PDF Dnac Sda
PDF Dnac Sda
PDF Dnac Sda
The knowledge and skills that students are expected to have before attending this
course:
• Students should be familiar with Cisco Catalyst 9000 series switches
• Students should understand Cisco Enterprise Architecture
• Students should be understanding the networking protocols, Routing and
Switching.
Course Goal
Introduction to Cisco
DNA Digital Network
Architecture
Cisco Digital Network Architecture (DNA)
Digital Network Architecture (DNA) is a network architecture for digital
transformation, open, broad and extensible software architecture for digital
businesses.
Digital networks are the platform of the digital business. “Cisco DNA brings
together virtualization, automation, analytics, the cloud and programming
capacity to build that platform.
Cisco DNA completes Cisco Application Centric Infrastructure (ACI) technology for
the data center extending the policy-based and software-based approach to the
entire network: from headquarters to branches and from the core to the end of
the network either wired or wireless.
Cisco Digital Network Architecture (DNA)
Key Principles
1. Virtualization
2. Designed for automation
3. Ubiquitous analytics
4. Services managed from the Cloud
5. Open, extensible and programmable architecture
Cisco Digital Network Architecture (DNA)
Key Principles
1.Virtualize everything so that organizations have the freedom to implement any
service anywhere, regardless of the underlying platform (physical or virtual, on-
premise or in the cloud).
2.Designed for automation, so that networks and services are simple to deploy,
manage and maintain - significantly transforming the approach to network
management.
4. Services managed from the Cloud to unify policies and orchestration through the
network - combining cloud agility with security and control of on-premise solutions.
• Products and services can be customized, ordered and delivered at the click of a button
using web-based applications.
• Business data can be acquired, analyzed and exchanged in near-real time. Geographic
boundaries between enterprises and consumers are decreasing.
• Increasingly, traditional enterprise and data center network architectures are being
stressed to adapt quickly to these dynamic requirements.
• Applications are moving to public, private, and hybrid-cloud environments and are
now consumed as services (SaaS), blurring the well-defined boundaries between
the enterprise’s network and untrusted domains.
• And increasingly, sensors and autonomous devices are being connected as the
Internet of Things (IoT) expands.
• At the same time, cyber-threats across the network are becoming more
sophisticated and dangerous to the brand reputation and financial welfare of all
organizations.
Intent-Based Networking
Concept
The concept of intent-based networking is that the network team could simply
describe, in plain language, what they wanted to accomplish (the intent) and the
network would be able to translate the intent into the numerous policies that would
establish the appropriate configuration and settings changes across a complex and
heterogeneous environment leveraging automation.
Normally this activity would require a significant manual effort by highly skilled network
engineers to modify each device impacted by the desired change.
1.- Intent: The first principle is intent, or the ability to apply business level objectives to
the network.
Essentially, your intent is “what you want to accomplish.” It is not related to the CLI
command, but rather is tied to an objective or outcome.
This intent is captured in some form by the system (potentially plain language GUI) and
then translated into policies that can be applied across the network regardless of the
specific infrastructure deployed.
For example, your intent could be: Connect to a specific cloud application, enable access
to remote office workers, or segment guest traffic from corporate traffic.
Intent-Based Networking
Examples
Intent-Based Networking
Three Key Elements of Intent-based Networking
2.- Automation: Once you have defined your intent and created policies, it will be
critical to accelerate the time to provision.
Automation will enable network teams to dramatically reduce the time to implement
change. The same automation that will help accelerate initial provisioning cycles will
also aid in automating future changes.
As organizations continue to grow in size and complexity, adding cloud, IoT, and more
remote workers, automation may be the only way to aid network administrators that
are already unable to meet the service level and security demands of the users,
applications and business.
Intent-Based Networking
Three Key Elements of Intent-based Networking
Visibility and context should not be limited to devices in each domain, they should also
cover the complex interactions between applications, users and machines, in any cloud
location or environment.
Ideally, organizations would decide what simple changes can be made in an automated
fashion. The machine learning will be important to employ in order to create a baseline
of performance and security so it can rapidly identify any deviation from “normal.” This
anomaly detection needs to occur in real time to mitigate risks.
Intent-Based Networking
Business Intent
Intent-Based Networking
Examples of Intention
The Network Intuitive
In the past, tools were not available to declare intent and translate it
into the device-level configurations required to realize a desired
outcome
The Network Intuitive
Unprecedented Demands on the Network
The Network Intuitive
The Network Intuitive
The Intent-based Networking Model
The Network Intuitive
The Intent-based Networking Model
•Activation: The intent then needs to be interpreted into policies that can be
applied across the network. The Activation function installs these policies into the
physical and virtual network infrastructure using network wide automation.
Cisco Digital Network Architecture (Cisco DNA): launched two and a half years
ago, it was reinforced with important software and hardware innovations.
Cisco DNA Center: a centralized and intuitive management console to design and
implement policies, and to provision the entire network (LAN, WAN and WLAN).
This resource allows to make a design prior to the deployment and installation of
the equipment, then download configurations and policies as they are installed, in
an automated way. In this way, IT departments can manage the network in a self-
adapting way.
The Network Intuitive
Software Defined Access: an innovative solution that allows defining the access
network through software.
Automate policy strengthening and network segmentation on a single fabric,
something that simplifies access for users of various types, devices and objects.
All the data that pass through the network are analyzed and categorized so that
they can later be used for predictive analytics through machine learning.
The Network Intuitive
Introduction to Cisco DNA Center
Cisco DNA Center Overview
Cisco DNA Center is at the heart of Cisco Digital Network Architecture (Cisco DNA), an
open, extensible, software-driven architecture that accelerates and simplifies your
enterprise network operations while helping you lower costs and reduce your risk.
Using intuitive workflows, easily design, provision, and apply policy across your
network.
Cisco DNA Center Overview
●Multiple tools with multiple interfaces add complexity, which increases the
possibility of errors in configuration and management.
●Third-party platforms will never support the same levels of device management
and control as those that are integrated and designed to work together.
Cisco DNA Center Overview
Network deployment time savings
Cisco DNA Center Overview
Network deployment time savings
Cisco DNA Center Overview
Workflows and profiles to Automation
Cisco DNA Center Overview
Workflows and profiles to Automation
Cisco DNA Center Overview
Workflows and profiles to Automation
Cisco DNA Center Overview
Workflows and profiles to Automation
Cisco DNA Center Overview
Workflows and profiles to Automation
Cisco DNA Center Overview
• Real intent-based networking requires extensive real-time data flow between the
operational tools that are core to the network. The management of network
configuration, security, analytics, and automation comes together to deliver the true
business intent of the operation.
Cisco DNA Center Overview
Assurance - Issues
Cisco DNA Center Overview
Over 100 APIs that allow IT and business applications to constantly communicate their
performance, policy and compliance needs to the network.
Adapters and connectors for integrating with other IT and network systems (e.g. ITSM
and IPAM) so you can optimize IT workflows.
Adapters and connectors for integrating with other infrastructure domains (e.g.
datacenter, cloud and security).
An SDK for allowing the support of 3rd party network vendors’ devices, so you can
bring intent-based networking to multivendor environments.
Definition
Cisco's Software-Defined Access (or SD-Access) solution is a programmable network
architecture that provides software-based policy and segmentation from the edge
of the network to the applications.
• Host Mobility
• Network segmentation
• Access control based on user roles
The Cisco SD-Access with Campus Fabric works at the Cisco DNA center, the
place where Cisco delivers its intuitive network and where all automation and
data analytics tasks are performed.
Cisco SD-Access
Challenges of networks without SD-Access?
Network deployment challenges
• Setup or deployment of a single network switch can take several hours due to
scheduling requirements and the need to work with different infrastructure
groups. In some cases, deploying a batch of switches can take several weeks.
• This allows much greater mobility and flexibility in associating users and
policies, regardless of physical location.
• In contrast, SD-Access uses IP anycast so that all edge devices within each IP pool
use the same gateway address.
This reduces not only configuration complexity but also the scale of IP routing
within an enterprise campus.
Cisco SD-Access
What does SD-Access offer us?
3.- Network and group segmentation can be applied at the fabric edge for both
wired and wireless users.
• SD-Access allows definition of VRF instances and access policies at each individual
edge switch and access point (AP).
• This allows an unprecendented level of granularity in routing and access control for
wired and wireless users and devices.
• There’s a common thread across these changes: SD-Access is a much more business-
and user-centric approach to network design, instead of the old device- and
network-centric approach.
Module 2
Cisco SD-Access
Solution
Cisco SD-Access Solution
What is Cisco SD-Access
What is Cisco SD-Access
What is Cisco SD-Access
Cisco DNA Enterprise Solution
Software Define Access
Software Define Access
Software Define Access
Software Define Access
Software Define Access
Software Define Access
Cisco Digital Network Architecture
Cisco Digital Network Architecture
Cisco Digital Network Architecture
Cisco Digital Network Architecture
Cisco Digital Network Architecture
Cisco Digital Network Architecture
Cisco SD Access Platform
Cisco SD Access Platform
Cisco Catalyst 9600 Series Chassis
https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-9600-series-switches/nb-06-cat9600-series-data-sheet-cte-en.html
Cisco SD Access Platform
Cisco SD Access Platform
Cisco SD Access Platform
Fabric Edge
Cisco SD Access Platform
Fabric Edge
Cisco SD Access Platform
Fabric Edge
Cisco SD Access Platform
Fabric Border Node
Cisco SD Access Platform
Fabric Border Node
Cisco SD Access Platform
Fabric Border Node
Cisco SD Access Platform
Fabric Border Node
Cisco SD Access Platform
Cisco SD Access Platform
Cisco SD Access Platform
Cisco SD Access Platform
Fabric enabled Wireless
Cisco SD Access Platform
Extention IoT
Cisco SD Access Platform
Extention IoT
Cisco SD Access
Cisco SD Access
How Virtual Network works ?
Cisco SD Access
How Virtual Network works ?
Cisco SD Access
Cisco SD Access
Cisco SD Access
Cisco SD Access
Layer 3 Overlay
Cisco SD Access
Layer 2 Overlay
Cisco SD Access
Fabric Site
Cisco SD Access
Fabric Overlay
Cisco SD Access
Fabric Overlay and Underlay
Cisco SD Access
Fabric Overlay and Underlay
Cisco SD Access Components
Functions
Cisco SD Access Components
Cisco SD Access Components
Cisco SD Access Components
Cisco SD Access Components
Module 3
Describing Cisco
SD-Access Architecture
Cisco SD-Access Architecture
Cisco SD-Access Architecture
Cisco SD-Access Architecture
Cisco SD-Access Architecture
An SGT is a unique (16-bit) ID tag, separate from the network address. This allows the user
to create network policies (such as security, Quality of Service [QoS], Policy-Based Routing
[PBR], etc.) based solely on the SGT, regardless of the actual location.
Also, when SGTs and VNs are combined together, we can create a two-level hierarchical
policy model. SGTs
Cisco SD-Access Policy
Two Level Hierarchy - Macro Level
Cisco SD-Access Policy
Two Level Hierarchy - Macro Level
Cisco SD-Access Policy
Two Level Hierarchy - Macro Level
Cisco SD-Access Policy
Policy Types
Cisco SD-Access Policy
Two ways to assign SGT
Cisco SD-Access Policy
Policy Contracts
Cisco SD-Access Policy
Policy Enforcement
Cisco SD-Access Policy
Policy Enforcement
Cisco SD-Access Policy
Policy Enforcement
Cisco SD-Access Policy
Group Propagation
Cisco SD-Access Policy
Group Propagation
Cisco SD-Access
Module 4
Configuring Underlay
Automation
Configuring Underlay Automation
Configuring Underlay Automation
Traditional network
Configuring Underlay Automation
Overview
Configuring Underlay Automation
Procedure-4 Step Process
Configuring Underlay Automation
Procedure-4 Step Process
Configuring Underlay Automation
Procedure-4 Step Process
Configuring Underlay Automation
Procedure-4 Step Process
Configuring Underlay Automation
Network Planning
Configuring Underlay Automation
Underlay Device Role
Configuring Underlay Automation
A PnP solution has three main components
Configuring Underlay Automation
A PnP solution has three main components
Configuring Underlay Automation
Plan – Underlay Automation Boundary
Configuring Underlay Automation
Plan 1-Network Design Support
Configuring Underlay Automation
Plan 2-IP Address Plan
Configuring Underlay Automation
Plan 3-Seed Switch IP Routing Configuration
Configuring Underlay Automation
Plan Endpoints Connections
Configuring Underlay Automation
Plan 4-Seed Switch Feature Validation
Configuring Underlay Automation
Underlay Network Design
Configuring Underlay Automation
Design 1-Create Site (Area)
Configuring Underlay Automation
Design 1-Global Networks Settings
Configuring Underlay Automation
Design 2-Global Device Credential
Configuring Underlay Automation
Design 3- IP Address Pools
Configuring Underlay Automation
Design 4- Reserve IP Address Pools
Configuring Underlay Automation
Discovery of Network Devices
Configuring Underlay Automation
Discovery of Network Devices
Configuring Underlay Automation
Options Discovery
Configuring Underlay Automation
Tools - Discovery
Configuring Underlay Automation
Tools - Discovery
Configuring Underlay Automation
Tools - Discovery
Configuring Underlay Automation
Discovery 2 – Seed System Discovery
Configuring Underlay Automation
Discovery 3 – Run System Discovery
Configuring Underlay Automation
Discovery 3 – Seed System Inventory
Configuring Underlay Automation
Underlay Network Provisioning
Configuring Underlay Automation
Provisioning 1-Add Seed System to Site
Configuring Underlay Automation
Provisioning 1-Device Inventory View
Configuring Underlay Automation
Provisioning 2-Initial Discover Process
Configuring Underlay Automation
Provisioning 2-Start LAN Automation
Configuring Underlay Automation
Provisioning 2-Start LAN Automation
Configuring Underlay Automation
Provisioning 2-Start LAN Automation
Configuring Underlay Automation
Provisioning 3-Stop LAN Automation / Status
Configuring Underlay Automation
Provisioning 3-Stop LAN Automation
Configuring Underlay Automation
Provisioning 3-Global Network Services
Configuring Underlay Automation
Summary
Module 6
Cisco SD-Access
Implementation
Cisco SD-Access Implementation
Objectives
Cisco SD-Access Implementation
ISE Integration in DNA Center
Cisco SD-Access Implementation
ISE Integration in DNA Center
Cisco SD-Access Implementation
Integrating DNAC with ISE and pxGrid
Cisco SD-Access Implementation
ISE Provisioning
Cisco SD-Access Implementation
ISE Certificate Management
Cisco SD-Access Implementation
Enabling pxGrid on ISE
Cisco SD-Access Implementation
Enabling pxGrid on ISE
Cisco SD-Access Implementation
DNAC-to-ISE Integration
Policy Provisioning Basics
Explaining Provisioning Basics
Policy Provisioning Basics
Policy Menu
Policy Provisioning Basics
Policy Menu
Policy Provisioning Basics
Two-Level Hierarchy-Macro Level
Virtual Network
Policy Provisioning Basics
Two-Level Hierarchy-Macro Level
Scalable Group
Policy Provisioning Basics
Policy types
Policy Provisioning Basics
Access Policy
Policy Provisioning Basics
Access Policy – ISE Authentication Rules
Policy Provisioning Basics
Access Policy – ISE Authorization Rules
Policy Provisioning Basics
Access Control Policy
Policy Provisioning Basics
SGACL (Group-Based Policies) in DNAC
Policy Provisioning Basics
SGACL Matrix in ISE
Policy Provisioning Basics
Access Controls Based on Group-Based Policies
Policy Provisioning Basics
Access Controls Based on Group-Based Policies
Policy Provisioning Basics
Access Controls Based on Group-Based Policies
Policy Provisioning Basics
User and Device Groups and Virtual Networks
Policy Provisioning Basics
Cisco TrustSec Simplified Segmentation with Group-Based Policy
Configuring Underlay Automation
Summary
Module 7
It combines together all the previously configured items completed during the Design Stage.
SD-Access Deployment
Host Onboarding - IP Address Pool
Once the overlay (LISP) is provisioned, the routers and switches need to be made
aware of the IP Address Pools.
This is done by binding the previously created IP Address Pools with the previously
created VNs.
This is how LISP keeps track of hosts and their applicable VRFs, effectively segmenting
the network. SGTs further segments the VRFs.
SD-Access Deployment
Host Onboarding - IP Address Pool
By default, any network device or user within the Virtual Network is permitted to
communicate with other users and devices in the same Virtual Network.
SD-Access Deployment
Host Onboarding – Add Segments to VN
SD-Access Deployment
Host Onboarding – Authentication Templates
During Host Onboarding, DNAC will push down additional AAA (802.1x) configuration
to the EdgeNodes. This is done using Authentication Templates.
Authentication templates refer to the interface level configuration for network access
(801.x, MAB, etc) using the staged approach (closed mode, open mode).
Once the VNs are bound to the IP Address Pools, DNAC will push additional
configuration to the EdgeNodes.
Each EdgeNode will be provisioned with a SVI (Switched Virtual Interface) for each
defined Virtual Network. The IP address of that SVI will be the Gateway defined in the
IP Address Pool in Design.
SD-Access Deployment
Host Onboarding – Authentication Templates Types
•Easy Connect: Security is added by applying an ACL to the switch port, to allow very
limited network access prior to authentication. After a host has been successfully
authenticated, additional network access is granted.
• No Authentication
Select the default host authentication template. This will be applied to all Fabric
Edge host ports, unless overridden by a static port assignment
SD-Access Deployment
Host Onboarding – Select Switch & Port Assignment
SD-Access Deployment
Host Onboarding – Select Switch & Port Assignment
Integrating Wireless
with Cisco SD-Access
Solution
Integrating Wireless with the SD-Acces Solutionv
Integrating Wireless with the SD-Acces Solution
Integrating Wireless with the SD-Acces Solution
Integrating Wireless with the SD-Acces Solution
Integrating Wireless with the SD-Acces Solution
CUWN OTT
Integrating Wireless with the SD-Acces Solution
CUWN FlexConnect OTT
Integrating Wireless with the SD-Acces Solution
Wireless in SDA Fabric
Wireless with the SD-Acces Solution
SD-Acces Fabric Architecture
Wireless with the SD-Acces Solution
SD-Acces Fabric Architecture
Wireless with the SD-Acces Solution
SD-Acces Fabric Architecture
Wireless with the SD-Acces Solution
SD-Acces Fabric Architecture
Wireless with the SD-Acces Solution
SD-Acces Fabric Architecture
Wireless with the SD-Acces Solution
SD-Acces Fabric Architecture
Wireless with the SD-Acces Solution
SD-Acces Fabric Architecture
Wireless with the SD-Acces Solution
SD-Acces Fabric Architecture
Wireless with the SD-Acces Solution
SD-Acces Fabric Architecture
Wireless with the SD-Acces Solution
Simplifying Policy and Segmentation
Wireless with the SD-Acces Solution
Simplifying Policy and Segmentation
Wireless with the SD-Acces Solution
Simplifying Policy and Segmentation
Wireless with the SD-Acces Solution
Simplifying Policy and Segmentation
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Wireless with the SD-Acces Solution
Workflow of Cisco SD-Acces Wireless
Select the AP and clink on Action > Provision
Assign to the floor
Cisco SD-Access
Assurance
Cisco SD-Access Assurance
Provide an Overview of the Cisco Network Data Platform
Cisco SD-Access Assurance
Provide an Overview of the Cisco Network Data Platform
Cisco SD-Access Assurance
Provide an Overview of the Cisco Network Data Platform
Cisco SD-Access Assurance
Provide an Overview of the Cisco Network Data Platform
Cisco SD-Access Assurance
Describe the role of assurance within Cisco SD-Acces
Cisco SD-Access Assurance
Describe the role of assurance within Cisco SD-Acces
Cisco SD-Access Assurance
Describe the role of assurance within Cisco SD-Acces
Cisco SD-Access Assurance
Describe the role of assurance within Cisco SD-Acces
Cisco SD-Access Assurance
Describe the role of assurance within Cisco SD-Acces
Cisco SD-Access Assurance
Describe the role of assurance within Cisco SD-Acces
Cisco SD-Access Assurance
Describe the role of assurance within Cisco SD-Acces
Cisco SD-Access Assurance
Describe the role of assurance within Cisco SD-Acces
Cisco SD-Access Assurance
Describe the role of assurance within Cisco SD-Acces
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Cisco SD-Access Assurance
Discuss DNA Center assurance use cases
Module 10