4 Brkens 2811
4 Brkens 2811
SD-Access LISP to
the World
Use Cases and Segmentation
#CiscoLive
Cisco Webex App
https://ciscolive.ciscoevents.com/
ciscolivebot/#BRKENS-2811
Questions?
Use Cisco Webex App to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Agenda
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
In this Session ….
✘ We will not be covering the basics of Cisco SD-Access and its various
components.
✘ The scenarios discussed may not exactly match your challenges, but they can
give you insights on how to approach them.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Explore Ideas with ..
• Cisco Partners
• Cisco CX services
• Cisco SE or AM
• Cisco Communities
• Cisco Live meet the expert
• Cisco Live On-Demand Library
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
For Your Reference
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Cisco Live US SD-Access/ISE Learning Map
Catalyst Center
ISE
BU-led sessions
Cisco SD-Access LISP Cisco ISE
#CiscoLive © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public
SD-Access LISP Industry Leading Campus
Architecture
+ 66% 1.8M+
API (YoY) Devices
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public
SD-Access LISP Customer Success
Healthcare Education + Energy Manufacturing
SCALE
5300 devices 6200 devices 6500 devices 5300 devices 4500 devices 16k devices
15K+endpoints 10K+endpoints 66K+endpoints 57K+endpoints 10K+endpoints 98K+endpoints
REQUIREMENTS
Segmentation at scale
Secure, Highly available network
Zero-Trust Network Access Automated operations
Hi performance scalable WI-FI
HIPAA Compliance APIs for Automation & Tool Integration
BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
SD-Access Migration
Underlay for the fabric should be automated
Concurrent Underlay automation for sites
Some locations must remain Layer 2 Switched Access
Flexibility to have no routing protocols below the distribution layer
• SD-Access Migration
• Underlay for the fabric should be automated
• Concurrent Underlay automation for sites
• Some locations must remain Layer 2 Switched Access
Customer
• Flexibility to have no routing protocols below the distribution layer
Challenges and
Critical Services
Simplified Critical Services such as Shared Services and Internet with
minimum configuration
Datacenter
Consistent Policy across Domains in an acquisition.
BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
SD-Access Migration
Underlay for the fabric should be automated
Concurrent Underlay automation for sites
Some locations must remain Layer 2 Switched Access
Flexibility to have no routing protocols below the distribution layer
SD-Access Migration
Underlay for the fabric should be automated
Concurrent Underlay automation for sites
Some locations must remain Layer 2 Switched Access
Customer
Flexibility to have no routing protocols below the distribution layer
Challenges and
• Critical Services
• Simplified Critical Services such as Shared Services and Internet with
minimum configuration
Datacenter
Consistent Policy across Domains in an acquisition.
BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
SD-Access Migration
Underlay for the fabric should be automated
Concurrent Underlay automation for sites
Some locations must remain Layer 2 Switched Access
Flexibility to have no routing protocols below the distribution layer
SD-Access Migration
Underlay for the fabric should be automated
Concurrent Underlay automation for sites
Some locations must remain Layer 2 Switched Access
Customer
Flexibility to have no routing protocols below the distribution layer
Challenges and
Critical Services
Simplified Critical Services such as Shared Services and Internet with
minimum configuration
Datacenter
Consistent Policy across Domains in an acquisition.
BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
SD-Access Migration
Underlay for the fabric should be automated
Concurrent Underlay automation for sites
Some locations must remain Layer 2 Switched Access
Flexibility to have no routing protocols below the distribution layer
SD-Access Migration
Underlay for the fabric should be automated
Concurrent Underlay automation for sites
Some locations must remain Layer 2 Switched Access
Customer
Flexibility to have no routing protocols below the distribution layer
Challenges and
Critical Services
Simplified Critical Services such as Shared Services and Internet with
minimum configuration
• Datacenter
• Consistent Policy across Domains in an acquisition.
BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
SD-Access Migration
Underlay for the fabric should be automated
Concurrent Underlay automation for sites
Some locations must remain Layer 2 Switched Access
Flexibility to have no routing protocols below the distribution layer
• SD-Access Migration
• Underlay for the fabric should be automated
• Concurrent Underlay automation for sites
• Some locations must remain Layer 2 Switched Access
Customer
• Flexibility to have no routing protocols below the distribution layer
Challenges and
• Critical Services
• Simplified Critical Services such as Shared Services and Internet with
minimum configuration
• Datacenter
• Consistent Policy across Domains in an acquisition.
BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
#CiscoLive BRKENS-2811 ©©
2024
2024Cisco
Ciscoand/or
and/oritsitsaffiliates.
affiliates.All
Allrights
rightsreserved.
reserved. Cisco Public 16
Migration Site 1 Migration Site 2
Cisco
Catalyst
ISE Center DHCP, DNS, AD
(Services)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Data Center Fabric Underlay Layer 2 Access
#CiscoLive © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public
LAN Automation
Enhancements
Migration Site 1 Migration Site 2 Migration Site 3 Migration Site 4
Layer 3 Link
Layer 2 Link
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Fabric Network Infrastructure
Underlay Infrastructure: LAN Automation
Migration Site 1
• Zero-Touch Image Management with device onboarding.
• Automated underlay buildout with validated best practice
configuration.
• L3 routed access network with IS-IS routing protocol.
• Higher MTU to accommodate VXLAN encapsulation
• (optional) enable Multicast option to support Broadcast,
Unknown-Unicast and Link-local Multicast (BUM).
Automated underlay
Layer 3 Switch
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Fabric Network Infrastructure
Underlay Infrastructure: LAN Automation Procedure
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Migration Site 1
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Fabric Network Infrastructure
Underlay Infrastructure: After LAN Automation
Migration Site 1
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Fabric Network Infrastructure
Underlay Infrastructure: Site after Migration
SD-Access Network
(Migration Site 1)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Fabric Network Infrastructure
Underlay Infrastructure: Site after Migration
SD-Access Network
(Migration Site 1)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Fabric Network Infrastructure
Underlay Infrastructure: LAN Automation
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Fabric Network Infrastructure
Underlay Infrastructure: LAN Automation
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Fabric Network Infrastructure For Your
Reference
Underlay Infrastructure: LAN Automation
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Fabric Network Infrastructure
Underlay Infrastructure: LAN Automation
We can have 5 simultaneous Lan automation sessions with one session per site.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Fabric Network Infrastructure
Underlay Infrastructure: LAN Automation Enhancements Cisco Catalyst
Center
• Simultaneous LAN Automation sessions is supported from Cisco
Catalyst Center release 2.3.5.x .
• Simultaneous LAN Automation sessions:
• This feature will allow customers to initiate up to 5 multiple LAN
Automation sessions with one session per site.
• Zero Touch onboarding of PNP ready switches at 5 different sites.
• Dedicated LAN Automation landing page with a new workflow to Seed Seed Seed Seed
initiate LAN Automation.
• As part of LAN Automation enhancements, user can Add or
Delete L3 links which helps customers to better manage links
through customization.
• Deleting is permitted on an existing link that have previously been
configured by LAN Automation.
▪ From Cisco Catalyst Center 2.3.7.x:
▪ The LAN automation workflow will now support the assignment of IP
address pools using the /27 , /28 subnet masks.
▪ The LAN automation workflow allows for customization of loopback IP
addresses for onboarded devices. Site 1 Site 5
▪ The modification of the loopback address for the SD-access fabric is
not supported.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Fabric Network Infrastructure For Your
Reference
Underlay Infrastructure: LAN Automation
Day 0 Day N
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
The Knowledge Vault ..
BRKENS-2800
Cisco SD-Access Zero-Touch Provisioning Using LAN Automation
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Data Center Fabric Underlay Layer 2 Access
SD-Access Network Migration Site 2
Cisco
(Migration Site 1)
Catalyst
ISE Center DHCP, DNS, AD
(Services)
#CiscoLive © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public
Progress Chart
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
How to Connect a
SD-Access Network
to Layer 2 Access
Networks
Migration Site 2
Layer 3 ↑
Layer 2 ↓
Layer 2 Switch
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Migration Site 2
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Migration Site 2
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
SD-Access Network
(Migration Site 2)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
SD-Access Network
(Migration Site 2)
Extended Nodes
Supplicant-Based
Extended Node
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
SD-Access Network
(Migration Site 2)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
SD-Access Network
(Migration Site 2)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
SD-Access Network
(Migration Site 2)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Cisco SD-Access
Layer 2 Access
Layer 2 Access
Enterprise
IOT
(Catalyst 9000)
Supplicant-
Policy Policy
Extended Node Based Extended Node
Extended Node Extended Node
Extended Node
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Cisco SD-Access
Layer 2 access
Catalyst 9000 Series Switches IOT Switches
❖ Daisy Chain support from 2.3.3.x ❖ Daisy Chain support from 2.2.2.x
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Cisco SD-Access For Your
Reference
Layer 2 Access
Design Considerations
• The option to utilize the Catalyst 9000 series switches as Extended Node (EN) with Essentials is accessible starting from Cisco Catalyst Center version
2.3.3.x and onwards. Users have the capability to transition the switch to PEN via the Cisco Catalyst Center workflow post-upgrading their license to
Catalyst Advantage.
• Catalyst 9000 series switches such as Extended Node (EN) , Policy Extended Node (PEN) , Supplicant-Based Extended Node (SBEN) can be daisy
chained when onboarded by Cisco Catalyst Center from 2.3.3.3 and later. A maximum of three Catalyst 9000 devices can be connected in a daisy
chain.
• Factory default switches that are supported and connected to Fabric Edge (FE) node closed authentication ports can be onboarded automatically,
providing network protection from unauthorized devices through the maintenance of closed authentication on all Edge Node ports. These are referred
to as Supplicant-Based Extended Nodes (SBEN), which are supported from the Cisco Catalyst Center release 2.3.3.x and onwards.
• Designed to onboard EN using Plug and Play (PNP) in a zero-trust environment, SBEN onboarding provisions these nodes as Policy Extended Nodes,
utilizing Security Group Tags (SGTs) for micro-segmentation. However, SBEN only supports a maximum of one physical uplink port, with EtherChannel
not being supported.
• In non-carpeted spaces, starting with 2.2.2.x, only IoT switches (Such as Industrial Ethernet Switches) can join as Extended or Policy Extended Nodes
in linear chains of up to 18; REP Rings for them require Catalyst Center workflow starting at 2.3.3.x.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
The Knowledge Vault ..
• Cisco SD-Access - Catalyst 9000 as Policy Extended Nodes You Tube Video With Demo
• Cisco SD-Access – Supplicant Based Extended Nodes YouTube Video With Demo
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Data Center Fabric Underlay Layer 2 Access
SD-Access Network SD-Access Network
Cisco
(Migration Site 1) (Migration Site 2)
Catalyst
ISE Center DHCP, DNS, AD
(Services)
#CiscoLive © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public
Progress Chart
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Simplified
Critical Services
access
SD-Access Extranet
Border Node Selection For Your
Reference
Key Takeaways
1. Do I need to import BGP-learned routes into the LISP database?
▪ Either Internal-only or Anywhere
• Internal-Only Border
• Registers external prefixes with the Control Plane Node
• External-Only Border
• Does not import external prefixes into fabric domain
• Does not register prefixes with the Control Plane Node
• Fabric Gateway of Last Resort
• Internal + External
• Registers external prefixes with the Control Plane Node
• Fabric Gateway of Last Resort
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Cisco SD-Access
Critical Services
• Simplified Critical Services such as Shared Services and Internet with minimum configuration
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Border Deployment Options
Shared Services (DHCP, AAA, etc..) with Border
ip vrf USERS
rd 1:4099
route-target export 1:4099
route-target import 1:4099
Global Routing Table should use a Peer Device with MP-BGP & VRF
ip vrf DEFAULT_VN
rd 1:4098
route-target export 1:4098
ip vrf GLOBAL
rd 1:4097
route-target export 1:4097
Control Plane route-target import 1:4097
route-target export 1:4099
VRF B T5/1
route-target export 1:4098
SVI B
SVI B AF VRF B G0/0/0.B
ISIS BGP
GRT/VRF
T5/2
SVI A
AF VRF A G0/0/0.A
VRF A External
SVI A Domain
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Cisco SD-Access Extranet
Solution Introduction
• LISP Extranet provides flexible, and scalable method for providing access to Shared Services
and access to the Internet to endpoints inside the Fabric.
• This simplifies SD-Access Fabric deployments by providing a policy-based method of VRF
leaking.
• LISP Extranet helps avoiding route-leaking outside Fabric Site by addressing the leaking natively
in LISP.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Cisco SD-Access Extranet
SD-Access Extranet Policy
Subscribers Providers
VN Employees
DHCP
VN IOT DNS
AD
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
For Your
Reference
Cisco SD-Access Extranet
Definition of Terms
Provider Virtual Network
Extranet Policy
• Describes the relationship between a Provider Virtual Network and one or more Subscriber Virtual
Networks.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Cisco SD-Access Extranet
DHCP, DNS, AD
DHCP, DNS, AD (Shared Services)
(Shared Services)
Peer Device
PVN VRF-lite
Employees VN handoff Contractor VN handoff handoff
SD-Access Network
SD-Access Network (Migration Site 3)
(Migration Site 3)
Subscriber VN Subscriber VN
VN ”Employee” VN “Contractor”
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Cisco SD-Access Extranet
Extranet Policy Details
• Extranet policy is orchestrated and maintained via Cisco Catalyst Center.
• Supported from Cisco IOS_XE 17.9 and Cisco Catalyst Center 2.3.4.x
• Extranet Policy can be associated to one or more Fabric Sites connected via IP transit/SD-
Access transit.
• With Extranet, user only need to perform layer 3 handoff for Provider VNs from Border nodes.
• Allows communication from the Subscriber Virtual Networks to the Provider Virtual Network.
• Allows communication from the Provider Virtual Network to the Subscriber Virtual Networks.
• Contains a single Provider Virtual Network
• Contains one or more Subscriber Virtual Networks SD-Access Extranet policy:
Extranet Policy Provider VN Subscriber VN
• Denies Subscriber to Subscriber communication
Provider VN NO YES
Subscriber VN YES NO
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
For Your
Reference
Cisco SD-Access Extranet
Considerations
• Extranet policies are supported with Lisp Pub/Sub fabric only
• A Provider Virtual Network in one Policy cannot be a Subscriber Virtual Network in another Policy.
• A Subscriber Virtual Network in one Policy cannot be a Provider Virtual network in another Policy.
• Multicast leveraging Extranet functionality is not supported ( If Multicast traffic stays within a VN, then it is supported. E.g.,
RP,Source,Receiver within a VN )
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Cisco SD-
Access Extranet
Packet Flows
SD-Access Extranet – Shared Services
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
SD-Access Extranet – Shared Services
• Admin creates SD-Access Extranet policy via Cisco DHCP, DNS, AD Cisco Catalyst
Catalyst Center workflow which is configured in Control (Shared Services) Center
2 Plane node.
PVN VRF-lite
2 handoff
Extranet Policy :
* Only 1 Provider VRF is allowed per extranet policy instance. (Migration Site 3)
Subscriber VN Subscriber VN
• At this stage, CP knows about users ( host entries) in “Contractor”
”Employee”
respective virtual networks and their location(Edge node).
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
SD-Access Extranet – Shared Services
3
• Host in Virtual Network Subscriber VN PVN VRF-lite
handoff
Employee on Edge node wants to
communicate with server in Shared Services
(Shared Services VN)
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
3
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
SD-Access Extranet – Shared Services
4
• Edge node with Virtual Network Employees PVN VRF-lite
handoff
sends a map-request to the control plane
node requesting to reach Server in Shared
Services
4
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
SD-Access Extranet – Shared Services
5
PVN VRF-lite
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
SD-Access Extranet – Shared Services
6 SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
SD-Access Extranet – Shared Services
7
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
SD-Access Extranet – Shared Services
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
SD-Access Extranet – Shared Services
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
SD-Access Extranet – Shared Services
10
• Border node will not have destination host
information in the Provider VN Shared
PVN VRF-lite
handoff
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
SD-Access Extranet – Shared Services
11
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
SD-Access Extranet – Internet
Internet
1
PVN VRF-lite
1 handoff
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
SD-Access Extranet – Internet
Cisco Catalyst
Center
• Admin creates SD-Access Extranet policy via Internet
Extranet Policy :
▪ Provider VN is “ Internet”
▪ Subscriber VN is “Employee”
▪ Subscriber VN is “Contractor” SD-Access Network
(Migration Site 3)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
SD-Access Extranet – Internet
Internet
3
• Host in Virtual Network Subscriber VN PVN VRF-lite
handoff
Contractor on Edge node wants to reach a
prefix on the Internet which is reachable via
default route in Provider VN Internet
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
3
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
SD-Access Extranet – Internet
Internet
4
• Edge node with Virtual Network Subscriber PVN VRF-lite
handoff
VN Contractor sends a map-request to the
control plane node requesting to reach prefix
in Internet.
4
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
SD-Access Extranet – Internet
Internet
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
SD-Access Extranet – Internet
Internet
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
SD-Access Extranet – Internet
Internet
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
SD-Access Extranet – Internet
Internet
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
SD-Access Extranet – Internet
Internet
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
SD-Access Extranet – Internet
Internet
10
• Border node will not have destination host
information in the Provider VN Internet. A PVN VRF-lite
handoff
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
SD-Access Extranet – Internet
Internet
11
SD-Access Network
(Migration Site 3)
Subscriber VN Subscriber VN
”Employee” “Contractor”
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
SD-Access Extranet – Subscriber to Subscriber policy
How Subscriber to Subscriber policy is denied ? Flow Event
1 • Admin creates SD-Access Extranet policy via Cisco Catalyst Center workflow
which is configured in Control Plane node.
Extranet Policy :
1 ▪ Provider VN is “ Shared Services”
▪ Subscriber VN is “Employee”
▪ Subscriber VN is “Contractor”
2
3 2 • Host on a subscriber VN (Employee) tries to initiate a communication to
another host in the subscriber VN(Contractor)
4 3 • The respective edge node generates a map request to the control plane.
4 • Map server responds back with a map-reply with the action set to drop the
frame
5
5 • Edge node installs the entry in map-cache and CEF to drop the frame, thus
blocking subscriber to subscriber communication
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
SD-Access Extranet Automation Workflow For Your
Reference
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
SD-Access Extranet Automation Workflow For Your
Reference
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
SD-Access Extranet Automation Workflow For Your
Reference
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
SD-Access Extranet Automation Workflow For Your
Reference
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Cisco SD-Access Extranet For Your
Reference
Single Site Example
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Cisco SD-Access Extranet
For Your
Reference
Extranet policy configuration on Transit Control Plane
Multi-site Site Example Node:
extranet Extranet_Policy_1_Services
Extranet Policy created on Cisco Catalyst Center: eid-record-provider instance-id 4101
ip-any
VN Policy Name Provider VN Subscriber VN exit-eid-record-provider
!
eid-record-subscriber instance-id 4099
Extranet_Policy_1_Ser Services Campus
ip-any
vices exit-eid-record-subscriber
!
exit-extranet
Extranet policy configuration on Control Plane Node: Internet
extranet Extranet_Policy_1_Services
Services
extranet-config-from-transit
VRF-lite
eid-record-provider instance-id 4101 handoff
exit-eid-record-provider
!
exit-extranet
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Cisco SD-
Access Extranet
Workflow
Cisco SD-Access Extranet Workflow
Provider VN
Services VRF-lite
handoff
Cisco SD-Access
Network
Subscriber VN
”Campus”-
172.16.8.0/24
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Cisco SD-Access Extranet
Key Take Away
Overview
• Automated Route Leaking Configuration via Cisco Catalyst Center.
• If Inter-VN policy enforcement is desired on devices such as firewalls, then use traditional route
leaking.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Data Center Fabric Underlay Layer 2 Access
SD-Access Network SD-Access Network
Cisco
(Migration Site 1) (Migration Site 2)
Catalyst
ISE Center DHCP, DNS, AD
(Services)
#CiscoLive © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public
Progress Chart
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Seamless
Internet
Connectivity
LISP Pub/Sub
Cisco SD-Access
Seamless Internet Connectivity
• Consistent Policy across Cisco SD-Access sites.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Cisco SD-Access
Seamless Internet Connectivity
• Cisco SD-Access Transit
• LISP Publisher/Subscriber
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
SD-Access
Transits
Fabric Constructs
Transits – A Closer Look
Internet
• Connects Fabric Site to other Fabric Data Center
Sites.
Transit
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Fabric Constructs
Transits – A Closer Look
IP-Based Transit SD-Access Transit
SD-Access
SD-Access Transit
Fabric Site
Fabric Site (SD-Access)
SD-Access SD-Access
Fabric Site Fabric Site
1
1
LISP
BGP BGP CONTROL PLANE LISP LISP
LISP VRF-lite MP-BGP / Other VRF-lite LISP
1
2
802.1Q 802.1Q
SGT (16 bits) SGT (16 bits) VXLAN SGT (16 bits) VXLAN SGT (16 bits) VXLAN SGT (16 bits)
VXLAN MPLS VXLAN DATA PLANE
Header
VLAN ID (12 bits)
Labels VPN (20 bits)
VLAN ID (12 bits)
Header Header VNID (24 bits) Header VNID (24 bits) Header VNID (24 bits)
VNID (24 bits) VNID (24 bits)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
For Your
Reference
Fabric Constructs
Transits – A Closer Look
IP-Based Transit SD-Access Transit
• Borders hand off traffic direct to external • Maintains Cisco SD-Access constructs
domain with VRF-lite and BGP (LISP,VXLAN,CTS) natively between sites.
• End-to-end policy maintained using manual • End-to-end policy maintained using Fabric
configuration encapsulation
• Requires remapping of VRFs and SGTs to • End-to-end automated by Cisco Catalyst Center
maintain policy and segmentation between
Sites • Uses domain-wide Control Plane Nodes for inter-site
control plane communication
• Traffic between sites use external networks’
control plane and data plane protocols • Requires WAN / MAN to support a large enough MTU
for 50-byte VXLAN header or use TCP MSS
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Cisco SD-Access Deployment For Your
Reference
Multisite Deployment with SD-Access Transit
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
SD-Access
Control Plane
Protocols
An Introduction to LISP Pub/Sub
SD-Access Control Plane Protocol
Cisco Catalyst Center 2.2.3.x
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
LISP Pub/Sub
What Challenges are We Solving?
Extensibility
• LISP Pub/Sub builds a new framework for LISP infrastructure.
• LISP Pub/Sub architecture is a building block for other features and capabilities:
• Dynamic Default Border Node
• LISP Backup Internet
• SD-Access Extranet
• Multicast across SD-Access Transit
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
LISP Pub/Sub
Architecture Introduction
• LISP Pub/Sub is new control plane protocol for SD-Access.
• It is a signaling protocol to carry information such as as prefixes, mappings, and other data.
• LISP Pub/Sub provides the capability to selectively push information.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
LISP/BGP Control Plane
Before LISP Pub/Sub
Reliance on BGP
• To push LISP Site-Registration table to another device, another protocol was needed.
• BGP was used as that transport
• This created an underlying reliance on BGP.
EBGP
EBGP IBGP Route-Reflect EBGP
Site-1
Site-1 Site-1
DC Route-Reflect
Import into map-cache Site-2
route-import database bgp
Map-Registration Map-Registration Import into map-cache
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
For Your
Reference
LISP/BGP Control Plane
Before LISP Pub/Sub
Reliance on BGP
• With BGP, LISP only knows the prefixes, not full EID-to-RLOC mappings.
• BGP populates map-cache with an incomplete entry
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
LISP Pub/Sub Control Plane
The Architecture Evolution
• The Control Plane Node notifies Border Nodes about mapping changes along with additional details
associated with those mappings.
• LISP Pub/Sub uses native LISP, devoid of external protocol such as BGP, to propagate the prefixes and
full mapping information.
Site-1
Site-1 Site-1
DC Site-2
LISP Pub/Sub
LISP Pub/Sub LISP Pub/Sub
LISP Pub/Sub
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
For Your
Reference
LISP Pub/Sub Control Plane
Basic Definitions – Part 1
Subscription
• The process LISP devices use to express interest for a certain portion of information within the
mapping system.
Publication
• The information that the mapping system sends to the Subscriber (the LISP device).
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
For Your
Reference
LISP Pub/Sub Control Plane
Basic Definitions – Part 2
Subscribers
• Border Nodes
Publishers
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Publishers Subscribers
Publisher Subscriber
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
For Your
Reference
LISP Pub/Sub
Details
• In release 2.2.3.x, LISP Pub/Sub is supported only for newly created fabric sites with devices running
IOS XE software ≥17.6.x
• Migration from LISP/BGP to LISP Pub/Sub is not currently available.
• When we upgrade Catalyst Center release to 2.2.3.x fabric sites created prior to this will continue to
operate with LISP BGP based fabric.
• Transit Control Plane Nodes can support LISP/BGP fabric sites or LISP Pub/Sub-based fabric sites, not
both simultaneously.
• The ongoing support for LISP/BGP is not planned to end, and LISP Pub/Sub is recommended for new
deployments.
• Migration workflow from LISP/BGP to LISP Pub/Sub is in development and tentatively planned for CY25.
Please reach out to Cisco for exact details/timelines.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
LISP Dynamic
Default Border
Node
LISP Pub/Sub - Dynamic Default Border
Current Network Challenges
Loss of Default Route
• If a Border Node’s losses the default route, it can take minutes for the network to converge (BGP).
• Note: This a common routing challenge that is not specific to SD-Access LISP Fabric.
Note: Convergence of the network after a Border Node reload is the responsibility of the IGP in the underlay.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Fabric Gateway
of Last Resort
LISP BGP
For Your
Reference
LISP BGP
Problem Statement
• Configure an Edge Node to use one or Border Nodes as the Fabric Gateway of Last Resort.
• Configure an xTR to use one or more PeTRs as the gateway of last resort in the Fabric Site.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
For Your
Reference
LISP BGP
Static Solution
• Static use-petr configuration is used on all the xTRs to configure the proxy-ETR.
• When the xTR receives NMR from map server, xTRs forward traffic to this configured proxy-ETR.
• Configured proxy-ETRs cannot be changed dynamically if external connectivity at the proxy-ETR
changes.
router lisp
! Output omitted for brevity
service ipv4
itr map-resolver 192.168.10.1
etr map-server 192.168.10.1
etr
use-petr 192.168.30.7
use-petr 192.168.30.8 Static use-petr configuration
proxy-itr 192.168.30.5
exit-service-ipv4
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
LISP BGP Forwarding Logic
Destination IP = 208.67.220.220
(Internet Destination)
Signal LISP
Map-Request: 208.67.220.220
Destination IP = 208.67.220.220
(Subsequent Packets)
Encapsulate and send to PETR
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Fabric Gateway
of Last Resort
LISP Pub/Sub
For Your
Reference
LISP Pub/Sub - Dynamic Default Border
Problem Statement
• Configure an Edge Node to use one or Border Nodes as the Fabric Gateway of Last Resort.
• Configure an xTR to use one or more PeTRs as the gateway of last resort in the Fabric Site.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
For Your
Reference
LISP Pub/Sub - Dynamic Default Border
Solution
• Implement LISP to monitor for the presence or absence of the default route Border Nodes.
• Do this on a per-VRF basis.
• Provide a method for the Border Nodes to registered the state of the default route to the
Control Plane Nodes.
• Dynamically program this default route state information into map-cache on the Edge Nodes.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
LISP Pub/Sub Solution Forwarding Logic
Destination IP = 208.67.220.220
(Internet Destination)
Signal LISP
Map-Request: 208.67.220.220
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
LISP Pub/Sub - Dynamic Default Border
Definition of Terms
Registration
• A Border Node tracks the state of the default route for a given VRF.
• A Border Node then notifies the Control Plane Node of the state of the default route.
De-prioritization
• A Border Node notifies the Control Plane Node of the loss of the default route.
• The Border Node registers itself with the Control Plane Node with a LISP Priority of 255.
• A LISP Priority of 255 indicates the Border Node cannot be used as a Fabric Gateway of Last
Resort.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
For Your
Reference
LISP Pub/Sub - Dynamic Default Border
Details
• Dynamic Default Border is enabled by default when we have external borders in the fabric.
• Dynamic Default Border works only with LISP Pub/Sub-based fabrics.
• Dynamic Default Border monitors the default route on External Border/s and registers that with Control
Plane node/s
• With Dynamic Default Border, if external border/s loses upstream connectivity, fabric Edge nodes will no
longer forward traffic to those external borders, and will dynamically detect and forward the traffic via
other available external borders
• With this functionality, traffic within the fabric will quickly converge minimizing traffic loss towards border
and traverse traffic through the other border.
• This avoids the need of configuring iBGP manually between external borders.
• With Dynamic Default Border feature fabric edges will not have static “use-petr” anymore instead they
will dynamically route the traffic to the border with active default route.
• Depending on the design, Border Node/s are going to register the default route with Local/Transit
Control Plane node/s
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
LISP Pub/Sub - Dynamic Default Border
LISP BGP
Internet
SD-Access Network
(Migration Site 4)
iBGP- Manual/Templates
eBGP- Automated
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
LISP Pub/Sub - Dynamic Default Border
LISP BGP
Internet
SD-Access Network
(Migration Site 4)
iBGP- Manual/Templates
eBGP- Automated
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
LISP Pub/Sub - Dynamic Default Border
LISP BGP
Internet
SD-Access Network
(Migration Site 4)
iBGP- Manual/Templates
eBGP- Automated
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
LISP Pub/Sub - Dynamic Default Border
LISP Pub/Sub
Internet
SD-Access Network
(Migration Site 4)
iBGP- Manual/Templates
eBGP- Automated
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
LISP Pub/Sub - Dynamic Default Border
LISP Pub/Sub
Internet
SD-Access Network
(Migration Site 4)
iBGP- Manual/Templates
eBGP- Automated
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
LISP Pub/Sub - Dynamic Default Border
LISP Pub/Sub
Internet
SD-Access Network
(Migration Site 4)
iBGP- Manual/Templates
eBGP- Automated
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
LISP Backup
Internet
LISP Backup Internet
Comparison of Functionality
Dynamic Default Border Node
• Border Convergence within a single Fabric Site.
• Results in the removal of using use-petr within the Fabric Site.
Backup Internet
• Essentially Border Convergence across an SD-Access Transit.
• Results in the removal of using use-petr within the Fabric Domain.
• LISP Backup Internet builds on top of Dynamic Default Border Node feature.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
LISP Backup Internet
Internet
Internet
EB`s- Tracks Default EB`s- Tracks Default
Route(0.0.0.0/0) Per Layer Route(0.0.0.0/0) Per Layer
3 VN with CP/TC 3 VN with CP/TC
SD-Access Transit
SD-Access Network
SD-Access Network
(Migration Site n)
(Migration Site 4)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
LISP Backup Internet
Internet
Internet
EB`s- Tracks Default EB`s- Tracks Default
Route(0.0.0.0/0) Per Layer Route(0.0.0.0/0) Per Layer
3 VN with CP/TC 3 VN with CP/TC
SD-Access Transit
SD-Access Network
SD-Access Network
(Migration Site n)
(Migration Site 4)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
LISP Backup Internet
Internet
Internet
EB`s- Tracks Default EB`s- Tracks Default
Route(0.0.0.0/0) Per Layer Route(0.0.0.0/0) Per Layer
3 VN with CP/TC 3 VN with CP/TC
SD-Access Transit
SD-Access Network
SD-Access Network
(Migration Site n)
(Migration Site 4)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
LISP Backup Internet
Internet
Internet
EB`s- Tracks Default EB`s- Tracks Default
Route(0.0.0.0/0) Per Layer Route(0.0.0.0/0) Per Layer
3 VN with CP/TC 3 VN with CP/TC
SD-Access Transit
SD-Access Network
SD-Access Network
(Migration Site n)
(Migration Site 4)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
LISP Backup Internet
Internet
Internet
EB`s- Tracks Default EB`s- Tracks Default
Route(0.0.0.0/0) Per Layer Route(0.0.0.0/0) Per Layer
3 VN with CP/TC 3 VN with CP/TC
SD-Access Transit
SD-Access Network
SD-Access Network
(Migration Site n)
(Migration Site 4)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
LISP Backup Internet
Key Takeaway
• In summary, local Internet is
preferred over Backup Internet
within the Fabric Site.
• If local Internet is down for the
site, then explore other options
provided by other fabric sites
(Backup Internet).
• Select this box on Border nodes if
we want to share internet access.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
LISP Backup Internet
Sample CLI Verification ( >17.6.2)
Internet
Internet
EB`s- Tracks Default EB`s- Tracks Default
Route(0.0.0.0/0) Per Layer Route(0.0.0.0/0) Per Layer
3 VN with CP/TC 3 VN with CP/TC
192.168.20.1 192.168.20.2
192.168.10.1
TCPN-1# show
SD-Access lisp remote-locator-set default-etrs
Transit
Codes: SD-Access Network
SD-Access Network 192.168.10.2 (Migration Site n)
(Migration Site 4) <Skipped some codes>
P = Primary/Direct in use, Backup not available
PB = Primary/Direct in use, Backup available
B = Backup in use, Primary/Direct not available
BP = Backup in use, Primary/Direct available
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
LISP Backup Internet
Sample CLI Verification ( >17.6.2)
Internet
Internet
EB`s- Tracks Default EB`s- Tracks Default
Route(0.0.0.0/0) Per Layer Route(0.0.0.0/0) Per Layer
3 VN with CP/TC 3 VN with CP/TC
192.168.20.1 192.168.20.2
192.168.10.1
TCPN-1# show
SD-Access lisp remote-locator-set default-etrs
Transit
Codes: SD-Access Network
SD-Access Network 192.168.10.2 (Migration Site n)
(Migration Site 4) <Skipped some codes>
P = Primary/Direct in use, Backup not available
PB = Primary/Direct in use, Backup available
B = Backup in use, Primary/Direct not available
BP = Backup in use, Primary/Direct available
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
LISP Remote
Internet
LISP Remote Internet
Internet
Internet
EB`s- Tracks Default EB`s- Tracks Default
Route(0.0.0.0/0) Per Layer Route(0.0.0.0/0) Per Layer
3 VN with CP/TC 3 VN with CP/TC
SD-Access Transit
SD-Access Network
SD-Access Network
(Migration Site n)
(Migration Site 4)
Remote SD-Access Site uses Internet from either site 4 or site n by default if Internet in those sites is shared
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
LISP Border
Node Priority
LISP Border Node Priority
Internet
Internet
EB`s- Tracks Default EB`s- Tracks Default
Route(0.0.0.0/0) Per Layer Route(0.0.0.0/0) Per Layer
3 VN with CP/TC 3 VN with CP/TC
9
6 9
SD-Access Transit
SD-Access Network
SD-Access Network
6 (Migration Site n)
(Migration Site 4)
• Remote SD-Access Site always prefers Migration Site 4 as LISP priority is lower.
• Remote SD-Access Site traffic goes via Migration site n only if Site 4 has no internet(default route available)
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
UI Automation
Internet
AS path Prepend
Border Priority
SD-Access
Campus VN Fabric IOT VN
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
For Your
Reference
Border Node Priority
Details
• Supported from Cisco Catalyst Center 2.3.3.x.
• Cisco Catalyst Center provides users the capability to select a border node to egress the fabric network traffic.
• Users can set the priority values between 1 and 9 (1 is the highest priority and 9 is the lowest. Lower number is
the preferred Border).
• By default (if user do not set a priority value), the border is assigned a priority value of 10. If border priorities are
not set ( or same across Borders), traffic is load balanced across the border nodes.
• User can modify border node priority in Day N without removing devices from fabric.
• The priority value set for a border is applicable to all the virtual networks that are handed-off from that border.
• If an SD-Access Transit interconnects the fabric sites, an external border with the Lowest priority is chosen to
send traffic to external networks.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Per Border Ingress steering with AS path For Your
Reference
Prepend
Details
• With Cisco Catalyst Center 2.3.7.x release, we will support ingress steering (influences incoming traffic) per Border node with AS
path Prepend which is achieved by redirecting traffic via route-map configurations.
• The addition of AS Prepend as the Ingress Steering feature allows fabrics to designate specific Border Nodes to receive incoming
traffic from outside the fabric.
• This functionality also enables fabrics to define fallback Border Nodes in case other devices fail to receive traffic. It is important to
note that this feature is distinct from Border Priority, which focuses on traffic within the fabric or egress steering. Ingress Steering,
on the other hand, determines which device should receive traffic from outside the fabric.
• The benefits of AS path prepending include influencing incoming traffic, load balancing, ensuring a proper return path, avoiding
congestion, enhancing application performance, and aiding in troubleshooting issues.
• It is disabled by default and can be enabled via a radio button per Border node.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Per Border Ingress steering with AS path For Your
Reference
Prepend
route-map PREPEND-AS-PATH permit 20
set as-path prepend 65001 65001 65001 ( User selected Prepend value to be 3)
• Once selected, Catalyst Center will push new/modify configurations involving BGP neighbors with PREPEND_AS_PATH route map with selected
length.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
For Your
Reference
The Knowledge Vault ..
For More Information
• Deep Dive on LISP Architecture: LISP Architecture Evolution - New Capabilities Enabling SD-
Access - BRKENS-2828
• Design best Practices: Cisco SD-Access Best Practices - Design and Deployment - BRKENS-
2502
• Information on SD-Access Transits: Cisco SD-Access – Connecting Multiple Sites in a Single
Fabric Domain - BRKENS-2815
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
Cisco SD-Access
Seamless Internet Connectivity – Take Away
• Using the SD-Access transit, packets are encapsulated between sites using the fabric VXLAN
encapsulation. This natively carries the macro (VRF) and micro (SGT) policy constructs
between fabric sites.
• Cisco SD-Access transit built with LISP Pub/Sub has built in functionalities such as :
• Dynamic Default Border
• LISP Backup Internet
• SD-Access Extranet
• Multicast over SD-Access Transit
• LISP Remote Internet (supported with LISP BGP as well)
• Border Priority (supported with LISP BGP as well)
• Per Border Ingress steering with AS path prepend(supported with LISP BGP as well)
• All the above functionalities are automated via Cisco Catalyst Center
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
Data Center Fabric Underlay Layer 2 Access
SD-Access Network SD-Access Network
Cisco
(Migration Site 1) (Migration Site 2)
Catalyst
ISE Center DHCP, DNS, AD
(Services)
#CiscoLive © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public
Progress Chart
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
Connecting SD-
Access Network to
Data Center
Cisco SD-Access
Datacenter
• Consistent Policy between Campus and Datacenter domains in an acquisition
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
Cisco
Catalyst
ISE Center DHCP, DNS, AD
(Services)
Data Center
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
ACI
SGT and EPG SGT and EPG
ACI Spine
SD-Access Network
(Migration Site 1)
ACI Leaf
Data Center
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
Allows contract to be built ISE Exchanges:
from Doctor EEPG to EMR EPG
Group Name: Doctor (Learned as EEPG)
SGT Binding Shared = 10.1.10.220
ACI Policy Domain
EMR EPG = Cisco SD-Access Policy Domain
ACI Spine ISE Retrieves:
10.1.100.52 is
Group Name: EMR EPG propagated
SD-Access Network
Binding Shared: 10.1.100.52 via SXP (Migration Site 1)
x
SRC:10.1.10.220
ACI Leaf
DST: 10.1.100.52 SRC:10.1.10.220
EPG DST: 10.1.100.52
EEPG Name = Doctor BGP/ (VRF-Lite)
Member = 10.1.10.220
EMR
10.1.100.52
SGT
Doctor
SRC:10.1.10.220 10.1.10.220
DST: 10.1.100.52
Data Center
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
ACI
SGT and EPG SGT and EPG
ACI Spine
Cisco ISE
SGTs deployed to DC
ACI Leaf
• Multi-Tenant
EPG 1 EPG 2
• Multiple L3Outs EPG 1 EPG 2
ESG1 ESG 2
• Multi-Pod ESG1 ESG 2
• Multi-VRF
• Filter SGTs sent to DC
• Filter EPGs/ESGs sent to
campus
Data Center
Cisco ISE 3.4, ACI 6.1(1) - LA for Solution
Cisco ISE 3.4 Patch 1, ACI 6.1(2) - GA
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
ACI Policy Domain
Tenant 2
ACI Spine
SGT 1 SGT 2
ESG1 ESG 2
L3Out
SGT 3 SGT 4
* SGT 3
Tenant 2 3. SGT Domain inbound rule from ISE to put the EPG
1(converted to SGTs) from Tenant 1 into SGT domain VN 1 to
ACI Spine send it to destination
ACI Leaf
VN1 VN2
4. SGT Domain inbound rule from ISE to put the ESG
ESG1 ESG 2
L3Out 1(converted to SGTs) in Tenant 2 into SGT domain VN 2 to SGT 1 SGT 2
send it to destination
*EPG 1 *ESG1
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
ACI Policy Domain
Tenant 2
ACI Spine
SGT DGT Contract
ACI Leaf
• ISE subscribes to selected ESGs/EPGs in ACI fabric
SGT 1 SGT 2
• ESGs/EPGs sent to firewall for enforcement
ESG1 ESG 2
L3Out
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
The Knowledge Vault ..
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
For Your
Cisco SD-Access to Cisco ACI Reference
Details
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 166
Progress Chart
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Global Partner Solution Advisors
NEW - Fully Virtualized, SD-Access Secure Campus Lab
Virtualized SD-Access Lab CTF Mission Contact
• Fully Customizable Topology with • Experience the SD-Access Virtual • GPSA is your source for no-
virtualized 9kv’s and 8kv’s Lab at Capture the Flag in The World cost, partner enabment and
• Access on dCloud or build on your of Solutions practice building!
existing Data Center • Use Cases – Fabric Sites and Virtual • Visit the Global Partner
• Fraction of the cost Network Provisioning, Fusion Experience booth (4227) across
• GPSA mentored lab buildout Automation, Extranet, Micro from Capture the Flag, for more
support available! Segmentation, and more! information.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
New Feature
• Network segmentation
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public
SD-Access Platform Support
Cisco Catalyst Center Data Sheet
Platform support based on the Fabric Role
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
Cisco SD-Access Scale Details
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
Summary and What’s Next
• Thank you. We can’t do this without you! ☺
• Keep sharing the feedback. We are listening.
• Ask the Cisco Sales or CX teams for help.
• Ask questions on the Cisco SD-Access communities:
http://cs.co/sda-community
• Go Cisco SD-Access!
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 174
Complete Your Session Evaluations
Earn 100 points per survey completed and compete on the Cisco Live
Challenge leaderboard.
#CiscoLive BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 175
• Visit the Cisco Showcase
for related demos
BRKENS-2811 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 176
Thank you
#CiscoLive