DNA Udemy02a
DNA Udemy02a
•
TCP
MSS
•
•
Physical Network Topology
•
•
•
•
www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/routed-
ex.html
IP Addressing for Underlay and Overlay
•
Segmentation- Default schema
•
•
Location of Shared Services Infrastructure
DHCP NT
Server P
Server
Location of Shared Services Infrastructure
•
•
Features enabled today
•
Move the features to different points in
the fabric network
•
•
QoS,
NetFlow
, IP
ACLs
Two Basic Types of Deployments
Collapsed
Core
Access
Layer
Two Basic Approaches to Migration
Deployment
Incremental (one at a time)
Deployment
Migration Approaches: Parallel vs Incremental
IMPLEMENTATION RESOURCES
RESOURCES IMPLEMENTATION
Parallel Install not feasible for Campus
Networks
DDI
MPLS MPLS I-NET
Branch IWAN DC IWAN Internet
Parallel Install for Branch Networks
MPLS I-NET
DDI
Branch IWAN
Cisco SD-Access Migration
C B
•
Considerations for using new subnets to transition
•
Before After
10.10.1.0/24 10.10.4.0/24 10.10.7.0/24
Network
L3 link
L2 Link
Connecting Default Fabric Border
• Option 1: Reconfigure Existing Core
External
You can reuse an existing Core Network C B
switch if it supports Fabric
functionality
External
Network
C B
Prepping the Switch
C B
•
•
•
•
•
•
•
Getting Started Steps – ISIS as an IGP
C B
IP Network
IP Network
3 4
Device Inventory: Assign Device Roles
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Network Topology
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Existing Network Topology
WAN Edge MERCURY POSEIDON
TACAMO
Distribution PROWLER INTRUDER
Access
VAMPIRE-2 VAMPIRE-3
Design Module
Design Module
1
BRKCRS-2812
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Design Module: Network Settings
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Design Module: Network Settings
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Design Module: User Credentials Device
Access
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Minimum number of IP Pools
•
1
2
3
4
5
6
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
1
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Policy Module
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Provision Module
2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
1
2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Provision only the potential Fabric Nodes
MERCURY POSEIDON
SANDY FIDDLER
TACAMO
PROWLER INTRUDER
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Provision Network Nodes
1
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Provision Network Nodes
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Provision Network Nodes: Success
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Add Fabric Domain
1
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Name Fabric Domain
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Add IP Transit
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
IP Transit Area Created
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Add Fabric Site to Fabric Domain
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Fabric Site Added to Fabric Domain
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Site Topology Details
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Fabric Pre-Provision Checks
2 3
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Fabric Pre-Provision Checks
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Fabric Pre-Provisioning Checks
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Add Fabric Edge Node
2
1
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Add Fabric Border, Co-located Control Plane node
1
2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Fabric Border Node Provisioning
4 5
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Using External Interface automation @Border
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Select VNs To Extend outside fabric
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Second Interface, VNs to extend outside fabric
1
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Final Border Provisioning
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Fabric Provisioned at Site
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Fabric Edge Node Configuration
router lisp instance-id 4097
locator-table default remote-rloc-probe on-route-change
locator-set rloc_1daeaec6-1a9c-4579-9dad- service ipv4
762bac1d3723 eid-table default
IPv4-interface Loopback0 priority 10 weight 10 exit-service-
exit-locator-set ipv4 exit-
! instance-id
locator default-set rloc_1daeaec6-1a9c-4579- !
9dad-762bac1d3723 instance-id 4098
service ipv4 remote-rloc-probe
encapsulation vxlan on-route-change
itr map-resolver 192.168.1.10 service ipv4
etr map-server 192.168.1.10 key 7 03115802 eid-table vrf
etr map-server 192.168.1.10 proxy-reply DEFAULT_VN
etr map-cache
sgt 0.0.0.0/0 map-
no map-cache away-eids send-map-request request
use-petr 192.168.1.10 exit-service-
proxy-itr 192.168.1.7 ipv4
exit-service-ipv4 exit-instance-id
! !
service ethernet instance-id 4099
itr map-resolver 192.168.1.10 remote-rloc-probe
itr on-route-change
etr map-server 192.168.1.10 key 7 0106050D service ipv4
etr map-server 192.168.1.10 proxy-reply eid-table vrf
etr USERS
ipv4 source-locator Loopback0
exit-service-ethernet map-cache
exit-router-lisp
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Fabric Edge and Border Nodes VRF
Configuration
VAMPIRE-1#sh vrf
Name Default RD Protocols Interfaces
DEFAULT_VN <not set> ipv4 LI0.4098
Mgmt-vrf <not set> ipv4,ipv6 Gi0/0
USERS <not set> ipv4 LI0.4099
SANDY#sh vrf
Name Default RD Protocols Interfaces
DEFAULT_V 1:4098 ipv4 Vl3005
N Vl3001
LI0.4098
Mgmt-vrf <not set> ipv4,ipv6 Gi0/0
USERS 1:4099 ipv4 Vl3004
Vl3003
LI0.4099
Border Node Interface to External
Router Configuration
=================
SANDY#s int t1/0/7
SANDY#s int t1/0/7
Building configuration...
Building configuration...
Current configuration :
Current configuration : 41 bytes
64 bytes
!
!
interface TenGigabitEthernet1/0/7
interface
end
TenGigabitEthernet1/0/7
SANDY#s int t1/0/8
switchport mode trunk
Building configuration...
end
SANDY#s int t1/0/8
Current configuration : 41 bytes
Building configuration...
!
Current configuration : 64 bytes
interface
!
TenGigabitEthernet1/0/8
end interface TenGigabitEthernet1/0/8
switchport mode trunk
end
Fabric Border Node Interfaces to External Router
SANDY#s int vl3001 SANDY#s int vl3004
Building configuration... Building configuration...
Current configuration : 186 bytes Current configuration : 182 bytes
! !
interface Vlan3001 interface Vlan3004
description vrf interface to External router description vrf interface to External router
vrf forwarding DEFAULT_VN vrf forwarding USERS
ip address 172.16.0.1 255.255.255.252 ip address 172.16.0.13 255.255.255.252
no ip redirects no ip redirects
ip route-cache same-interface ip route-cache same-interface
end end
1 2
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Select VN for associating IP Pool
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
IP Pool association to VN
1 2 3 4
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
IP Pool associated to USERS
VN
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Fabric Provision: Configuration on Fabric
Edge
VAMPIRE-1#sh vrf
Name Default RD Protocols Interfaces
DEFAULT_VN <not set> ipv4 LI0.4098
Mgmt-vrf <not set> ipv4,ipv6 Gi0/0
USERS <not set> ipv4 LI0.4099
Vl1021
VAMPIRE-1#s int vl1021
Building configuration...
Current configuration : 285 bytes
!
interface Vlan1021
description Configured from apic-em
mac-address 0000.0c9f.f45c
vrf forwarding USERS
ip address 172.16.15.254 255.255.248.0
ip helper-address 192.168.4.1
no ip redirects
ip route-cache same-interface
no lisp mobility liveness test
lisp mobility USERS
end
Fabric Provision: Configuration on Fabric Edge
VAMPIRE-1#s | sec lisp
no lisp mobility liveness test
lisp mobility USERS
router lisp
locator-table default
<snip …… snip>
exit-locator-set
!
instance-id 4099
remote-rloc-probe on-route-change
dynamic-eid USERS
database-mapping 172.16.8.0/21
locator-set rloc_1daeaec6-1a9c-
4579-9dad-762bac1d3723
exit-dynamic-eid
!
service ipv4
eid-table vrf USERS
map-cache 0.0.0.0/0 map-request
exit-service-ipv4
exit-instance-id
!
instance-id 8188
remote-rloc-probe on-route-change
service ethernet
eid-table vlan 1021
database-mapping mac locator-set
rloc_1daeaec6-1a9c-4579-9dad-
762bac1d3723
Fabric Provision: Configuration on Control Plane Node
1 2
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Fabric Edge Node: Static Port-to-VN/SGT
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Fabric Edge Node: Static
Port-to-VN/SGT
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Fabric Edge Node: Static Port-to-VN/SGT
POSEIDON#sh ip bgp su
BGP router identifier 192.168.1.2, local AS number 65002
<snip …. snip>
BGP activity 2/0 prefixes, 2/0 paths, scan interval 60 secs
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Host Details in Traditional Network
10.1.51.2
Current State of the Network & Future
MERCURY POSEIDON
B C
SANDY FIDDLER
TACAMO
PROWLER INTRUDER
B C
SANDY FIDDLER
TACAMO
PROWLER INTRUDER
B C
SANDY FIDDLER
TACAMO
PROWLER INTRUDER
B C B C
SANDY FIDDLER
TACAMO
PROWLER INTRUDER
B C B C
SANDY FIDDLER
TACAMO
PROWLER INTRUDER
Configure Fabric Edge on Access
MERCURY POSEIDON
B C B C
SANDY FIDDLER
TACAMO
PROWLER INTRUDER
VAMPIRE-1
Distribute Control Plane node for Scale
MERCURY POSEIDON
B B
SANDY FIDDLER
TACAMO C C
PROWLER INTRUDER
C B
Existing IP
Network
Edge
(underlay) Border/Control Existing Campus
Plane Node and External
Nodes
Network
Network B
C B C
10.1.1.0/24
10.1.1.0/24 VLAN 1021 L2 VNI = 8188 VLAN10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Migrating to Cisco SD-Access retaining existing
subnets
External
Network B
C B C
Map Vlan10 to same L2 VNI as
8188 on Fabric Border node
10.1.1.0/24
10.1.1.0/24 VLAN 1021 L2 VNI = 8188 VLAN10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Migrating to Cisco SD-Access retaining
existing subnets
External
Network
C B C B Internal + External
L2 L2 Handoff
In-system
redundancy
only
10.1.1.0/24
10.1.1.0/24 VLAN 1021 L2 VNI = 8188 VLAN10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Migrating to SD-Access retaining existing subnet
External
Network B
C B C Local EID scale of 4K Endpoints
L2
Border can only onboard 4K
Endpoints in Legacy Network
10.1.1.0/24
10.1.1.0/24 VLAN 1021 L2 VNI = 8188 VLAN10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Migrating to SD-Access retaining existing subnets
External
Network B
C B C
L2 /20, /21 subnets – maybe a couple We can bunch up a
VLANs can be onboarded PER lot with /24 VLANs
Border
10.1.1.0/24
10.1.1.0/24 VLAN 1021 L2 VNI = 8188 VLAN10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Separate L2 Border recommendation
External
Network B
C B C
L2
L2 Border (separate)
for smaller impact
domain, and scale
10.1.1.0/24
10.1.1.0/24 VLAN 1021 L2 VNI = 8188 VLAN10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Separate L2 Border recommendation
External
Network B L2
C B C 10.1.0.0/20
4K EIDs from VLAN10
VLAN10
L2
10.2.0.0/20 4K EIDs from VLAN20
VLAN20
Network B
C B C
L2
10.1.0.0/20
VLAN10
10.1.0.0/20
10.1.0.0/20 VLAN 1021 L2 VNI = 8188
VLAN10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
End-to-End SD-Access, Repurpose L2 Border
External
Network B
C B C
131
no switchport no switchport
ip address 192.168.2.82 255.255.255.252 ip address 192.168.2.78 255.255.255.252
ip pim sparse-mode ip pim sparse-mode
end end
L2 Border Connectivity to Intermediate Node
TACAMO#s int t1/0/1
interface TenGigabitEthernet1/0/1
no switchport
ip address 192.168.2.77 255.255.255.252
TACAMO#s int t1/0/3
ip pim sparse-mode
interface TenGigabitEthernet1/0/3
ip ospf mtu-ignore
switchport trunk allowed vlan 30*
logging event link-status
switchport mode trunk
load-interval 30
end
end
TACAMO#s int t1/0/4
TACAMO#s int t1/0/2
Building configuration...
interface TenGigabitEthernet1/0/2
interface
no switchport
TenGigabitEthernet1/0/4
ip address 192.168.2.81 255.255.255.252
switchport trunk allowed
ip pim sparse-mode
vlan 30*
ip ospf mtu-ignore switchport mode trunk
logging event link-status
end
load-interval 30
end
Design: Define Existing Subnet as an IP
Pool
2
3
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
Design: Reserve the IP Pool at Site Level
2
3
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
Site-Level IP
Pool
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Provision L2 Border
2
1
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
This has to be simultaneous from here on…..
SINGLE PHASE
FROM NOW ON
HERE
Shutdown Existing SVI on Intermediate
Nodes
PROWLER#sh standby br
Interface Grp Pri P State Active Standby Virtual IP
Vl10 1 110 P Active local 10.1.49.253 10.1.49.254
Vl20 1 110 P Active local 10.1.50.253 10.1.50.254
Vl30 1 110 P Active local 10.1.51.253 10.1.51.254
PROWLER#conf t
Enter configuration commands, one per line. End with CNTL/Z.
PROWLER(config)#int ra vl20, vl30
PROWLER(config-if-range)#shut
PROWLER(config-if-range)#
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
Add Existing subnet to USERS VN
1 2 3
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
Legacy Subnet Provisioning on Fabric Edge
VAMPIRE-1#sh vrf
Name Default RD Protocols Interfaces
USERS <not set> ipv4 LI0.4099
Vl1021
Vl1022
VAMPIRE-1#s int vl1022
Building configuration...
Current configuration : 293 bytes
!
interface Vlan1022
description Configured from apic-em
mac-address 0000.0c9f.f45d
vrf forwarding USERS
ip address 10.1.51.254 255.255.255.0
ip helper-address 192.168.4.1
no ip redirects
ip route-cache same-interface
no lisp mobility liveness test
lisp mobility PHNX_TEMP_USERS
end
Fabric Edge Configuration modification
VAMPIRE-1#s | sec lisp
router lisp
locator-table default
instance-id 4099
remote-rloc-probe on-route-change
dynamic-eid PHNX_TEMP_USERS
database-mapping 10.1.51.0/24 locator-set rloc_1daeaec6-1a9c-4579-9dad-762bac1d3723
exit-dynamic-eid
!
exit-instance-id
!
instance-id 8189
remote-rloc-probe on-route-change
service ethernet
eid-table vlan 1022
database-mapping mac locator-set rloc_1daeaec6-1a9c-4579-9dad-762bac1d3723
exit-service-ethernet
!
exit-instance-id
Fabric Border Configuration modification
SANDY#s | sec lisp
router lisp
locator-table default
!
instance-id 4099
remote-rloc-probe on-route-change
service ipv4 router bgp 65001
eid-table vrf USERS bgp router-id interface Loopback0
route-export site-registrations !
distance site-registrations address-family ipv4 vrf USERS
250 map-cache site- bgp aggregate-timer 0
network 10.1.51.254 mask
registration
255.255.255.255
exit-service-ipv4 aggregate-address 10.1.51.0
! 255.255.255.0 summary-only
exit-instance-id
!
site site_uci
description map-server
configured
eid-record from
instance-id
apic-em4099 10.1.51.0/24 accept-more-specifics
authentication-key 7 06130C28
eid-record instance-id 8189 any-mac
exit-site
Add L2 Border into SD-Access fabric
1
2
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
Layer 2 Handoff on L2 Border (Internal)
1
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
Map Existing VLAN to Subnet in SD-
Access
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Configure L2 Border
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Current State of Network
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
VN, VLAN creation on L2 Border
TACAMO#sh vrf
Name Default RD Protocols Interfaces
DEFAULT_VN 1:4098 ipv4 LI0.4098
Mgmt-vrf <not set> ipv4,ipv6 Gi0/0
USERS 1:4099 ipv4 Vl30
Lo1023
Lo1021
LI0.4099
TACAMO#s int vl30
interface Vlan30
description Configured from apic-em
mac-address 0000.0c9f.f45d
vrf forwarding USERS
ip address 10.1.51.254 255.255.255.0
ip helper-address 192.168.4.1
no ip redirects
ip route-cache same-interface
no lisp mobility liveness test
lisp mobility PHNX_TEMP_USERS
end
Fabric Configuration on L2 Border
TACAMO#s | sec lisp
router lisp
locator-table default
locator-set rloc_0d8b4ebb-e80e-4e2b-84b1-b2e1330d9f3e
IPv4-interface Loopback0 priority 10 weight 10
auto-discover-
rlocs exit-
locator-set
!
service ipv4
encapsulation vxlan
itr map-resolver
192.168.1.10
etr map-server
192.168.1.10 key 7
1310141B
etr map-server
192.168.1.10 proxy-
reply
etr
sgt
no map-cache away-eids send-map-request
use-petr 192.168.1.10
proxy-itr 192.168.1.15
exit-service-ipv4
!
service ethernet
itr map-resolver 192.168.1.10
Map VLAN to L2 VNI on L2 Border
instance-id 4097
remote-rloc-probe on-route-change
service ipv4
eid-table default
route-import map-cache bgp 65001 route-map permit-all-eids
exit-service-ipv4
<snip ……… snip>
instance-id 4099
remote-rloc-
probe on-route-
change
dynamic-eid
PHNX_TEMP_USERS
database-
mapping
10.1.51.0/24
locator-set
rloc_0d8b4ebb-
e80e-4e2b-
84b1-
b2e1330d9f3e
exit-dynamic-
eid
!
service ipv4
eid-table vrf
USERS
map-cache
0.0.0.0/0 map-
exit-instance-id
Endpoint (Legacy) Registration in Host Database
SANDY#sh lisp site instance 4099
LISP Site Registration Information
Site Name Last Up Who Last Inst EID Prefix
Register Registered ID
site_uci never no -- 4099 0.0.0.0/0
never no -- 4099 10.1.50.0/24
never no -- 4099 10.1.51.0/24
00:09:40 yes# 192.168.1.15:15912 4099 10.1.51.2/32
never no -- 4099 172.16.8.0/21
1
2
3
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Fabric Edge Configuration for Host On-
boarding
VAMPIRE-1#s int t1/0/1 VAMPIRE-1#s int vl1022
Building configuration... Building configuration...
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
East-West: Hosts in same subnet, inside
and outside fabric
10.1.51.2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Hosts on Fabric Edge, and L2 Border
VAMPIRE-1#sh lisp ins 4099 dyna summ
Dyn-EID Name Dynamic-EID Interface Uptime Last Pending
Packet Ping Count
PHNX_TEMP_USERS 10.1.51.3 Vl1022 00:06:39 00:06:39 0
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
East-West: Hosts in same subnet, inside and outside
fabric
10.1.51.2
Enable Layer 2 Flooding
between Legacy and
fabric
Pre-requisite: ASM in underlay (Manual)
interface Loopback0
ip address 192.168.1.15 255.255.255.255
ip pim sparse-mode
ip ospf network point-to-point
!
interface TenGigabitEthernet1/0/1
no switchport
ip address 192.168.2.77 255.255.255.252
ip pim sparse-mode
ip ospf mtu-ignore
logging event link-status
load-interval 30
!
interface TenGigabitEthernet1/0/2
no switchport
ip address 192.168.2.81 255.255.255.252
ip pim sparse-mode
ip ospf mtu-ignore
logging event link-status
load-interval 30
end
!
ip pim rp-address
192.168.100.1
Multicast RP Configuration in Underlay
(Manual)
RP RP
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
Enable Layer 2 flooding
Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
Configuration for Layer 2 flooding
Fabric Edge
instance-id 8189
remote-rloc-probe on-route-change
service ethernet
eid-table vlan 1022
broadcast-underlay 239.0.0.2
database-mapping mac locator-set rloc_1daeaec<snip>1d3723
exit-service-ethernet
Layer 2 Border
instance-id 8189
remote-rloc-probe on-route-change
service ethernet
eid-table vlan 30 166
broadcast-underlay 239.0.0.2
database-mapping mac locator-set rloc_0d8b4ebb<snip>30d9f3e
exit-service-ethernet
Multicast Outputs – Default
State
TACAMO#sh ip pim rp
Group: 239.0.0.2, RP: 192.168.100.1, uptime 5d21h, expires never
VAMPIRE-1#sh ip pim rp
Group: 239.0.0.2, RP: 192.168.100.1, uptime 5d21h, expires never
VAMPIRE-1#mr 239.0.0.2
(*, 239.0.0.2), 5d21h/stopped, RP 192.168.100.1, flags: SJC
Incoming interface: TenGigabitEthernet1/1/1, RPF nbr 192.168.2.62
Outgoing interface list:
Tunnel0, Forward/Sparse-Dense, 5d21h/00:01:53
PROWLER#mr 239.0.0.2
(*, 239.0.0.2), 5d19h/00:03:17, RP 192.168.100.1, flags: S
Incoming interface: Null, RPF nbr 0.0.0.0
Outgoing interface list:
TenGigabitEthernet1/0/8, Forward/Sparse, 5d19h/00:03:17
Multicast Outputs – Broadcast traffic ON -
Source
• VAMPIRE-1#mr 239.0.0.2
• (*, 239.0.0.2), 5d21h/stopped, RP 192.168.100.1, flags: SJCF
• Incoming interface: TenGigabitEthernet1/1/1, RPF nbr 192.168.2.62 Outgoing
interface list:
• Tunnel0, Forward/Sparse-Dense, 5d21h/00:02:02
INTRUDER#mr 239.0.0.2
(*, 239.0.0.2), 5d22h/00:03:20, RP 192.168.100.1, flags: S
Incoming interface: Null, RPF nbr 0.0.0.0
Outgoing interface list:
TenGigabitEthernet1/0/6, Forward/Sparse, 5d22h/00:03:20
•
174
Routed Access Migration to Cisco SD-Access
External
• Network
C B
•
175
•
10.1.1.0/24 10.1.2.0/24
VLAN 1021 VLAN 20
Routed Access Migration to Cisco SD-
Access
External
• Network
C B C B
176
•
10.1.2.0/24 10.1.1.0/24 10.1.1.0/24 10.1.2.0/24
VLAN 1022 VLAN 1021 VLAN 1021 VLAN 1022
Migrating Wireless into
Cisco SD-Access
Cisco SD-Access Wireless Adoption
• Greenfield Building
ISE / AD
B C B C
Full Cisco SD-Access Wireless value
VXLAN tunnel to
Cisco DNA Center and NDP for Automation & Assurance
SD-Access Guest FB Virtual Networks for Segmentation (ex Employee, IoT, Guest)
Fabric ISE for SGT Access Control within VRF (ex. Contractor, BYOD,
VXLAN
Employees)
(Data) Subnet extension across Campus with distributed data plane
Fabric building Optimized path for Guest and no Anchor WLC
And more…
Fabric APs
SSID
SSID
Blizzard
Guest
CAPWAP Control
VXLAN
BYOD Contractor Employee
Migrating to Cisco SD-Access Wireless
from CUWN
Datacente
r DHCP ISE
Non Fabric
Cisco Prime
W LC
Non Fabric
Cisco SD-Access Wireless Adoption
• Migration for an existing CUWN deployment
Non Fabric
Bldg 1
Bldg 2 C W LC
CAPW AP B
SD Fabric
Non Fabric
Bldg 1
No seamless
roaming
Bldg 2 VXLAN C
(Data)
CAPWAP Cntrl B
SD Fabric
SDA WLC
181
1 Add a dedicated WLC for Cisco SD-Access and configure it with same SSIDs
2 on CUWN WLC, configure the APs in the area to join the new Fabric WLC
Non Fabric
Bldg 1
No seamless
roaming
Bldg 2 VXLAN C W LC
(Data)
CAPWAP Cntrl B
SD Fabric
SDA WLC
Recommendations
Prime for CUWN areas, Cisco DNAC for SDA areas Same RF Groups for CUWN WLC and SDA WLC
Dedicated WLC for Cisco SD-Access Wireless WLCs in different Mobility Group (no seamless
roaming between areas)
Same SSIDs on Fabric and non-Fabric
Proof of Concept,
Production roll-out
Ways to build a PoC
• 184
Connect PoC to
Production
External
Network B
B
Fusion
Router
C
185
Layer-3 Routing Protocol Normalization to
IGP
External
B
Network
Redistribute eBGP to
OSPF/EIGRP
C
eBGP ISIS/OSPF
B
EIGRP/OSPF C
Key Takeaways
Key
•
Takeaways
•
•
•
•
•
•
•
•
Agenda
• LAN Automation Overview
• Network Planning
• Underlay Network Design
• Underlay Network Provisioning
• Conclusion
LAN Automation
Software Defined Access
Core
Dist
Access
Core
Core
Dist
Access
✅
✅
✅
Verify Network Design Sites across geographic Discover Network devices Dynamic automation
Verify System support Global network services Physical Topology Optimized routing design
Prepare IP Services Design IP Address Pools Network Readiness Resilient underlay settings
4 Step Process
SDA Ready Network
LAN Automation
Step – 1 : Plan
Plan Design Discover Provision
Core Core
PnP Agent
PnP-Agent
PnP Agent
LAN Automation Block
PnP-Agent Device
Seed Device
Catalyst switch with factory-default
Intermediate system(s) between Core and settings and waiting at startup-wizard
new network block state
Key system to discover, automate and on- Interconnect between Seed and
board new Catalyst switches in network another
PnP-Agent device in the network
Plan Design Discover Provision
Core
2 Tier – Collapsed Core Design 3 Tier – Campus Design Extended Campus Design
P n P A g ent P n P A g ent
P n P A g ent
Core
2 Tier – Collapsed Core 3 Tier – Campus Design
Design
PnP Agent PnP Agent PnP Agent PnP Agent PnP Agent PnP Agent
Access
Underlay Network Discovery Flexible Discovery Support
Dynamic and on-demand network discovery Flexible Multi-tier network topologies support
process – Two or Three-Tier Designs
Seed system programmed to on-board new Day-2 LAN Automation support for new
Catalyst switches with zero configurations systems in P2P topologies
Layer 3
Layer 2
LAN Automation Boundary
Plan Design Discover Provision
Core
2 Tier – Collapsed Core Design 3 Tier – Campus Design
PnP Agent PnP Agent PnP Agent PnP Agent PnP Agent PnP Agent
Access
Distribution Seed Catalyst 9500 | 9400 | 3850 | 6800 Core Seed Catalyst 9500 | 9400 | 3850 | 6800
Access PnP Agent Catalyst 9400 | 9300 | 4500E | 3850 | 3650 Distribution PnP Agent Catalyst 9000 | 4500E | 3850 | 3650
Access PnP Agent Catalyst 9400 | 9300 | 4500E | 3850 | 3650
Release Notes
https://
www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/software-defined-access/guide-c07-739242.html
Plan Design Discover Provision
Seed-1 Seed-2
Core
S1(config)# interface Loopback 0 S2(config)# interface Loopback 0
S1(config-if)# ip address <ip> <mask> S2(config-if)# ip address <ip> <mask>
! !
Seed Seed
Seed-1 OSPF
Core
Seed-2 OSPF
EIGR EIGR
P P
PnP Agent PnP Agent
S2(config)# router isis
S1(config)# router isis S2(config-router)# redistribute eigrp <id> metric <count>
S1(config-router)# redistribute eigrp <id> metric <count> !
! S2(config)# interface <id>
S1(config)# interface <id> S2(config-if)# description CONNECTED TO CORE
S1(config-if)# description CONNECTED TO CORE S2(config-if)# ip summary-address eigrp <AS> 10.128.0.0 255.255.0.0
S1(config-if)# ip summary-address eigrp <AS> 10.128.0.0 255.255.0.0
Seed Seed
IP Address : <IP_Address_2>
PnP Agent PnP Agent Netmask : <Mask>
Gateway : <Skip>
Static Route :
<LAN_Automation
-Net>/<mask>/G
PnP Agent PnP Agent PnP Agent
W
Core
Endpoint Integration
Seed Seed
The PnP Agent may contend for DHCP
10.128.0.0/16 IS-IS Routing Domain
address with attached Endpoints
LAN automation process may fail if the
PnP Agent PnP Agent LAN Pool is consumed by the Endpoints
connected to PnP Agents
Recommended to connect Endpoints
post successful LAN Automation
procedure
PnP Agent PnP Agent PnP Agent
✅ Verify Seed devices do not have any network address belonging to LAN Automation IP Pool
Pre-configure IS-IS routing without Area Tag. Mutual route-redistribution. No additional
✅
IS-IS routing configuration implemented.
✅ Verify SSH configuration on Seed devices is present for terminal access. Telnet is
unsupported
LAN Automation
Step – 2 : Design
Plan Design Discover Provision
Design – Overview
#CLU BRKCRS-2816 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco
20
S Public 7
Plan Design Discover Provision
Design – Overview
Plan Design Discover Provision
Plan Design Discover Provision
Gateway IP Address 4
Step- 4 Configure LAN IP Pool from Parent – Global | Area | Site level
LAN Automation
Step – 3 : Discovery
Plan Design Discover Provision
Discovery – Overview
Cisco DNA Center
Core
Core
Seed Seed
Dist
Seed Seed PnP Agent PnP Agent
Access
PnP Agent PnP Agent PnP Agent PnP Agent PnP Agent PnP Agent
Seed-1-Loopback IP
2 Assign Seed System IP Range
Seed-2-Loopback IP
✅
✅
↻
2 Update Software if needed
✅ ✅
✅ ✅
7 Hostname Settings
See Notes for more details
8 Start LAN Automation
Plan Design Discover Provision
✅
✅
✅
✅ ✅ ✅✅
✅
1 Check Discovery Status
✅ ✅
✅ ✅
✅ ✅
✅ ✅
✅
Plan Design Discover Provision
Core
Seed Seed
✅ • 34
Four simplified steps to rapidly automate large network infrastructure
• 28
✅ Automate Global or Area local system
•
24 services for consistency
•5and network
• 10 11
• 19
cisco.com/go/dna
cisco.com/go/sdaccess cisco.com/go/dnacenter
• SD-Access At-A-Glance • DNA Center At-A-Glance
•
•
SD-Access Ordering Guide
SD-Access Solution Data Sheet
cisco.com/go/cvd •
•
DNA ROI Calculator
DNA Center Data Sheet
• SD-Access Solution White Paper • SD-Access Design Guide • DNA Center 'How To' Video Resources
• SD-Access Deployment Guide
• SD-Access Segmentation Guide