Professional Documents
Culture Documents
Deploying+Cisco+SD Access+ (ENSDA) + +4
Deploying+Cisco+SD Access+ (ENSDA) + +4
Border Operation
•Cisco SD-Access
Deployment Models
•Connecting the Fabric to
External Domains
Thank you!!!
Cisco SD-Access
Deployment
Models
Two Basic Types of Deployments
▪ Campus Networks (Large Sites)
Large- scale fabric site: multiple horizontally- scaled devices, per fabric site
Fabric-in-a-box
SD- Access for distributed campus
➢ Multiple fabric sites corresponding to a single fabric will be interconnected by a transit network area.
➢ The transit network area may be defined as a portion of the fabric which interconnects the borders
of individual fabrics, and which has its own control plane nodes — but does not have edge nodes.
Transit Network -1
(IP Transit)
Thank you!!!
Cisco SD-Access
Transit Types
Cisco SD-Access Transit
Understanding Transit Types
C C
B B B B
IP Transit
Fabric Fabric
Site 1 Site 2
Cisco DNA-Center
DATA+POLICY-PLANE
1
LISP BGP External Domain(BGP/IGP)
C
B
B External
Domain
B
IP Transit Border Hand off
DATA-PLANE
2
VXLAN VRF-LITE External Domain(IP/MPLS/VXLAN)
C
B
B External
Domain
B
IP Transit Border Hand off * Manual
POLICY-PLANE
3
SGT in VXLAN SGT Tagging External Domain ( IP ACL/SGT)
C
B
B External
Domain
B
Creating an IP Transit
IP-Transit
• Select the external handoff protocol
as BGP from the drop-down
• Specify the remote BGP AS number
Cisco SD-Access
Transit
Cisco SD-Access for Distributed Campus
Why Cisco SD-Access Transit?
Cloud
Data Centre • Fully Automated Site-to-Site Connection
• Seamless Policy Propagation
Campus 1
Campus 2 Campus 3
Cisco SD-Access for Distributed Campus
Why Cisco SD-Access Transit?
Cloud
Data Center
Campus 2 Campus 3
Cisco SD-Access Transit
CONTROL-PLANE
C C
B B B B
Cisco SD-Access Transit
Border Border
Cisco DNA-Center
DATA+POLICY-PLANE
Public Cloud
C
B B
Internet
Fabric Edge Nodes
SD-Access Border
Use Case 1 : Fabric Connecting to Unknown Networks
Unknown
unknown destinations
• Connects to any “unknown” IP prefixes (e.g. Internet,
Public Cloud, 3 rd Party, etc.) C
Known
Networks
DC
C
B B
Branch
B B
• Exports all internal IP Pools to outside (as aggregate),
using a traditional IP routing protocol(s).
Border Role =
Rest of Company(Internal)
Data Center
C
WAN
B B
Internet
Fabric Edge Nodes
SD-Access Border Deployment Options
Use Case 3 : Fabric Connecting to Everywhere– Automation
SD-Access Border Deployment Options
Use Case 3 : Fabric Connecting to Everywhere– Automation
IP Transit
Border 5.1.1.1
Control Plane
5 2.1.1.1
nodes
SDA Fabric
4
1.1.1.1 → 2.1.1.1
10.1.1.1 → 192.1.1.1
1.1.1.1 Edge 1.1.2.1 1.1.3.1 Edge 1.1.4.1
2
10.1.1.1 → 192.1.1.1
1 S
DNS Entry: Campus
Campus
10.1.1.0/24 10.3.0.0/24 Bldg 2
D.abc.com A 192.1.1.1 Bldg 1
SD-Access Border
Border - Forwarding from External Domain to Fabric Domain
1
Routing Entry: 3 EID-prefix: 10.1.1.1/32
Send traffic to exit point of Path Preference
Mapping Locator-set: Controlled
domain(Internal Border)
Entry 1.1.1.1, priority: 1, weight: 100 (D1) by Destination Site
192.1.1.0/24
Branch
Border 5.1.1.1
Control Plane
2 2.1.1.1
nodes
4 SDA Fabric
2.1.1.1 → 1.1.1.1
192.1.1.1 → 10.1.1.1
1.1.1.1 Edge 1.1.2.1 1.1.3.1 Edge 1.1.4.1
5
192.1.1.1 → 10.1.1.1
D
Campus
Campus
10.1.1.0/24 10.3.0.0/24 Bldg 2
Bldg 1
SD-Access Border Config
Internal Border Node
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
router lisp
• Add a Map Cache + Map-Request for locator-table default
Dynamic EIDs locator-set border
IPv4-interface Loopback0 priority 10 weight 10
• trigger a lookup for traffic coming from outside !
eid-table vrf USER instance-id 10
• Repeat for other IP Subnets and ipv4 map-cache site-registration
VRF’s in Fabric exit
Border Node as LISP xTR - Control Plane Connectivity
xTR
Thank you!!!
Fabric Border
Packet Flow &
Deep Dive –
External Border
SD-Access Border
Default Border - Forwarding to ExternalDomain
2 EID-Prefix: Not found , map-cache miss
Mapping Locator-Set: ( use-petr)
Entry 3.1.1.1, priority: 1, weight: 100 (D1)
INTERNET
193.3.0.0/24 D
4 Default
Border
10.2.0.1 → 193.3.0.1
3.1.1.1
5.1.1.1
Control Plane
nodes
3 5.2.2.2
SDA Fabric
1.1.2.1 → 3.1.1.1
10.2.0.1 → 193.3.0.1
1
10.2.0.1 → 193.3.0.1
Campus S Campus
Bldg 1 10.2.0.0/24 10.3.0.0/24 Bldg 2
SD-Access Border Config
External Border Node
IP Network
10.1.1.0/24 150.1.1.0/24
192.1.1.0/24
IP Network
10.1.1.0/24 150.1.1.0/24
192.1.1.0/24
IP Network
10.1.1.0/24 150.1.1.0/24
192.1.1.0/24
router lisp
• Fabric edge node has a default route to locator-table default
the External Border. locator-set edge
IPv4-interface Loopback0 priority 10 weight 10
!
ipv4 use-petr 3.1.1.1
Border Node as LISP PxTR - Control Plane Connectivity
xTR
Thank you!!!
Fabric Border
Packet Flow &
Deep Dive –
Anywhere Border
SD-Access Border Config
Anywhere Border Node
IP Network
10.1.1.0/24 BGP 192.1.1.0/24
IP Network
10.1.1.0/24 150.1.1.0/24
B B DNA
Host Pool 10 Edge Node 1 Border Node Fusion Router Shared Services
ip vrf User1
• The Shared Services are in the Global rd 1:1
Routing Table route-target export 1:1
route-target import 1:1
• Will form a routing adjacency in import ipv4 unicast map Shared_Services
!
each Address Family. ip vrf User2
rd 2:2
• Use import ipv4 unicast map to route-target export 2:2
route-target import 2:2
”leak” routes import ipv4 unicast map Shared_Services
B B DNA
Cisco
VRF DNACenter
DHCP/ IdentityService
DNS
Fusion
Router Shared Services
Fabric Border Connectivity
Shared Services (DHCP, AAA, etc) in a dedicated VRF
5.1.1.1/32 C
Control-Plane Node
Host Pool 10 Edge Node 1 Border Node Fusion Router Shared Services
ip vrf User1
• The Shared Services are in a unique rd 1:1
dedicated VRF of their own. route-target export 1:1
route-target import 1:1
• Will form a routing adjacency in route-target import 3:3
!
each Address Family. ip vrf User2
rd 2:2
• Use route-target import / export route-target export 2:2
route-target import 2:2
(leaking) to ”share” routes route-target import 3:3
• Dedicated Control-Plane in
use as the map-server/map-
resolver
70
Fabric Troubleshooting B C
Step 3: Verify BGP external prefixes are imported into LISP database
Control-Plane#show l i s p s i t e
LISP S i t e Registration Information
* = Some l o c a t o r s are down or unreachable
# = Some r e g i s t r a t i o n s are sourced by r e l i a b l e t r a n s p o rt