Brkarc 2020
Brkarc 2020
Brkarc 2020
BRKARC-2020
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda
• Fabric
• Layer 3 forwarding
• Layer 2 forwarding
• Multicast Forwarding
• Security in the Fabric
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Fabric
The basic fabric
Underlay
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
The fabric
Physical Logical
VN1 VN2
VN3 VN4
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
LISP Basic operation
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
LISP Device SD Access Function
ETR (Egress Tunnel Edge Device & Border Connects a LISP site to a LISP capable core network. Registers EID
ETR)
LISP Components
Router)& PETR (Proxy node prefixes with Map Server (MS). Decapsulates LISP packets received from
LISP core. PETR works on behalf of non-LISP domain and provides LISP-
non-LISP connectivity.
ITR (Ingress Tunnel Edge Device and Border Responsible for forwarding local traffic to external destinations. Resolves
Router) & node RLOC for a given destination by sending Map-request to Map Resolver.
PITR (Proxy Ingress Encapsulates traffic and send to fabric. Typically, this is a Access Layer
Tunnel Router) Switch. PITR works on behalf of non-LISP domain and provides LISP-
non-LISP connectivity.
XTR (X Tunnel Router) Edge Device When both ITR and ETR functions are handled by one router, it is called
XTR. This is typical in practice.
MR (Map Resolver) Control Plane Node Responds to Map-requests from ITR. Map-requests will be replied with a
(Negative) Map-reply or forwarded to appropriate ETR
MS (Map Server) Control Plane Node Registers EID space upon receiving Map-register messages from ETR.
Updates Map Resolver with EID and RLOC data.
MSMR (Map Server Map Control Plane Node When a device acts as both Map Server and Map Resolver, it is called
Resolver) MS MR. This is typical in practice.
EID (Endpoint ID) IP pools/End Points Endpoint Identifier. IP addresses. Hidden from core network routing table.
RLOC acts next-hop to reach EID space.
RLOC (Routing Locator) Fabric Devices Routing Locator. Exists in global routing tables. Authoritative to reach EID
space. BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
LISP basic operation, registering with Map Server
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
LISP basic operation, resolving
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
LISP basic operation, packet forwarding
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Data Plane
• In SD Access the entire packet is encapsulated
• VXLAN encapsulation used. Outer IP is RLOC
• VXLAN Network Identifier used for LISP instance ID
• Group Policy ID set to SGT
ORIGINAL
ETHERNET IP PAYLOAD
PACKET
Supports L2
& L3 Overlay
PACKET IN
ETHERNET IP UDP VXLAN ETHERNET IP PAYLOAD
VXLAN
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Packet Encapsulation
New Header
SGT
VXLAN Header
LISP Instance ID
Encapsulated packet
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Layer 3
Forwarding
Layer 3 in the Fabric
RLOC EID
Edge_1 192.168.1.100
Border 10.48.91.128/25
Underlay
• All Edges use same IP for SVI (Anycast)
• Layer 3 LISP Instance ID’s are in 4000 range
• Traffic forwarding Edge_1 Edge_2 Edge_3
-> Outside Pool(other subnet):
”Routed”, Client sends to Anycast IP Mac
Forwarding done based upon destination IP
-> Inside Pool (same subnet):
“Bridged”, Client sends to Mac of Endpoint
Forwarding done based upon Mac Address
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
IP Anycast
• Every Edge Devices uses same Vlan , same IP address and same Mac Address
• Endpoints in the IP Pool(subnet) can be spread through the fabric.
• Default Gateway for Endpoint is set to Anycast IP
Edge_1#sh run int vlan 1024
interface Vlan1024
mac-address 0000.0c9f.f45f Edge_3#sh run int vlan 1024
vrf forwarding CiscoLive interface Vlan1024
mac-address 0000.0c9f.f45f
ip address 192.168.2.1 255.255.255.0
vrf forwarding CiscoLive
ip helper-address 10.48.91.148
no ip redirects ip address 192.168.2.1 255.255.255.0
ip pim sparse-mode ip helper-address 10.48.91.148
ip route-cache same-interface ip redirects
no
ip igmp version 3 ip pim sparse-mode
ip igmp explicit-tracking ip route-cache same-interface
192.168.1.1 192.168.1.1
no lisp mobility liveness test igmp version 3
ip
ip igmp explicit-tracking
lisp mobility 192_168_2_0-CiscoLive-IPV4
end no lisp mobility liveness test
lisp mobility 192_168_2_0-CiscoLive-IPV4
end 192.168.1.100 192.168.1.101
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Locally Registered Endpoints
• VN’s in SDA correlate to a VRF named as the VN Edge_1#sh ip vrf CiscoLive
Name Interfaces
• Only endpoints belonging to EID space are added CiscoLive Lo4100
to the LISP database and registered with CP Vl1022
LI0.4100
• Interface LISP 0.<instance-id> part of VRF Tu2
Vl1024
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Locally Registered Endpoints
Edge_1#sh ip arp vrf CiscoLive 192.168.1.100
Protocol Address Age (min) Hardware Addr Type Interface
Internet 192.168.1.100 3 0050.5692.6d39 ARPA Vlan1022
Edge_1#sh lisp instance-id 4100 ipv4 database 192.168.1.100/32
LISP ETR IPv4 Mapping Database for EID-table vrf CiscoLive (IID 4100), LSBs: 0x1
Entries total 2, no-route 0, inactive 0
192.168.1.100/32, dynamic-eid 192_168_1_0-CiscoLive-IPV4, inherited from default
locator-set rloc_ab36f833-b546-4869-930f-578ba1cdf413
Locator Pri/Wgt Source State
172.31.255.109 10/10 cfg-intf site-self, reachable
• LISP Database registers only Learned Endpoints that are inside the EID Space
• Endpoints can be learned via ARP or DHCP Snooping
• Locator RLOC as advertised by Fabric Device registering the entry.
RLOC IP address should be advertised in Underlay network as host route
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Registration of Endpoints with Map Server (CP)
• IPv4/IPv6 Endpoints can be reached when learned by Edge and registered with CP
• Dynamic Endpoints learned via ARP and Device Tracking (DHCP/ARP)
• Once learned by Fabric Device it registered using LISP Reliable Transport with CP
Edge_1#sh lisp session
Sessions for VRF default, total: 2, established: 2
Peer State Up/Down In/Out Users
172.31.255.28:4342 Up 07:14:14 111/46 6
172.31.255.29:4342 Up 07:14:14 111/46 6
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Control Plane Node (MSMR)
• Control Plane Node maintains table with all EID registrations
• Redundant Control Plane node do not synchronize each other.
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Control Plane Node (MSMR) details on EID
CP_1#sh lisp site 192.168.1.100/32 instance-id 4100
Requested EID-prefix:
EID-prefix: 192.168.1.100/32 instance-id 4100
First registered: 00:15:25
Last registered: 00:15:25 When registered on CP
Routing table tag: 0
Origin: Dynamic, more specific of 192.168.1.0/24
Merge active: No
Proxy reply: Yes Proxy Reply -> CP will respond
TTL: 1d00h
State: complete
on behalf of registering
Registration errors:
Authentication failures: 0 ETR Information
Allowed locators mismatch: 0
ETR 172.31.255.109:13974, last registered 00:15:25, proxy-reply, map-notify
state complete, no security-capability
sourced by reliable transport
Locator Local State Pri/Wgt Scope
172.31.255.109 yes up 10/10 IPv4 none RLOC Information
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Inactive clients
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Resolving Remote Destinations
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Resolving Remote Destinations
Edge_2#sh lisp instance-id 4100 ipv4 map-cache
LISP IPv4 Mapping Cache for EID-table vrf CiscoLive (IID 4100), 8 entries
0.0.0.0/0, uptime: 1d03h, expires: never, via static-send-map-request
Negative cache entry, action: send-map-request
8.0.0.0/7, uptime: 00:00:04, expires: 23:59:55, via map-reply, forward-native
Encapsulating to proxy ETR
10.48.91.128/25, uptime: 00:00:16, expires: 23:59:44, via map-reply, complete
Locator Uptime State Pri/Wgt Encap-IID
172.31.255.29 00:00:16 up 10/10 -
192.168.1.0/24, uptime: 1d03h, expires: never, via dynamic-EID, send-map-request
Negative cache entry, action: send-map-request
192.168.1.100/32, uptime: 1d02h, expires: 03:39:23, via map-reply, complete
Locator Uptime State Pri/Wgt Encap-IID
172.31.255.109 20:20:36 up 10/10 -
192.168.2.0/24, uptime: 1d03h, expires: never, via dynamic-EID, send-map-request
Negative cache entry, action: send-map-request
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
LISP Remote forwarding on edge, more detail
• Routing table for VRF on edges show no Default Gateway or remote routes
• Entries in Database are inserted into routing table
• Remote entries in map-cache are not displayed or as Null routes
Edge_2#sh ip route vrf CiscoLive
Routing Table: CiscoLive
Gateway of last resort is not set
192.168.2.0/24 is variably subnetted, 3 subnets, 2 masks
C 192.168.2.0/24 is directly connected, Vlan1024
L 192.168.2.1/32 is directly connected, Vlan1024
l 192.168.2.100/32 [10/1] via 192.168.2.100, 2d18h, Vlan1024
192.168.200.0/32 is subnetted, 1 subnets
C 192.168.200.9 is directly connected, Loopback4100
CP_2#sh ip route vrf CiscoLive
Routing Table: CiscoLive
B 192.168.1.0/24 [200/0], 3d20h, Null0
C 192.168.1.1/32 is directly connected, Loopback1022
l 192.168.1.100/32 [250/1], 2d14h, Null0
l 192.168.1.101/32 [250/1], 2d22h, Null0
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
LISP Remote forwarding, more detail
Edge_2#sh ip cef vrf CiscoLive 192.168.1.100/32 detail
192.168.1.100/32, epoch 1, flags [subtree context, check lisp eligibility]
SC owned,sourced: LISP remote EID - locator status bits 0x00000001
LISP remote EID: 2 packets 1152 bytes fwd action encap, cfg as EID space, dynamic
EID need encap
SC inherited: LISP cfg dyn-EID - LISP configured dynamic-EID
LISP EID attributes: localEID No, c-dynEID Yes, d-dynEID No
LISP source path list
nexthop 172.31.255.109 LISP0.4100
2 IPL sources [no flags]
nexthop 172.31.255.109 LISP0.4100
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
DHCP in the fabric. Quick overview
• Host sends DHCP Discover
• DHCP Snooping inserts remote agent in option 82
• DHCP Relay forwards to DHCP server through fabric,
setting giaddress to IP Anycast address
• DHCP Offer send by DHCP server to Anycast IP
address.
• Border extracts the option 82 and forwards through
fabric to the Edge who forwards it to client Anycast IP configured
as loopback (/32)
Fabric
Anycast IP
configured on
SVI Edge Border
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Option 82 Agent Remote ID Decoding
AA BB CC CC CC DD EE EE EE EE
AA = Sub option, 03 = LISP (01 = mac address, 02 = string)
BB = length of option
CCCCCCC = LISP Instance ID
DD = Address Family IPv4 = 01 IPv6 -02
EEEEEEEE =Source locator
03 08 001002 01 c0a80106
03 Sub option lisp
08 Length of option
001002 = 4098 in decimals ->LISP Instance ID 4098
01= IPV4 locator
c0.a8.01.06 = 192.168.1.6 Source locator (Loopback 0 of xTR)
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
DHCP related debugs
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
DHCP Debug – DHCP Snooping
Jan 27 18:23:14.889: DHCP_SNOOPING: received new DHCP packet from input interface
(GigabitEthernet1/0/1)
Jan 27 18:23:14.890: DHCP_SNOOPING: process new DHCP packet, message type: DHCPREQUEST,
input interface: Gi1/0/1, MAC da: ffff.ffff.ffff, MAC sa: 0050.5692.6d39, IP da:
255.255.255.255, IP sa: 0.0.0.0, DHCP ciaddr: 0.0.0.0, DHCP yiaddr: 0.0.0.0, DHCP
siaddr: 0.0.0.0, DHCP giaddr: 0.0.0.0, DHCP chaddr: 0050.5692.6d39, efp_id: 0, vlan_id:
1022
Jan 27 18:23:14.891: DHCP_SNOOPING: add relay information option.
Jan 27 18:23:14.891: DHCP_SNOOPING: Encoding opt82 CID in vlan-mod-port format
Jan 27 18:23:14.891: :VLAN case : VLAN ID 1022
Jan 27 18:23:14.891: VRF id is valid
Jan 27 18:23:14.891: LISP ID is valid, encoding RID in srloc format
Jan 27 18:23:14.892: DHCP_SNOOPING: binary dump of relay info option, length: 22 data:
0x52 0x14 0x1 0x6 0x0 0x4 0x3 0xFE 0x1 0x1 0x2 0xA 0x3 0x8 0x0 0x10 0x4 0x1 0xAC 0x1F
0xFF 0x6D
Jan 27 18:23:14.893: DHCP_SNOOPING: bridge packet get invalid mat entry:
FFFF.FFFF.FFFF, packet is flooded to ingress VLAN: (1022)
Jan 27 18:23:14.893: DHCP_SNOOPING: bridge packet send packet to cpu port: Vlan1022.
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
DHCP Debug –DHCP Relay
DHCP Relay functionality sets GI address in DHCP packet and forwards
Jan 27 18:23:14.896: DHCPD: Finding a relay for client 0050.5692.6d39 on interface
Vlan1022.
Jan 27 18:23:14.896: DHCPD : Locating relay for Subnet 192.168.1.1
Jan 27 18:23:14.896: DHCPD: there is no pool for 192.168.1.1.
Jan 27 18:23:14.896: DHCPD: Looking up binding using address 192.168.1.1
Jan 27 18:23:14.897: DHCPD: setting giaddr to 192.168.1.1.
Jan 27 18:23:14.897: DHCPD: BOOTREQUEST from 0050.5692.6d39 forwarded to 10.48.91.148.
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
DHCP Debug -Snooping
Jan 27 18:23:14.903: DHCP_SNOOPING: process new DHCP packet, message type: DHCPACK, input
interface: Vl1022, MAC da: 0050.5692.6d39, MAC sa: 0000.0c9f.f45d, IP da: 192.168.1.100, IP sa:
192.168.1.1, DHCP ciaddr: 0.0.0.0, DHCP yiaddr: 192.168.1.100, DHCP siaddr: 0.0.0.0, DHCP
giaddr: 192.168.1.1, DHCP chaddr: 0050.5692.6d39, efp_id: 0, vlan_id: 1022
Jan 27 18:23:14.904: DHCP_SNOOPING: binary dump of option 82, length: 22 data:
0x52 0x14 0x1 0x6 0x0 0x4 0x3 0xFE 0x1 0x1 0x2 0xA 0x3 0x8 0x0 0x10 0x4 0x1 0xAC 0x1F 0xFF 0x6D
Jan 27 18:23:14.906: DHCP_SNOOPING: binary dump of extracted circuit id, length: 8 data:
0x1 0x6 0x0 0x4 0x3 0xFE 0x1 0x1
Jan 27 18:23:14.907: DHCP_SNOOPING: binary dump of extracted remote id, length: 12 data:
0x2 0xA 0x3 0x8 0x0 0x10 0x4 0x1 0xAC 0x1F 0xFF 0x6D
Jan 27 18:23:14.909: No entry found for mac(0050.5692.6d39) vlan(1022) GigabitEthernet1/0/1
Jan 27 18:23:14.909: host tracking not found for update add dynamic (192.168.1.100, 0.0.0.0,
0050.5692.6d39) vlan(1022)
Jan 27 18:23:14.909: DHCP_SNOOPING: remove relay information option.
Jan 27 18:23:14.909: platform lookup dest vlan for input_if: Vlan1022, is NOT tunnel,
if_output: Vlan1022, if_output->vlan_id: 1022, pak->vlan_id: 1022
Jan 27 18:23:14.910: DHCP_SNOOPING: direct forward dhcp replyto output port:
GigabitEthernet1/0/1.
0050.5692.9735
CP Border
70e4.22e5.c4f7
• Traffic inside Pool send via Layer 2 , Traffic outside Layer 3 send via Layer 3
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Layer 2 Mac Address Tables
• Local clients show as Dynamic or Static for Authenticated endpoints
• Remote Mac Addresses ->CP_LEARN and port Tu0
• Anycast IP with associated Mac learned on both clients
• ARP tables on clients hold mac address of remote, traffic from client to
client is send to mac address of client
Local
Edge_3#sh mac add | inc 1022|--|Type guest@Client_3:~$ ip neig
192.168.1.100 dev eth0 lladdr 00:50:56:92:6d:39
-------------------------------------------
192.168.1.1 dev eth0 lladdr 00:00:0c:9f:f4:5d
Vlan Mac Address Type Ports
---- ----------- -------- -----
1022 0000.0c9f.f45d STATIC Vl1022 Remote
1022 58bf.eab6.4b75 STATIC Vl1022
guest@Client_1:~$ ip neig
1022 70e4.22e5.c4f7 STATIC Gi1/0/1 192.168.1.1 dev eth0 lladdr 00:00:0c:9f:f4:5d
1022 0050.5692.6d39 CP_LEARN Tu0 192.168.1.101 dev eth0 lladdr 70:e4:22:e5:c4:f7
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
LISP Local registered mac addresses
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Layer 2 Map-Cache
Edge_1#sh lisp instance-id 8190 ethernet map-cache detail
LISP MAC Mapping Cache for EID-table Vlan 1022 (IID 8190), 1 entries
70e4.22e5.c4f7/48, uptime: 04:09:04, expires: 19:50:55, via map-reply, complete
Sources: map-reply
State: complete, last modified: 04:09:04, map-source: 172.31.255.111
Idle, Packets out: 0(0 bytes)
Encapsulating dynamic-EID traffic
Locator Uptime State Pri/Wgt Encap-IID
172.31.255.111 04:09:04 up 10/10 -
Last up-down state change: 04:09:04, state change count: 1
Last route reachability change: 04:09:04, state change count: 1
Last priority / weight change: never/never
RLOC-probing loc-status algorithm:
Last RLOC-probe sent: 04:09:04 (rtt 3ms)
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Control Plane Node
• All Mac Addresses registered in Fabric on CP node as EID Prefix
• Show lisp instance-id <id> ethernet server uses Layer 2 instance-id or *
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
CP Node, Ethernet EID more detailed information
CP_1#sh lisp instance-id 8190 ethernet server 0050.5692.6d39
Requested EID-prefix:
EID-prefix: 0050.5692.6d39/48 instance-id 8190
First registered: 2d22h
Last registered: 2d22h Registration info
Routing table tag: 0
Origin: Dynamic, more specific of any-mac
Merge active: No
Proxy reply: Yes
TTL: 1d00h CP responds to map-reply
State: complete
Registration errors:
Authentication failures: 0
Allowed locators mismatch: 0
ETR 172.31.255.109:13974, last registered 2d22h, proxy-reply, map-notify
TTL 1d00h, sourced by reliable transport
Locator Local State Pri/Wgt Scope
172.31.255.109 yes up 10/10 IPv4 none RLOC info
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
ARP in the Fabric
192.168.1.100 192.168.1.101
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
ARP Captures
VXLAN header
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Device tracking
• Device tracking facilitates learning of End Points for Layer 2 Operation
• Learning happens for IPv4 and IPv6
• Probes used to verify/maintain reachability
• Remote entries shown via Interface Tu0, shorter aging time, no probing
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
ARP 192.168.1.101 70e4.22e5.c4f7 Tu0 1022 0005 10s REACHABLE 297 s
ND FE80::250:56FF:FE92:6D39 0050.5692.6d39 Gi1/0/1 1022 0005 4mn REACHABLE 18 s try 0
DH4 192.168.1.100 0050.5692.6d39 Gi1/0/1 1022 0025 20s REACHABLE 289 s try 0
L 192.168.1.1 0000.0c9f.f45d Vl1022 1022 0100 5109mn REACHABLE
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Local Mappings
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
CP Address Resolution Mapping Info
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Multicast in the Fabric
Multicasting in the Fabric
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Multicast Overview
CP RP CP RP
Underlay Underlay
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
RPF Resolution
Local Remote
Edge_1#sh ip rpf vrf CiscoLive 192.168.1.100 Edge_1#sh ip rpf vrf CiscoLive 192.168.1.101
RPF information for ? (192.168.1.100) RPF information for ? (192.168.1.101)
RPF interface: Vlan1022 RPF interface: LISP0.4100
RPF neighbor: ? (192.168.1.100) - directly connected RPF neighbor: ? (172.31.255.111)
RPF route/mask: 192.168.1.100/32 RPF route/mask: 192.168.1.101/32
RPF type: unicast (lisp) RPF type: unicast ()
Doing distance-preferred lookups across tables Doing distance-preferred lookups across tables
RPF topology: ipv4 multicast base RPF topology: ipv4 multicast base
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Head End Replication Mode, FHR
Edge_1#sh ip mroute vrf CiscoLive 239.100.100.100
IP Multicast Routing Table
Outgoing interface flags: H - Hardware switched, A - Assert winner, p - PIM Join
Timers: Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
(*, 239.100.100.100), 02:29:39/stopped, RP 192.168.200.1, flags: SPF
Incoming interface: LISP0.4100, RPF nbr 172.31.255.28
Outgoing interface list: Null
(192.168.1.100, 239.100.100.100), 02:29:39/00:02:35, flags: FT
Incoming interface: Vlan1022, RPF nbr 0.0.0.0
Outgoing interface list: FHR sends 2 copies out
LISP0.4100, 172.31.255.110, Forward/Sparse, 00:10:30/00:02:54
LISP0.4100, 172.31.255.111, Forward/Sparse, 01:09:35/00:02:46
• First Hop Router sending traffic through vxlan to both RLOCs with receivers
• All edge nodes join the *.G pointing to the RP RLOC IP address
• Traffic from Sender gets encapsulated into vxlan , similar to Unicast traffic
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Head End Replication Mode, Egress Router
• On receiver side the packet is de-encapsulated and send to the receiver
Edge_3#sh ip mroute vrf CiscoLive 239.100.100.100
(*, 239.100.100.100), 05:14:22/stopped, RP 192.168.200.1, flags: SJC
Incoming interface: LISP0.4100, RPF nbr 172.31.255.28
Outgoing interface list:
Vlan1022, Forward/Sparse, 01:52:18/00:02:13 RPF of (S,G) is RLOC of FHR
(192.168.1.100, 239.100.100.100), 01:29:05/00:02:09, flags: JT
Incoming interface: LISP0.4100, RPF nbr 172.31.255.109
Outgoing interface list:
Vlan1022, Forward/Sparse, 01:29:05/00:02:13
Edge_3#sh ip igmp vrf CiscoLive groups
Ingress LISP Egress Vlan1022
Group Address Interface Uptime Expires Last
239.100.100.100 Vlan1022 01:53:01 00:02:26 192.168.1.101
Edge_3#sh ip igmp snooping groups
Vlan Group Type Version Port List
-----------------------------------------------------------------------
1022 239.100.100.100 igmp v3 Gi1/0/1
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Native Multicast – First Hop Router
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Native Multicast – Egress Router
Edge_2#sh ip mroute 232.0.3.1
IP Multicast Routing Table
(172.31.255.28, 232.0.3.1), 17:38:29/00:00:30, flags: sT
Incoming interface: GigabitEthernet2/0/47, RPF nbr 172.31.250.64 *,G , sourced at RP
Outgoing interface list:
Null0, Forward/Dense, 17:38:29/stopped
(172.31.255.109, 232.0.3.1), 17:38:29/00:00:30, flags: sT
Incoming interface: GigabitEthernet2/0/47, RPF nbr 172.31.250.64
Outgoing interface list:
Null0, Forward/Dense, 17:38:29/stopped S,G , sourced at FHR
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Native Multicast, Egress Router
• At the Egress Fabric Device traffic is de-encapsulated and send out
• RPF neighbor in Overlay is the RLOC of encapsulating device
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Security in the Fabric
Authentication in the Fabric ISE
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Authentication Profiles
Profiles:
• Closed Authentication, Most Secure
Dot1x & MAB using Closed Authentication
• Open Authentication, Moderately Secure
Dot1x & MAB using Open authentication
• Easy Connect, Moderately Secure
Dot1x & MAB using open authentication and pre-auth ACL
• No Authentication, Unsecure
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Access Session details
Edge_3#sh access-session interface gigabitEthernet 1/0/1 details
Interface: GigabitEthernet1/0/1
IIF-ID: 0x19558A98
• IPv4/IPv6 info from device tracking
MAC Address: 70e4.22e5.c4f7 • Username that authenticate
IPv6 Address: Unknown
IPv4 Address: 192.168.1.101 • Device-type from profiling
User-Name: CLtestuser
Device-type: Cisco-Device • Domain: Data or Voice
Status: Authorized
Domain: DATA
• Control Direction: in or both
Oper host mode: multi-auth
Oper control dir: both
• Policy: Applied policy on interface
Session timeout: N/A
Common Session ID: AC1FFA45000000107B7EA0EB
Acct Session ID: 0x00000005
Handle: 0x1d000006
Current Policy: PMAP_DefaultWiredDot1xClosedAuth_1X_MAB
Server Policies:
Vlan Group: Vlan: 1022
• Server Policies, send from Radius SGT Value: 200
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Security Policies inside the Fabric 10.48.91.151
SGT 300
10.48.91.251
SGT 301
SGT Endpoint
201 192.168.1.100
SRC DST Action
300 192.168.1.101 CP Border
200 192.168.1.3 200 300 Permit ssh
Deny any
300 10.48.91.151
200 300 Deny ssh
301 10.48.91.251 permit any Underlay
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Cisco TrustSec
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
CTS environment data
Edge_1#sh cts environment-data
CTS Environment Data
====================
CTS environment data from ISE.
Current state = COMPLETE Crucial for Enforcement to occur
Last status = Successful
Local Device SGT:
SGT tag = 0-01:Unknown
Server List Info:
Installed list: CTSServerList1-0001, 1 server(s):
*Server: 10.48.91.222, port 1812, A-ID 25FCBAE325B2C0E4073058F860957868
Status = ALIVE
auto-test = TRUE, keywrap-enable = FALSE, idle-time = 60 mins, deadtime = 20 secs
Security Group Name Table:
0-01:Unknown Radius server used
..
20-00:Phones
200-01:CL_Client_1
201-01:CL_Client_2 Groups known on ISE
..
Environment Data Lifetime = 86400 secs
Last update time = 16:26:35 UTC Wed Jan 8 2020
Env-data expires in 0:20:50:45 (dd:hr:mm:sec)
Env-data refreshes in 0:20:50:45 (dd:hr:mm:sec)
ISE can trigger
Cache data applied = NONE CoA to update
State Machine is running
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
CTS Enforcement
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
CTS Policies
• Fabric Devices only Downloaded Policies it needs enforcing (egress enforcement)
and is present on ISE
• All other traffic will hit a * * policy
• RBACL names are appended with a version,
Ex: NoTelnet-00 is version 00 of RBACL name NoTelnet
CP_2#sh cts role-based permissions to 300
IPv4 Role-based permissions from group 200:CL_Client_1 to group 300:CL_Servers_1:
AllowSSHPING-00
IPv4 Role-based permissions from group 201:CL_Client_2 to group 300:CL_Servers_1:
allowping-00
CP_2#sh cts rbacl AllowSSHPING CP_2#sh cts rbacl allowping
CTS RBACL Policy CTS RBACL Policy
name = AllowSSHPING-00 name = allowping-00
refcnt = 4 refcnt = 4
RBACL ACEs: RBACL ACEs:
permit tcp dst eq 22 permit icmp
permit icmp deny tcp dst eq 22
deny ip permit ip
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Monitoring SGT traffic
• Counters are accumulative per device
• Traffic not hitting a more specific entry will hit * *
• Different Column for Software and Hardware enforcement
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Continue your education
Demos in the
Walk-In Labs
Cisco Showcase
BRKARC-2020 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Thank you