network, and it must provide all forwarding, security, and services expected from a physical network. Virtualization of the transport layer must address virtualization at both the device level and the interconnection level: Device forwarding virtualization: The creation of VLANs for switches and VRF instances for routers are both examples of techniques to create multiple separated control plane and data plane instances on top of the same physical device. Data-path virtualization: Data-path virtualization is the virtualization of the interconnection between devices. This connection can be a single-hop or a multiple-hop interconnection. For example, an Ethernet link between two switches provides a single-hop interconnection that can be virtualized by using IEEE 802.1Q VLAN tags. When an IP cloud separates two virtualized devices, a multiple-hop interconnection is required to provide end-to-end logical isolation and is usually implemented through tunneling. Cisco has multiple solutions for implementing Network Path Virtualization. They can be classified in two main categories: policy based and control-plane based. Policy-based Path Segmentation Policy-based path segmentation restricts the forwarding of traffic to specific destinations based on a defined policy and independent of the information provided by the forwarding control plane. A classic example of policy-based segmentation is the use of VLANs and related ACLs assigned to a switch port or to a service set identifier (SSID) for wireless users. Groups of devices or users are assigned to VLANs and ACLs by static configuration or as a result of the authentication using IEEE 802.1X or other technologies (Figure 8). Although common for use cases such as guest access, this Layer 2 virtualization solution has scalability limitations: every time a VLAN is added, a series of parameters needs to configured on the network devices (subnet, DHCP pool, routing, etc.) Cisco and/or its affiliates. All rights reserved. 9

10 Figure 8. Segmentation ACL Aggregation Layer VLAN Addressing DHCP Scope Redundancy Routing Static ACL Access Layer Quarantine Voice Data Suppliers Guest Also, the logical isolation provided by VLANs ceases to exist at the boundary between Layer 2 and Layer 3 domains (the distribution-layer devices). To extend the propagation beyond the access device, a VRF instance needs to be defined and mapped to the VLAN. Specific to wireless users, peer-to-peer blocking allows simple segmentation to control traffic between users connected to the same SSID by either dropping the traffic or forwarding it to the core network 1. Peerto-peer blocking is used primarily for the guest WLAN and is configured at the SSID level. For Wi-Fi access, customers have been using Control and Provisioning of Wireless Access Points (CAPWAP) protocol to tunnel wireless traffic from access points to a centralized WLC on top of an IP cloud and to provide the desired segmentation. SSIDs broadcast over the air interface are mapped at the WLC to different VLANs as traffic enters the wired network. To add virtualization at Layer 3, the VLAN can be also mapped to a separate VRF instance on the first-hop layer device as shown in Figure 9. The Cisco WLC does not support overlapping IP addresses at this point. VRF-based segmentation is still supported to help ensure logical separation of the different traffic flows. Figure 9. CAPWAP Tunnels VLAN Blue VLAN Red IP Network VRF Blue VRF Red CAPWAP tunnel 1 The forwarding option is available only for traffic switched centrally at the WLC Cisco and/or its affiliates. All rights reserved. 10

11 Figure 10. Cisco TrustSec Solution Single-Hop SXP Speaker SXP Listener SXP Enabled Switch/WLC Non-TrustSec Domain SGT Capable HW In summary, policy-based technologies do not rely on a control plane to transport the virtualization information and, to provide any-to-any segmentation, they use hop-by-hop propagation. This approach can result in more deployment and management complexity and limited scalability. The Cisco TrustSec solution overcomes the above limitations of solutions based on VLANs and ACLs and brings role-based access control (RBAC) to the network: that is, to all devices in the network and not just the access device. The Cisco TrustSec solution does not require changes in VLANs and subnets and works with the existing design (Figure 10). Cisco TrustSec security is based on three functions: Classification: An SGT can be assigned dynamically as the result of Identity Services Engine authorization. Alternatively, it can be assigned through static methods to map the SGT to a VLAN, subnet, or IP address. Propagation: SGT information can be propagated either inline (hop by hop) or through the SGT Exchange Protocol (SXP). Enforcement: The network device enforces the policy through SGT-ACLs dynamically downloaded from the Identity Services Engine. The Cisco TrustSec tag is inserted at Layer 2 in the Ethernet frame in the Cisco TrustSec metadata (CMD) field. For inline propagation, every node in the network needs to be able to interpret the tag and act on it. If the customer deployment does not require any-toany segmentation, Cisco TrustSec can be used with the SXP protocol, which allows the propagation of SGT information across a network that is not enabled for Cisco TrustSec security. Control-Plane-Based Segmentation Control plane-based techniques achieve path isolation by restricting the propagation of routing information to only subnets that belong to a VPN. To achieve control plane virtualization, a Layer 3 device must use the VRF technology, which allows virtualization of the forwarding plane. Path virtualization technologies can be classified based on the way that virtualization information is transported across the underlying network infrastructure: Multihop path isolation: The virtualized devices are not directly connected, and the virtualization information is carried across a network that is not virtualization aware by the use of a Layer 3 tunneling technology. VRF-lite with Generic Routing Encapsulation (GRE) and Multiprotocol Label Switching (MPLS) VPN are examples of multihop solutions. Single-hop path isolation: The VRF information is carried hop by hop, and all the devices in the path need to be VRF aware. VRF-lite and EVN are technologies in this category. 1) Multihop Path Isolation Techniques VRF-lite with GRE is the simplest multihop technology. A GRE tunnel is built between the routers that are part of the same virtual network, and the VRF instances are mapped to the GRE header. The implication is that GRE peering sessions need to be established among all the routers that are part of the virtual network, and if a router is added in a new site, all the existing routers need to be reconfigured. So the solution does not scale very well. Also, GRE tunneling is implemented in hardware only in higher-end switches such as Cisco Catalyst 6500 Series Switches and Cisco Nexus 7000 Series Switches, and not in lower-end switches that can be found at the edge. For these reasons, this technology has not been widely adopted by customers and is recommended only if it is deployed in a hub-and-spoke topology typical of guest access scenarios Cisco and/or its affiliates. All rights reserved. 11

12 In an MPLS VPN design, the exchange of VPN routes is achieved by using an additional control-plane element called Multiprotocol BGP (MP-BGP), which is an extension of the existing BGP-4 protocol. The MPLS core is made up of provider edge (PE) and provider (P) routers. At the PE level, MP-BGP is used to exchange VRF routes (Figure 11). MPLS VPN uses two sets of labels. The outer label represents the PE destination and is used by the PE routers to forward the packet through the network. The inner MPLS label is the VPN label and carries the VRF information. Only the destination PE will interpret this VPN label and forward the original packet to the associated VRF instance. Figure 11. VRF-Based Segmentation PE DATA 4 Byte IGP Label 4 Byte VPN Label P Original Packet As with GRE tunnel overlay architecture, MPLS VPN architecture based on BGP requires a fullmesh neighbor relationship to be established. The added configuration and management complexity of such full-mesh designs can be mitigated by the deployment of BGP route reflectors (RR) to relay the BGP information to other PEs in the network. In case of an MPLS core, Virtual Private LAN Services (VPLS) can also be used to provide a Layer 2 pseudowire service across the core network. VPLS mitigates the Spanning Tree Protocol problems that arise from PE the extension of VLANs across multiple switches. However, VPLS also requires full-mesh control-plane communication and can limit MAC address scalability. In summary, multihop segmentation techniques have the advantage that they touch and virtualize only the devices at the edge of the network; the rest of the network ignores the VPN information. MPLS VPN solutions scale well and support any-to-any connectivity, relying on an underlay MPLS network based on BGP. This approach can require staff to learn new techniques and hence can increase deployment time and costs. Single-Hop and Hop-by-Hop Path Isolation Techniques An example of a single-hop (or hop-by-hop) isolation technique is VRF-lite. In this case, each and every network device is virtualized as are all the devices physical interconnections. From a data-plane perspective, VLAN tags can be used to provide logical isolation on each point-to-point link that interconnects the Layer 3 virtualized network devices. VRF-lite does not rely on the MP-BGP or MPLS label to carry the network segmentation information. Instead, it requires hop-by-hop path isolation. Separate interfaces or subinterfaces must be provisioned for each virtual network on core-facing interfaces on an end-toend virtualized path. Figure 12 shows VLAN-based segmentation with VRF-lite. The use of multiple VRF instances is suitable for networks with a limited number of VRF instances and hops in a virtual network path. As the number of virtual networks grows, new interfaces and subinterfaces and related IP addresses and routing will need to be added, increasing planning and provisioning overhead. To address this complexity, Cisco introduced Easy Virtual Network, or EVN. Figure 12. VLAN-Based Segmentation with VRF-lite R1 R q 802.1q 802.1q 2016 Cisco and/or its affiliates. All rights reserved. 12

13 Figure 13. VLAN-Based Segmentation with Cisco EVN Edges Interfaces Trunk Interface Edges Interfaces 802.1q vnet tag 802.1q R1 R2 With EVN, path isolation can be achieved by using a unique tag for each virtual network. This tag, the virtual network (VNET) tag, is operator assigned. An EVN device on the virtual path uses the tags to separate traffic among the different virtual networks. This approach eliminates the need to depend on physical and logical interfaces to provide traffic separation. As illustrated in Figure 13, only a single trunk interface is required to connect a pair of EVN devices. Also, instead of having to add a new field to carry the VNET tag in a packet, the VLAN ID field in IEEE 802.1Q is repurposed to carry the VNET tag. In summary, VRF-lite and EVN are IP-based solutions that reuse familiar technologies such as IEEE 802.1Q and Interior Gateway Protocol (IGP) routing protocols to provide virtualization. This approach can provide straightforward migration from existing campus architecture and less need for staff learning (for example, because complexities arising from BGP are eliminated). Also, VRF-lite is supported on all the major Cisco Catalyst switches starting with the Cisco Catalyst 3000 Series. With EVN, Cisco enabled easy implementation with the use of EVN tags and features such as route replication that allow greater scalability (up to 32 VRF instances is the current recommendation). Evolution of the Virtualization Technologies The previous sections of this document focus on the virtualization techniques available for deployment in enterprise network architectures today. Additional virtualization solutions first developed for data center architectures are now also starting to be applied in other network domains. For transport virtualization, protocols such as Cisco Locator/ID Separation Protocol (LISP) and Virtual Extensible LAN (VXLAN) are evolving to meet most of the requirements for an optimal segmentation solution: Easy to deploy: The more complex a solution is to deploy, the greater the operating expenses (OpEx). Security-group-based policy: Traffic between devices can be isolated. Scalable: Any-to-any connectivity is provided with no configuration burden. Address family independent: IPv4 and IPv6 are both supported. Incrementally deployable: Incremental deployment helps provide a migration path from the current customer architecture. Mobility aware: Easy mobility for wired and wireless hosts is provided. LISP and VXLAN in combination promise to overcome the scalability limitations of the policy-based technologies described earlier in this document: in particular, the operational challenges imposed by hop-by-hop segmentation. Because it is based on an IP packet format for transport, VXLAN allows virtualization information to be carried in the IP header. Only network elements at the edge require virtualization awareness, and any intermediary network elements operate in IP-forwarding mode only. An IP-based transport such as VXLAN helps organizations migrate to virtualization by eliminating the need for major equipment upgrades and allowing gradual introduction of the new technologies. A LISP control plane can also benefit transport virtualization by facilitating a scalable mechanism to distribute segmentation information. Identity information for endpoints can also be decoupled from the actual location information by the use of the aforementioned techniques with VXLAN and LISP, breaking the bond between endpoint location and identity that is inherent when the IP address is used for both location and identity. Network-based solution: No host change is required Cisco and/or its affiliates. All rights reserved. 13

14 An upcoming evolving NFV technology is based on the concept of service-function chaining (SFC) using the network services header, or NSH. SFC allows the deployment of network functions independent of location. Traffic flows are classified at the network edge, and a header describing the services required for the flow is pushed onto each packet. The (virtualized) network services are then reached by the SFC architecture through overlay tunnels governed by a controller. For example, a flow can be subjected to immediate deep packet inspection (DPI) based classification as the user-network interface (UNI) is traversed. It can then require processing by a firewall instance in a regional office followed by processing by a web filter that is cloud based. SFC enables these services to be applied at the network edge by imposing the respective header for such a chain and by automating the transport path between the services. Another benefit of NSH-based service chaining is the inclusion of metadata in the packet header. The NSH fields added to a flow not only signify the service sequence. They can also carry metadata pertinent to a packet between services, such as the application type or additional segmentation information. Appendix A: Glossary API: Application programming interfaces help enable network elements or functions to be controlled by outside applications. Typically, an API is a set of functions that can be called into a software program with specified parameters and formats to provide input data or receive output from the function. APIs can enable openness and flexibility in Cisco Digital Network Architecture by allowing third-party vendors to contribute to network operations and to accelerate deployment of new services. Cloud: The cloud is the computing, storage, and networking infrastructure offered by the aggregate set of cloud providers as services to run enterprise applications. The cloud is made up of all the data centers used by cloud providers to host applications. The advantage of cloud computing is that these services can be acquired instantaneously upon demand, so that enterprises do not need to invest in data center infrastructure (saving both capital expenditures [CapEx] and operating expenses [OpEx]). The cloud provider services the resources to help ensure that capacity meets demand and that cloud services are offered with redundancy and security. Cloud computing offers a different consumption model (subscription pricing) for computing. Controller: A controller is a network component that manipulates the network elements in Digital Network Architecture according to the policies (to instantiate the services). The controller maintains the full holistic current state of the network: that is, it keeps an abstracted network state. The controller interfaces with the orchestration and policy layers through a northbound interface. Controllers instantiate configuration entries in the network to create transport paths or to implement the services that are offered to the endpoints using a southbound interface. In Digital Network Architecture, a single controller can span multiple domains (cloud, WAN, campus, and data center). Alternatively, multiple controllers can collaborate, each fulfilling a domainspecific role. The functions that controllers run can even be divided among multiple subcontrollers, each specializing in a particular control task, such as monitoring and manipulating the QoS state of the network. Devices: Devices are physical systems capable of running applications and sending or receiving network traffic. Digitalization: Digitalization is the process of bringing digital technologies into all aspects of an enterprise s business and offering digitalized services to the business s consumers. Digitalization also refers to the act of converting business processes into digital formats and take advantage of automated algorithms and processes to optimize and simplify either internal operations or interactions with consumers. DPI: Deep packet inspection is a technique to determine the type of the application carried in an IP flow by inspecting the payload, often over multiple packets, and making inferences based on the payload. This approach contrasts with application characterization based on TCP port numbers or payload type fields, which are often insufficient to adequately characterize an application. Endpoint: Endpoints are consumers of network services defined at the application level. They can run on traditional hosts such as PCs, notebooks, and IP phones, and also increasingly on IP-enabled devices that drive digitalized business processes: robots, point-of-sale (POS) displays, scanners, inventory tracking devices, vehicles, and more. Applications running on servers in a data center are considered consumers of network services and are therefore endpoints in the architecture Cisco and/or its affiliates. All rights reserved. 14

15 Endpoint group (EPG): And EPG is a categorization of multiple endpoints into one logical entity receiving a service from the network. An EPG could bundle all endpoints from a particular end device, for example. Alternatively, an EPG could bundle all endpoints from a particular end user, with the endpoints on multiple physical devices. The term endpoint is used loosely in this document to mean both individual endpoints and endpoint groups. Fabric: A fabric is a collection of network elements that offers communication paths between its outbound-facing ports, providing any-to-any connectivity through the use of overlay tunnels. A fabric is governed by a controller to simplify operation. A service can be instantiated by applying the right policy enforcement to characterize the service instances, and by using the any-to-any connectivity offered by the fabric to reach the service s remote ends. Intent: Intent is the association of a business process with a service. The purpose, or intent, of a service delivered by the network is to implement the business processes relevant to the enterprise. Services, therefore, implement the business intent of the enterprise, and a policy specifies how the service is implemented and enforced by the network. Internet of Things (IoT): The IoT is the extension of the Internet to reach not only traditional computing resources such as PCs, notebooks, and servers, but also any device. This definition implies that IoT devices must become networked: that is, they must be extended to include computing resources on which a networking software stack can run. The definition also typically implies that IoT-enabled devices can run digitalized business applications to benefit from Internet connectivity. Examples of IoT devices include refrigerators, cameras, vehicles, parking meters, production robots, elevators, RFIDequipped hardware, and sensors. The advantage of networked objects equipped with software stacks is that these devices can be controlled remotely, so they help digitalize business processes and services. Intrusion prevention system (IPS) and intrusion detection system (IDS): IPSs and IDSs are sets of network functions that continuously monitor the network. The systems look for behavioral anomalies and malicious activities and take appropriate actions (such as blocking or reporting) when such activities are detected. These systems often rely on baseline behavior characterization (signatures), against which the anomalies are defined. Statistical methods may also be employed. Open networking: Open networking allows the operation of the network architecture to be influenced by third-party software or hardware vendors. It relies on standards-based and published APIs to facilitate such integration. Open networking empowers the community of developers outside Cisco to contribute to network operations and capabilities. Open networking increases the speed of innovation and introduces more flexibility into the network. Orchestrator: This orchestrator allows controlled specification of services in the network and instantiation or ongoing modification of those services. The orchestrator in Digital Network Architecture focuses on service definition from the network consumer s point of view, thus abstracting any low-level details about how, and sometimes where, those services are to be configured. The orchestrator determines the service intent and communicates this to the controller. The controller then manipulates the network elements to provide the transport between the relevant policy enforcement points, to instantiate the policies (transport, security, etc.), and to help ensure that services are monitored on an ongoing basis. Overlay network: The overlay network is based on network tunneling that sits on top of an underlay network. Tunneling techniques are used to decouple a network service from the underlying transport infrastructure. The state of the service is retained only at the edge of the network. For all network elements that make up the underlay network, the tunneled service traffic appears simply as the encapsulated tunnel traffic. Overlay networks are characterized by: Segregation of traffic between users Support for different address spaces Support for dynamic device or virtual machine placement (independent of the underlay topology and addressing) Support for large-scale deployments A network is fully virtualized if virtual network functions, such as routers or firewalls, are connected to each other using VLANs or VRF instances Cisco and/or its affiliates. All rights reserved. 15

Cisco SD-WAN and DNA-C

Cisco SD-WAN and DNA-C Cisco SD-WAN and DNA-C SD-WAN Cisco SD-WAN Intent-based networking for the branch and WAN 4x Improved application experience Better user experience Deploy applications in minutes on any platform with consistent

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

Cisco Campus Fabric Introduction. Vedran Hafner Systems engineer Cisco

Cisco Campus Fabric Introduction. Vedran Hafner Systems engineer Cisco Cisco Campus Fabric Introduction Vedran Hafner Systems engineer Cisco Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility (w/o stretching VLANs) Network

More information

Več kot SDN - SDA arhitektura v uporabniških omrežjih

Več kot SDN - SDA arhitektura v uporabniških omrežjih Več kot SDN - SDA arhitektura v uporabniških omrežjih Aleksander Kocelj SE Cisco Agenda - Introduction to Software Defined Access - Brief description on SDA - Cisco SDA Assurance - DEMO 2 New Requirements

More information

Borderless Networks. Tom Schepers, Director Systems Engineering

Borderless Networks. Tom Schepers, Director Systems Engineering Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action

More information

Cisco Integrated Services Virtual Router

Cisco Integrated Services Virtual Router Data Sheet Cisco Integrated Services Virtual Router The Cisco Integrated Services Virtual Router (ISRv) is a virtual form-factor Cisco IOS XE Software router that delivers comprehensive WAN gateway and

More information

Software-Defined Access 1.0

Software-Defined Access 1.0 Software-Defined Access 1.0 What is Cisco Software-Defined Access? The Cisco Software-Defined Access (SD-Access) solution uses Cisco DNA Center to provide intent-based policy, automation, and assurance

More information

Software-Defined Access 1.0

Software-Defined Access 1.0 White Paper Software-Defined Access 1.0 Solution White Paper Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA https://www.cisco.com/ Tel: 408 526-4000 800 553-NETS

More information

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q&A Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q. What is the Cisco Cloud Services Router 1000V? A. The Cisco Cloud Services Router 1000V (CSR 1000V) is a router in virtual

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Data Sheet Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building

More information

Enterprise Network Compute System (ENCS)

Enterprise Network Compute System (ENCS) Enterprise Network Compute System (ENCS) Cisco vbranch Architecture Per Jensen, per@cisco.com Sept 2017 Agenda: Tech Update september-2017 1. ENCS update + demo v/per 2. Viptela update + demo v/dr Søren

More information

Securing BYOD with Cisco TrustSec Security Group Firewalling

Securing BYOD with Cisco TrustSec Security Group Firewalling White Paper Securing BYOD with Cisco TrustSec Security Group Firewalling Getting Started with TrustSec What You Will Learn The bring-your-own-device (BYOD) trend can spur greater enterprise productivity

More information

Cisco Software-Defined Access

Cisco Software-Defined Access Migration Guide Cisco Software-Defined Access 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 31 Contents Cisco SD-Access... 3 Evolution of Networking

More information

Cisco Nexus Data Broker

Cisco Nexus Data Broker Data Sheet Cisco Nexus Data Broker Product Overview You used to monitor traffic mainly to manage network operations. Today, when you monitor traffic you can find out instantly what is happening throughout

More information

Routing Underlay and NFV Automation with DNA Center

Routing Underlay and NFV Automation with DNA Center BRKRST-1888 Routing Underlay and NFV Automation with DNA Center Prakash Rajamani, Director, Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Cisco Nexus 1000V Switch for Microsoft Hyper-V Q&A Cisco Nexus 1000V Switch for Microsoft Hyper-V Overview Q. What are Cisco Nexus 1000V Switches? A. Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual

More information

Networking in the Digital Era

Networking in the Digital Era Networking in the Digital Era Ioana Manea Cisco Systems Engineer 19 Octombrie 2016 Digital Transformation UBER, The world s largest taxi company owns no vehicles AIRBNB, The world s largest accommodation

More information

Cisco Application Centric Infrastructure

Cisco Application Centric Infrastructure Data Sheet Cisco Application Centric Infrastructure What s Inside At a glance: Cisco ACI solution Main benefits Cisco ACI building blocks Main features Fabric Management and Automation Network Security

More information

Delivering Enterprise SDN. Now. Simplify and Automate Your Network for Digital Transformation

Delivering Enterprise SDN. Now. Simplify and Automate Your Network for Digital Transformation Delivering Enterprise SDN. Now. Simplify and Automate Your Network for Digital Transformation Agenda Software-Defined Networking (SDN) Market Drivers Cisco APIC-EM Automate Network Configuration & Setup

More information

Virtualized Network Services SDN solution for enterprises

Virtualized Network Services SDN solution for enterprises Virtualized Network Services SDN solution for enterprises Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise s locations

More information

Network Virtualization

Network Virtualization Network Virtualization Petr Grygárek 1 Traditional Virtualization Techniques Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on

More information

Software-Defined Access Design Guide

Software-Defined Access Design Guide Cisco Validated design Software-Defined Access Design Guide December 2017 Solution 1.1 Table of Contents Table of Contents Cisco Digital Network Architecture and Software-Defined Access Introduction...

More information

SD-Access Wireless: why would you care?

SD-Access Wireless: why would you care? SD-Access Wireless: why would you care? CUWN Architecture - Centralized Overview Policy Definition Enforcement Point for Wi-Fi clients Client keeps same IP address while roaming WLC Single point of Ingress

More information

Automating Enterprise Networks with Cisco DNA Center

Automating Enterprise Networks with Cisco DNA Center White Paper Automating Enterprise Networks with Cisco DNA Center 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 30 Contents Introduction...

More information

Simplify and automate your network with Cisco DNA

Simplify and automate your network with Cisco DNA Simplify and automate your network with Cisco DNA Mr. Brink Sanders Managing Director, Software and Network Transformation Cisco Asia Pacific and Japan March, 2017 Agenda Software-Defined Networking (SDN)

More information

Cisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility

Cisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility White Paper Cisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility The Cisco 4000 Series Integrated Services Routers (ISRs) are designed for distributed organizations with

More information

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack White Paper Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack Introduction Cisco Application Centric Infrastructure (ACI) is a next-generation data center fabric infrastructure

More information

MPLS in the DCN. Introduction CHAPTER

MPLS in the DCN. Introduction CHAPTER CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information

More information

Optimizing Layer 2 DCI with OTV between Multiple VXLAN EVPN Fabrics (Multifabric)

Optimizing Layer 2 DCI with OTV between Multiple VXLAN EVPN Fabrics (Multifabric) White Paper Optimizing Layer 2 DCI with OTV between Multiple VXLAN EVPN Fabrics (Multifabric) What You Will Learn This document describes how to achieve a VXLAN EVPN multifabric design by integrating Virtual

More information

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski Internet Technology 15. Things we didn t get to talk about Paul Krzyzanowski Rutgers University Spring 2016 May 6, 2016 352 2013-2016 Paul Krzyzanowski 1 Load Balancers Load Balancer External network NAT

More information

From Zero Touch Provisioning to Secure Business Intent

From Zero Touch Provisioning to Secure Business Intent From Zero Touch Provisioning to Secure Business Intent Flexible Orchestration with Silver Peak s EdgeConnect SD-WAN Solution From Zero Touch Provisioning to Secure Business Intent Flexible Orchestration

More information

Virtualized Network Services SDN solution for service providers

Virtualized Network Services SDN solution for service providers Virtualized Network Services SDN solution for service providers Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise customers

More information

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing

More information

Intelligent WAN Multiple VRFs Deployment Guide

Intelligent WAN Multiple VRFs Deployment Guide Cisco Validated design Intelligent WAN Multiple VRFs Deployment Guide September 2017 Table of Contents Table of Contents Deploying the Cisco Intelligent WAN... 1 Deploying the Cisco IWAN Multiple VRFs...

More information

Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design

Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design White Paper Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design Emerging IT technologies have brought about a shift from IT as a cost center to IT as a business driver.

More information

Cisco.Network.Intuitive FastLane IT Forum. Andreas Korn Systems Engineer

Cisco.Network.Intuitive FastLane IT Forum. Andreas Korn Systems Engineer Cisco.Network.Intuitive FastLane IT Forum Andreas Korn Systems Engineer 12.10.2017 Ziele dieser Session New Era of Networking - Was ist darunter zu verstehen? Software Defined Access Wie revolutioniert

More information

PassTorrent. Pass your actual test with our latest and valid practice torrent at once

PassTorrent.   Pass your actual test with our latest and valid practice torrent at once PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version

More information

Pradeep Kathail Chief Software Architect Network Operating Systems Technology Group, Cisco Systems Inc.

Pradeep Kathail Chief Software Architect Network Operating Systems Technology Group, Cisco Systems Inc. Pradeep Kathail Chief Software Architect Network Operating Systems Technology Group, Cisco Systems Inc. March 4 th, 2014 2012 2010 Cisco and/or its affiliates. All rights reserved. 1 2012 Cisco and/or

More information

Cisco Group Encrypted Transport VPN

Cisco Group Encrypted Transport VPN Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that

More information

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV. 2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are

More information

Deploying and Administering Cisco s Digital Network Architecture (DNA) and Intelligent WAN (IWAN) (DNADDC)

Deploying and Administering Cisco s Digital Network Architecture (DNA) and Intelligent WAN (IWAN) (DNADDC) Deploying and Administering Cisco s Digital Network Architecture (DNA) and Intelligent WAN (IWAN) (DNADDC) COURSE OVERVIEW: Deploying and Administering Cisco s Digital Network Architecture (DNA) and Intelligent

More information

Demand-Based Control Planes for Switching Fabrics

Demand-Based Control Planes for Switching Fabrics Demand-Based Control Planes for Switching Fabrics Modern switching fabrics use virtual network overlays to support mobility, segmentation, and programmability at very large scale. Overlays are a key enabler

More information

Network Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016

Network Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016 Network Automation and Branch Agility The Network Helps Enable Digital Business Rajinder Singh Product Sales Specialist June 2016 Agenda WAN Market Drivers Cisco Intelligent WAN (IWAN) Cisco Intelligent

More information

Introduction to Segment Routing

Introduction to Segment Routing Segment Routing (SR) is a flexible, scalable way of doing source routing. Overview of Segment Routing, page 1 How Segment Routing Works, page 2 Examples for Segment Routing, page 3 Benefits of Segment

More information

MPLS VPN--Inter-AS Option AB

MPLS VPN--Inter-AS Option AB The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) service provider

More information

Virtual Security Gateway Overview

Virtual Security Gateway Overview This chapter contains the following sections: Information About the Cisco Virtual Security Gateway, page 1 Cisco Virtual Security Gateway Configuration for the Network, page 10 Feature History for Overview,

More information

Cisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience.

Cisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience. Cisco Securely connect any user to any application across any platform, all with a consistent user experience. Introduction Moving applications to the cloud requires faster, more reliable connectivity.

More information

Cisco Virtual Managed Services

Cisco Virtual Managed Services Data Sheet Cisco Virtual Managed Services SD-WAN Made Simple for Service Providers Cisco Virtual Managed Services (VMS) is a cloud native solution for service providers to automate, innovate and accelerate

More information

Cisco HyperFlex Systems

Cisco HyperFlex Systems White Paper Cisco HyperFlex Systems Install and Manage Cisco HyperFlex Systems in a Cisco ACI Environment Original Update: January 2017 Updated: March 2018 Note: This document contains material and data

More information

Campus Fabric. How To Integrate With Your Existing Networks. Kedar Karmarkar - Technical Leader BRKCRS-2801

Campus Fabric. How To Integrate With Your Existing Networks. Kedar Karmarkar - Technical Leader BRKCRS-2801 Campus Fabric How To Integrate With Your Existing Networks Kedar Karmarkar - Technical Leader Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility (w/o

More information

Cisco Extensible Network Controller

Cisco Extensible Network Controller Data Sheet Cisco Extensible Network Controller Product Overview Today s resource intensive applications are making the network traffic grow exponentially putting high demands on the existing network. Companies

More information

Managing Site-to-Site VPNs: The Basics

Managing Site-to-Site VPNs: The Basics CHAPTER 23 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels

More information

Cisco ISR G2 Management Overview

Cisco ISR G2 Management Overview Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and

More information

Configuring Virtual Private LAN Services

Configuring Virtual Private LAN Services Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS

More information

Service Graph Design with Cisco Application Centric Infrastructure

Service Graph Design with Cisco Application Centric Infrastructure White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

MPLS VPN Inter-AS Option AB

MPLS VPN Inter-AS Option AB First Published: December 17, 2007 Last Updated: September 21, 2011 The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol

More information

Transforming the Cisco WAN with Network Intelligence

Transforming the Cisco WAN with Network Intelligence Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using

More information

Exam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.

Exam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test. Exam Code: 700-303 Number: 700-303 Passing Score: 800 Time Limit: 120 min File Version: 41.2 http://www.gratisexam.com/ Exam Code: 700-303 Exam Name: Advanced Borderless Network Architecture Systems Engineer

More information

Network Edge Innovation With Virtual Routing

Network Edge Innovation With Virtual Routing Independent market research and competitive analysis of next-generation business and technology solutions for service providers and vendors Network Edge Innovation With Virtual Routing A Heavy Reading

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 Introduction to MPLS L3VPN 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 5 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information

More information

Deploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework

Deploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework White Paper Deploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework August 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

More information

P ART 3. Configuring the Infrastructure

P ART 3. Configuring the Infrastructure P ART 3 Configuring the Infrastructure CHAPTER 8 Summary of Configuring the Infrastructure Revised: August 7, 2013 This part of the CVD section discusses the different infrastructure components that are

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

ONUG SDN Federation/Operability

ONUG SDN Federation/Operability ONUG SDN Federation/Operability Orchestration A white paper from the ONUG SDN Federation/Operability Working Group May, 2016 Definition of Open Networking Open networking is a suite of interoperable software

More information

SD-WAN on Cisco IOS XE Routers: An End-to-End View

SD-WAN on Cisco IOS XE Routers: An End-to-End View SD-WAN on Cisco IOS XE Routers: An End-to-End View Summary This white paper presents an overview of the Cisco Software-Defined WAN (SD-WAN) solution on Cisco IOS XE routers. It is a good introduction for

More information

THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017

THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 The Network. Intuitive. Constantly learning, adapting and protecting. L E A R

More information

Building NFV Solutions with OpenStack and Cisco ACI

Building NFV Solutions with OpenStack and Cisco ACI Building NFV Solutions with OpenStack and Cisco ACI Domenico Dastoli @domdastoli INSBU Technical Marketing Engineer Iftikhar Rathore - INSBU Technical Marketing Engineer Agenda Brief Introduction to Cisco

More information

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note White Paper Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services Introduction and Application Note Last Updated: 5/2014 Ethernet VPN (EVPN)

More information

Managing Site-to-Site VPNs

Managing Site-to-Site VPNs CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels

More information

ACI Terminology. This chapter contains the following sections: ACI Terminology, on page 1. Cisco ACI Term. (Approximation)

ACI Terminology. This chapter contains the following sections: ACI Terminology, on page 1. Cisco ACI Term. (Approximation) This chapter contains the following sections:, on page 1 Alias API Inspector App Center Alias A changeable name for a given object. While the name of an object, once created, cannot be changed, the Alias

More information

Managing Site-to-Site VPNs: The Basics

Managing Site-to-Site VPNs: The Basics CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels

More information

Cisco Software-Defined Access

Cisco Software-Defined Access Cisco Software-Defined Access Introducing an entirely new era in networking. What if you could give time back to IT? Provide network access in minutes for any user or device to any application-without

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 642-996 Exam Questions & Answers Number: 642-996 Passing Score: 800 Time Limit: 120 min File Version: 38.8 http://www.gratisexam.com/ Cisco 642-996 Exam Questions & Answers Exam Name: Designing Cisco

More information

IWAN Security for Remote Site Direct Internet Access and Guest Wireless

IWAN Security for Remote Site Direct Internet Access and Guest Wireless IWAN Security for Remote Site Direct Internet Access and Guest Wireless Technology Design Guide (ISR4K) March 2015 Table of Contents Preface...1 CVD Navigator...2 Use Cases... 2 Scope... 2 Proficiency...

More information

Simplify and Automate Your Network with Cisco DNA. Brink Sanders Managing Director, Software and Network Transformation 12 May 2017

Simplify and Automate Your Network with Cisco DNA. Brink Sanders Managing Director, Software and Network Transformation 12 May 2017 Simplify and Automate Your Network with Cisco DNA Brink Sanders Managing Director, Software and Network Transformation 12 May 2017 Agenda Software-Defined Networking (SDN) Market Drivers Cisco APIC-EM

More information

EIGRP Over the Top. Finding Feature Information. Information About EIGRP Over the Top. EIGRP Over the Top Overview

EIGRP Over the Top. Finding Feature Information. Information About EIGRP Over the Top. EIGRP Over the Top Overview The feature enables a single end-to-end routing domain between two or more Enhanced Interior Gateway Routing Protocol (EIGRP) sites that are connected using a private or a public WAN connection. This module

More information

MASERGY S MANAGED SD-WAN

MASERGY S MANAGED SD-WAN MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way

More information

WAN Edge MPLSoL2 Service

WAN Edge MPLSoL2 Service 4 CHAPTER While Layer 3 VPN services are becoming increasing popular as a primary connection for the WAN, there are a much larger percentage of customers still using Layer 2 services such Frame-Relay (FR).

More information

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC)

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Dedi Shindler - Sr. Manager Product Management Cloud System Management Technology Group Cisco Agenda Trends Influencing

More information

Evolving your Campus Network with. Campus Fabric. Shawn Wargo. Technical Marketing Engineer BRKCRS-3800

Evolving your Campus Network with. Campus Fabric. Shawn Wargo. Technical Marketing Engineer BRKCRS-3800 Evolving your Campus Network with Campus Fabric Shawn Wargo Technical Marketing Engineer BRKCRS-3800 Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility

More information

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018 Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14

More information

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN Avaya-FatPipe Solution Overview Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN The Avaya SDN-Fx and FatPipe Networks solution provides a fabric-based SDN architecture for simplicity

More information

Network+ Guide to Networks 7 th Edition

Network+ Guide to Networks 7 th Edition Network+ Guide to Networks 7 th Edition Chapter 10 Network Segmentation and Virtualization 2016 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in

More information

CCNA Exploration Network Fundamentals

CCNA Exploration Network Fundamentals CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing

More information

SDN Security BRKSEC Alok Mittal Security Business Group, Cisco

SDN Security BRKSEC Alok Mittal Security Business Group, Cisco SDN Security Alok Mittal Security Business Group, Cisco Security at the Speed of the Network Automating and Accelerating Security Through SDN Countering threats is complex and difficult. Software Defined

More information

Simplifying the Branch Network

Simplifying the Branch Network Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing

More information

Cisco APIC Enterprise Module Simplifies Network Operations

Cisco APIC Enterprise Module Simplifies Network Operations Cisco APIC Enterprise Module Simplifies Network Operations October 2015 Prepared by: Zeus Kerravala Cisco APIC Enterprise Module Simplifies Network Operations by Zeus Kerravala October 2015 º º º º º º

More information

MPLS VPN. 5 ian 2010

MPLS VPN. 5 ian 2010 MPLS VPN 5 ian 2010 What this lecture is about: IP CEF MPLS architecture What is MPLS? MPLS labels Packet forwarding in MPLS MPLS VPNs 3 IP CEF & MPLS Overview How does a router forward packets? Process

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 648-375 Exam Questions & Answers Number: 648-375 Passing Score: 800 Time Limit: 120 min File Version: 22.1 http://www.gratisexam.com/ Cisco 648-375 Exam Questions & Answers Exam Name: Cisco Express

More information

Cisco ACI Multi-Pod/Multi-Site Deployment Options Max Ardica Principal Engineer BRKACI-2003

Cisco ACI Multi-Pod/Multi-Site Deployment Options Max Ardica Principal Engineer BRKACI-2003 Cisco ACI Multi-Pod/Multi-Site Deployment Options Max Ardica Principal Engineer BRKACI-2003 Agenda ACI Introduction and Multi-Fabric Use Cases ACI Multi-Fabric Design Options ACI Stretched Fabric Overview

More information

Question No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three.

Question No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three. Volume: 162 Questions Question No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three.) A. easy management B. infrastructure

More information

Chapter 1: Enterprise Campus Architecture. Course v6 Chapter # , Cisco Systems, Inc. All rights reserved. Cisco Public

Chapter 1: Enterprise Campus Architecture. Course v6 Chapter # , Cisco Systems, Inc. All rights reserved. Cisco Public Chapter 1: Analyzing The Cisco Enterprise Campus Architecture CCNP SWITCH: Implementing IP Switching Course v6 1 Chapter 1 Objectives Describe common campus design options and how design choices affect

More information

Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision

Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision At-A-Glance Unified Computing Realized Today, IT organizations assemble their data center environments from individual components.

More information

Configuring MPLS and EoMPLS

Configuring MPLS and EoMPLS 37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates

More information

Extreme Networks How to Build Scalable and Resilient Fabric Networks

Extreme Networks How to Build Scalable and Resilient Fabric Networks Extreme Networks How to Build Scalable and Resilient Fabric Networks Mikael Holmberg Distinguished Systems Engineer Fabrics MLAG IETF TRILL Cisco FabricPath Extreme (Brocade) VCS Juniper QFabric IEEE Fabric

More information

Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab

Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Ali Shaikh Technical Leader Faraz Shamim Sr. Technical Leader Mossaddaq Turabi Distinguished ENgineer Cisco Spark How Questions?

More information

TrustSec (NaaS / NaaE)

TrustSec (NaaS / NaaE) TrustSec (NaaS / NaaE) per@cisco.com Security on top of the mind for our customers 60% 85% 54% of data is stolen in HOURS of point-of-sale intrusions aren t discovered for WEEKS of breaches remain undiscovered

More information