Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Brkarc 2020

Download as pdf or txt
Download as pdf or txt
You are on page 1of 71

SD Access:

Troubleshooting the fabric

Jon Balewicz, Technical Leader Engineering


Michel Peters, Technical Leader Engineering

BRKARC-2020
Cisco Webex Teams

Questions?
Use Cisco Webex Teams to chat
with the speaker after the session

How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda

• Fabric
• Layer 3 forwarding
• Layer 2 forwarding
• Multicast Forwarding
• Security in the Fabric

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Fabric
The basic fabric

Control Plane Nodes CP Borders:


Border
External connectivity

Underlay

Edges: Edge_1 Edge_2


Endpoint Connectivity
Fabric devices can
have multiple roles

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
The fabric
Physical Logical
VN1 VN2

VN3 VN4

One Underlay Many Overlays


BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
SD Access Fabric Key Technologies

• Locator/ID Separation Protocol,


Control plane protocol inside the fabric
• Cisco TrustSec,
Assigning of Policy label to all packets and enforcing
• Authentication,
Assigns endpoints using Dot1x/MAB with their respective authorization profiles
and associated pools
• VXLAN,
Used for encapsulating all Dataplane traffic trough the underlay to form
the overlay networks

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
LISP Basic operation

• LISP is a routing architecture.


• LISP creates a level of indirection by using two spaces: “locators” (RLOC) and
“endpoints” (EID)
• Advertise “locators” in core routing. Removes “hosts” from routing tables. Host
prefixes moved to an alternative system database
• Routers in Underlay only need routing information to RLOC space, simplifies
Underlay network
• To get path information to end hosts, routers query locator-end host map servers.
Mapping analogous to DNS.
• Routers hold map-cache of locator-hosts.

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
LISP Device SD Access Function

ETR (Egress Tunnel Edge Device & Border Connects a LISP site to a LISP capable core network. Registers EID

ETR)
LISP Components
Router)& PETR (Proxy node prefixes with Map Server (MS). Decapsulates LISP packets received from
LISP core. PETR works on behalf of non-LISP domain and provides LISP-
non-LISP connectivity.

ITR (Ingress Tunnel Edge Device and Border Responsible for forwarding local traffic to external destinations. Resolves
Router) & node RLOC for a given destination by sending Map-request to Map Resolver.
PITR (Proxy Ingress Encapsulates traffic and send to fabric. Typically, this is a Access Layer
Tunnel Router) Switch. PITR works on behalf of non-LISP domain and provides LISP-
non-LISP connectivity.

XTR (X Tunnel Router) Edge Device When both ITR and ETR functions are handled by one router, it is called
XTR. This is typical in practice.
MR (Map Resolver) Control Plane Node Responds to Map-requests from ITR. Map-requests will be replied with a
(Negative) Map-reply or forwarded to appropriate ETR
MS (Map Server) Control Plane Node Registers EID space upon receiving Map-register messages from ETR.
Updates Map Resolver with EID and RLOC data.
MSMR (Map Server Map Control Plane Node When a device acts as both Map Server and Map Resolver, it is called
Resolver) MS MR. This is typical in practice.
EID (Endpoint ID) IP pools/End Points Endpoint Identifier. IP addresses. Hidden from core network routing table.
RLOC acts next-hop to reach EID space.
RLOC (Routing Locator) Fabric Devices Routing Locator. Exists in global routing tables. Authoritative to reach EID
space. BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
LISP basic operation, registering with Map Server

RLOC EID (mac address) RLOC EID (IPv4)


CP Border
Edge_1 0050.5692.6d39 Edge_1 192.168.1.100

Edge_2 0050.5692.9735 Edge_2 192.168.2.100

Edge_3 70e4.22e5.c4f7 Edge_3 192.168.1.101


Underlay

• Fabric devices learn the IPv4, IPv6 and Mac


addresses of attached devices Edge_1 Edge_2 Edge_3

• Fabric device register those with Map


Server if they are in the defined EID Space
• Control Plane node keeps central database
mapping all the EID to RLOC

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
LISP basic operation, resolving

RLOC EID (mac address) RLOC EID (IPv4)


CP Border
Edge_1 0050.5692.6d39 Edge_1 192.168.1.100

Edge_2 0050.5692.9735 Edge_2 192.168.2.100

Edge_3 70e4.22e5.c4f7 Edge_3 192.168.1.101


Underlay

• Endpoint 1 sends packet towards Endpoint 2


• Edge_1 initiates map request to CP node Edge_1 Edge_2 Edge_3

• CP responds to Edge_2 with map-response


containing RLOC information
• RLOC information added to map-cache
to allow traffic forwarding to Endpoint 2

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
LISP basic operation, packet forwarding

RLOC EID (mac address) RLOC EID (IPv4)


CP Border
Edge_1 0050.5692.6d39 Edge_1 192.168.1.100

Edge_2 0050.5692.9735 Edge_2 192.168.2.100

Edge_3 70e4.22e5.c4f7 Edge_3 192.168.1.101


Underlay

• Overlay traffic in SD Access is encapsulated


in vxlan and send between RLOC addresses Edge_1 Edge_2 Edge_3

• Loopback0 is typically used for RLOC


• Underlay Routing table provides reachability
for RLOC’s
• If reachability does not exist to RLOC traffic
does not get forwarded

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Data Plane
• In SD Access the entire packet is encapsulated
• VXLAN encapsulation used. Outer IP is RLOC
• VXLAN Network Identifier used for LISP instance ID
• Group Policy ID set to SGT

ORIGINAL
ETHERNET IP PAYLOAD
PACKET

Supports L2
& L3 Overlay
PACKET IN
ETHERNET IP UDP VXLAN ETHERNET IP PAYLOAD
VXLAN

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Packet Encapsulation

New Header
SGT
VXLAN Header
LISP Instance ID

Encapsulated packet

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Layer 3
Forwarding
Layer 3 in the Fabric
RLOC EID
Edge_1 192.168.1.100

Edge_2 192.168.2.100 CP Border


Edge_3 192.168.1.101

Border 10.48.91.128/25
Underlay
• All Edges use same IP for SVI (Anycast)
• Layer 3 LISP Instance ID’s are in 4000 range
• Traffic forwarding Edge_1 Edge_2 Edge_3
-> Outside Pool(other subnet):
”Routed”, Client sends to Anycast IP Mac
Forwarding done based upon destination IP
-> Inside Pool (same subnet):
“Bridged”, Client sends to Mac of Endpoint
Forwarding done based upon Mac Address

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
IP Anycast
• Every Edge Devices uses same Vlan , same IP address and same Mac Address
• Endpoints in the IP Pool(subnet) can be spread through the fabric.
• Default Gateway for Endpoint is set to Anycast IP
Edge_1#sh run int vlan 1024
interface Vlan1024
mac-address 0000.0c9f.f45f Edge_3#sh run int vlan 1024
vrf forwarding CiscoLive interface Vlan1024
mac-address 0000.0c9f.f45f
ip address 192.168.2.1 255.255.255.0
vrf forwarding CiscoLive
ip helper-address 10.48.91.148
no ip redirects ip address 192.168.2.1 255.255.255.0
ip pim sparse-mode ip helper-address 10.48.91.148
ip route-cache same-interface ip redirects
no
ip igmp version 3 ip pim sparse-mode
ip igmp explicit-tracking ip route-cache same-interface
192.168.1.1 192.168.1.1
no lisp mobility liveness test igmp version 3
ip
ip igmp explicit-tracking
lisp mobility 192_168_2_0-CiscoLive-IPV4
end no lisp mobility liveness test
lisp mobility 192_168_2_0-CiscoLive-IPV4
end 192.168.1.100 192.168.1.101

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Locally Registered Endpoints
• VN’s in SDA correlate to a VRF named as the VN Edge_1#sh ip vrf CiscoLive
Name Interfaces
• Only endpoints belonging to EID space are added CiscoLive Lo4100
to the LISP database and registered with CP Vl1022
LI0.4100
• Interface LISP 0.<instance-id> part of VRF Tu2
Vl1024

Edge_1#sh run | s instance-id 4100


instance-id 4100 EID Space
dynamic-eid 192_168_1_0-CiscoLive-IPV4
database-mapping 192.168.1.0/24 locator-set rloc_ab36f833-b546-4869-930f-578ba1cdf413
!
dynamic-eid 192_168_2_0-CiscoLive-IPV4
database-mapping 192.168.2.0/24 locator-set rloc_ab36f833-b546-4869-930f-578ba1cdf413
!
service ipv4
eid-table vrf CiscoLive
database-mapping 192.168.200.4/32 locator-set rloc_ab36f833-b546-4869-930f-578ba1cdf413
map-cache 0.0.0.0/0 map-request

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Locally Registered Endpoints
Edge_1#sh ip arp vrf CiscoLive 192.168.1.100
Protocol Address Age (min) Hardware Addr Type Interface
Internet 192.168.1.100 3 0050.5692.6d39 ARPA Vlan1022
Edge_1#sh lisp instance-id 4100 ipv4 database 192.168.1.100/32
LISP ETR IPv4 Mapping Database for EID-table vrf CiscoLive (IID 4100), LSBs: 0x1
Entries total 2, no-route 0, inactive 0
192.168.1.100/32, dynamic-eid 192_168_1_0-CiscoLive-IPV4, inherited from default
locator-set rloc_ab36f833-b546-4869-930f-578ba1cdf413
Locator Pri/Wgt Source State
172.31.255.109 10/10 cfg-intf site-self, reachable

• LISP Database registers only Learned Endpoints that are inside the EID Space
• Endpoints can be learned via ARP or DHCP Snooping
• Locator RLOC as advertised by Fabric Device registering the entry.
RLOC IP address should be advertised in Underlay network as host route

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Registration of Endpoints with Map Server (CP)
• IPv4/IPv6 Endpoints can be reached when learned by Edge and registered with CP
• Dynamic Endpoints learned via ARP and Device Tracking (DHCP/ARP)
• Once learned by Fabric Device it registered using LISP Reliable Transport with CP
Edge_1#sh lisp session
Sessions for VRF default, total: 2, established: 2
Peer State Up/Down In/Out Users
172.31.255.28:4342 Up 07:14:14 111/46 6
172.31.255.29:4342 Up 07:14:14 111/46 6

Edge_1#sh lisp instance-id 4100 ipv4 statistics | sec Map-Register


Map-Register records in/out: 0/28
Map-Server AF disabled: 0
Authentication failures: 0
Edge_1#sh lisp instance-id 4100 ipv4 statistics | sec Map-Requests
Map-Requests in/out: 9/12
Encapsulated Map-Requests in/out: 0/8
RLOC-probe Map-Requests in/out: 9/4
SMR-based Map-Requests in/out: 4/0

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Control Plane Node (MSMR)
• Control Plane Node maintains table with all EID registrations
• Redundant Control Plane node do not synchronize each other.

CP_1#sh lisp site instance-id 4100


LISP Site Registration Information
* = Some locators are down or unreachable
# = Some registrations are sourced by reliable transport

Site Name Last Up Who Last Inst EID Prefix


Register Registered ID
site_uci never no -- 4100 0.0.0.0/0
07:32:40 yes# 172.31.255.29:12616 4100 10.48.91.128/25
never no -- 4100 192.168.1.0/24
00:03:39 yes# 172.31.255.109:13974 4100 192.168.1.100/32
07:32:40 yes# 172.31.255.111:43564 4100 192.168.1.101/32
never no -- 4100 192.168.2.0/24
06:14:53 yes# 172.31.255.110:43692 4100 192.168.2.100/32

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Control Plane Node (MSMR) details on EID
CP_1#sh lisp site 192.168.1.100/32 instance-id 4100
Requested EID-prefix:
EID-prefix: 192.168.1.100/32 instance-id 4100
First registered: 00:15:25
Last registered: 00:15:25 When registered on CP
Routing table tag: 0
Origin: Dynamic, more specific of 192.168.1.0/24
Merge active: No
Proxy reply: Yes Proxy Reply -> CP will respond
TTL: 1d00h
State: complete
on behalf of registering
Registration errors:
Authentication failures: 0 ETR Information
Allowed locators mismatch: 0
ETR 172.31.255.109:13974, last registered 00:15:25, proxy-reply, map-notify
state complete, no security-capability
sourced by reliable transport
Locator Local State Pri/Wgt Scope
172.31.255.109 yes up 10/10 IPv4 none RLOC Information

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Inactive clients

• Endpoints become inactive when no longer active on the network


or roamed away to another fabric device
• Device Tracking sending regular ARP probes to ensure device reachability

Edge_1#sh lisp instance-id 4100 ipv4 database 192.168.1.100/32


LISP ETR IPv4 Mapping Database for EID-table vrf CiscoLive (IID 4100), LSBs: 0x1
Entries total 2, no-route 0, inactive 1
192.168.1.100/32, Inactive, expires: 23:58:48
Edge_1#sh lisp instance-id 4100 ipv4 away
LISP Away Table for router lisp 0 (CiscoLive) IID 4100
Prefix Producer
192.168.1.100/32 local EID
Edge_1#sh lisp instance-id 4100 ipv4 smr
LISP SMR Table for router lisp 0 (CiscoLive) IID 4100
Prefix Producer
192.168.1.100/32 away table
192.168.200.4/32 local EID

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Resolving Remote Destinations

• Map Cache checked for Destination IP match.

 Hit: traffic forwarded using cached information


 No Hit: Map request is sent to the CP node(s)
• Responses from Control Plane Nodes are cached on fabric devices
to build the map cache.
• Successful map-requests are cached with a TLL of 1 day
• Control plane node returns largest possible block containing requested EID
when sending NMR.

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Resolving Remote Destinations
Edge_2#sh lisp instance-id 4100 ipv4 map-cache
LISP IPv4 Mapping Cache for EID-table vrf CiscoLive (IID 4100), 8 entries
0.0.0.0/0, uptime: 1d03h, expires: never, via static-send-map-request
Negative cache entry, action: send-map-request
8.0.0.0/7, uptime: 00:00:04, expires: 23:59:55, via map-reply, forward-native
Encapsulating to proxy ETR
10.48.91.128/25, uptime: 00:00:16, expires: 23:59:44, via map-reply, complete
Locator Uptime State Pri/Wgt Encap-IID
172.31.255.29 00:00:16 up 10/10 -
192.168.1.0/24, uptime: 1d03h, expires: never, via dynamic-EID, send-map-request
Negative cache entry, action: send-map-request
192.168.1.100/32, uptime: 1d02h, expires: 03:39:23, via map-reply, complete
Locator Uptime State Pri/Wgt Encap-IID
172.31.255.109 20:20:36 up 10/10 -
192.168.2.0/24, uptime: 1d03h, expires: never, via dynamic-EID, send-map-request
Negative cache entry, action: send-map-request

Map Cache shows EID range, source of


cache entry and action to be taken.

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
LISP Remote forwarding on edge, more detail
• Routing table for VRF on edges show no Default Gateway or remote routes
• Entries in Database are inserted into routing table
• Remote entries in map-cache are not displayed or as Null routes
Edge_2#sh ip route vrf CiscoLive
Routing Table: CiscoLive
Gateway of last resort is not set
192.168.2.0/24 is variably subnetted, 3 subnets, 2 masks
C 192.168.2.0/24 is directly connected, Vlan1024
L 192.168.2.1/32 is directly connected, Vlan1024
l 192.168.2.100/32 [10/1] via 192.168.2.100, 2d18h, Vlan1024
192.168.200.0/32 is subnetted, 1 subnets
C 192.168.200.9 is directly connected, Loopback4100
CP_2#sh ip route vrf CiscoLive
Routing Table: CiscoLive
B 192.168.1.0/24 [200/0], 3d20h, Null0
C 192.168.1.1/32 is directly connected, Loopback1022
l 192.168.1.100/32 [250/1], 2d14h, Null0
l 192.168.1.101/32 [250/1], 2d22h, Null0

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
LISP Remote forwarding, more detail
Edge_2#sh ip cef vrf CiscoLive 192.168.1.100/32 detail
192.168.1.100/32, epoch 1, flags [subtree context, check lisp eligibility]
SC owned,sourced: LISP remote EID - locator status bits 0x00000001
LISP remote EID: 2 packets 1152 bytes fwd action encap, cfg as EID space, dynamic
EID need encap
SC inherited: LISP cfg dyn-EID - LISP configured dynamic-EID
LISP EID attributes: localEID No, c-dynEID Yes, d-dynEID No
LISP source path list
nexthop 172.31.255.109 LISP0.4100
2 IPL sources [no flags]
nexthop 172.31.255.109 LISP0.4100

• CEF gives an accurate view of forwarding


• Next Hop egressing out of LISP interface is in Underlay network
• Using “internal” keyword provides even more detail
• Show ip cef <nexthop> gives egress interface information in underlay

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
DHCP in the fabric. Quick overview
• Host sends DHCP Discover
• DHCP Snooping inserts remote agent in option 82
• DHCP Relay forwards to DHCP server through fabric,
setting giaddress to IP Anycast address
• DHCP Offer send by DHCP server to Anycast IP
address.
• Border extracts the option 82 and forwards through
fabric to the Edge who forwards it to client Anycast IP configured
as loopback (/32)
Fabric
Anycast IP
configured on
SVI Edge Border

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Option 82 Agent Remote ID Decoding

AA BB CC CC CC DD EE EE EE EE
AA = Sub option, 03 = LISP (01 = mac address, 02 = string)
BB = length of option
CCCCCCC = LISP Instance ID
DD = Address Family IPv4 = 01 IPv6 -02
EEEEEEEE =Source locator
03 08 001002 01 c0a80106
03 Sub option lisp
08 Length of option
001002 = 4098 in decimals ->LISP Instance ID 4098
01= IPV4 locator
c0.a8.01.06 = 192.168.1.6 Source locator (Loopback 0 of xTR)

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
DHCP related debugs

• Debug ip dhcp snooping


Enables showing detail with regards to DHCP snooping and
the insertion of option 82 remote circuit
• Debug ip dhcp server
Enables debug with regards to the relay function , insertion
giaddress and relay functionality to the Server
• Debug dhcp detail
Adds additional detail with regards to LISP in DHCP debugs

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
DHCP Debug – DHCP Snooping
Jan 27 18:23:14.889: DHCP_SNOOPING: received new DHCP packet from input interface
(GigabitEthernet1/0/1)
Jan 27 18:23:14.890: DHCP_SNOOPING: process new DHCP packet, message type: DHCPREQUEST,
input interface: Gi1/0/1, MAC da: ffff.ffff.ffff, MAC sa: 0050.5692.6d39, IP da:
255.255.255.255, IP sa: 0.0.0.0, DHCP ciaddr: 0.0.0.0, DHCP yiaddr: 0.0.0.0, DHCP
siaddr: 0.0.0.0, DHCP giaddr: 0.0.0.0, DHCP chaddr: 0050.5692.6d39, efp_id: 0, vlan_id:
1022
Jan 27 18:23:14.891: DHCP_SNOOPING: add relay information option.
Jan 27 18:23:14.891: DHCP_SNOOPING: Encoding opt82 CID in vlan-mod-port format
Jan 27 18:23:14.891: :VLAN case : VLAN ID 1022
Jan 27 18:23:14.891: VRF id is valid
Jan 27 18:23:14.891: LISP ID is valid, encoding RID in srloc format
Jan 27 18:23:14.892: DHCP_SNOOPING: binary dump of relay info option, length: 22 data:
0x52 0x14 0x1 0x6 0x0 0x4 0x3 0xFE 0x1 0x1 0x2 0xA 0x3 0x8 0x0 0x10 0x4 0x1 0xAC 0x1F
0xFF 0x6D
Jan 27 18:23:14.893: DHCP_SNOOPING: bridge packet get invalid mat entry:
FFFF.FFFF.FFFF, packet is flooded to ingress VLAN: (1022)
Jan 27 18:23:14.893: DHCP_SNOOPING: bridge packet send packet to cpu port: Vlan1022.

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
DHCP Debug –DHCP Relay
DHCP Relay functionality sets GI address in DHCP packet and forwards
Jan 27 18:23:14.896: DHCPD: Finding a relay for client 0050.5692.6d39 on interface
Vlan1022.
Jan 27 18:23:14.896: DHCPD : Locating relay for Subnet 192.168.1.1
Jan 27 18:23:14.896: DHCPD: there is no pool for 192.168.1.1.
Jan 27 18:23:14.896: DHCPD: Looking up binding using address 192.168.1.1
Jan 27 18:23:14.897: DHCPD: setting giaddr to 192.168.1.1.
Jan 27 18:23:14.897: DHCPD: BOOTREQUEST from 0050.5692.6d39 forwarded to 10.48.91.148.

Reply packet from DHCP server received by relay and forwarded


Jan 27 18:23:14.901: DHCPD: forwarding BOOTREPLY to client 0050.5692.6d39.
Jan 27 18:23:14.901: DHCPD: Option 125 not present in the msg.
Jan 27 18:23:14.902: DHCPD: src nbma addr as zero
Jan 27 18:23:14.902: DHCPD: ARP entry exists (192.168.1.100, 0050.5692.6d39).
Jan 27 18:23:14.902: DHCPD: egress Interfce Vlan1022
Jan 27 18:23:14.902: DHCPD: unicasting BOOTREPLY to client 0050.5692.6d39 (192.168.1.100).

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
DHCP Debug -Snooping
Jan 27 18:23:14.903: DHCP_SNOOPING: process new DHCP packet, message type: DHCPACK, input
interface: Vl1022, MAC da: 0050.5692.6d39, MAC sa: 0000.0c9f.f45d, IP da: 192.168.1.100, IP sa:
192.168.1.1, DHCP ciaddr: 0.0.0.0, DHCP yiaddr: 192.168.1.100, DHCP siaddr: 0.0.0.0, DHCP
giaddr: 192.168.1.1, DHCP chaddr: 0050.5692.6d39, efp_id: 0, vlan_id: 1022
Jan 27 18:23:14.904: DHCP_SNOOPING: binary dump of option 82, length: 22 data:
0x52 0x14 0x1 0x6 0x0 0x4 0x3 0xFE 0x1 0x1 0x2 0xA 0x3 0x8 0x0 0x10 0x4 0x1 0xAC 0x1F 0xFF 0x6D
Jan 27 18:23:14.906: DHCP_SNOOPING: binary dump of extracted circuit id, length: 8 data:
0x1 0x6 0x0 0x4 0x3 0xFE 0x1 0x1
Jan 27 18:23:14.907: DHCP_SNOOPING: binary dump of extracted remote id, length: 12 data:
0x2 0xA 0x3 0x8 0x0 0x10 0x4 0x1 0xAC 0x1F 0xFF 0x6D
Jan 27 18:23:14.909: No entry found for mac(0050.5692.6d39) vlan(1022) GigabitEthernet1/0/1
Jan 27 18:23:14.909: host tracking not found for update add dynamic (192.168.1.100, 0.0.0.0,
0050.5692.6d39) vlan(1022)
Jan 27 18:23:14.909: DHCP_SNOOPING: remove relay information option.
Jan 27 18:23:14.909: platform lookup dest vlan for input_if: Vlan1022, is NOT tunnel,
if_output: Vlan1022, if_output->vlan_id: 1022, pak->vlan_id: 1022
Jan 27 18:23:14.910: DHCP_SNOOPING: direct forward dhcp replyto output port:
GigabitEthernet1/0/1.

DHCP Snooping forwarding packet to Egress Interface


BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Layer 2
Forwarding
Layer 2 in the Fabric
EID (mac address)
0050.5692.6d39

0050.5692.9735
CP Border
70e4.22e5.c4f7

• Forwarding occurs inside an IP pool, based on Underlay


Layer 2 Mac Addressing
• Complete Ethernet frame gets encapsulated in
vxlan and transported through fabric Edge Edge
• All traffic inside an IP pool gets send via Layer 2
instances (8000 range)
• Mac Addresses are registered with CP node
• Edge Nodes resolve and cache remote mac
addresses similar as done with Layer 3.
• Layer 2 Instances are associated with the Vlan
corresponding to the SVI
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Layer 2 Modes
• Layer 2 Extension mode on Cisco DNA Center adds Layer 2 transport
through Fabric (Transports Known Unicast traffic) through Fabric
• Layer 2 Flooding mode allows flooding of selected traffic through the use
of an underlay Mcast Group (broadcast-underlay) config present in config

Edge_3#sh run | s instance-id 8190 Edge_3#sh run int vlan 1022


instance-id 8190 interface Vlan1022
remote-rloc-probe on-route-change mac-address 0000.0c9f.f45d
service ethernet vrf forwarding CiscoLive
eid-table vlan 1022 ip address 192.168.1.1 255.255.255.0
broadcast-underlay 239.0.0.3 ip helper-address 10.48.91.148
database-mapping mac locator-set rloc_88 no lisp mobility liveness test
exit-service-ethernet lisp mobility 192_168_1_0-CiscoLive-IPV4

• Traffic inside Pool send via Layer 2 , Traffic outside Layer 3 send via Layer 3

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Layer 2 Mac Address Tables
• Local clients show as Dynamic or Static for Authenticated endpoints
• Remote Mac Addresses ->CP_LEARN and port Tu0
• Anycast IP with associated Mac learned on both clients
• ARP tables on clients hold mac address of remote, traffic from client to
client is send to mac address of client
Local
Edge_3#sh mac add | inc 1022|--|Type guest@Client_3:~$ ip neig
192.168.1.100 dev eth0 lladdr 00:50:56:92:6d:39
-------------------------------------------
192.168.1.1 dev eth0 lladdr 00:00:0c:9f:f4:5d
Vlan Mac Address Type Ports
---- ----------- -------- -----
1022 0000.0c9f.f45d STATIC Vl1022 Remote
1022 58bf.eab6.4b75 STATIC Vl1022
guest@Client_1:~$ ip neig
1022 70e4.22e5.c4f7 STATIC Gi1/0/1 192.168.1.1 dev eth0 lladdr 00:00:0c:9f:f4:5d
1022 0050.5692.6d39 CP_LEARN Tu0 192.168.1.101 dev eth0 lladdr 70:e4:22:e5:c4:f7

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
LISP Local registered mac addresses

• Layer 2 LISP use show lisp instance-id <instance> ethernet commands


• Similar to IP LISP maintains local entries in a database.
• All mac addresses part of Layer 2 EID space, all mac addresses
can be learned and registered

Edge_3#sh lisp instance-id 8190 ethernet database


LISP ETR MAC Mapping Database for EID-table Vlan 1022 (IID 8190), LSBs: 0x1
Entries total 1, no-route 0, inactive 0

70e4.22e5.c4f7/48, dynamic-eid Auto-L2-group-8190, inherited from default locator-


set rloc_88efd7b1-bb88-42d7-8a3f-68e1bfe94085
Locator Pri/Wgt Source State
172.31.255.111 10/10 cfg-intf site-self, reachable

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Layer 2 Map-Cache
Edge_1#sh lisp instance-id 8190 ethernet map-cache detail
LISP MAC Mapping Cache for EID-table Vlan 1022 (IID 8190), 1 entries
70e4.22e5.c4f7/48, uptime: 04:09:04, expires: 19:50:55, via map-reply, complete
Sources: map-reply
State: complete, last modified: 04:09:04, map-source: 172.31.255.111
Idle, Packets out: 0(0 bytes)
Encapsulating dynamic-EID traffic
Locator Uptime State Pri/Wgt Encap-IID
172.31.255.111 04:09:04 up 10/10 -
Last up-down state change: 04:09:04, state change count: 1
Last route reachability change: 04:09:04, state change count: 1
Last priority / weight change: never/never
RLOC-probing loc-status algorithm:
Last RLOC-probe sent: 04:09:04 (rtt 3ms)

• Fabric Devices resolve RLOC when traffic send to unknown Destination


mac-addresses using map-request.
• Similar to Layer 3 a map-cache is build for Layer 2 entries with result

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Control Plane Node
• All Mac Addresses registered in Fabric on CP node as EID Prefix
• Show lisp instance-id <id> ethernet server uses Layer 2 instance-id or *

CP_1#sh lisp instance-id 8190 ethernet server


LISP Site Registration Information
* = Some locators are down or unreachable
# = Some registrations are sourced by reliable transport

Site Name Last Up Who Last Inst EID Prefix


Register Registered ID
site_uci never no -- 8190 any-mac
3d04h yes# 172.31.255.19:2470 8190 0000.0c9f.f45d/48
2d22h yes# 172.31.255.109:13974 8190 0050.5692.6d39/48
03:36:25 yes# 172.31.255.111:43564 8190 70e4.22e5.c4f7/48
3d04h yes# 172.31.255.19:2470 8190 fc99.47e9.4c7f/48

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
CP Node, Ethernet EID more detailed information
CP_1#sh lisp instance-id 8190 ethernet server 0050.5692.6d39
Requested EID-prefix:
EID-prefix: 0050.5692.6d39/48 instance-id 8190
First registered: 2d22h
Last registered: 2d22h Registration info
Routing table tag: 0
Origin: Dynamic, more specific of any-mac
Merge active: No
Proxy reply: Yes
TTL: 1d00h CP responds to map-reply
State: complete
Registration errors:
Authentication failures: 0
Allowed locators mismatch: 0
ETR 172.31.255.109:13974, last registered 2d22h, proxy-reply, map-notify
TTL 1d00h, sourced by reliable transport
Locator Local State Pri/Wgt Scope
172.31.255.109 yes up 10/10 IPv4 none RLOC info

• Control Plane node detailed information on registered mac address

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
ARP in the Fabric

• ARP protocol relies on Layer 2 Broadcasts to resolve IP to Mac Address


• Layer 2 Broadcast domain (without Layer 2 flooding) constrained to just Fabric Edge
• Device Tracking enables ARP snooping , allowing rewriting of Destination Mac
• Fabric Edge register learned Address Resolution info with Control Plane node
• Fabric Edge’s query Control Plane node for Address Resolution info to rewrite
broadcast to Unicast Mac Address and send it through fabric as Unicast

192.168.1.100 192.168.1.101

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
ARP Captures

MAP request/reply from


Fabric Edge for Mapping

VXLAN header

Unicast Destination Mac

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Device tracking
• Device tracking facilitates learning of End Points for Layer 2 Operation
• Learning happens for IPv4 and IPv6
• Probes used to verify/maintain reachability
• Remote entries shown via Interface Tu0, shorter aging time, no probing

Edge_1#show device-tracking database vlanid 1022


Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol,
DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned

Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
ARP 192.168.1.101 70e4.22e5.c4f7 Tu0 1022 0005 10s REACHABLE 297 s
ND FE80::250:56FF:FE92:6D39 0050.5692.6d39 Gi1/0/1 1022 0005 4mn REACHABLE 18 s try 0
DH4 192.168.1.100 0050.5692.6d39 Gi1/0/1 1022 0025 20s REACHABLE 289 s try 0
L 192.168.1.1 0000.0c9f.f45d Vl1022 1022 0100 5109mn REACHABLE

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Local Mappings

• LISP maintains local database for Address Resolution


• Address Resolution is part of the Layer 2 Instance.
• Both IPv4 and Ipv6 Address are registered with Control Plane Node

Edge_1#sh lisp instance-id 8190 ethernet database address-resolution


LISP ETR Address Resolution for EID-table Vlan 1022 (IID 8190)
(*) -> entry being deleted
Hardware Address Host Address L3 InstID
0050.5692.6d39 FE80::250:56FF:FE92: 4100
192.168.1.100/32 4100

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
CP Address Resolution Mapping Info

• Control Plane Node maintains Address Resolution table for Layer 2


Instances
• Other Fabric Edges send mapping request to CP node when
ARP entry is being received.
• CP Node responds to mapping queries from Fabric Edges

CP_2#sh lisp instance-id 8190 ethernet server address-resolution


Address-resolution data for router lisp 0 instance-id 8190
L3 InstID Host Address Hardware Address
4100 192.168.1.100/32 0050.5692.6d39
4100 192.168.1.101/32 70e4.22e5.c4f7
4100 FE80::250:56FF:FE92:6D39/128 0050.5692.6d39

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Multicast in the Fabric
Multicasting in the Fabric

• Multicasting in SD Access modes:

- Head End Replication (Default)


- Native Multicast
• Head End Replication mode, multicast packets are replicated using Unicast
to all fabric devices that joined the group.
• Native Multicast relies on underlay multicast topology using SSM groups
Overlay Multicast groups are hashes to a range of groups in underlay network.
Hashing collisions can occur
• Head End Replication can be enabled regardless of underlay multicast capable

• Native Multicast prevents Packet Duplication

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Multicast Overview

CP RP CP RP

Underlay Underlay

Edge_1 Edge_2 Edge_3


Edge_1 Edge_2 Edge_3

Head End Replication Native Multicast

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
RPF Resolution
Local Remote
Edge_1#sh ip rpf vrf CiscoLive 192.168.1.100 Edge_1#sh ip rpf vrf CiscoLive 192.168.1.101
RPF information for ? (192.168.1.100) RPF information for ? (192.168.1.101)
RPF interface: Vlan1022 RPF interface: LISP0.4100
RPF neighbor: ? (192.168.1.100) - directly connected RPF neighbor: ? (172.31.255.111)
RPF route/mask: 192.168.1.100/32 RPF route/mask: 192.168.1.101/32
RPF type: unicast (lisp) RPF type: unicast ()
Doing distance-preferred lookups across tables Doing distance-preferred lookups across tables
RPF topology: ipv4 multicast base RPF topology: ipv4 multicast base

• RPF resolution for Sources reachable through the fabric:


- RPF Interface LISP 0.<instance ID>
- RPF Neighbor, RLOC IP address of Fabric Device source resides
• If RPF cannot be resolved multicast traffic will not flow

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Head End Replication Mode, FHR
Edge_1#sh ip mroute vrf CiscoLive 239.100.100.100
IP Multicast Routing Table
Outgoing interface flags: H - Hardware switched, A - Assert winner, p - PIM Join
Timers: Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
(*, 239.100.100.100), 02:29:39/stopped, RP 192.168.200.1, flags: SPF
Incoming interface: LISP0.4100, RPF nbr 172.31.255.28
Outgoing interface list: Null
(192.168.1.100, 239.100.100.100), 02:29:39/00:02:35, flags: FT
Incoming interface: Vlan1022, RPF nbr 0.0.0.0
Outgoing interface list: FHR sends 2 copies out
LISP0.4100, 172.31.255.110, Forward/Sparse, 00:10:30/00:02:54
LISP0.4100, 172.31.255.111, Forward/Sparse, 01:09:35/00:02:46

• First Hop Router sending traffic through vxlan to both RLOCs with receivers
• All edge nodes join the *.G pointing to the RP RLOC IP address
• Traffic from Sender gets encapsulated into vxlan , similar to Unicast traffic

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Head End Replication Mode, Egress Router
• On receiver side the packet is de-encapsulated and send to the receiver
Edge_3#sh ip mroute vrf CiscoLive 239.100.100.100
(*, 239.100.100.100), 05:14:22/stopped, RP 192.168.200.1, flags: SJC
Incoming interface: LISP0.4100, RPF nbr 172.31.255.28
Outgoing interface list:
Vlan1022, Forward/Sparse, 01:52:18/00:02:13 RPF of (S,G) is RLOC of FHR
(192.168.1.100, 239.100.100.100), 01:29:05/00:02:09, flags: JT
Incoming interface: LISP0.4100, RPF nbr 172.31.255.109
Outgoing interface list:
Vlan1022, Forward/Sparse, 01:29:05/00:02:13
Edge_3#sh ip igmp vrf CiscoLive groups
Ingress LISP Egress Vlan1022
Group Address Interface Uptime Expires Last
239.100.100.100 Vlan1022 01:53:01 00:02:26 192.168.1.101
Edge_3#sh ip igmp snooping groups
Vlan Group Type Version Port List
-----------------------------------------------------------------------
1022 239.100.100.100 igmp v3 Gi1/0/1

IGMP join on Gi 1/0/1 triggered the join.


BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Native Multicast – First Hop Router
Edge_1#sh ip mroute vrf CiscoLive 239.100.100.100 verbose
IP Multicast Routing Table
(*, 239.100.100.100), 23:32:06/stopped, RP 192.168.200.1, flags: SPF
Incoming interface: LISP0.4100, RPF nbr 172.31.255.28, LISP:
[172.31.255.28, 232.0.3.1]
Outgoing interface list: Null
(192.168.1.100, 239.100.100.100), 23:32:06/00:02:53, flags: FTp
Incoming interface: Vlan1022, RPF nbr 0.0.0.0
Outgoing interface list: Underlay Group
LISP0.4100, (172.31.255.109, 232.0.3.1), Forward/Sparse,
17:09:05/stopped, p
172.31.255.111, 17:09:04/00:03:07 Subscribers
172.31.255.110, 17:09:05/00:02:41

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Native Multicast – First Hop Router

Edge_1#sh ip mfib 172.31.255.109 232.0.3.1


Forwarding Counts: Pkt Count/Pkts per second/Avg Pkt Size/Kbits per
second
Other counts: Total/RPF failed/Other drops
I/O Item Counts: FS Pkt Count/PS Pkt Count
Default
(172.31.255.109,232.0.3.1) Flags: HW SSM group overlay uses
SW Forwarding: 0/0/0/0, Other: 1/1/0
HW Forwarding: 61913/1/102/0, Other: 0/0/0
GigabitEthernet1/0/24 Flags: F NS
Pkts: 0/0 Egress port

• In underlay network the Overlay traffic is send encapsulated in vxlan


• Traffic is send as a multicast with source the RLOC of this fabric
device

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Native Multicast – Egress Router
Edge_2#sh ip mroute 232.0.3.1
IP Multicast Routing Table
(172.31.255.28, 232.0.3.1), 17:38:29/00:00:30, flags: sT
Incoming interface: GigabitEthernet2/0/47, RPF nbr 172.31.250.64 *,G , sourced at RP
Outgoing interface list:
Null0, Forward/Dense, 17:38:29/stopped
(172.31.255.109, 232.0.3.1), 17:38:29/00:00:30, flags: sT
Incoming interface: GigabitEthernet2/0/47, RPF nbr 172.31.250.64
Outgoing interface list:
Null0, Forward/Dense, 17:38:29/stopped S,G , sourced at FHR

• Egress Interface showing Null, traffic is being De-encapsulated


• RPF neighbor for Underlay Multicast group is upstream router

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Native Multicast, Egress Router
• At the Egress Fabric Device traffic is de-encapsulated and send out
• RPF neighbor in Overlay is the RLOC of encapsulating device

Edge_2#sh ip mroute vrf CiscoLive 239.100.100.100


(*, 239.100.100.100), 1d00h/stopped, RP 192.168.200.1, flags: SJC
Incoming interface: LISP0.4100, RPF nbr 172.31.255.28
Outgoing interface list:
Vlan1024, Forward/Sparse, 22:02:36/00:02:42
(192.168.1.100, 239.100.100.100), 22:02:35/00:01:21, flags: JT
Incoming interface: LISP0.4100, RPF nbr 172.31.255.109
Outgoing interface list:
Vlan1024, Forward/Sparse, 22:02:35/00:02:42
Edge_2#sh ip igmp snooping groups
Vlan Group Type Version Port List
--------------------------------------------------------------------
1024 239.100.100.100 igmp v3 Gi2/0/1

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Security in the Fabric
Authentication in the Fabric ISE

• Switch based authentication provides: CP Border


- Access Control to Fabric
- Assignment to VN/Pool
- Policy Assignment to Endpoint Underlay
• ISE recommended, not mandatory
• Switches use 802.1x and Mac Address
Bypass (MAB) to authenticate endpoints Edge Edge

• ISE can use profiling to determine type of


endpoint

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Authentication Profiles

• Default Profile per Fabric, applied to all Layer 2 Interfaces


Can be overridden using host onboarding on Cisco DNA Center
• Order of Authentication and timers can be tuned on Cisco DNA Center

Profiles:
• Closed Authentication, Most Secure
Dot1x & MAB using Closed Authentication
• Open Authentication, Moderately Secure
Dot1x & MAB using Open authentication
• Easy Connect, Moderately Secure
Dot1x & MAB using open authentication and pre-auth ACL
• No Authentication, Unsecure

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Access Session details
Edge_3#sh access-session interface gigabitEthernet 1/0/1 details
Interface: GigabitEthernet1/0/1
IIF-ID: 0x19558A98
• IPv4/IPv6 info from device tracking
MAC Address: 70e4.22e5.c4f7 • Username that authenticate
IPv6 Address: Unknown
IPv4 Address: 192.168.1.101 • Device-type from profiling
User-Name: CLtestuser
Device-type: Cisco-Device • Domain: Data or Voice
Status: Authorized
Domain: DATA
• Control Direction: in or both
Oper host mode: multi-auth
Oper control dir: both
• Policy: Applied policy on interface
Session timeout: N/A
Common Session ID: AC1FFA45000000107B7EA0EB
Acct Session ID: 0x00000005
Handle: 0x1d000006
Current Policy: PMAP_DefaultWiredDot1xClosedAuth_1X_MAB

Server Policies:
Vlan Group: Vlan: 1022
• Server Policies, send from Radius SGT Value: 200

• Method : dot1x or mab and its state Method status list:


Method State
dot1x Authc Success

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Security Policies inside the Fabric 10.48.91.151
SGT 300
10.48.91.251
SGT 301

SGT Endpoint
201 192.168.1.100
SRC DST Action
300 192.168.1.101 CP Border
200 192.168.1.3 200 300 Permit ssh
Deny any
300 10.48.91.151
200 300 Deny ssh
301 10.48.91.251 permit any Underlay

• Security based on Cisco TrustSec Solution


• Policy header inside vxlan header carries SGT
• Every endpoint assigned SGT Traffic policies Edge Edge Edge

enforced on egress not ingres


• Policies downloaded from ISE based on
groups
192.168.1.100 192.168.2.100 192.168.1.101
SGT 200 SGT 300 SGT 201

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Cisco TrustSec

• Every endpoint in the fabric gets assigned a Secure Group Tag


• Secure Group Tag transmitted in Policy Field in vxlan header of encapsulated frames
• Fabric devices download CTS environment data from ISE server
• Fabric devices download permissions for all SGT on switch
(Destination mappings only)
• Traffic being allowed/denied based upon SGT -> DGT mapping
• Traffic policy can be deny all, permit all, or SGACL
• Default action applied to all cells not populated.

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
CTS environment data
Edge_1#sh cts environment-data
CTS Environment Data
====================
CTS environment data from ISE.
Current state = COMPLETE Crucial for Enforcement to occur
Last status = Successful
Local Device SGT:
SGT tag = 0-01:Unknown
Server List Info:
Installed list: CTSServerList1-0001, 1 server(s):
*Server: 10.48.91.222, port 1812, A-ID 25FCBAE325B2C0E4073058F860957868
Status = ALIVE
auto-test = TRUE, keywrap-enable = FALSE, idle-time = 60 mins, deadtime = 20 secs
Security Group Name Table:
0-01:Unknown Radius server used
..
20-00:Phones
200-01:CL_Client_1
201-01:CL_Client_2 Groups known on ISE
..
Environment Data Lifetime = 86400 secs
Last update time = 16:26:35 UTC Wed Jan 8 2020
Env-data expires in 0:20:50:45 (dd:hr:mm:sec)
Env-data refreshes in 0:20:50:45 (dd:hr:mm:sec)
ISE can trigger
Cache data applied = NONE CoA to update
State Machine is running

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
CTS Enforcement

• All endpoints not assigned an SGT tag via Authentication or static


configuration will belong to SGT 0 (unknown)
• SGT can be learned Locally on switch or via SXP sessions
Edge_1#sh cts role-based sgt-map vrf CiscoLive all
Active IPv4-SGT Bindings Information Endpoint IP assigned
IP Address SGT Source
============================================ SGT 201 via 802.1x
192.168.1.100 201 LOCAL
CP_2#sh cts role-based sgt-map vrf CiscoLive all
Active IPv4-SGT Bindings Information
IP Address SGT Source
============================================ Border learned 2
10.48.91.151 300 SXP mappings via SXP to
10.48.91.251 301 SXP
ISE Server

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
CTS Policies
• Fabric Devices only Downloaded Policies it needs enforcing (egress enforcement)
and is present on ISE
• All other traffic will hit a * * policy
• RBACL names are appended with a version,
Ex: NoTelnet-00 is version 00 of RBACL name NoTelnet
CP_2#sh cts role-based permissions to 300
IPv4 Role-based permissions from group 200:CL_Client_1 to group 300:CL_Servers_1:
AllowSSHPING-00
IPv4 Role-based permissions from group 201:CL_Client_2 to group 300:CL_Servers_1:
allowping-00
CP_2#sh cts rbacl AllowSSHPING CP_2#sh cts rbacl allowping
CTS RBACL Policy CTS RBACL Policy
name = AllowSSHPING-00 name = allowping-00
refcnt = 4 refcnt = 4
RBACL ACEs: RBACL ACEs:
permit tcp dst eq 22 permit icmp
permit icmp deny tcp dst eq 22
deny ip permit ip
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Monitoring SGT traffic
• Counters are accumulative per device
• Traffic not hitting a more specific entry will hit * *
• Different Column for Software and Hardware enforcement

CP_2#sh cts role-based counters


Role-based IPv4 counters
From To SW-Denied HW-Denied SW-Permitt HW-Permitt SW-Monitor HW-Monitor
* * 0 0 4965 312090 0 0
200 300 0 0 0 0 0 0
201 300 0 15 0 146 0 0
200 301 0 0 0 0 0 0
201 301 0 0 0 195 0 0
Edge_1#sh cts role-based counters
Role-based IPv4 counters
From To SW-Denied HW-Denied SW-Permitt HW-Permitt SW-Monitor HW-Monitor
* * 0 0 13296 21927 0 0
200 201 0 0 0 13 0 0

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.

Cisco Live sessions will be available for viewing on


demand after the event at ciscolive.com.

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Continue your education

Demos in the
Walk-In Labs
Cisco Showcase

Meet the Engineer


Related sessions
1:1 meetings

BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Thank you

You might also like