Cisco SD-Access Policy Driven Manageability

Size: px
Start display at page:

Download "Cisco SD-Access Policy Driven Manageability"

Transcription

1

2 BRKCRS-3811 Cisco SD-Access Policy Driven Manageability Victor Moreno, Distinguished Engineer

3 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#brkcrs Cisco and/or its affiliates. All rights reserved. Cisco Public

4 Agenda Introduction SD-Access Fundamentals Policy in SD-Access Cross Domain Policy Federation Conclusion

5 Cisco s Intent-based Networking Learning DNA Center The Network. Intuitive. Policy Automation Analytics Powered by Intent. Informed by Context. Intent Context Network Infrastructure Switching Routers Wireless Security BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 5

6 Software Defined Access Policy, Automation and Assurance for an Intent-based Network Infrastructure Branch DNA Center L E A R N I N G WAN Wireless Control Policy Automation Analytics I N T E N T C O N T E X T Intent-based Network Infrastructure Campus Fabric Fabric Control S E C U R I T Y Wired + Wireless Mobility Segmentation 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public Scale

7 Software Defined Access Cisco Live Barcelona - Session Map Missed One? Sessions are available CiscoLive.com You Are Here Tuesday (Jan 30) Wednesday (Jan 31) Thursday (Feb 01) Friday (Feb 02) 08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00 08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00 08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00 08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00 BRKEWN-2021 SDA Wireless Setup BRKEWN-2020 Wireless Overview BRKDCN-2489 DC Integration BRKCRS-3811 Policy Management BRKCRS-2810 Solution Overview BRKCRS-2816 Routed Underlay BRKCRS-2814 Assurance BRKCRS-2811 External Connect BRKCRS-2815 Design & Scale BRKCRS-2812 Migration LTRCRS-2810 (1) Hands-On Lab LTRCRS-2810 (2) Hands-On Lab 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

8 SD-Access Fundamentals

9 SD-Access Fabric Roles & Terminology Identity Services DNA-Center DNA Controller DNA Controller Enterprise SDN Controller (e.g. DNA Center) provides GUI management and abstraction via Apps that share context Identity Services Dynamic Endpoint to Group mapping and Policy definition Fabric Border Nodes Intermediate Nodes (Underlay) Fabric Edge Nodes B B Campus Fabric C Analytics Engine Fabric Wireless Controller Control Plane Nodes Analytics Engine Assurance and analysis of Endpoint to App flows and monitor fabric status Control Plane Nodes Map System that manages Endpoint to Device relationships Fabric Border Nodes A Fabric device (e.g. Core) that connects External L3 network(s) to the SD-Access Fabric Fabric Edge Nodes A Fabric device (e.g. Access or Distribution) that connects Wired Endpoints to the SD-Access Fabric Fabric Wireless Controller A Fabric device (WLC) that connects Wireless Endpoints to the SD-Access Fabric BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 9

10 Overlay Virtual Networks Control and Data Plane Separation Overlay Virtual Networks Logical topology used to virtually connect devices, built on top of a physical Underlay topology. Overlay Control Plane Encapsulation Edge Devices An Overlay network often uses alternate forwarding attributes to provide additional services, not provided by the Underlay. Underlay Network Hosts (end-points) Underlay Control Plane BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 10

11 SD-Access Macro Segmentation Network Virtual Network (VN) First level Segmentation that ensures zero communication between specific groups. Ability to consolidate multiple networks into one management plane. Building Management VN Campus Users VN BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 11

12 SD-Access - Micro Segmentation Network Scalable Group (SG) Second level Segmentation ensures role based access control between two groups within a Virtual Network. Provides the ability to segment the network into either line of businesses or functional blocks. Building Management VN Finance SG Employee SG Campus Users VN BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 12

13 Fabric Enabled Segmentation Virtual Networks Virtual Networks Outer/Transport IP-UDP Header VXLAN Header Original IP Packet or L2 Frame Underlay Network Virtual Network Identifier (24 bits) Group Policy Identifier (16 bits) BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 13

14 Micro-segmentation Enforcement Ingress Classification with Egress Enforcement User Authenticated = Classified as Marketing (5) FIB Lookup = Destination MAC = SGT 20 Destination Classification CRM: SGT 20 Web: SGT 30 SRC: Catalyst 3k/4k/6k/9k SRC: DST: SGT: 5 WLC5508 Enterprise Backbone DST SRC Catalyst/ISR/Nexus 5 5 Egress Enforcement (SGACL) CRM (20) Web (30) Marketing (5) Permit Deny BYOD (7) Deny Permit CRM DST: SGT: 20 Web DST: SGT: 30 BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 14

15 Policy in SD-Access

16 Policy types Access Policy Authentication/ Authorization Who goes in which group Based on which criteria Authentication methods Access Control Policy Who can access what Rules for x-group access Permit group to app Permit group to group Application Policy Traffic treatment QoS for Application Path Optimization Application compression Application caching DB 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

17 User/Device Groups & Virtual Networks Users/Devices users things Identity Services / AAA groups DNA Center Virtual Network 1 Virtual Network 2 virtual networks BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 17

18 Access Policy in SD-Access Authentication and Authorization

19 Access Policy Authentication and Authorization Access Policy Authentication/ Authorization Who goes in which group Based on which criteria Authentication methods 802.1X / MAB / Easy Connect / WebAuth BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 19

20 Authentication- Identity Store Integrations Cisco ISE Validate Endpoints via External Identity Sources BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 20

21 Authentication - MAC Authentication Bypass (MAB) Endpoints without supplicant will fail 802.1X authentication! Bypassing Known MAC Addresses 802.1X Network Device Cisco ISE AA-1F-38 Network Device Cisco ISE LAN 802.1X Timeout EAP: What s your Id? No 802.1X MAB Any Packet User: AA-1F-38 ACCESS-ACCEPT BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 21

22 Authentication x Credentials Endpoint (Certificate / Password / Token) (Supplicant) Network Device (Authenticator) Cisco ISE (Authentication Server) Active Directory (Identity Store) EAP EAP 802.1X EAP RADIUS EAP RADIUS: ACCESS-REQUEST RADIUS SERVICE-TYPE: FRAMED EAP: EAP-RESPONSE-IDENTITY EAP: Extensible Authentication Protocol Supplicant: Software running on the client that provides credentials to the authenticator (Network Device). BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 22

23 Authentication x Endpoint (Supplicant) Network Device (Authenticator) Cisco ISE (Authentication Server) Active Directory (Identity Store) Port-Authorized EAP 802.1X EAP RADIUS RADIUS: ACCESS-ACCEPT EAP: EAP-SUCCESS Port-Unauthorized (If authentication fails) EAP: Extensible Authentication Protocol Supplicant: Software running on the client that provides credentials to the authenticator (Network Device). BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 23

24 Authentication - Easy Connect DOMAIN\bob DOMAIN CONTROLLER Bob logged in DHCP NTP DNS AD ISE retrieves user-id and user s AD membership LIMITED FULL ACCESS CoA: Limited Full Access UNKNOWN EMPLOYEES LIMITED ACCESS FULL ACCESS No 802.1X SWITCH-1 Enterprise Network CISCO ISE Immediate value Leverage existing infrastructure Increased visibility into active network sessions Flexible deployment co-operates with other auth methods BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 24

25 Authentication - Central Web Authentication (CWA) Endpoint Network Device Cisco ISE NETWORK Initial packet Google.com MAB Request Initial AuthZ Limited Access ACL + URL-Redirect to ISE Got your MAC, need your ID alice... ISE login page Username + password CoA Full Access ACL BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 25

26 Authentication - Policy Endpoint Policies RADIUS Attributes Service type NAS IP Username SSID EAP Types EAP-FAST EAP-Chaining EAP-TLS PEAP Host lookup, etc Identity Source Internal/Certificate Active Directory LDAPv3 RADIUS Identity Sequence Authentication Options 802.1X / MAB / Any Connect / WebAuth 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

27 Authentication Network Template Application MAB MAB 802.1x EasyConnect Cisco ISE interface GigabitEthernet1/0/3 description Client Wired-2 switchport mode access switchport voice vlan 4000 device-tracking attach-policy IPDT_MAX_10 authentication control-direction in authentication event server dead action authorize vlan 3999 authentication event server dead action authorize voice authentication host-mode multi-auth authentication order dot1x mab authentication priority dot1x mab authentication port-control auto authentication periodic authentication timer reauthenticate server authentication timer inactivity server dynamic mab dot1x pae authenticator dot1x timeout tx-period 10 spanning-tree portfast 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

28 SD-Access Policy Authorization DNA-Center Credentials Posture Profiling SIEM Identity (e.g. Active Directory) users things CASB pxgrid Identity Services Engine / AAA Location Behavior Analytics Vulnerability Scalable Groups BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 28

29 Authorization Policy Endpoint Policies 802.1X / MAB / Easy Connect / CWA Authorization Condition(s) Authorization Profile (s) BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 29

30 Authorization Profiles - VLAN Name = IP Subnet & VN Name VN_IoT BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 30

31 ISE authorization for VN assignment Authorization Result = Virtual Network Virtual Network Identity Services VN_IoT Virtual Network BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 31

32 ISE authorization for VN and SGT assignment Authorization Result = Virtual Network + SGT Users/Devices Virtual Network SGT Identity Services VN_IoT Virtual Network Scalable Group Tag BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 32

33 Authorization Policy - Authorization Profiles VN_IoT IoT_Devices SGT VN_IOT VN_IoT VN_IoT 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

34 SD-Access Users and Devices Group Registry Registry of Groups created in different domains 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

35 SD-Access Users and Devices Custom Groups Custom groups may be created in the registry 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

36 Access Control Policy in SD-Access

37 NETWORK ACCESS Access Control Policy Access Control Policy Who can access what Certificates PROTECTED SERVERS SHARED SERVICES PUBLIC NETWORK Rules for x-group access Permit group to app Permit group to group EMPLOYEE CONTRACTOR Passwords alice ***** DB SOURCE DESTINATION Who are you? What can you access? BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 37

38 Sources SD-Access Micro-segmentation Identity Services Engine (ISE) enabled AAA ISE authenticates Network Devices for a trusted domain SGT & SGT Names Centrally defined Endpoint ID Groups Scalable Group ACL Destinations SGACL Name Table Cisco ISE SGT & SGT Names Scalable Group Tags 3: Employee 4: Contractors 8: PCI_Servers 9: App_Servers SGACL - Name Table Policy matrix to be pushed down to the network devices ISE dynamically authenticates endpoint users and devices, and assigns SGTs Rogue Device(s) Dynamic SGT Assignment MAB, 802.1x, Easy Connect Static SGT Assignment BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 39

39 Micro-segmentation Enforcement Ingress Classification with Egress Enforcement User Authenticated = Classified as Marketing (5) FIB Lookup = Destination MAC = SGT 20 Destination Classification CRM: SGT 20 Web: SGT 30 SRC: Catalyst 3k/4k/6k/9k SRC: DST: SGT: 5 WLC5508 Enterprise Backbone DST SRC Catalyst/ISR/Nexus 5 5 Egress Enforcement (SGACL) CRM (20) Web (30) Marketing (5) Permit Deny BYOD (7) Deny Permit CRM DST: SGT: 20 Web DST: SGT: 30 BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 40

40 Cisco DNA Center Single Pane of Glass across the Enterprise DNA Center Network Controller Identity, Context and Security Policy Network Provisioning Analytics And Assurance PROVISION MONITOR TROUBLESHOOT Wireless LAN WAN Cloud Remote Access BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 41

41 ISE and DNA-C integration for Policy Automation Cisco Identity Services Engine Authentication Authorization Policies Groups and Policies Campus Fabric pxgrid REST APIs Fabric Management Policy Authoring Workflows Cisco DNA Center BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 42

42 Communication channels for integration SSH To establish trust relationship 22/TCP SSH Service REST To program ISE 443/TCP ERS Read/Write pxgrid Service DNA-Center pxgridcontext & TrustSec Meta Data pxgrid* ISE * 5222/TCP, 7400/TCP, 8910/TCP, 12001/TCP, details: BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 43

43 Virtual Network Rollout Virtual Network Segmentation CISCO DNA CENTER SSH Border eid-table vrf Campus instance-id 4098 ipv4 route-export site-registrations ipv4 distance site-registrations 250 ipv4 map-cache site-registration exit B B B Edge instance-id 4098 service ipv4 eid-table vrf Campus exit-service-ipv4! exit-instance-id E E E 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

44 Scalable Groups Assignment to VNs A Scalable Group is assigned to a single VN Virtual Network 1 Virtual Network 2 Virtual Network 3 BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 46

45 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

46 SD-Access Access Control Policies Source VN-X Contract Destination VN-Y CONTRACT GREEN Classifier Port Number IP Address Application Type Action Permit Deny FCS all groups in a Policy must belong to the same Virtual Network 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

47 Scalable Group Policy rollout FABRIC POLICIES Source Destination CISCO DNA CENTER Employees Contract PERMIT Production API Employees Contractors Production Development CISCO ISE POLICY DOWNLOAD FABRIC NODES BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 49

48 SD-Access Policy Authoring 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

49 SD-Access Policy Authoring Access Contracts 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

50 SD-Access Policy List View BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 52

51 SD-Access Policy Matrix View 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

52 Application Policy in SD-Access

53 Application Policy - QoS Application Policy Traffic treatment QoS for Application Path Optimization Application compression Application caching App X App Y App Z 3 Treatment Profiles Application Registry DNAC Normalize QoS diversity Application X IP-Prefix / URL = x.x.x.x /24 UDP/TCP Ports = Application Y IP-Prefix / URL =y.y.y.y /22 UDP/TCP Ports = 80 Polaris (3K), IOS-XE (4K), IOS (6K), NX-OS (N7K), AireOS Catalyst 3650/3850 Catalyst 9300/9400/ 9500 Catalyst 4500 (Sup8E) Catalyst 6500/6800 Nexus 7700 (M3) WLC 5500/8500 BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 55

54 SD-Access Application Definition classifiers application end-points Application Name End-point addresses IP/URL/Source-Group Classifiers TCP/UDP port numbers DSCP Implicit Policy Traffic Class Path Preference BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 56

55 SD-Access Application Registry Application Registry classifiers end-points classifiers end-points classifiers end-points Sources: AVC/NBAR ACI DNS-AS Other repository of application information Custom Application Configuration BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 57

56 SD-Access Application Registry - Applications 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

57 SD-Access Application Registry - Applications 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

58 SD-Access Application Registry Application Sets 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

59 Solicit Application Business-Relevance Relevant These applications directly supports business objectives Applications should be classified and marked according to RFC 4594-based rules Default These applications may/may not support business objectives E.g. HTTP/HTTPS Alternatively, administrator may not know the application (or how its being used in the org) Applications in this class should be marked DF and provisioned with a default best-effort service (RFC 2474) Irrelevant These applications are known and do not directly support any business objectives; this class includes all personal/consumer applications Applications in this class should be marked CS1 and provisioned with a less-than-best-effort service, per (RFC 3662) BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 61

60 SD-Access Application Policy 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

61 Application Policy 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

62 Application Policy 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

63 SD-Access Application Policy 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

64 SD-Access Application Policy 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

65 SD-Access Application Policy 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

66 Application Policy - Traffic Copy Traffic Copy Policy Mirror Traffic (ERSPAN) ERSPAN for specific endpoint and traffic Employee 1 Edge Switch Finance Servers monitor session 1 type erspandestination destination interface Gi0/2/2 source erspan-id 1 ip address B C 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public B B E E E ip access-list extended erspan-session-1 permit ip any monitor session 1 type erspan-source source interface Gi1/0/4 filter ip access-group erspan-session-1 destination erspan-id 1 ip address ip ttl 32 origin ip address

67 Traffic Copy Policy Traffic Copy Policy Mirror Traffic (ERSPAN) ERSPAN for specific endpoint and traffic Edge Switch Employee 1 Finance Servers BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 69

68 Policy End-to-end

69 Unified Policy Language across Domains consumer Policy Element/Object Exchange Contract Web Users consumer Allow only web traffic in/out Sessions must be logged Violations must be inspected. Web Servers provider Network Operator Access Domain (Campus/Branch/WAN) Security Domain Data Center A Data Center B Network Operator Security Operator 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

70 Federated Identity Cross Domain Group awareness / Independent Policy User-App Application Prioritization DB C User to App Contracts Web DNA-Center User-User Access Control: SG-ACL Web1 Qo Se rvi ce App1 Qo S Filt er App to App Contracts DB SaaS/IaaS Exchange Policy Groups Web ISE DB BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 72

71 Multi-domain Identity Exchange Campus access-list 102 deny udp gt eq 2165 access-list 102 deny udp lt gt 428 access-list 102 permit ip eq gt 1511 access-list 102 deny tcp gt gt 1945 access-list 102 permit icmp lt eq 116 access-list 102 deny udp eq eq 959 access-list 102 deny tcp eq lt 4993 access-list 102 deny tcp eq lt 848 access-list 102 deny ip eq gt 4878 access-list 102 permit icmp lt eq 1216 access-list 102 deny icmp gt gt 1111 access-list 102 deny ip eq eq 4175 access-list 102 permit tcp lt gt 1462 access-list 102 permit tcp gt lt 4384 Wireles s Control WAN ACI Fabric Fabri c Contr ol Campus Firewall Border Leaf s PXGRID Groups+IP Web DNA-Center BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 73

72 Network + Host Based Segmentation C Web Segmentation Agent? c users Enforce at Network Edge Enforce at Segmentation Agent applications things Access Network Data Center Enforcement footprint will vary BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 74

73 Integration with Policy Orchestrators Centralization of Policy Visibility & Compliance Automatic Provisioning Cloud Campus / Branch SD-Access Policy Domain ISE B C B B Cisco Firewall APIC Data Center APIC Policy Domain Employee SD-Access Fabric 3 rd party Firewall Web ACI Fabric App BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 75

74 Network Layer Controller Layer Campus Fabric SGT Info Used in ACI Policies Campus Fabric Policy Domain ISE ACI Policy Domain Auditor SRC: DST: SGT: 5 Campus Fabric ISE Retrieves: ISE Exchanges: EPG Name: SGT PCI Name: EPG Auditor EPG Binding = SGT Binding = SRC: DST: Plain Ethernet (no CMD) EPG Name = Auditor Groups= SRC: DST: EPG ACI Border Leaf (N9K) ACI Spine (N9K) PCI EPG ACI Leaf (N9K) SGT Groups available in ACI Policies Controller Layer Network Layer PCI BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 76

75 Required connectivity for ACI-Campus Campus scope of Management All outside EPGs learnt from ISE will be assigned to a single VRF DC scope of management Campus Border Router DC Border Leaf Web1 VRF A VRF B VRF C VRF D N:M VRF 1 VRF 2 VRF 1 VRF 2 Web2 SGTs in VXLAN VRF-lite (SXP) EPGs in VXLAN In the initial releases, ISE does not support VRF/VN semantics It is assumed that connectivity between campus VRFs and DC VRFs is provisioned In the future, xvrf connectivity should be driven from x-group policies 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

76 Policy Driven Segment Connectivity x-domain C Web User to App Contracts Domain A Border Router Domain A Segmentation Space VRF A VRF B VRF C VRF D N:M Domain B Segmentation Space VRF 1 VRF 2 Domain B Border Router VRF 1 VRF 2 Domain B Segmentation Space Domain A Data Plane Handoff Domain B Data Plane BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 78

77 Fabric Enabled Segmentation Virtual Networks Virtual Networks Outer/Transport IP-UDP Header VXLAN Header Original IP Packet or L2 Frame Underlay Network Virtual Network Identifier (24 bits) Group Policy Identifier (16 bits) BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 79

78 ISE and APIC data plane translation SD-Access Policy Domain ACI Policy Domain APIC-EM Security Groups IP, SGT mappings Cisco ISE 2.3 ISE & APIC Exchange Groups and Member information ISE creates SGT to EPG translation table Send translation table to ASR 1K/N7K End Point Groups Cisco APIC-DC IP-ClassId, VNI bindings SD-Access User Classification Switch Router* Nexus9000 Nexus9000 Server Spine Leaf LISP,SGT & VXLAN BGP EVPN, EPG &VXLAN APIC - Application Policy Infrastructure Controller, ACI - Application Centric Infrastructure *ASR1K (ship) N7K (plan) 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

79 Use Case - Cloud User to Cloud Access Control Workflow Virtual Firewall or SGACL-capable virtual routers in cloud environments FTDv, ASAv, CSR-1000v, ISRv Workloads / groups provisioned by Cisco or 3 rd party provisioning tools AWS Security Groups Prod App Dev App Prod App Dev App Azure Network Security Groups IP-SGT bindings pushed to ISE REST APIs ISE SXP/PxGrid updates enforcement point Zero policy changes as new workloads are provisioned in clouds ISE Ent Policy Domain Employee Tag Developer Tag Guest Tag Non-Compliant Tag Consistent Policy Dev Apps Prod Apps Remediation Internet Employee Developer X X Non Compliant Employee Voice Voice Employee Developer Guest Non Compliant Guest X X BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 81

80 Conclusion

81 What to Do Next? Technical Advisory Managed Implementation Optimization Training SD-Access Capable DNA Center Cisco Services Refresh your Hardware & Software Deploy the DNA Center Engage with Cisco Services Get SD-Access Capable Devices with DNA Advantage OS License Get DNA Center Appliances with DNA Center Software Cisco Services can help you to Test - Migrate - Deploy BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 84

82 The First Step #NewEra #CiscoDNA #NetworkIntuitive 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

83 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#brkcrs Cisco and/or its affiliates. All rights reserved. Cisco Public

84 Please complete your Online Session Evaluations after each session Complete 4 Session Evaluations & the Overall Conference Evaluation (available from Thursday) to receive your Cisco Live T-shirt All surveys can be completed via the Cisco Live Mobile App or the Communication Stations Complete Your Online Session Evaluation Don t forget: Cisco Live sessions will be available for viewing on-demand after the event at Cisco and/or its affiliates. All rights reserved. Cisco Public

85 Continue Your Education Demos in the Cisco campus Walk-in Self-Paced Labs Tech Circle Meet the Engineer 1:1 meetings Related sessions BRKCRS Cisco and/or its affiliates. All rights reserved. Cisco Public 88

86 Thank you

87

Cisco SD-Access Hands-on Lab

Cisco SD-Access Hands-on Lab LTRCRS-2810 Cisco SD-Access Hands-on Lab Larissa Overbey - Technical Marketing Engineer, Cisco Derek Huckaby - Technical Marketing Engineer, Cisco https://cisco.box.com/v/ltrcrs-2810-bcn2018 Password:

More information

Identity Based Network Access

Identity Based Network Access Identity Based Network Access Identity Based Network Access - Agenda What are my issues Cisco ISE Power training What have I achieved What do I want to do What are the issues? Guest Student Staff Contractor

More information

SD-Access Wireless: why would you care?

SD-Access Wireless: why would you care? SD-Access Wireless: why would you care? CUWN Architecture - Centralized Overview Policy Definition Enforcement Point for Wi-Fi clients Client keeps same IP address while roaming WLC Single point of Ingress

More information

Cisco Campus Fabric Introduction. Vedran Hafner Systems engineer Cisco

Cisco Campus Fabric Introduction. Vedran Hafner Systems engineer Cisco Cisco Campus Fabric Introduction Vedran Hafner Systems engineer Cisco Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility (w/o stretching VLANs) Network

More information

Cisco SD-Access Building the Routed Underlay

Cisco SD-Access Building the Routed Underlay Cisco SD-Access Building the Routed Underlay Rahul Kachalia Sr. Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the

More information

Evolving your Campus Network with. Campus Fabric. Shawn Wargo. Technical Marketing Engineer BRKCRS-3800

Evolving your Campus Network with. Campus Fabric. Shawn Wargo. Technical Marketing Engineer BRKCRS-3800 Evolving your Campus Network with Campus Fabric Shawn Wargo Technical Marketing Engineer BRKCRS-3800 Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility

More information

Več kot SDN - SDA arhitektura v uporabniških omrežjih

Več kot SDN - SDA arhitektura v uporabniških omrežjih Več kot SDN - SDA arhitektura v uporabniških omrežjih Aleksander Kocelj SE Cisco Agenda - Introduction to Software Defined Access - Brief description on SDA - Cisco SDA Assurance - DEMO 2 New Requirements

More information

2012 Cisco and/or its affiliates. All rights reserved. 1

2012 Cisco and/or its affiliates. All rights reserved. 1 2012 Cisco and/or its affiliates. All rights reserved. 1 Policy Access Control: Challenges and Architecture UA with Cisco ISE Onboarding demo (BYOD) Cisco Access Devices and Identity Security Group Access

More information

Cisco TrustSec How-To Guide: Central Web Authentication

Cisco TrustSec How-To Guide: Central Web Authentication Cisco TrustSec How-To Guide: Central Web Authentication For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 1

More information

Routing Underlay and NFV Automation with DNA Center

Routing Underlay and NFV Automation with DNA Center BRKRST-1888 Routing Underlay and NFV Automation with DNA Center Prakash Rajamani, Director, Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session

More information

P ART 3. Configuring the Infrastructure

P ART 3. Configuring the Infrastructure P ART 3 Configuring the Infrastructure CHAPTER 8 Summary of Configuring the Infrastructure Revised: August 7, 2013 This part of the CVD section discusses the different infrastructure components that are

More information

Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions

Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across

More information

Tech Update Oktober Rene Andersen / Ib Hansen

Tech Update Oktober Rene Andersen / Ib Hansen Tech Update 10 12 Oktober 2017 Rene Andersen / Ib Hansen DNA Solution Cisco Enterprise Portfolio DNA Center Simple Workflows DESIGN PROVISION POLICY ASSURANCE Identity Services Engine DNA Center APIC-EM

More information

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table

More information

Cisco TrustSec How-To Guide: Monitor Mode

Cisco TrustSec How-To Guide: Monitor Mode Cisco TrustSec How-To Guide: Monitor Mode For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

Contents. Introduction

Contents. Introduction Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram ISE - Configuration Steps 1. SGT for Finance and Marketing 2. Security group ACL for traffic Marketing ->Finance

More information

2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public PSODCN-1030 Intent Based Systems Deliver Automation Dave Malik Cisco Fellow and Chief Architect Advanced Services @dmalik2 2018 Cisco

More information

Get Hands On With DNA Center APIs for Managing Intent

Get Hands On With DNA Center APIs for Managing Intent DEVNET-3620 Get Hands On With DNA Center APIs for Managing Intent Adam Radford Distinguished Systems Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session

More information

APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks

APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks Saurav Prasad Technical Marketing Engineer CTHNMS-1002 Cisco Spark How Questions? Use Cisco Spark to chat with the speaker after

More information

Campus Fabric. How To Integrate With Your Existing Networks. Kedar Karmarkar - Technical Leader BRKCRS-2801

Campus Fabric. How To Integrate With Your Existing Networks. Kedar Karmarkar - Technical Leader BRKCRS-2801 Campus Fabric How To Integrate With Your Existing Networks Kedar Karmarkar - Technical Leader Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility (w/o

More information

Cisco TrustSec Software-Defined Segmentation Platform and Capability Matrix Release 6.3

Cisco TrustSec Software-Defined Segmentation Platform and Capability Matrix Release 6.3 TrustSec Software-Defined Segmentation Platform and Capability Matrix Release 6.3 TrustSec uniquely builds upon your existing identity-aware infrastructure by enforcing segmentation and access control

More information

TrustSec (NaaS / NaaE)

TrustSec (NaaS / NaaE) TrustSec (NaaS / NaaE) per@cisco.com Security on top of the mind for our customers 60% 85% 54% of data is stolen in HOURS of point-of-sale intrusions aren t discovered for WEEKS of breaches remain undiscovered

More information

Monitor Mode Deployment with Cisco Identity Services Engine. Secure Access How -To Guides Series

Monitor Mode Deployment with Cisco Identity Services Engine. Secure Access How -To Guides Series Monitor Mode Deployment with Cisco Identity Services Engine Secure Access How -To Guides Series Author: Adrianne Wang Date: December 2012 Table of Contents Monitor Mode... 3 Overview of Monitor Mode...

More information

Cisco.Network.Intuitive FastLane IT Forum. Andreas Korn Systems Engineer

Cisco.Network.Intuitive FastLane IT Forum. Andreas Korn Systems Engineer Cisco.Network.Intuitive FastLane IT Forum Andreas Korn Systems Engineer 12.10.2017 Ziele dieser Session New Era of Networking - Was ist darunter zu verstehen? Software Defined Access Wie revolutioniert

More information

Cisco TrustSec How-To Guide: Phased Deployment Overview

Cisco TrustSec How-To Guide: Phased Deployment Overview Cisco TrustSec How-To Guide: Phased Deployment Overview For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2

More information

Cloud Mobility: Meraki Wireless & EMM

Cloud Mobility: Meraki Wireless & EMM BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile

More information

TrustSec Configuration Guides. TrustSec Capabilities on Wireless 8.4 Software-Defined Segmentation through SGACL Enforcement on Wireless Access Points

TrustSec Configuration Guides. TrustSec Capabilities on Wireless 8.4 Software-Defined Segmentation through SGACL Enforcement on Wireless Access Points TrustSec Configuration Guides TrustSec Capabilities on Wireless 8.4 Software-Defined Segmentation through SGACL Enforcement on Wireless Access Points Table of Contents TrustSec Capabilities on Wireless

More information

Building an End-End Policy Driven Secure Hybrid Cloud DC Architecture

Building an End-End Policy Driven Secure Hybrid Cloud DC Architecture BRKSEC-2980 Building an End-End Policy Driven Secure Hybrid Cloud DC Architecture David Jansen CCIE #5952 DSE Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session

More information

Cisco Trusted Security Enabling Switch Security Services

Cisco Trusted Security Enabling Switch Security Services Cisco Trusted Security Enabling Switch Security Services Michal Remper, CCIE #8151 CSE/AM mremper@cisco.com 2009 Cisco Systems, Inc. All rights reserved. 1 Enter Identity & Access Management Strategic

More information

Software-Defined Access 1.0

Software-Defined Access 1.0 White Paper Software-Defined Access 1.0 Solution White Paper Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA https://www.cisco.com/ Tel: 408 526-4000 800 553-NETS

More information

Cisco Group Based Policy Platform and Capability Matrix Release 6.4

Cisco Group Based Policy Platform and Capability Matrix Release 6.4 Group d Policy Platform and Capability Matrix Release 6.4 (inclusive of TrustSec Software-Defined Segmentation) Group d Policy (also known as TrustSec Software-Defined Segmentation) uniquely builds upon

More information

ForeScout CounterACT. Configuration Guide. Version 4.3

ForeScout CounterACT. Configuration Guide. Version 4.3 ForeScout CounterACT Authentication Module: RADIUS Plugin Version 4.3 Table of Contents Overview... 4 Understanding the 802.1X Protocol... 4 About the CounterACT RADIUS Plugin... 6 IPv6 Support... 7 About

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo Vendor: Cisco Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access Solutions Version: Demo QUESTION 1 By default, how many days does Cisco ISE wait before it purges the expired guest accounts?

More information

Integrating Meraki Networks with

Integrating Meraki Networks with Integrating Meraki Networks with Cisco Identity Services Engine Secure Access How-To guide series Authors: Tim Abbott, Colin Lowenberg Date: April 2016 Table of Contents Introduction Compatibility Matrix

More information

Serviceability of SD-WAN

Serviceability of SD-WAN BRKCRS-2112 Serviceability of SD-WAN Chandrabalaji Rajaram & Ali Shaikh Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live

More information

Software-Defined Access 1.0

Software-Defined Access 1.0 Software-Defined Access 1.0 What is Cisco Software-Defined Access? The Cisco Software-Defined Access (SD-Access) solution uses Cisco DNA Center to provide intent-based policy, automation, and assurance

More information

Cisco UCS Director and ACI Advanced Deployment Lab

Cisco UCS Director and ACI Advanced Deployment Lab Cisco UCS Director and ACI Advanced Deployment Lab Michael Zimmerman, TME Vishal Mehta, TME Agenda Introduction Cisco UCS Director ACI Integration and Key Concepts Cisco UCS Director Application Container

More information

Introducing Cisco Network Assurance Engine

Introducing Cisco Network Assurance Engine BRKACI-2403 Introducing Cisco Network Assurance Engine Intent Based Networking for Data Centers Sundar Iyer, Distinguished Engineer Head Cisco Network Assurance Engine Team Dhruv Jain, Director of Product

More information

ISE Primer.

ISE Primer. ISE Primer www.ine.com Course Overview Designed to give CCIE Security candidates an intro to ISE and some of it s features. Not intended to be a complete ISE course. Some topics are not discussed. Provides

More information

CertKiller q

CertKiller q CertKiller.500-451.28q Number: 500-451 Passing Score: 800 Time Limit: 120 min File Version: 5.3 500-451 Cisco Unified Access Systems Engineer Exam I just passed today with 89%. My sole focus was the VCE.

More information

Software-Defined Access Wireless

Software-Defined Access Wireless Introduction to, page 1 Configuring SD-Access Wireless (CLI), page 7 Enabling SD-Access Wireless (GUI), page 8 Configuring SD-Access Wireless VNID (GUI), page 9 Configuring SD-Access Wireless WLAN (GUI),

More information

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack White Paper Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack Introduction Cisco Application Centric Infrastructure (ACI) is a next-generation data center fabric infrastructure

More information

Software-Defined Access Wireless

Software-Defined Access Wireless Introduction to, page 1 Configuring SD-Access Wireless (CLI), page 7 Introduction to The Enterprise Fabric provides end-to-end enterprise-wide segmentation, flexible subnet addressing, and controller-based

More information

Cisco TrustSec 4.0:How to Create Campus and Branch-Office Segmentation

Cisco TrustSec 4.0:How to Create Campus and Branch-Office Segmentation Ordering Guide TrustSec 4.0:How to Create Campus and Branch-Office Segmentation Ordering Guide November 2013 2013 and/or its affiliates. All rights reserved. This document is Public Information. Page 1

More information

Cisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1

Cisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1 Cisco ISE Overview, page 2 Key Functions, page 2 Identity-Based Network Access, page 2 Support for Multiple Deployment Scenarios, page 3 Support for UCS Hardware, page 3 Basic User Authentication and Authorization,

More information

Software-Defined Access Wireless

Software-Defined Access Wireless Introduction to, page 1 Configuring SD-Access Wireless (CLI), page 7 Enabling SD-Access Wireless (GUI), page 8 Configuring SD-Access Wireless VNID (GUI), page 9 Configuring SD-Access Wireless WLAN (GUI),

More information

Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab

Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Ali Shaikh Technical Leader Faraz Shamim Sr. Technical Leader Mossaddaq Turabi Distinguished ENgineer Cisco Spark How Questions?

More information

PSOACI Tetration Overview. Mike Herbert

PSOACI Tetration Overview. Mike Herbert Tetration Overview Mike Herbert Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion

More information

Intuit Application Centric ACI Deployment Case Study

Intuit Application Centric ACI Deployment Case Study Intuit Application Centric ACI Deployment Case Study Joon Cho, Principal Network Engineer, Intuit Lawrence Zhu, Solutions Architect, Cisco Agenda Introduction Architecture / Principle Design Rollout Key

More information

ONE POLICY. Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013

ONE POLICY. Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013 ONE POLICY Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013 Agenda Secure Unified Access with ISE Role-Based Access Control Profiling TrustSec Demonstration How ISE is Used Today

More information

Cisco Software-Defined Access

Cisco Software-Defined Access Cisco Software-Defined Access Introducing an entirely new era in networking. What if you could give time back to IT? Provide network access in minutes for any user or device to any application-without

More information

BEST PRACTICE - NAC AUF ARUBA SWITCHES. Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features

BEST PRACTICE - NAC AUF ARUBA SWITCHES. Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features BEST PRACTICE - NAC AUF ARUBA SWITCHES Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features Agenda 1 Overview 2 802.1X Authentication 3 MAC Authentication

More information

LTRDCT-2781 Building and operating VXLAN BGP EVPN Fabrics with Data Center Network Manager

LTRDCT-2781 Building and operating VXLAN BGP EVPN Fabrics with Data Center Network Manager LTRDCT-2781 Building and operating VXLAN BGP EVPN Fabrics with Data Center Network Manager Henrique Molina, Technical Marketing Engineer Matthias Wessendorf, Technical Marketing Engineer Cisco Spark How

More information

SDN Security BRKSEC Alok Mittal Security Business Group, Cisco

SDN Security BRKSEC Alok Mittal Security Business Group, Cisco SDN Security Alok Mittal Security Business Group, Cisco Security at the Speed of the Network Automating and Accelerating Security Through SDN Countering threats is complex and difficult. Software Defined

More information

Cisco Software Defined Access (SDA)

Cisco Software Defined Access (SDA) Cisco Software Defined Access (SDA) Transformational Approach to Network Design & Provisioning Sanjay Kumar Regional Manager- ASEAN, Cisco Systems What is network about? Source: google.de images Security

More information

Choice of Segmentation and Group Based Policies for Enterprise Networks

Choice of Segmentation and Group Based Policies for Enterprise Networks Choice of Segmentation and Group Based Policies for Enterprise Networks Hari Holla Technical Marketing Engineer, Cisco ISE BRKCRS-2893 hari_holla /in/hariholla Cisco Spark How Questions? Use Cisco Spark

More information

Cisco TrustSec How-To Guide: Global Switch Configuration

Cisco TrustSec How-To Guide: Global Switch Configuration Cisco TrustSec How-To Guide: Global Switch Configuration For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...

More information

DumpsFree. DumpsFree provide high-quality Dumps VCE & dumps demo free download

DumpsFree.   DumpsFree provide high-quality Dumps VCE & dumps demo free download DumpsFree http://www.dumpsfree.com DumpsFree provide high-quality Dumps VCE & dumps demo free download Exam : 300-208 Title : Implementing Cisco Secure Access Solutions Vendor : Cisco Version : DEMO Get

More information

Troubleshooting sieci opartej na. Mariusz Kazmierski, CCIE #25082 (R&S, SP) TAC EMEAR Technical Leader Switching

Troubleshooting sieci opartej na. Mariusz Kazmierski, CCIE #25082 (R&S, SP) TAC EMEAR Technical Leader Switching Troubleshooting sieci opartej na architekturze SDA Mariusz Kazmierski, CCIE #25082 (R&S, SP) TAC EMEAR Technical Leader Switching What s on the Network? Overlay Network Control Plane based on LISP Policy

More information

Network Deployments in Cisco ISE

Network Deployments in Cisco ISE Cisco ISE Network Architecture, page 1 Cisco ISE Deployment Terminology, page Node Types and Personas in Distributed Deployments, page Standalone and Distributed ISE Deployments, page 4 Distributed Deployment

More information

Posture Services on the Cisco ISE Configuration Guide Contents

Posture Services on the Cisco ISE Configuration Guide Contents Posture Services on the Cisco ISE Configuration Guide Contents Introduction Prerequisites Requirements Components Used Background Information ISE Posture Services Client Provisioning Posture Policy Authorization

More information

Segmentation. Threat Defense. Visibility

Segmentation. Threat Defense. Visibility Segmentation Threat Defense Visibility Establish boundaries: network, compute, virtual Enforce policy by functions, devices, organizations, compliance Control and prevent unauthorized access to networks,

More information

DNA Campus Fabric. How to Migrate The Existing Network. Kedar Karmarkar - Technical Leader BRKCRS-2801

DNA Campus Fabric. How to Migrate The Existing Network. Kedar Karmarkar - Technical Leader BRKCRS-2801 DNA Campus Fabric How to Migrate The Existing Network Kedar Karmarkar - Technical Leader Campus Fabric Abstract Is your Campus network facing some, or all, of these challenges? Host Mobility (w/o stretching

More information

Catalyst 3850 Series Switch Session Aware Networking with a Service Template on the ISE Configuration Example

Catalyst 3850 Series Switch Session Aware Networking with a Service Template on the ISE Configuration Example Catalyst 3850 Series Switch Session Aware Networking with a Service Template on the ISE Configuration Example Document ID: 116838 Contributed by Michal Garcarz, Cisco TAC Engineer. Nov 26, 2013 Contents

More information

Policy Defined Segmentation with Cisco TrustSec

Policy Defined Segmentation with Cisco TrustSec Policy Defined Segmentation with Cisco TrustSec Session ID 18PT Rob Bleeker Consulting System Engineer CCIE #: 2926 Abstract This session will explain how TrustSec Security Group Tagging can be used to

More information

DNA SA Border Node Support

DNA SA Border Node Support Digital Network Architecture (DNA) Security Access (SA) is an Enterprise architecture that brings together multiple building blocks needed for a programmable, secure, and highly automated fabric. Secure

More information

PSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco

PSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco PSOACI-4592 Why ACI: An overview and a customer (BBVA) perspective TJ Bijlsma César Martinez Joaquin Crespo Technology Officer DC EMEAR Cisco Lead Architect BBVA Lead Architect BBVA Cisco Spark How Questions?

More information

Introduction to Cisco SD- WAN (Viptela)

Introduction to Cisco SD- WAN (Viptela) LTRCRS-2005 Introduction to Cisco SD- WAN (Viptela) Brad Edgeworth, Systems Engineer, CCIE#31574 Dustin Schuemann, Solutions Architect Madhavan Aruanchalam, Technical Marketing Engineer Cisco Spark How

More information

DNA Automation Services Offerings

DNA Automation Services Offerings DNA Automation Services Offerings Jamie Owen, Solutions Architect, Cisco Advanced Services Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session

More information

Network as an Enforcer (NaaE) Cisco Services. Network as an Enforcer Cisco and/or its affiliates. All rights reserved.

Network as an Enforcer (NaaE) Cisco Services. Network as an Enforcer Cisco and/or its affiliates. All rights reserved. Network as an Enforcer (NaaE) Cisco Services INTRODUCTION... 6 Overview of Network as an Enforcer... 6 Key Benefits... 6 Audience... 6 Scope... 6... 8 Guidelines and Limitations... 8 Configuring SGACL

More information

Network Deployments in Cisco ISE

Network Deployments in Cisco ISE Cisco ISE Network Architecture, page 1 Cisco ISE Deployment Terminology, page 2 Node Types and Personas in Distributed Deployments, page 2 Standalone and Distributed ISE Deployments, page 4 Distributed

More information

SD-Access Wireless Design and Deployment Guide

SD-Access Wireless Design and Deployment Guide SD-Access Wireless Design and Deployment Guide Executive Summary 2 Software Defined Access 2 SD Access Wireless 3 SD Access Wireless Architecture 4 Setting up SD-Access Wireless with DNAC 13 SD Access

More information

Software-Defined Access Design Guide

Software-Defined Access Design Guide Cisco Validated design Software-Defined Access Design Guide December 2017 Solution 1.1 Table of Contents Table of Contents Cisco Digital Network Architecture and Software-Defined Access Introduction...

More information

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug

More information

Configure IBNS 2.0 for Single-Host and Multi- Domain Scenarios

Configure IBNS 2.0 for Single-Host and Multi- Domain Scenarios Configure IBNS 2.0 for Single-Host and Multi- Domain Scenarios Contents Introduction Prerequisites Requirements Components Used Configure Configuration Theory Scenario for Single-Host Scenario for Multi-Domain

More information

NXOS in the Real World Using NX-API REST

NXOS in the Real World Using NX-API REST NXOS in the Real World Using NX-API REST Adrian Iliesiu Corporate Development Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session

More information

Cisco TrustSec Software-Defined Segmentation Release 6.1 System Bulletin

Cisco TrustSec Software-Defined Segmentation Release 6.1 System Bulletin System Bulletin TrustSec Software-Defined Segmentation Release 6.1 System Bulletin Introduction Network segmentation is essential for protecting critical business assets. TrustSec Software Defined Segmentation

More information

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) The goal of the course is to provide students with foundational knowledge in the capabilities and functions of the IEEE 802.1x

More information

Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN

Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN BRKCRS-2113 Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN Sumanth Kakaraparthi Product Leader SD-WAN Manan Shah Director Of Product Management Cisco Spark How Questions? Use Cisco Spark

More information

Figure 1 - Controller-Initiated Web Login Flow

Figure 1 - Controller-Initiated Web Login Flow Figure 1 - Controller-Initiated Web Login Flow Figure 2 Controller-Initiated Web Login with MAC Cache Figure 3 Server-Initiated Web Login Figure 4 Server Initated Web Login with MAC Cache Figure 5 Server-Initiated

More information

Cisco S802dot1X - Introduction to 802.1X(R) Operations for Cisco Security Professionals.

Cisco S802dot1X - Introduction to 802.1X(R) Operations for Cisco Security Professionals. Cisco 650-472 S802dot1X - Introduction to 802.1X(R) Operations for Cisco Security Professionals http://killexams.com/exam-detail/650-472 QUESTION: 60 Which two elements must you configure on a Cisco Wireless

More information

ExamTorrent. Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you

ExamTorrent.   Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you ExamTorrent http://www.examtorrent.com Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you Exam : 400-251 Title : CCIE Security Written Exam (v5.0) Vendor : Cisco Version

More information

Forescout. Configuration Guide. Version 4.4

Forescout. Configuration Guide. Version 4.4 Forescout Version 4.4 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Borderless Networks. Tom Schepers, Director Systems Engineering

Borderless Networks. Tom Schepers, Director Systems Engineering Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action

More information

Cisco Software-Defined Access

Cisco Software-Defined Access Migration Guide Cisco Software-Defined Access 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 31 Contents Cisco SD-Access... 3 Evolution of Networking

More information

ISE Version 1.3 Self Registered Guest Portal Configuration Example

ISE Version 1.3 Self Registered Guest Portal Configuration Example ISE Version 1.3 Self Registered Guest Portal Configuration Example Document ID: 118742 Contributed by Michal Garcarz and Nicolas Darchis, Cisco TAC Engineers. Feb 13, 2015 Contents Introduction Prerequisites

More information

Cisco Nexus Data Broker

Cisco Nexus Data Broker Data Sheet Cisco Nexus Data Broker Product Overview You used to monitor traffic mainly to manage network operations. Today, when you monitor traffic you can find out instantly what is happening throughout

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : 300-208 Title : Implementing Cisco Secure Access Solutions Vendor : Cisco Version : DEMO Get Latest & Valid 300-208

More information

Configuring IEEE 802.1x Port-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication CHAPTER 10 Configuring IEEE 802.1x Port-Based Authentication IEEE 802.1x port-based authentication prevents unauthorized devices (clients) from gaining access to the network. Unless otherwise noted, the

More information

Tetration Hands-on Lab from Deployment to Operations Support

Tetration Hands-on Lab from Deployment to Operations Support LTRACI-2184 Tetration Hands-on Lab from Deployment to Operations Support Furong Gisiger, Solutions Architect Lawrence Zhu, Sr. Solutions Architect Cisco Spark How Questions? Use Cisco Spark to communicate

More information

Configuring MAC Authentication Bypass

Configuring MAC Authentication Bypass Configuring MAC Authentication Bypass Last Updated: January 18, 2012 The MAC Authentication Bypass feature is a MAC-address-based authentication mechanism that allows clients in a network to integrate

More information

Data Center Security. Fuat KILIÇ Consulting Systems

Data Center Security. Fuat KILIÇ Consulting Systems Data Center Security Fuat KILIÇ Consulting Systems Engineer @Security Data Center Evolution WHERE ARE YOU NOW? WHERE DO YOU WANT TO BE? Traditional Data Center Virtualized Data Center (VDC) Virtualized

More information

Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches)

Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) First Published: 2017-07-31 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Cisco TrustSec Software-Defined Segmentation Release 6.1 System Bulletin

Cisco TrustSec Software-Defined Segmentation Release 6.1 System Bulletin System Bulletin TrustSec Software-Defined Segmentation Release 6.1 System Bulletin Introduction Network segmentation is essential for protecting critical business assets. TrustSec Software Defined Segmentation

More information

Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 3650 Switches)

Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 3650 Switches) Campus Fabric Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 3650 Switches) First Published: 2017-07-31 Last Modified: 2017-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Cisco TrustSec Quick Start Configuration Guide

Cisco TrustSec Quick Start Configuration Guide Cisco TrustSec Quick Start Configuration Guide Table of Contents Introduction... 5 Using This Guide... 5 Baseline ISE Configuration for TrustSec... 7 Active Directory Integration (optional)... 7 Defining

More information

CloudCenter for Developers

CloudCenter for Developers DEVNET-1198 CloudCenter for Developers Conor Murphy, Systems Engineer Data Centre Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the

More information

802.1x Port Based Authentication

802.1x Port Based Authentication 802.1x Port Based Authentication Johan Loos Johan at accessdenied.be Who? Independent Information Security Consultant and Trainer Vulnerability Management and Assessment Wireless Security Next-Generation

More information

CWA URL Redirect support on C891FW

CWA URL Redirect support on C891FW Introduction, page 1 Prerequisites for, page 2 Configuring, page 3 HTTP Proxy Configuration, page 8 Configuration Examples for, page 8 Important Notes, page 14 Additional References for, page 14 Feature

More information

Configuring IEEE 802.1x Port-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication CHAPTER 8 Configuring IEEE 802.1x Port-Based Authentication This chapter describes how to configure IEEE 802.1x port-based authentication on the switch. IEEE 802.1x authentication prevents unauthorized

More information