Professional Documents
Culture Documents
Shawn Wargo
Principal Engineer - Technical Marketing
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKCRS-2810
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Sessions are available Online @ CiscoLive.com
Tuesday (Jan 29) Wednesday (Jan 30) Thursday (Jan 31) Friday (Feb 01)
08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00 08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00 08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00 08:00-11:00 11:00-13:00 13:00-15:00 15:00-18:00
BRKCLD-2412 BRKCRS-3811
Cross-Domain Policy SD-Access Policy
2 Key Concepts
What is SD-Access?
3 Fabric Fundamentals
How does it work?
4 Controller Fundamentals
How does it work?
5 Take Away
Where to get started?
3 4
Complex
1 2 5
Time
Key Benefits
Why do you care?
Cisco’s Intent-Based Network
Delivered by Cisco Software Defined Access
SAAS
ACI
Data Center
LEARNING Branch
SD-WAN Wireless
Policy Automation Analytics
Control
SECURITY
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Cisco Software Defined Access
The Foundation for Cisco’s Intent-Based Network
Cisco DNA Center
Identity-Based
Policy and Segmentation
Policy definition decoupled
Policy Automation Assurance
from VLAN and IP address
B B Outside Automated
C
Network Fabric
Single fabric for Wired and
Wireless with full automation
Insights and
SD-Access
Telemetry
Extension User Mobility
Analytics and insights into
Policy follows User User and Application experience
IoT Network Employee Network BRKCRS-2810
What is Software Defined Access?
Key
Concepts
#CLUS BRKCRS-2810 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
What is SD-Access?
Campus Fabric + Cisco DNA Center (Automation & Assurance)
SD-Access
APIC-EM
NCP
1.X GUI approach provides automation &
ISE NDP
PI assurance of all Fabric configuration,
management and group-based policy
Cisco DNA
Center Cisco DNA Center integrates multiple
management systems, to orchestrate
LAN, Wireless LAN and WAN access
B B
Campus Fabric
CLI or API approach to build a LISP +
C
VXLAN + CTS Fabric overlay for your
enterprise Campus networks
Campus CLI provides backwards compatibility,
Fabric but management is box-by-box.
API provides device automation via
NETCONF/YANG
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
What is Software Defined Access?
Roles &
Terminology
1. High-Level View
2. Roles & Platforms
3. Fabric Constructs
SD-Access
What exactly is a Fabric?
A Fabric is an Overlay
An Overlay network is a logical topology used to virtually connect devices,
built over an arbitrary physical Underlay topology.
An Overlay network often uses alternate forwarding attributes to provide
additional services, not provided by the Underlay.
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
SD-Access
Fabric Terminology
Encapsulation
Hosts
(End-Points)
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
SD-Access
Fabric Underlay – Manual vs. Automated
Underlay Network
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
SD-Access
Fabric Roles & Terminology
Network Automation – Simple graphical
Automation user interface and intent based automation
NCP
Identity (e.g. NCP) of fabric devices
Services
ISE NDP Network Assurance – Data Collectors
(e.g. NDP) analyze Endpoint to App flows
Cisco DNA
Assurance and monitor fabric status
Center
Identity Services – NAC & ID Systems
(e.g. ISE) for dynamic Endpoint to Group
Fabric Border Fabric Wireless mapping and Policy definition
Nodes Controller
B B Control-Plane Nodes – Map System that
manages Endpoint to Device relationships
Intermediate Control-Plane
C Nodes Fabric Border Nodes – A Fabric device
Nodes (Underlay) (e.g. Core) that connects External L3
network(s) to the SD-Access Fabric
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
What is Software Defined Access?
Roles &
Terminology
1. High-Level View
2. Roles & Platforms
3. Fabric Constructs
SD-Access Fabric
Control-Plane Nodes – A Closer Look
B B
• Host Database supports multiple types of Endpoint
ID lookup types (IPv4, IPv6 or MAC)
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms The Channelco®
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms
Fabric Control Plane
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
SD-Access Fabric
Edge Nodes – A Closer Look
Edge Node provides first-hop services for Users / Devices connected to a Fabric
B B
• Register specific Endpoint ID info (e.g. /32 or /128)
with the Control-Plane Node(s)
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms The Channelco®
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms
Fabric Edge Node
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
SD-Access Fabric
Border Nodes
Border Node is an Entry & Exit point for data traffic going Into & Out of a Fabric
B B
• Internal Border (Rest of Company)
• connects ONLY to the known areas of the company
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms Winner
The Channelco®
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms
Fabric Border Node
* EXTERNAL ONLY
• Catalyst 3650/3850 • Catalyst 6500/6800 • Nexus 7700 • ISR 4300/4400 • ASR 1000-X/HX
• 1/mG RJ45 • Sup2T/Sup6T • Sup2E • AppX (AX) • AppX (AX)
• 1/10G SFP • C6800 Cards • M3 Cards • 1/10G RJ45 • 1/10G ELC/EPA
• 1/10/40G NM Cards • C6880/6840-X • LAN1K9 + MPLS • 1/10G SFP • 40G ELC/EPA
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
SD-Access Fabric
Border Nodes - Internal
B B
• Exports all internal IP Pools to outside (as
aggregate), using a traditional IP routing protocol(s).
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
SD-Access Fabric
Border Nodes - External
B B
• Exports all internal IP Pools outside (as aggregate)
into traditional IP routing protocol(s).
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
SD-Access Fabric
Fabric Enabled Wireless – A Closer Look
Fabric Enabled WLC is integrated into Fabric for SD-Access Wireless clients
Ctrl: CAPWAP
Data: VXLAN
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
For more details: cs.co/sda-compatibility-matrix
SD-Access Platforms
Fabric Enabled Wireless
* COMING SOON * No IPv6, AVC, FNF
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
What is Software Defined Access?
Roles &
Terminology
1. High-Level View
2. Roles & Platforms
3. Fabric Constructs
SD-Access Fabric
Virtual Network– A Closer Look
Virtual Network maintains a separate Routing & Switching table for each instance
B B
• Nodes add a VNID to the Fabric encapsulation
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
SD-Access Fabric
Scalable Groups – A Closer Look
B B
• Nodes add a SGT to the Fabric encapsulation
SGT
SGT SGT SGT
• SGTs are used to manage address-independent 17
4
SGT
8 25
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
SD-Access Fabric
Host Pools – A Closer Look
B B
• Fabric uses Dynamic EID mapping to advertise each
Host Pool (per Instance ID) Pool
Pool
Pool .4 Pool
.17 .8 .25
Pool
• Fabric Dynamic EID allows Host-specific (/32, /128 Pool Pool Pool .19 Pool
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
SD-Access Fabric
Anycast Gateway – A Closer Look
C
• Similar principle and behavior to HSRP / VRRP with Known Unknown
B B
• The same Switch Virtual Interface (SVI) is present
on EVERY Edge with the SAME Virtual IP and MAC
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
SD-Access Fabric
Layer 3 Overlay – A Closer Look
B B
• Fabric Dynamic EID mapping allows Host-specific
(/32, /128, MAC) advertisement and mobility
Dynamic
EID
• Host 1 connected to Edge A can now use the same
IP subnet to communicate with Host 2 on Edge B
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
SD-Access Fabric
Layer 2 Overlay – A Closer Look
B B
• Uses a pre-built Multicast Underlay to setup a P2MP
tunnel between all Fabric Nodes.
L2
Overlay
• L2 Broadcast and Multicast traffic will be distributed
to all connected Fabric Nodes.
VLAN VLAN VLAN
• Can be enabled for specific Host Pools that require
L2 services (use Stretched Subnets for L3)
NOTE: L3 Integrated Routing and Bridging (IRB) is not supported at this time.
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
What is Campus Fabric?
Fabric
Fundamentals
1. Control-Plane
2. Data-Plane
3. Policy-Plane
SD-Access Fabric
Campus Fabric - Key Components
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
SD-Access Fabric
Key Components - LISP
Routing Protocols = Big Tables & More CPU LISP DB + Cache = Small Tables & Less CPU
with Local L3 Gateway with Anycast L3 Gateway
BEFORE AFTER
IP Address = Location + Identity Separate Identity from Location
Prefix RLOC
192.58.28.128 ….....171.68.228.121
Prefix Next-hop 189.16.17.89
22.78.190.64
….....171.68.226.120
….....171.68.226.121
189.16.17.89 ….....171.68.226.120 172.16.19.90 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121 192.58.28.128 ….....171.68.228.121
172.16.19.90 ….....171.68.226.120 192.58.28.128 ….....171.68.228.121
192.58.28.128 …....171.68.228.121 Prefix Next-hop 189.16.17.89 ….....171.68.226.120
Mapping
189.16.17.89 …....171.68.226.120 22.78.190.64 ….....171.68.226.121
22.78.190.64 ….....171.68.226.121 189.16.17.89 ….....171.68.226.120
172.16.19.90 ….....171.68.226.120
Endpoint
172.16.19.90 …......171.68.226.120 22.78.190.64 ….....171.68.226.121
172.16.19.90 ….....171.68.226.120 192.58.28.128 ….....171.68.228.121
192.58.28.128 ….....171.68.228.121
189.16.17.89 …....171.68.226.120 192.58.28.128 …....171.68.228.121
Database
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
Routes are
192.58.28.128 …......171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 …......171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
Consolidated
Prefix
189.16.17.89
22.78.190.64
Next-hop
…......171.68.226.120
….....171.68.226.121
to LISP DB
172.16.19.90 ….....171.68.226.120
192.58.28.128 …....171.68.228.121
189.16.17.89 …....171.68.226.120
22.78.190.64 ….....171.68.226.121 Prefix Next-hop
172.16.19.90 …......171.68.226.120 189.16.17.89 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121 22.78.190.64 ….....171.68.226.121
189.16.17.89 …....171.68.226.120 172.16.19.90 ….....171.68.226.120
22.78.190.64 ….....171.68.226.121 192.58.28.128 …....171.68.228.121
172.16.19.90 …......171.68.226.120
192.58.28.128 ….....171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 …......171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
Prefix Next-hop
Prefix Next-hop 189.16.17.89 ….....171.68.226.120
189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121
22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120
172.16.19.90 ….....171.68.226.120 192.58.28.128 …....171.68.228.121
192.58.28.128 …....171.68.228.121
189.16.17.89 …....171.68.226.120
22.78.190.64 ….....171.68.226.121
172.16.19.90 …......171.68.226.120
Topology Routes
192.58.28.128 ….....171.68.228.121
189.16.17.89 ….....171.68.226.120
22.78.190.64 …......171.68.226.121
172.16.19.90 ….....171.68.226.120
192.58.28.128 ….....171.68.228.121
Endpoint Routes
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Fabric Operation
Control-Plane Roles & Responsibilities Control-Plane EID RLOC
a.a.a.0/24 w.x.y.1
b.b.b.0/24 x.y.w.2
c.c.c.0/24 z.q.r.5
d.d.0.0/16 z.q.r.5
(Control-Plane) b.b.b.0/24
c.c.c.0/24
d.d.0.0/16
x.y.w.2
z.q.r.5
z.q.r.5
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Fabric Operation
Control Plane Register & Resolution
Branch
Fabric Edge
Cache Entry (on ITR) Where is 10.2.2.2?
10.2.2.2/32 (2.1.2.1) Fabric Control Plane
5.1.1.1
Database Mapping Entry (on ETR) Fabric Edges Database Mapping Entry (on ETR)
10.2.2.4/32 ( 3.1.2.1)
10.2.2.2/32 ( 2.1.2.1)
3 EID-prefix: 10.2.2.2/32
Mapping Locator-set: Path Preference
Entry Controlled
2.1.2.1, priority: 1, weight:100
by Destination Site
1
DNS Entry:
Branch Non-Fabric Non-Fabric
D.abc.com A 10.2.2.2
10.1.0.0/24
Fabric Borders
S Fabric Edge
2
1.1.1.1
10.1.0.1 10.2.2.2 5.3.3.3
5 Fabric Edges
10.1.0.1 10.2.2.2
D
10.2.2.3/16 10.2.2.2/16 10.2.2.4/16 10.2.2.5/16
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Fabric Operation Fabric Control Plane
Host Mobility – Dynamic EID Migration Map Register 10.10.0.0/16 – 12.0.0.1
EID: 10.17.1.10/32
Node: 12.1.1.1 10.2.1.10/32 – 12.1.1.1
D 10.2.1.10/32 – 12.2.2.1
10.10.10.0/24
2.1.1.1
DC1 3.1.1.1
Fabric Borders 1.1.1.1
Mapping
System
10.2.1.10/32 – LISP0
10.2.1.10/32 - Local
IP Network
10.2.1.10 10.2.1.10
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
SD-Access Fabric
Unique Control-Plane extensions compared to LISP
Virtual Networks Layer-3 VN (VRF) only Both Layer-3 and Layer-2 VN (VRF)
support (using VXLAN)
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
What is Campus Fabric?
Fabric
Fundamentals
1. Control-Plane
2. Data-Plane
3. Policy-Plane
SD-Access Fabric
Key Components – VXLAN
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
VXLAN-GPO Header
Next-Hop MAC Address
Source MAC 48
Source IP 32
Src RLOC IP Address
Outer IP Header Dest. IP 32
Source Port 16 Dst RLOC IP Address
Segment ID 16
8 Bytes
Original Payload VN ID 24
Allows 16M
Reserved 8 possible VRFs
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Data-Plane Overview
Fabric Header Encapsulation
Inner
Fabric Data-Plane provides the following:
Outer
• Underlay address advertisement & mapping
• Automatic tunnel setup (Virtual Tunnel End-Points)
• Frame encapsulation between Routing Locators
Outer
• Nearly the same, with different fields & payload Encap
Inner
Inner
• LISP header carries IP payload (IP in IP)
• VXLAN header carries MAC payload (MAC in IP)
Decap
Triggered by LISP Control-Plane events
• ARP or NDP Learning on L3 Gateways
• Map-Reply or Cache on Routing Locators
Inner
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
SD-Access Fabric
Unique Data-Plane Extensions compared to VXLAN
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
What is Campus Fabric?
Fabric
Fundamentals
1. Control-Plane
2. Data-Plane
3. Policy-Plane
SD-Access Fabric
Key Components – Group Based Policy
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
SD-Access Policy
Two Level Hierarchy - Macro Level
Known Unknown
Networks Networks
SD-Access
VN VN VN
Fabric
Virtual Network (VN)
“A” “B” “C”
First level Segmentation ensures zero
communication between forwarding
domains. Ability to consolidate multiple
networks into one management plane.
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
SD-Access Policy
Two Level Hierarchy - Micro Level
Known Unknown
Networks Networks
SG
SG
1
SG SG
SG
4
SG SG
SG
7
SG
SD-Access
Fabric
Scalable Group (SG)
2 3 5 6 8 9
Second level Segmentation ensures
role based access control between
two groups within a Virtual Network.
Provides the ability to segment the
network into either line of businesses
or functional blocks.
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
SD-Access Policy
Policy Types
✓
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Group Assignment
Two ways to assign SGT
Campus
Access Distribution Core DC Core DC Access
MAB
Enterprise
Backbone
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
SD-Access Policy
Policy Contracts
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Group Propagation
VN & SGT in VXLAN-GPO Encapsulation
Encapsulation Decapsulation
IP Network
VXLAN VXLAN
VN ID SGT ID VN ID SGT ID
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
SD-Access Fabric
Unique Policy-Plane Extensions compared to CTS
QoS (App) Policy Not Supported App based QoS policy, to optimize
application traffic priority
Traffic Copy Policy Not Supported SRC/DST based Copy policy (using
ERSPAN) to capture data traffic
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
What is Cisco DNA Center?
Controller
Fundamentals
1. Architecture
2. User Interface
3. Workflows
Cisco DNA Center
SD-Access – Key Components
API
Cisco ISE
Identity 2.3
& Policy Automation
NCP Assurance
NDP
API API
Identity Services Engine Network Control Platform Network Data Platform
NETCONF
SNMP
SSH
AAA
RADIUS
EAPoL
Campus Fabric HTTPS
NetFlow
Syslogs
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
Cisco DNA Center
Appliance Models & Specifications
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Cisco DNA Center
High Availability Cluster
Telemetry Intent
Alerts
Network Control Violations Network Data
Platform Inventory, Topology, Host, Group Platform
Network State changes
Path Trace information
Campus
Fabric
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
Cisco DNA Center and ISE integration
Identity and Policy Automation
PxGrid
Campus Fabric REST APIs
Fabric Policy
Management Authoring
Workflows
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Cisco DNA Center and ISE integration
ISE roles in SD-Access
Admin/Operate
Network
Devices
DNA-Center
Things
Config Sync Context
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
What is Cisco DNA Center?
Controller
Fundamentals
1. Architecture
2. User Interface
3. Workflows
SD-Access
CLI and API vs. GUI
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
Cisco DNA Center
4 Step Workflow
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
Assure
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Assure
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Take Away
Things to Remember
Session Summary
B B
Campus
Fabric DESIGN PROVISION POLICY ASSURANCE
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
For more details: cs.co/sda-compatibility-matrix
SD-Access Support
Digital Platforms for your Cisco Digital Network Architecture
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
What to Do Next?
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
SD-Access Resources
Would you like to know more?
cisco.com/go/dna
cisco.com/go/sdaccess cisco.com/go/dnacenter
• SD-Access At-A-Glance • Cisco DNA Center At-A-Glance
•
•
SD-Access Ordering Guide
SD-Access Solution Data Sheet
cisco.com/go/cvd •
•
Cisco DNA ROI Calculator
Cisco DNA Center Data Sheet
• SD-Access Solution White Paper • SD-Access Design Guide • Cisco DNA Center 'How To' Video Resources
• SD-Access Deployment Guide
• SD-Access Segmentation Guide
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKCRS-2810
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
Complete your online
Session Survey
• Please complete your Online Survey
immediately after each Session
• Complete 4 Session Surveys AND
the Overall Conference Survey
(available from Thursday)
to receive your Cisco Live T-shirt
• All surveys can be completed via
the Cisco Events Mobile App or
the Communication Stations
Don’t forget: Cisco Live sessions will be available
on demand after the event at ciscolive.cisco.com
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
Continue
Your
Education Demos
in the
Walk-In
Self-Paced
Meet The
Engineer
Related
Training
Cisco labs 1:1 Sessions
Campus meetings
BRKCRS-2810 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
Thank You