3 Brkens 2810
3 Brkens 2810
Fundamentals
Ritika Singh
Technical Marketing Engineer
BRKENS-2810
#CiscoLive
Cisco Webex App
https://ciscolive.ciscoevents.com/
ciscolivebot/#BRKENS-2810
Questions?
Use Cisco Webex App to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
• Why Cisco SD-Access LISP?
• Roles and Terminology
BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Why Cisco
SD-Access LISP?
Intent-Driven Automation
Standardized templates for consistent implementation
Configuration workflows to drive intent
BRKENS-2810 5
Intent-Driven Automation
Automation with highly flexible scale
Best practice configurations curated Simple UI based guided workflow Configure multiple devices
and validated extensively for each for the administrator to deploy across or within a site in
workflow. with a few clicks. one-go!
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
SD-Access Zero-Trust Workplace
Based on the Organization’s goal, explore 3 Pillars of SD-Access Zero Trust Workplace:
and achieve Zero Trust for workplace. Visibility, Segmentation, and Trust.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Attribute-Based Policy and Segmentation
Catalyst Center and ISE integration facilitates automated configuration and segmentation at
scale
Catalyst Center
and ISE Integration
Trust
Configure
Context ISE
Automated configuration and segmentation policies
paired with scalable onboarding of endpoints.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Attribute-Based Policy and Segmentation
Centralize policy definition on ISE for wired and wireless endpoints
Classification
Enforcement
Catalyst Center
and ISE Integration
Context
Catalyst Center
802.1x, MAB, WebAuth
and ISE Integration
Trust
Dynamically onboard end users and devices,
Configure assign Security Group Tags, and create
ISE
policies aka Microsegmentation in
Context SD-Access.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Attribute-Based Policy and Segmentation Additional
Information
Catalyst Center
and ISE Integration
Use Group Based Policy
Trust Analytics application to model
Configure
policies and deploy to the
ISE
network when you are ready.
Context
Scanner
SGT: 8 (OT)
AAA
Profile, Trust
Score, ANC Policy
ISE
Unknown
Context, Auth Endpoint
status, Auth
EA profile, SGT
Known
Endpoint
Campus =
People + Things
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Tailormade for Campus Networks
Seamless and secure mobility of endpoints (Wired use-case)
L3 ROUTED ACCESS
Wired Endpoint
Wired Endpoint
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Tailormade for Campus Networks
Seamless and secure mobility of endpoints (Wireless use-case)
No hairpinning of
client traffic to
WLC
Wireless user
Wireless user
BRKENS-2810 16
AI-Driven Insights and Telemetry
The more you know!
End user insights Network health and status Application Visibility & Performance
WAN
Onboarding, Connectivity, IPv4/v6, Site Health, System Health, Topology, Application Usage/Throughput, Business Relevant
Device Type, MAC, VLAN, Trust Score etc. Issues and Suggested Actions Application Health, Integrations, Trends
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Roles and
Terminology
1. Concepts
2. SD-Access Roles
3. Fabric Constructs
Underlay and Overlay
Generally Speaking
Destination Address
Source Address
Destination Address
Source Address
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Underlay and Overlay
Generally Speaking
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Underlay and Overlay
But why?
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Underlay and Overlay
But why?
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Underlay and Overlay
But why?
Network
Segment C
Network
Segment B
Network
Segment A
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Underlay and Overlay
In context of Cisco SD-Access
Mapping Database System
EID RLOC
Control Plane
1.1.1.1 2.2.2.2
RLOC: 2.2.2.2
(Routing Locator)
EID
(Endpoint
Identifier)
1.1.1.1
EID RLOC
1.1.1.1 ---
User/Device Identity =
IP address (EID 1.1.1.1) + RLOC (2.2.2.2)
EID RLOC
Control Plane
I would like to talk 1.1.1.1 2.2.2.2
to host 3.3.3.3
3.3.3.3 4.4.4.4
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
What is an SD-Access Fabric Site?
Definition and more
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Roles and
Terminology
1. Concepts
2. SD-Access Roles
3. Fabric Constructs
Cisco SD-Access Roles
Key Roles for a Complete Wired and Wireless Campus Experience
Border Nodes
Connects external L3 and L2 networks to the Cisco SD-
Access fabric.
Edge Nodes
Connects wired endpoints to the Cisco SD-Access fabric
and optionally enforces micro-segmentation policy.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Cisco SD-Access Roles
Key Roles for a Complete Wired and Wireless Campus Experience
Border Nodes
Connects external L3 and L2 networks to the Cisco SD-
Access fabric.
Edge Nodes
Connects wired endpoints and Fabric APs to the Cisco SD-
Access fabric and optionally enforces micro-segmentation
policy.
Fabric Wireless Controller
Fabric WLC is integrated into the SD-Access Control Plane
(LISP) communication.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Cisco SD-Access Roles Additional
Information
Extended Nodes
A switch operating at Layer 2 that extends fabric
connectivity and optionally enforces micro-
segmentation policy.
Intermediate Nodes
Moves data between fabric nodes. Can be one or
many hops. Part of the underlay.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Cisco SD-Access Roles Additional
Information
Border Node, Control Plane Node, Fabric Edge Node, and Embedded Wireless
Controller.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Edge Node Host Tracking Database
Map-Register to CP
Authenticate and RLOC (10.10.10.20/32 is
Authorize Endpoints 2.2.2.2 connected to me!)
Anycast Gateway
10.10.10.1/24 EID Table
VLAN 10
EID RLOC
10.10.10.20 ---
John Ethernet IP Payload
SGT: Employee AA:BB:CC ---
10.10.10.20/32
AA:BB:CC/48
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Cisco SD-Access Fabric Additional
Information
IP - 1.2.3.4/32
MAC – AA:BB:CC
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Control Plane Node
Maintains Host Tracking Database containing Endpoint Attribute to Location Mapping
Host Tracking Database
Data Center
Pub/Sub
Register/update
Wireless EID
Register EID
Internet
10.10.10.20/32
AA:BB:CC/48
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Cisco SD-Access Fabric Additional
Information
Control Plane Node Maintains a Host Tracking Database to Map Location Information
External Network
Border Nodes connect external L3 and L2 networks to the Cisco SD-Access fabric.
As a result, performs VXLAN encapsulation and decapsulation.
There are 4 types of Border Nodes.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Cisco SD-Access Fabric
External Border Node
Internet/
Rest of the network
• The most common configuration.
• Exports all fabric subnets to outside
the Fabric Site as eBGP summary
routes.
• Does not register IP prefixes from
outside the Fabric Site into the
fabric Control Plane.
• Acts as a gateway of last resort for
the Fabric Site.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Cisco SD-Access Fabric
Internal Border Node
Data Center
Shared Services
• Exports all fabric subnets to outside
the Fabric Site as eBGP summary
routes.
• Imports and registers eBGP-learned
IPv4/IPv6 prefixes from outside the
Fabric Site, into the fabric Control
Plane.
• Does not act as a gateway of last
resort for the Fabric Site.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Cisco SD-Access Fabric
Internal + External Border Node
Internet
Data Center
Shared Services
• Exports all fabric subnets to outside
the Fabric Site as eBGP summary
routes.
• Imports and registers eBGP-learned
IPv4/IPv6 prefixes from outside the
Fabric Site, into the fabric Control
Plane.
• Acts as a gateway of last resort for
the Fabric Site.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Cisco SD-Access Fabric
Layer 2 Border Node
Gateway outside
the fabric
• Acts as Layer 2 handoff for pure Layer 2 10.10.10.1/24 vlan 20
Overlays or Layer 2 + Layer 3 Overlays.
• Allows VLAN translation between Traditional
vlan 100
SD-Access network segments and Switching Domain
John Kate
10.10.10.20/32 20.20.20.20/32
AA:BB:CC/48 BB:CC:DD/48
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Cisco SD-Access Fabric
Fabric Enabled Wireless Unifies Wired and Wireless Management, Policy and Data Planes
MAC – AA:BB:CC
• Fabric WLC accessible though a Fabric Ctrl: CAPWAP
hops away.
• Fabric Enabled APs reside in a dedicated IP
range and communicate with the WLC
(CAPWAP Control).
• Fabric WLC registers endpoints with the
Control Plane Node.
• Fabric APs switch endpoint traffic to the
adjacent Edge Node.
• Wireless endpoints use same data plane and
policy plane as wired endpoints.
MAC - AA:BB:CC
IP - 1.2.3.4/32
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Roles and
Terminology
1. Concepts
2. SD-Access Roles
3. Fabric Constructs
Virtual Networks
Overlay Network Virtualization, also known as Macro-segmentation.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Cisco SD-Access Fabric Additional
Information
Virtual Networks
• Layer 3 Virtual Networks use VRFs and LISP
Instance IDs to maintain separate routing
topologies.
• Endpoint IDs (IPv4/IPv6 addresses) are routed
within an L3VN.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Layer 3 Virtual Networks
Overlay Network Virtualization, also known as Macro-segmentation.
VN: INFRA_VN
VN: USER VN: INFRA_VN
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Cisco SD-Access Fabric
Host Pools Provide a Default Gateway and Basic IP Services for Endpoints
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Cisco SD-Access Fabric
Anycast Gateway Provides a Default Gateway for IP-Capable Endpoints
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Cisco SD-Access Fabric
Host Pools are “stretched” via the Overlay IP to RLOC MAC to RLOC Address Resolution
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Layer 3 Handoff
Per-Layer-3-Virtual-Network Layer 3 Handoff using Peer Device
VRF GUEST
SVI A
AF VRF GUEST
External
VRF Campus AF VRF CAMPUS Routing
VN
SVI B Domain
VN
GUEST CAMPUS VRF GRT
SVI 40 SVI 30 SVI C AF IPv4 MP-BGP
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Extranet Layer 3 Handoff
Helps achieve route-leaking natively in LISP SD-Access Fabric
VN
INFRA_VN
(Provider VN) SVI 30
SVI 40 Peer Device external
VN VN
GUEST CAMPUS to fabric
vlan vlan
(Subscriber VN) 40 30 (Subscriber VN)
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Cisco SD-Access Fabric
Layer 2 Virtual Networks
Gateway
Outside the
• By default, an L2VN is deployed with each Fabric
Anycast Gateway and Layer 2 Flooding is
disabled. Layer 2 Flooding can be enabled, if VLAN
Specialist
use-case
Gateway outside
vlan10 the fabric
VRF CAMPUS 10.10.10.1/24
SVI
vlan 10 vlan 30
vlan 10 USER A
vlan 30 USER B
3.3.3.3/24 vlan 300
3.3.3.5/24
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Cisco SD-Access Fabric
A Security Group Tag Assigns a “Group” to Each Endpoint
10
• SGTs can be extended to numerous other
Encap with SGT info
networking technologies e.g., Cisco Encap with
Secure Firewall, Cisco SD-WAN, some USER C
SGT info
1. Control Plane
2. Data Plane
3. Policy Plane
Cisco SD-Access Fabric
Control Plane: Locator/ID Separation Protocol (LISP)
User: John
IP: 4.4.4.4/32
VN: Campus
RLOC:3.3.3.3
can change, but who you
are in the network remains RLOC:1.1.1.1 RLOC:2.2.2.2
the same.
User: John
IP: 4.4.4.4/32
VN: Campus User: John
SGT: 25 IP: 4.4.4.4/32
VN: Campus
(IETF Standards Track RFC9300-RFC9305 and Informational RFC9299) SGT: 25
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Cisco SD-Access Fabric
Why LISP?
Scalable Pull model • No massive routing tables • Creates ‘DNS’ for routing •
Conversational learning Massive Scalability • BGP and IGPs cannot scale like LISP • Purpose-built for
scale (DFZ was the impetuous for LISP)
Efficient Address-Family Agnostic • Supports
IPv4, IPv6, and MAC Address Families • Wired and Wireless Unification • WLC participates in LISP
control plane communication. • Wired and Wireless endpoints have policy applied at same point in the
network. Host Mobility • Native support for this capability • Wired and Wireless Extensibility • LISP
Canonical Address Format (LCAF) allows for encoding of additional information beyond simply
Address-Families.
Extensible
enhanced for the last ten years.
LISP has been actively developed, optimized, and
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Cisco SD-Access Fabric Additional
Information
Why LISP?
• Optimised resource usage on Edge Nodes:
• “Pull” only the information needed, like DNS. By comparison BGP pushes
all routing information to all Edge Nodes.
• Underlay network is simple and stable:
• IGP routing from Border Node to Edge Node. Maybe PIM. No L2, no
VLANs, no link bundling, no STP, no MPLS.
• Unified wired and wireless data plane and policy plane.
• No wireless concentrator bottleneck = higher throughput.
• Receive future innovations in later SD-Access + IOS XE releases.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Cisco SD-Access Fabric
Control Plane: Locator/ID Separation Protocol (LISP)
LISP Pub/Sub
Released with Catalyst Center 2.2.3.x.
Reliable and stable.
2022 Native LISP transport.
Less Control Plane load.
Faster convergence.
Highly extensible.
LISP/BGP
Reliable and stable. Subscribe
BGP transport.
Publish Publisher
Subscriber
2017 (IID)
Other
EID RLOC Attributes
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Fabric Operation
Default ETR Registration
0.0.0.0/0
10.0.0.0/8
192.168.0.0/16 External Border Node
Etc.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Fabric Operation
Next
Default ETR Registration Destination IID
Hop
Default ETR 1001 --
Default ETR 1002 --
0.0.0.0/0
10.0.0.0/8
192.168.0.0/16 BGP
External Border Node
Etc. Static
Etc.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Fabric Operation
Next Next
Default ETR Registration Destination IID
Hop
Destination IID
Hop
Default ETR 1001 -- Default ETR 1001 BN1
Default ETR 1002 -- Default ETR 1002 BN1
0.0.0.0/0
10.0.0.0/8
192.168.0.0/16 BGP Register Default ETR per
Etc. Static L3VN (Gateway of last
Etc. resort)
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Fabric Operation
Next Next
Edge Node Bootstrap Destination IID
Hop
Destination IID
Hop
Default ETR 1001 -- Default ETR 1001 BN1
Default ETR 1002 -- Default ETR 1002 BN1
0.0.0.0/0
10.0.0.0/8
192.168.0.0/16 External Border Node
Etc.
Default ETR
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Fabric Operation
Next Next
Edge Node Bootstrap Destination IID
Hop
Destination IID
Hop
Default ETR 1001 -- Default ETR 1001 BN1
Default ETR 1002 -- Default ETR 1002 BN1
0.0.0.0/0
10.0.0.0/8
192.168.0.0/16 External Border Node
Etc.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Fabric Operation
Edge Node Bootstrap
✓ ✓
0.0.0.0/0
10.0.0.0/8
192.168.0.0/16 External Border Node
Etc.
✓ ✓ ✓
✓ Default ETR
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Fabric Operation
Endpoint Registration
✓ ✓
0.0.0.0/0
10.0.0.0/8
192.168.0.0/16 External Border Node
Etc.
✓ ✓ ✓
Next Next
Destination IID Destination IID
Hop Hop
2.2.2.2 1001 -- 1.1.1.1 1001 EN1
1.1.1.1 2.2.2.2
2001::1 2001::2 ✓ Default ETR
MAC: A MAC: B
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Fabric Operation
Endpoint Registration
Next
✓ ✓ Destination IID
Hop
0.0.0.0/0 1.1.1.1 1001 EN1
10.0.0.0/8 2.2.2.2 1001 EN3
192.168.0.0/16 External Border Node
Etc.
Register
✓ ✓ ✓
Next Next
Destination IID Destination IID
Hop Hop
2.2.2.2 1001 -- 1.1.1.1 1001 EN1
1.1.1.1 2.2.2.2
2001::1 2001::2 ✓ Default ETR
MAC: A MAC: B
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Fabric Operation
Endpoint Registration
Next
✓ ✓ Destination IID
Hop
0.0.0.0/0 1.1.1.1 1001 EN1
10.0.0.0/8 2.2.2.2 1001 EN3
192.168.0.0/16 External Border Node
Etc.
Notification
✓ ✓ ✓
1.1.1.1 2.2.2.2
2001::1 2001::2 ✓ Default ETR
MAC: A MAC: B
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Fabric Operation
Publish Destination IID
Next
Hop
1.1.1.1 1001 EN1 Next
✓ 2.2.2.2 1001 EN3 ✓ Destination IID
Hop
0.0.0.0/0 1.1.1.1 1001 EN1
10.0.0.0/8 Publish 2.2.2.2 1001 EN3
192.168.0.0/16 External Border Node
Etc.
✓ ✓ ✓
1.1.1.1 2.2.2.2
2001::1 2001::2 ✓ Default ETR
MAC: A MAC: B
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Fabric Operation
South to North Traffic Destination IID
Next
Hop
1.1.1.1 1001 EN1 Next
✓ 2.2.2.2 Destination IID
1001 EN3 Hop
0.0.0.0/0 1.1.1.1 1001 EN1
10.0.0.0/8 2.2.2.2 1001 EN3
192.168.0.0/16 External Border Node
Etc.
Where is Negative Map Reply
8.8.8.8? 8.0.0.0/7
✓ ✓ ✓
Dst: 8.8.8.8
Src: 2.2.2.2
1.1.1.1 2.2.2.2
2001::1 2001::2 ✓ Default ETR
MAC: A MAC: B
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Fabric Operation
South to North Traffic Destination IID
Next
Hop
1.1.1.1 1001 EN1 Next
✓ 2.2.2.2 1001 EN3 ✓ Destination IID
Hop
0.0.0.0/0 1.1.1.1 1001 EN1
10.0.0.0/8 2.2.2.2 1001 EN3
192.168.0.0/16 External Border Node
Etc.
✓ ✓ ✓
1.1.1.1 2.2.2.2
2001::1 2001::2 ✓ Default ETR
MAC: A MAC: B
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Fabric Operation
East to West Traffic Destination IID
Next
Hop
1.1.1.1 1001 EN1 Next
✓ 2.2.2.2 1001 EN3 ✓ Destination IID
Hop
0.0.0.0/0 1.1.1.1 1001 EN1
10.0.0.0/8 2.2.2.2 1001 EN3
192.168.0.0/16 External Border Node
Etc.
Where is Map Reply
1.1.1.1? 1.1.1.1 is at EN1
✓ ✓ ✓
1.1.1.1 2.2.2.2
2001::1 2001::2 ✓ Default ETR
MAC: A MAC: B
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Fabric Operation
East to West Traffic Destination IID
Next
Hop
1.1.1.1 1001 EN1 Next
✓ 2.2.2.2 1001 EN3 ✓ Destination IID
Hop
0.0.0.0/0 1.1.1.1 1001 EN1
10.0.0.0/8 2.2.2.2 1001 EN3
192.168.0.0/16 External Border Node
Etc.
✓ ✓ ✓
1.1.1.1 2.2.2.2
2001::1 2001::2 ✓ Default ETR
MAC: A MAC: B
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
LISP Pub/Sub Additional
For Your Information Information
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Fabric
Fundamentals
1. Control Plane
2. Data Plane
3. Policy Plane
Cisco SD-Access Fabric Additional
Information
Data Plane: Virtual Extensible Local Area Network (VXLAN)
vlan 10 20 30
Mobility & Multitenancy
• Restricted to L2 domain
• Geographical limitation
• 12-bit VLAN ID = 4000 VLANs
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Cisco SD-Access Fabric
Data Plane: Virtual Extensible Local Area Network (VXLAN)
IP Network
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Cisco SD-Access Fabric
Data Plane: VXLAN
ORIGINAL
ETHERNET IP PAYLOAD
PACKET
PACKET IN
ETHERNET IP UDP LISP IP PAYLOAD
LISP
Supports L2
& L3 Overlay
PACKET IN
ETHERNET IP UDP VXLAN ETHERNET IP PAYLOAD
VXLAN
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Next-Hop MAC Address
VXLAN-GPO Header
Dest. MAC 48
Source MAC 48
Checksum
Source IP 32
Src RLOC IP Address
Outer IP Header Dest. IP 32
Source Port 16 Dst RLOC IP Address
Segment ID 16
8 Bytes
Original Payload VN ID 24
Allows 16M
Reserved 8 possible VRFs
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Fabric
Fundamentals
1. Control Plane
2. Data Plane
3. Policy Plane
Cisco SD-Access Fabric
Policy Plane: Group-Based Policy
1. Control Plane: LISP
2. Data Plane: VXLAN
3. Policy Plane: Group-Based Policy
VRF + SGT
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
What is Security Group Tag and Group-Based
Policy?
Endpoints authenticated
and classified as:
Endpoint authenticated and Lighting (SGT 20)
classified as Camera (SGT 5) HVAC (SGT 30)
Destination = SGT 20
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
SD-Access Policy Additional
VN Campus
VN Campus
VN IOT
VN IOT
ISE
Cisco Catalyst Center
CLASSIFIER: PORT ACTION: DENY
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
SD-Access Policy
Group-Based Access Control Policy
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Multiple Fabrics
Transits for VN and SGT Preservation
VN1 eBGP
VN2 eBGP IP-Based Transit
VN3 eBGP
• Per-Layer-3-Virtual-Network eBGP peering to external routing
Fabric1 IP Fabric2
domain, or LISP Extranet Provider VN eBGP peering to external
routing domain.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Transits for VN and SGT Preservation
VN1 eBGP
VN2 eBGP IP-Based Transit
VN3 eBGP
• Per-Layer-3-Virtual-Network eBGP peering to external routing
Fabric1 IP Fabric2
domain, or LISP Extranet Provider VN eBGP peering to external
routing domain.
SD-Access Transit
ASN1 ASN2
• SD-Access LISP/VXLAN between Fabric Sites.
IP
Fabric1 Fabric2
• Preserves Layer 3 Virtual Networks and SGT.
• Fabric as a transit between external routing domains.
FabricN
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Global Partner Solution Advisors
NEW - Fully Virtualized, SD-Access Secure Campus Lab
Virtualized SD-Access Lab CTF Mission Contact
• Fully Customizable Topology with • Experience the SD-Access Virtual • GPSA is your source for no-
virtualized 9kv’s and 8kv’s Lab at Capture the Flag in The World cost, partner enabment and
• Access on dCloud or build on your of Solutions practice building!
existing Data Center • Use Cases – Fabric Sites and Virtual • Visit the Global Partner
• Fraction of the cost Network Provisioning, Fusion Experience booth (4227) across
• GPSA mentored lab buildout Automation, Extranet, Micro from Capture the Flag, for more
support available! Segmentation, and more! information.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Effortlessly Deploy Your Fabric of Choice
LISP Fabric is the leading choice for Enterprise customers!
• Network segmentation
+ 66% 1.8M+
API (YoY) Devices
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
SD-Access LISP Customer Success
Healthcare Education + Energy Manufacturing
SCALE
5300 devices 6200 devices 6500 devices 5300 devices 4500 devices 16k devices
15K+endpoints 10K+endpoints 66K+endpoints 57K+endpoints 10K+endpoints 98K+endpoints
REQUIREMENTS
Segmentation at scale
Secure, Highly available network
Zero-Trust Network Access Automated operations
Hi performance scalable WI-FI
HIPAA Compliance APIs for Automation & Tool Integration
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Cisco Live US SD-Access and ISE Learning Map
BU-led sessions
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Cisco SD-Access Collaterals
Cisco Software-Defined Access Cisco Software-Defined Access Cisco Solution Validated Profiles (CVPs)
for Industry Verticals Enabling intent-based networking
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Complete Your Session Evaluations
Earn 100 points per survey completed and compete on the Cisco Live
Challenge leaderboard.
#CiscoLive BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
• Visit the Cisco Showcase
for related demos
BRKENS-2810 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Thank you
#CiscoLive