Mira LG Ensda2.0b
Mira LG Ensda2.0b
V1.0
v1.0
Content
Lab 0 The MIRA LAB Access ......................................................................................................4
Task 1 Lab Access ..................................................................................................................4
Task 2 Topology and Addressing...........................................................................................8
Topology ........................................................................................................................................ 8
Addressing ..................................................................................................................................... 9
Task 3 Correct Access to the remote Student PCs ..............................................................10
Initial setup for RDP..................................................................................................................... 10
Lab 1 Configure Initial Cisco ISE setup ....................................................................................11
Task 1 Configure ISE via Setup Wizard ................................................................................12
Task 2 Applying a patch ......................................................................................................19
Lab 2 Using DNA Center Design App ......................................................................................24
Task 1 Creating Sites and Buildings – Network Hierarchy ..................................................25
Task 2 Defining Shared Common Servers – Network Settings ...........................................33
Task 3 Network Settings – Device credentials ....................................................................37
Task 4 Network Settings – IP Address Pools .......................................................................39
Lab 3 Integration of the ISEv with the DNA Center ................................................................44
Task 1 Configure roles for ISE nodes...................................................................................45
Task 2 Add the ISE node to DNA Center as a AAA server ...................................................49
Verification ..........................................................................................................................53
Lab 4 Using DNA Center Policy App........................................................................................54
Task 1 SD-Access Scalable Group Tag Creation for User Groups........................................55
Task 2 SD-Access Network Segmentation – Virtual Networks and SGTs ...........................61
Task 3 Applying a Layer-3 Policy – Group Based Access Control ........................................68
Lab 5 Discovering the SD-Access Underlay ............................................................................76
Task 1 Discover the SDA Underlay ......................................................................................77
Task 2 Configure underlay switches using LAN Automation ..............................................97
Task 3 Provisioning the SD-Access underlay network ..................................................... 110
Task 4 Building an Overlay Network ................................................................................ 116
Task 5 Reserved IP Pools for Host Onboarding................................................................ 119
Lab 6 Configuring Transit Site and Fusion Router ............................................................... 128
5. Open AnyConnect
Note: Please, DO NOT upgrade any software on the remote Jumper (student PCs) such java,
browser or DNA Center or Swicthes.
At the level of virtual machines we have one ISEv for integration with DNA Center, a DNS
Server, a Jumper PC, one Windows PCs, and Ubuntu machine.
Topology
The figure illustrates the lab topology that is used throughout the labs in this course.
Note 1: This lab guide is using POD1 values as example, be carefully with the addressing if
different POD is used.
Note 2: During the development of the guide please do not make any type of update either
in the DNA Center or in the switches
Overview
We have an ISE virtual machine deployed off an ISO. While you can deploy via OVA
downloaded from the Cisco site, we recommend using the ISO download instead. The reason
being is that you can configure the virtual machine requirements prior to deploying it. In the
past, we have seen ISE slow down after deploying an OVA and then changing the resources
on it (add/remove RAM, vCPUs, etc). It's easier to set it up right and size it right prior to
installing it on that VM.
Topology
RDP: administrator /
DNS 10.10.1#.110 1234QWer
After you enter this information, ISE will bring up the network interface, attempt to
contact the default gateway and name server and reboot if that is successful after setup
is complete.
Step 1 Connect via RDP on you Jumper PC 10.10.1#.10 with credentials: Win7 / NXos12345
Step 2 Open Vmware vsphere Client and introduce the IP: 192.168.100.33 with credentials
of your POD (dnac#/dnac#).
NOTE: In this document reference is made to the tasks for the POD1
Step 4 Open the context menu with the secondary button on the VM marked ISE-DNAC-
POD# choose Open Console and press Enter.
**********************************************
**********************************************
Introduce the command “show application status ise” to see that all processes are running,
this command takes a few seconds to show the list.
NOTE: This lab takes about 20 minutes to apply the patch, you can reprogram this lab before the
end of the class or for the last day.
Step 1 Open the browser and go to http://10.17.11.7/files/ and download the file ISE-
patchbundle-2.6.0.156-Patch3-19110111.SPA.x86_64.tar.gz
2. Click on Install
In Choose file and navigate to the Download folder and select the file ISE-patchbundle-
2.6.0.156-Patch3-19110111.SPA.x86_64.tar.gz
After a patch is applied to a node, it immediately reboots to complete the installation. You can
keep track of a node’s progress by logging into the CLI via SSH and executing the command
“show application status ise”.
5. Once started, we log in and in the top gear o the right select About Identity Services Engine
7. Close
The network hierarchy created in the Design Application should mimic the actual, physical
network hierarchy of your deployment.
Using DNA Center, you will create a network hierarchy of areas that can contain additional
areas or buildings and floors within areas. Devices map into the buildings and floors for
service provisioning.
Topology
RDP: administrator /
DNS 10.10.1#.110 1234QWer
Build the network hierarchy based on the geographic locations for your SD-Access
Campus fabric in the Cisco DNA Center GUI.
Step 2 Click the Add Site button to create a new site and the Area button should be selected.
Step 3 Create another Site (Area) by clicking Barcelona, and clicking on then, select Add
Area.
Step 6 Click Montserrat, then click the gear next to Montserrat, and select Add
Building.
Note: When the network devices are provisioned later, they will be added to the building
Montserrat. DNAC must know where a device is physically located in the topology and
geographically in order to provision policy and fabric configurations.
As the address is entered, the Design App will narrow down the known addresses to the one
entered.
Step 9 When Sant Cugat appears in the window below, select it.
The benefit of selecting a known address is that the longitude and latitude coordinates are
automatically provided, as they are required.
Step 12 Click Montserrat, and use the next to Ambar to add a building floor with the
Add Floor button.
• Height – 15 feet
• Floor # – 1
• Global settings affect your entire network and can include settings for servers (such as NTP,
Syslog, SNMP Trap, NetFlow Collector, etc.), IP address pools, and device credential profiles.
• Site settings override Global settings and can include settings for servers, IP address pools,
and device credential profiles.
DNA Center allows saving common resources and settings with Design App’s Network
Settings sub-application (tab). As described earlier, this allows information pertaining to the
enterprise to be stored so it can be reused throughout DNA Center. The idea is to define
once and use many.
Step 1 Click on Desing > Network Settings > Network on the menu bar.
Step 2 Once opened, a list of server settings, which are typical in every network environment,
are shown.
Step 4 Under DNS server, use the domain name dnac#.local, and type in the address
10.10.1#.110
Step 7 Click on Cisco DNA Center and review the results, you can see 1 DNS and 1 NTP
server
Use the table to populate the CLI and SNMPv2c Read and Write credentials.
Field Value
CLI Credentials Username dnac
Password NXos12345
Enable Password 1234QWer
SNMPv2c Read Name / Description publica
Read Community public
SNMPv2c Write Name / Description privada
Write Community private
Step 1 Go to DNA Center GUI and select Design > Network Settings > Device Credentials,
click on CLI
Step 3 Scroll down and Add SNMPv2c and in the Read and Write boxes add the data
according to the table above and give Save.
DNA Center supports both manually entering IP address allotments as well as integrating with
IPAM solutions, such as Infoblox, to learn of existing IP addresses already in use in the
network.
IP Address Pools required in the topology must be manually defined and configured. DNAC
does not provision the actual DHCP server, even if it is a Cisco device. It is simply setting aside
pools as a visual reference. These pools will be referenced later in the lab guide. These address
pools will be associated with VN (Virtual Networks/VRFs) during the Device On-Boarding
section.
POD2
IP Pool Name IP Subnet Mask Gateway DHCP Server DNS Server
Student_Pool 172.16.71.0 /24 172.16.71.1 99.2.2.2 10.10.12.110
Server_Pool 172.16.72.0 /24 172.16.72.1 99.2.2.2 10.10.12.110
AP_Global_Pool 172.16.73.0 /24 172.16.73.1 99.2.2.2 10.10.12.110
POD3
IP Pool Name IP Subnet Mask Gateway DHCP Server DNS Server
Student_Pool 172.16.81.0 /24 172.16.81.1 99.3.3.3 10.10.13.110
Server_Pool 172.16.82.0 /24 172.16.82.1 99.3.3.3 10.10.13.110
AP_Global_Pool 172.16.83.0 /24 172.16.83.1 99.3.3.3 10.10.13.110
Step 4 Click on Add to open a dialog for creating the Underlay-# IP Pools.
Note: The name of the IP Address Pool is arbitrary. It simply needs to be a descriptive name
that indicates the purpose of that pool
The Cisco Platform Exchange Grid (pxGrid) is a multivendor, cross-platform network system
that pulls together different parts of an IT infrastructure. Cisco pxGrid provides an API which
is secured via an SSL certificate system. DNA Center has automated the certificate process
to allow users to simply and easily integrate DNA Center to ISE in a secure manner.
In this Lab you will perform the following steps to integrate Cisco DNA Center with Cisco ISE:
ISE server management IP address
RADIUS server/ISE shared secret
ISE user login credentials
ISE FQDN name
Subscriber/Client name for PxGrid services
Inspect the Cisco ISE running configuration that must be enabled for successful ISE
integration with Cisco DNA Center.
Verify that the Cisco DNA Center is integrated successfully with Cisco ISE.
Topology
RDP: administrator /
DNS 10.10.1#.110 1234QWer
Step 1 On the ISE node, login using a web browser and the configured username and
password, and then accept any informational messages. From Jumper PC, open browser and
type: https://10.10.1#.100, username admin and password 1234QWer.
Step 3 Click on the ISEv# node hostname, and then under Role, click Make Primary.
Step 1 In the Cisco DNA Center - System menu select Settings and click in External Services
and choose Authentication and Policy Servers.
Click Add
Step 3 Use the Refresh button until communication establishes with ISE and the server
displays ACTIVE status. If communication is not established, an error message displays with
information reported from ISE regarding the problem to be addressed before continuing.
Step 4 Log in to ISE, and then navigate to Administration > pxGrid Services.
The client named dnac# is now showing Pending in the Status column.
Step 5 Check the box next to dnac#, below the list click Approve, and then click Yes to
confirm.
Step 6 In case you did not see the pxgrid_client_######_dnac_ndp entry in the All Clients
table, then use the ssh [email protected]#.100 to ISE console and use the show application
status ise command to verify thet PxGrid services are running on ISE. If they are not running,
Note If ISE is integrated with DNA Center after scalable groups are already created in ISE, in addition
to the default groups available, any existing ISE groups are also visible by logging in to DNA Center
and navigating to Policy > Registry > Scalable Groups. Existing ISE policies are not migrated to DNA
Center.
Step 8 Return to DNA Center and verify that the System Settings shows the AAA/ISE Server
as Active.
Step 9 You can also see the communication status by navigating from the gear icon to
System Settings > System 360. Under External Network Services, the Cisco ISE server shows
in Available status. With communications established, DNA Center requests a pxGrid
session with ISE.
ISE, by default, creates several SGTs. A new SGT will be created as part of the lab to
demonstrate the pxGrid communication between DNAC and ISE. These steps are used to
show that an SGT defined in ISE will be shown and available for policy in DNAC.
Topology
RDP: administrator /
DNS 10.10.1#.110 1234QWer
Pod1: 10.10.11.3
Fusion-Router# Pod2: 10.10.12.3
Pod3: 10.10.13.3 dnac / NXos12345
Step 3 Then click in Scalable Groups page to shows all the SGTs pushed from ISE. A new
SGT (Group) will be Added to demonstrate the pxGrid communication between ISE and
DNAC. Click on Create Scalable Group.
You will see the new Scalable group is created and syncing to our ise server.
Step 8 We are going to check if the Scalable Group appears in our ise server, go to your ise
server assigned 10.10.1#.100 and log in.
Step 11 In TrustSec click on Security Groups, remember we can’t add or delete neither
modify groups from ise if we want to create or remove needs to be done on your DNA
Center.
The Policy app supports creating and managing Virtual Networks, Policy Administration and
Contracts, and supports Scalable Groups. Most deployments will want to set up their SD-
Access Policy (Virtual Networks and Contracts) before doing any SD-Access Provisioning. The
general order of operation is Design, Policy, and Provision, corresponding with the order of
the Apps seen on DNAC’s dashboard However, because it is a Lab and to be more illustrative
we prefer to make the Provision before.
In this section, the overlay network (which has not been created, yet) will be segmented
using the DNAC Policy app. This process virtualizes the overlay network into multiple self-
contained Virtual Networks (VRFs).
By default, any network device (or user) within a Virtual Network is permitted to
communicate with other device (or user) in the same Virtual Network.
The later policy validation exercises will simulate deploying SD-Access in a Learning Center
setting. This allows the demonstration of SD-Access virtualization (VRFs) and segmentation
(SGTs) between well understood groups and entities such as Students, Employees, Guest and
Servers.
VRFs (VNs) are used to segment the network. SGTs are used to segment inside of VRFs
(Microsegmentation).
Step 1 Return to the Cisco DNAC Center, navigate to Policy -> Virtual Network.
Note: The Default Virtual Network has numerous SGT Groups, which were populated from
ISE when DNA Center was integrated with in previous steps. Ensure Students SGT appears in
the DEFAULT_VN to validate that the pxGrid connection between ISE and DNAC is
functioning correctly.
Step 4 Give the Virtual Network the Network Name of Campus_VN and Save
• Employees
• Production Servers
• Students
Note: Guest Virtual Network—Devices that are configured with special rules, which allow
guests limited access, for example our Access Point to register with WLC. Click this check box
to configure the virtual network as a guest network. You can create only one guest virtual
network.
The following steps will show how SD-Access (Secure Fabric) will be provisioned to establish
security policies with just a few clicks within DNA Center. The security policies created in this
section are referred to as SGACL (Security Group ACLs) in ISE. They are also referred to as
Layer-3 Policies as they enforce traffic based on Layer-3 information.
Three policies will be created using the information in the table below will help demonstrate
the ease of creating (and enforcing) end-to-end policy in DNAC.
Table of SGACL
Step 1 From the principal page to select Policy – Group-Based Access Control and click on
Click on Create Policies to add a new policy and select Source to Destination.
Step 4 The first policy denies traffic sourced by Employees and destined for Students. Select
Scalable Groups Employees and click Next.
Step 8 The policy will be created, and the page will reload in a few seconds.
Step 9 Click on icon to see TrustSec Matrix Table and Click on Enter full screen
This policy denies traffic sourced by Production_Server and destined for Students.
Step 12 Click on once the page refreshes itself, the three created policies are
displayed.
Click on
Different views of the ISE TrustSec Matrix can be selected. You may need to use both
scrolls bars on the right of the screen to navigate the Matrix.
Device Inventory retrieves and saves the details about the devices in its database. Device
Inventory refreshes every 25 minutes for each device. There are two methods for discovering
devices:
RDP: administrator /
DNS 10.10.1#.110 1234QWer
Pod1: 10.10.11.3
Fusion-Router# Pod2: 10.10.12.3
Pod3: 10.10.13.3 dnac / NXos12345
Step 1 Before creating a Discovery profile and running it, take a moment to look at the
underlay configuration of the equipment. Specifically observe the Border and Fusion Router
devices which have been configured so that there is connectivity in the network segment so
that the discovery between the DNA Center and the Border (Seed switch) is successful.
The devices can be accessed from JumperPC by clicking the Putty icon on the desktop. An
entry will be available for each devices console access.
Note: If for some reason the serial ports (COM) are not correctly associated in the Putty,
please check in Control Panel - System - Device Manager what are the available serial ports
and associate in Terminal Putty to access the consoles devices.
BORDER-POD1show running
hostname BORDER-POD1
ip routing
ip name-server 10.10.11.110
shutdown
interface GigabitEthernet1/0/3
no switchport
ip ssh version 2
line vty 0 4
password 1234QWer
login local
BORDER-POD1#ping 10.10.11.254
!!!!!
BORDER-POD1#ping 10.10.11.200
!!!!!
Step 4 Execute in Fusion-# the command show running-config and checking the following
baseline configuration.
FUSION-1#show running
hostname FUSION-1
ip name-server 10.10.11.110
default-router 172.16.63.14
dns-server 10.10.11.110
domain-name dnac1.local
default-router 172.16.61.14
dns-server 10.10.11.110
domain-name dnac1.local
default-router 172.16.62.1
dns-server 10.10.11.110
domain-name dnac1.local
interface Loopback99
ip address 99.1.1.1 255.255.255.255 please take note of the mask /24 o /32
interface GigabitEthernet0/0
no ip address
interface GigabitEthernet0/0.417
interface GigabitEthernet0/1
line vty 0 4
password 1234QWer
login local
According to the topology in the Gi0/0.417 sub interface of the Fusion router, it is the
connection to the 10.10.1#.0/24 enterprise network through the GW-SW and the Gi0/1 port
to the L3 connection to the Border switch for discovery.
FUSION-1#ping 10.10.11.254
!!!!!
FUSION-1#ping 10.10.11.200
!!!!!
PODs
Go to Design – Network Setting – your Building – IP Address Pool Select, click Reserved IP
Pool
Step 8 Return to DNA Center in the browser. Click on the Discovery tool from the home page.
Step 9 Go to Cisco DNAC Center – Tools - Discovery from the home page
Device IP Address
CDP Level: 4
Note: Outside of the lab, this IP address could be any L3 interface or Loopback on any switch
that DNA Center can access.
Normally you would sweep a large range of IP addresses that you have in your environment,
for lab you will discover a single device. Border Switch 9300 will have the role BORDER/CP
and Edge Switch have the role EDGE
Step 13 Scroll down the page and open the Advanced section.
Step 14 The final step is to verify SSH as a discovery. To do this, scroll down the page and
open the Advanced section. Ensure it has a blue check mark to it.
Step 15 To start the discovery process, click on Start in the upper right-hand corner.
Once the discovery starts, the page will present the devices and details as they are
discovered.
Note: Discovery may discover multiple devices per CDP, but by now only the Border switch
with the supplied credentials will be reachable successfully via CLI and SNMP. Full discovery
with this number of CDP hops may take up to ten minutes to complete.
You can find the differences between baseline file and the new configuration with the
following command:
BORDER-1
From version 1.3 you can go directly to Provision – Network Devices - Inventory, select the
BORDER Switch, click on Configuration and check the running-config
Step 18 Verify that the Status of the Border Switch is Not Provisioned (Unassigned
Devices)
Step 22 After giving Deploy and Apply, we can see how the Border switch has already been
assigned to the corresponding building.
Use this procedure if you are deploying LAN switches without existing configurations into
the underlay by using DNA Center’s LAN Automation capabilities. The device CLI and SNMP
credentials to be pushed by PnP, the network-reachable IP address pool used for
connectivity, and the seed devices (typically border switches) have been configured as part
of previous procedures.
Each seed device (BORDER) is expected to have an appropriate VTP mode and MTU
configuration (examples: vtp mode transparent, system mtu 9100). Ports on the seed device
connected to devices to be discovered must be in layer-2 mode (access port versus routed
port), and the seed device ports cannot be dedicated out-of-band (OOB) management ports.
The credentials supplied allow DNA Center and seed devices to work together to configure
the discovered devices and add them into managed inventory. Because all of the discovered
devices must be running the PnP agent with no previous configuration, any previously
configured switch to be used must be restored to a state where the PnP agent is running,
accomplished by using the following configuration mode and exec mode commands:
(config)#config-register 0x2102
write erase
reload
The IP pool used for LAN Automation should be sized significantly larger than the number of
devices to be discovered. The pool is divided in half, with one half used for VLAN 1 DHCP
services provided by the seed devices.
The second half of the pool is divided in half again, leaving a quarter of the total address
space for point-to-point link addressing, and a quarter for loopback addressing. Endpoints
should not be plugged into the switches, as they can exhaust the IP pool DHCP uses for PnP
provisioning.
Select Border switch, click Actions - Provision drop-down, click LAN Automation on the right
in the LAN Automation slide-out, fill in all of the parameters for the supported seed device.
Select the interfaces connected to the devices to be discovered, and then click Start.
Step 3 Click LAN Auto Status to view progress. Do not click Stop in this step. Wait until all
devices show a state of Completed, and then proceed to the next verification step.
Prematurely stopping the PnP process will leave the discovery in a state needing manual
intervention for recovery.
During the LAN Automation process, we can observe from the BORDER and EDGE switch
console how the DNA Center performs several successful configurations.
Aug 28 11:18:41.542: %CLNS-6-DFT_OPT: Protocol timers for fast convergence are Enabled.
Aug 28 11:22:51.358: %CLNS-5-ADJCHANGE: ISIS: Adjacency to 0101.3225.5068 (Vlan1) Up, new adjacency
Aug 28 11:22:51.358: %CLNS-5-ADJCHANGE: ISIS: Adjacency to 0101.3225.5068 (Vlan1) Up, new adjacency
Aug 28 11:30:37.742: %BFDFSM-6-BFD_SESS_DOWN: BFD-SYSLOG: BFD session ld:1 handle:1,is going Down Reason:
ECHO FAILURE
Aug 28 11:30:39.827: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down
EDGE
*Aug 28 11:19:28.000: %SYS-6-CLOCKUPDATE: System clock has been updated from 11:
22:47 UTC Sat Aug 28 2021 to 11:19:28 UTC Sat Aug 28 2021, configured from console by vty0.
Aug 28 11:19:28.000: %PKI-6-AUTHORITATIVE_CLOCK: System clock has been set. PKI timers get initialized now.
Aug 28 11:19:28.685: %PKI-4-NOCONFIGAUTOSAVE: Configuration was modified. Issue "write memory" to save new IOS PKI
configuration
Aug 28 11:21:02.140: %PNPA-DHCP Op-43 Msg: Op43 has 5A. It is for PnP
Aug 28 11:21:02.140: %PNPA-DHCP Op-43 Msg: After stripping extra characters in front of 5A, if any:
5A1D;B2;K4;I10.10.13.6;J80; op43_len: 27
Aug 28 11:22:15.152: AUTOINSTALL: Tftp script execution not successful for Vl1.
000198: Aug 28 11:22:48.027: yang-infra: ERROR: Failed to create a new self-signed trustpoint
000199: Aug 28 11:22:48.027: yang-infra: netconf-yang server has been notified to start
000200: Aug 28 11:22:48.548: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named dnac-sda has been generated or imported
000201: Aug 28 11:22:48.753: %LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback0, changed state to up
000202: Aug 28 11:22:48.761: %CLNS-6-DFT_OPT: Protocol timers for fast convergence are Enabled.
000205: Aug 28 11:22:50.256: %BFDFSM-6-BFD_SESS_UP: BFD-SYSLOG: BFD session ld:1 handle:1 is going UP
000206: Aug 28 11:22:50.383: %CLNS-5-ADJCHANGE: ISIS: Adjacency to 0101.3225.5065 (Vlan1) Up, new adjacency
000207: Aug 28 11:22:50.785: %CLNS-5-ADJCHANGE: ISIS: Adjacency to 0101.3225.5065 (Vlan1) Up, new adjacency
000208: Aug 28 11:22:52.155: %PNPA-DHCP Op-43 Msg: Op43 has 5A. It is for PnP
000209: Aug 28 11:22:52.155: %PNPA-DHCP Op-43 Msg: After stripping extra characters in front of 5A, if any:
5A1D;B2;K4;I10.10.13.6;J80; op43_len: 27
000213: Aug 28 11:22:58.881: %HMANRP-6-EMP_NO_ELECTION_INFO: Could not elect active EMP switch, setting emp active
switch to 0: EMP_RELAY: Could not elect switch with mgmt port UP
000214: Aug 28 11:23:02.527: %ONEP_BASE-6-SS_ENABLED: ONEP: Service set Vty was enabled by Platform
000217: Aug 28 11:23:13.381: %NDBMAN-5-ACTIVE: Switch 1 R0/0: ndbmand: All data providers active.
000218: Aug 28 11:23:18.243: %DMI-5-SYNC_START: Switch 1 R0/0: syncfd: External change to running configuration
detected. The running configuration will be synchronized to the NETCONF running data store.
000219: Aug 28 11:23:18.353: %DMI-5-NACM_INIT: Switch 1 R0/0: dmiauthd: NACM configuration has been set to its
initial configuration.
000220: Aug 28 11:23:18.389: %DMI-3-NETCONF_SSH_ERROR: Switch 1 R0/0: ncsshd_bp:NETCONF/SSH: error: Trustpoint does
not have a cert
000221: Aug 28 11:23:21.052: %DMI-5-SYNC_COMPLETE: Switch 1 R0/0: syncfd: The running configuration has been
synchronized to the NETCONF running data store.
000223: Aug 28 11:23:44.921: %SYS-5-CONFIG_I: Configured from console by dnac on vty2 (10.10.13.200)
000225: Aug 28 11:23:45.593: %SYS-5-CONFIG_I: Configured from console by dnac on vty2 (10.10.13.200)
000226: Aug 28 11:23:46.215: %SYS-5-CONFIG_I: Configured from console by dnac on vty2 (10.10.13.200)
000227: Aug 28 11:23:46.847: %SYS-5-CONFIG_I: Configured from console by dnac on vty2 (10.10.13.200)
000229: Aug 28 11:23:51.330: %PKI-6-CA_CERT_INSTALL: A CA certificate has been installed under trustpoint : DNAC-CA
Serial-number 00C48790CF64D1DE90
000230: Aug 28 11:23:51.846: %SYS-5-CONFIG_I: Configured from console by dnac on vty2 (10.10.13.200)
000231: Aug 28 11:23:51.923: %DMI-5-SYNC_START: Switch 1 R0/0: syncfd: External change to running configuration
detected. The running configuration will be synchronized to the NETCONF running data store.
000232: Aug 28 11:23:54.148: %SYS-5-CONFIG_I: Configured from console by dnac on vty2 (10.10.13.200)
000233: Aug 28 11:23:54.818: %DMI-5-SYNC_COMPLETE: Switch 1 R0/0: syncfd: The running configuration has been
synchronized to the NETCONF running data store.
000234: Aug 28 11:23:59.142: %SYS-5-CONFIG_I: Configured from console by dnac on vty2 (10.10.13.200)
000235: Aug 28 11:23:59.254: %DMI-5-SYNC_START: Switch 1 R0/0: syncfd: External change to running configuration
detected. The running configuration will be synchronized to the NETCONF running data store.
000236: Aug 28 11:23:59.914: %SYS-5-CONFIG_I: Configured from console by dnac on vty2 (10.10.13.200)
000237: Aug 28 11:24:02.403: %DMI-5-SYNC_COMPLETE: Switch 1 R0/0: syncfd: The running configuration has been
synchronized to the NETCONF running data store.
000238: Aug 28 11:30:32.940: %DMI-5-SYNC_NEEDED: Switch 1 R0/0: syncfd: Configuration change requiring running
configuration sync detected - 'action 1.4 cli command "ip address 10.132.255.67 255.255.255.254"'. The running
configuration will be synchronized to the NETCONF running data store.
000262: Aug 28 11:31:19.230: %PNPA-DHCP Op-43 Msg: Op43 has 5A. It is for PnP
000263: Aug 28 11:31:19.230: %PNPA-DHCP Op-43 Msg: After stripping extra charact
ers in front of 5A, if any: 5A1D;B2;K4;I10.10.13.6;J80; op43_len: 27
Username:
Step 1 Assign the Border-Router Role to BORDER-POD1.dna1.local switch and new swith
appears as Access by default.
BORDER-POD3 (Details)
(Interfaces-Ethernet Ports)
Step 3 Now we can observe the network topology in the icon of Topology
Step 5 Assign Fusion Router as CORE and assign to your building site
The Cisco DNA Center web interface made this possible with a simple five step process:
1.- Provision network devices. This was simply a matter of adding all previously defined
devices.
2.- Create a fabric domain. With SD-Access, the scope of a fabric domain can be arbitrarily
large or small. In our lab, we will define a new fabric called “FABRIC_POD#” and added all
previously defined devices to it using DNA Center’s Provision/Fabric module.
Importantly, this step creates a single logical fabric of multiple physical devices, while also
hiding the underlying mechanics (which can be quite complex) from network professionals.
3.- Define a Border node require explicit definition in SD-Access. This is as simple as clicking
on a previously defined Cisco Catalyst 9300 and designating it as a Border node.
4.- Define a Control Plane node. Similarly, in our lab we clicked on the same Catalyst 9300
Border switch and chose it to be the network’s Control Plane node.
5.- Define one or more Fabric Edge nodes. Clicking on the remaining switch in DNA Center
allowed us to designate them as Fabric Edge nodes.
Once the overlay (LISP) is provisioned, the routers and switches need to be made aware of
the IP Address Pools. These pools enable hosts to communicate through the Fabric. This is
done by binding the Reserved IP Address Pools with the previously created VNs. This is how
LISP keeps track of hosts and their applicable VRFs, effectively segmenting the network. SGTs
further segments the VRFs.
Step 1 In the DNA Center tab home page click Design – Network Settings and select your
Building or Floor to create the Reserved IP Address Pool for Virtual Networks
Reserved IP Pools
POD1
POD2
Step 5 Return the Cisco DNA Center and select Provision – Fabric and click in your
FABRIC_POD#
Step 6 Click on the Host Onboarding to start applying the IP pools for host devices.
This will utilize the IP Address Pools defined in the Design section.
Note: Sometimes the Virtual Networks will be displayed in a different order. They should be
alphabetical, although may appear out of order in this early release. This is GUI display error
that does not impact the configuration or provisioning.
Step 11 The previously defined IP Address Pools from Design Section are listed.
These Address Pools must be assigned to (bound to) a VN (VRF) in order for the Host Tracking
Data Base (HTDB), Segmentation, and Anycast Gateways to work properly.
Step 12 Returns DNAC to the Host Onboarding page for the FABRIC-POD#.
Provision - Fabric – FABRIC-POD# - Host Onboarding
Notice that the Campus Virtual Network is now blue, indicating it has Address Pools
provisioned.
Today the Dynamic Network Architecture Software Defined Access (DNA-SDA) solution
requires a fusion router to perform VRF route leaking between user VRFs and Shared-
Services, which may be in the Global routing table (GRT) or another VRF. Shared Services
may consist of DHCP, Domain Name System (DNS), Network Time Protocol (NTP), Wireless
LAN Controller (WLC), Identity Services Engine (ISE), DNAC components which must be made
available to other virtual networks (VN’s) in the Campus. Thus by creating Border Gateway
Protocol (BGP) peering’s from the Border Routers to the Fusion Routers, on the Fusion
Router the fabric VRF’s subnets which need access to these shared services will be leaked
into GRT, and vice-versa. Route maps can be used to help contain routing tables to subnets
specific to SDA Fabric.
Transit Sites
A transit site is a site that connects two or more fabric sites with each other or connects the
fabric site with external networks (Internet, data center, and so on). There are two types of
transit networks:
SDA transit: Used in LISP/VxLAN encapsulation to connect two fabric sites. The SDA transit
area may be defined as a portion of the fabric that has its own Control Plane Nodes, Border
Nodes, but does not have Edge Nodes.
Using SDA transit, an end-to-end policy plane is maintained using SGT group tags.
Border Switch
Connects to any “known” IP subnets attached to the outside network (e.g. DC, WLC, FW,
etc.)
• Exports all internal IP Pools to outside (as aggregate), using a traditional IP routing
protocol(s).
• Imports and registers (known) IP subnets from outside, into the Fabric Control Plane
System • Outside hand-off requires mapping the prefix context (VRF & SGT) from one
domain to another.
RDP: administrator /
DNS 10.10.1#.110 1234QWer
Pod1: 10.10.11.3
Fusion-Router# Pod2: 10.10.12.3
Pod3: 10.10.13.3 dnac / NXos12345
Step 1 From the Cisco DNA Center home page, click Provision.
Step 5
Enter a transit name for the network.
Step 6 Choose IP-Based as the transit type.
The routing protocol is set to BGP by default.
Cisco DNA Center only BGP is supported (for automated configuration). Any routing
protocol is supported if the configuration is going to be applied to the external
interface of the border manually. Select a number to be used as the local AS number.
Step 7
Enter the autonomous system number (ASN) for the transit network.
To establish the Layer 3 connectivity between the Border Switch and the Fusion Router, we
need a network segment and define the trunk interface in the Border switch.
Step 1 Create the Global IP Pool for the Layer 3 Handoff in Design – Network Setting –
Global – IP address pool
Step 2 Fill the Global IP Pool with the following data and Save:
Step 4 Complete the Reserve IP Pool template with the following data according to your
pod and Save:
CIDR Notation:
Step 9 Now you can select BORDER switch click on it and select first CP Node and later
Border Node
TRANSIT: EXTERNAL-TRANSIT
Interface: Gi1/0/2
Step 12 ADD
This Section covers verification of configuration on Border Routers related to BGP protocol,
Enter in BORDER switch and no shutdown interface Gi1/0/2 and verify is configured as
trunk and status UP
interface GigabitEthernet1/0/2
end
BORDER-POD3#show vlan
Te1/1/7, Te1/1/8
interface Loopback0
ip pim sparse-mode
ip router isis
. .
. .
. .
. .
BORDER-POD3#
interface Loopback1021
interface Loopback1022
end
interface Loopback1023
rd 1:4099
address-family ipv4
exit-address-family
BORDER-POD3#show vrf
LI0.4099
LI0.4100
rd 1:4100
address-family ipv4
exit-address-family
interface Vlan3001
no ip redirects
ip route-cache same-interface
interface Vlan3002
no ip redirects
ip route-cache same-interface
interface Vlan3003
interface Vlan3003
no ip redirects
ip route-cache same-interface
bgp log-neighbor-changes
bgp graceful-restart
address-family ipv4
exit-address-family
exit-address-family
exit-address-family
router lisp
locator-table default
locator-set rloc_519a88fa-3b01-48a7-9433-4a9624b5c2cc
auto-discover-rlocs
exit-locator-set
service ipv4
encapsulation vxlan
etr
sgt
proxy-etr
proxy-itr 10.132.255.65
map-server
map-resolver
exit-service-ipv4
service ethernet
itr
etr
map-server
map-resolver
exit-service-ethernet
instance-id 4097
remote-rloc-probe on-route-change
eid-table default
route-export site-registrations
map-cache site-registration
exit-service-ipv4
exit-instance-id
instance-id 4099
remote-rloc-probe on-route-change
service ipv4
route-export site-registrations
map-cache site-registration
exit-service-ipv4
exit-instance-id
instance-id 4100
remote-rloc-probe on-route-change
service ipv4
route-export site-registrations
map-cache site-registration
exit-service-ipv4
exit-instance-id
site site_uci
authentication-key 7 11511F50151053
exit-site
exit-router-lisp
router lisp
locator-table default
locator-set rloc_8c223f43-e91b-4c5e-af7d-d9d2fe0517a6
exit-locator-set
service ipv4
encapsulation vxlan
etr
sgt
use-petr 10.132.255.65
proxy-itr 10.132.255.68
exit-service-ipv4
service ethernet
itr
etr
exit-service-ethernet
instance-id 4097
remote-rloc-probe on-route-change
service ipv4
eid-table default
exit-service-ipv4
exit-instance-id
instance-id 4099
remote-rloc-probe on-route-change
dynamic-eid 172_16_81_0-Campus_VN-IPV4
exit-dynamic-eid
dynamic-eid 172_16_82_0-Campus_VN-IPV4
exit-dynamic-eid
service ipv4
exit-service-ipv4
exit-instance-id
instance-id 4100
remote-rloc-probe on-route-change
dynamic-eid 172_16_83_0-Guest_VN-IPV4
exit-dynamic-eid
service ipv4
exit-service-ipv4
exit-instance-id
instance-id 8188
service ethernet
broadcast-underlay 239.0.17.1
flood arp-nd
flood unknown-unicast
exit-service-ethernet
exit-instance-id
instance-id 8189
remote-rloc-probe on-route-change
service ethernet
broadcast-underlay 239.0.17.1
flood arp-nd
flood unknown-unicast
exit-service-ethernet
exit-instance-id
instance-id 8190
remote-rloc-probe on-route-change
broadcast-underlay 239.0.17.1
flood arp-nd
flood unknown-unicast
exit-service-ethernet
exit-instance-id
exit-router-lisp
The external device handling routing among multiple virtual networks and a global routing
instance acts as a fusion router for those networks, and the separation of connectivity is
maintained by using VRFs connected using interfaces with 802.1Q tagging to the border, also
known as VRF-lite.
Step 1 Open Putty from your Jumper PC and select the Fusion-# and enter with dnac /
NXos12345
Routing needs to be established between the border and the fusion router. Any IGP that
your border, fusion router, or firewall hardware support is supported. This Lab provides
configuration for BGP based on the Cisco DNA Center automated Layer 3 handoff BGP
configuration. This task can be used as guidance for implementing other routing protocols.
Appropriate loop prevention mechanisms should be implemented (distribute-list, prefix-list,
route-map, etc.).
Note: The Cisco Catalyst 3000, 6000, and 9000 platforms and the Cisco Nexus 7000 platform will use SVIs
for the VRFs that connect to the fusion router. The ASR 1000 Series and the 4000 Series ISR will use 802.1Q
sub interfaces for the VRFs that connect to the fusion router.
IP: 10.129.0.2 /30 IP: 10. 131.0.2 /30 IP: 10. 133.0.2 /30
IP: 10.129.0.6 /30 IP: 10. 131.0.6 /30 IP: 10. 133.0.6 /30
IP: 10.129.0.10 /30 IP: 10. 131.0.10 /30 IP: 10. 133.0.10 /30
The values of the vlans (30XX, 30YY and 30ZZ) will depend on those assigned in the
provisioning process to the border.
Note: The following configurations are for the POD1 and in our lab the fusion router will be
represented by an ISR 2901
Step 4 Configure the Sub-interfaces in the Fusion Router (Example for POD3)
interface GigabitEthernet0/0.3001
interface GigabitEthernet0/0.3002
interface GigabitEthernet0/0.3003
Step 5 Configure BGP Routing Protocol to establish the neighbor relationship with Border
switch.
Step 6 Advertise only the 10.10.1#.0 subnet and the DHCP IP address in the BGP table to be
learned by the Border Switch. This configuration is done at the address-family ipv4 level.
address-family ipv4
A prefix-list that matches the 10.10.1 #.0 subnet and the DHCP IP
A prefix-list that matches the subnets corresponding to the INFRA network segment (Pod1:
10.128.0.0/16 / Pod2: 10.129.0.0/16 / Pod3: 10.130.0.0/16) and the network segments of
the VRFs Campus_VN / AP pools and Guest_VN
address-family ipv4
exit-address-family
This Section covers verification of configuration on Fusion Routers related to BGP protocol.
FUSION-3#show ip bgp
FUSION-3#show ip route
FUSION-3#ping 172.16.81.14
!!!!!
FUSION-3#ping 172.16.82.14
!!!!!
FUSION-3#ping 172.16.83.14
!!!!!
!!!!!
BORDER-POD3#show ip bgp
Topology
POD1
Interface Device-Type Address Pool Auth Template
Gi1/0/12 User Devices 172_16_61_0 No Authentication
Gi1/0/13 User Devices 172_16_62_0 No Authentication
POD2
Interface Device-Type Address Pool Auth Template
Gi1/0/12 User Devices 172_16_71_0 No Authentication
Gi1/0/13 User Devices 172_16_72_0 No Authentication
POD3
Interface Device-Type Address Pool Auth Template
Gi1/0/12 User Devices 172_16_81_0 No Authentication
Gi1/0/13 User Devices 172_16_82_0 No Authentication
Example:
interface GigabitEthernet1/0/13
switchport access vlan 1021
switchport mode access
device-tracking attach-policy IPDT_POLICY
load-interval 30
no macro auto processing
spanning-tree portfast
spanning-tree bpduguard enable
end
Switch-10-132-255-68#conf t
Switch-10-132-255-68(config)#int gi1/0/13
Switch-10-132-255-68(config-if)#no spanning-tree bpduguard enable
Step 1 Run the VSphere Client from the JumperPC. We access vCenter to 192.168.100.33
with user and password dnac# (# is the POD).
Step 4 Verify that your host Student-DNAC# has received an IP of the range 172.16.X1.0/28
with the ipconfig command.
Step 8 Open Terminal and verify that the host Server-DNAC# has received an IP of the
range 172.16.62.0/28 with the ipconfig command.
Step 11 Enter the console of the fusion router through the Putty and validate with the show
ip dhcp binding command the IP addresses delivered to the 2 hosts.
Note: Pings between the Student and Server will success because they are in same
Campus_VN Virtual Network although they are in different network segments.
RDP: administrator /
DNS 10.10.1#.110 1234QWer
Step 1 Verify you can access via SSH to WLC with the following’s credentials: admin /
1234QWer from Jumper PC via Putty. In logins as: enter
Step 2 Navigate to the main DNA Center dashboard, under the Tools section click Discovery
and Add Discovery
Name: WIRELESS-LAN-#
Username: admin
Password: 1234QWer
The inventory discovery for the WLC starts, and when it is complete the device count
increments and shows Complete is displayed.
Before proceeding, use the Refresh button to update the Last Inventory Collection Status
until it is in Managed status.
Step 1 Navigate to the main DNA Center dashboard, under the Design section click Network
Profiles and Add Profile.
Step 2 Enter a Wireless Profile Name: MIRALAB-# and Profile Type: wlan and click Save
Step 3 Click on Assign site to MIRALAB-# Network Profile and select Building and Floor and
click OK
Step 2 Assign the site (example for POD 3: Global/Sevilla/Bonales/Topacio), click Next
Step 4 At the Summary screen review the configurations, click Deploy, at the slide out panel
keep the default selection Run Now, and then click Apply.
The WLC is assigned to the site and the provisioning starts. Use the Refresh button until
Provision Status shows Success before proceeding.
Step 1 The AP is connected to the fabric directly to an edge node within the fabric, port
Gi1/0/20.
Step 2 Navigate to PROVISION > Fabric, select the fabric, and then click Host Onboarding.
After the update is complete, the edge node switch ports connected to the APs are enabled
with a device tracking configuration recognizing APs and permitting the APs to get network
connectivity.
Step 9 Enter by RDP to the Jumper PC 10.10.1#.10, Win7 / NXoos12345 and from there
execute the Putty and open the consoles of the AP and Fusion Router.
The credentials by default for AP are cisco/Cisco and enable Cisco and the Fusion Router are
dnac/NXos12345
[*09/24/2021 16:58:43.2643]
[*09/24/2021 16:58:43.2643]
[*09/24/2021 16:58:43.2646]
[*09/24/2021 16:58:48.3066]
[*09/24/2021 16:59:59.0000]
[*09/24/2021 16:59:59.3797]
[*09/24/2021 16:59:59.4844]
[*09/24/2021 16:59:59.5266]
[*09/24/2021 17:00:02.3510] deinit DFS SM since radio is stopped before last CAC expired
[*09/24/2021 17:00:09.1136]
[*09/24/2021 17:00:09.2251]
[*09/24/2021 17:00:10.3315]
[*09/24/2021 17:00:11.4246]
Step 11 Go to the Fusion Router and type show ip dhcp binding command to confirm that
DHCP have delivered an IP in the AP segment.
Step 12 Check ping connectivity to the IP address of the AP from Router Fusion.
Now that the AP obtained an IP address and learnt the WLC's Management IP, the AP will
join the WLC.
Step 16 In the Edge Switch we can observe the default IP Gateway (Anycast Gateway) of
the AP with show ip int brief command.
Step 17 Once the APs are registered to WLC, they will appear in the Inventory page on DNAC.
Navigate to the main page of Provision and observe as AP was immediately added to the
inventory without waiting for an inventory refresh.
Step 21 As part of AP provisioning, some config pushed on WLC. An AP group will be created
with the name of the site it was mapped.
Note: If you find other AP Group Name, it is a product of previous configurations of some
past courses.
In Typical deployment, all users on a WLAN are mapped to a single interface on the WLC.
With the help of AP groups we can specify that which SSID will be shown by which Access
Point. Each access point advertises only the enabled WLANs that belong to its access point
group. We can create access point groups (AP Groups) and assign up to 16 WLANs to each
group. Each access point advertises only the enabled WLANs that belong to its access point
Step 1 Navigate to Design – Network Settings and click on Global IP Pool Address and create
the following Global IP address Pool according to the following table:
PODs
Guest_Pool_Wireless
POD1: 172.16.65.0 /24 172.16.65.1 99.1.1.1 10.10.11.110
POD2: 172.16.75.0 172.16.75.1 99.2.2.2 10.10.12.110
POD3: 172.16.85.0 172.16.85.1 99.3.3.3 10.10.13.110
POD1
POD2
POD3
Create SSIDs
Step 1 Check that the Wireless Profile has been created (Lab 8 - Task 2) in main DNA Center
dashboard, under the Design section click Network Profiles.
Step 2 From the main DNA Center dashboard, navigate to DESIGN > Network Settings>
Wireless, in the Enterprise Wireless section click + Add, in the Create an Enterprise Wireless
Network wizard, and supply the following information:
PODs
- Select the Type of Enterprise Network: Voice and Data or Data Only.
- Check the Fast Lane check box to enable fastlane capability on this network.
- Under Level of Security area, select the encryption and authentication type for each
network.
Step 4 Click Next. The Wireless Profiles window is displayed. You can associate this SSID
with the corresponding wireless profile MIRALAB-# created rrecently.
Step 6 Repeat this procedure for additional SSIDs Student_Per_Pod#, using the same
network profile and location but changing the level of security to WPA2 personal
with NXos12345 as pass phrase finally you will get the next result.
• WPA2 Personal—Provides good security using a passphrase or a preshared key (PSK). Allows
anyone with the passkey to access the wireless network.
• Open—Provides no security. Allows any device to access the wireless network without any
authentication.
Step 7 From the main DNA Center dashboard, navigate to DESIGN > Network Settings>
Wireless, in the Guest Wireless section click +Add, in Create the Guest Wireless Network
wizard, and supply the following information:
PODs
Step 8 Click Next. The Wireless Profiles window is displayed. You can associate this SSID
with the corresponding wireless profile MIRALAB-#.
Step 9 Click Finish to continue. The DESIGN > Network Settings> Wireless screen is
displayed.
Step 10 Repeat this procedure for additional Guest SSIDs Guest_Portal_Pod#, using the
same network profile and location, finally you will get the next result
The final result of the Enterprise and Guest Wireless SSIDs should be.
Step 1 In the Provision menu click Fabric – FABRIC_POD# - your Building Pod select Host
Onboarding in Virtual Networks Click on Guest_VN.
Note: Layer-2 Extension enables L2 LISP and associates a L2VNID to this pool. This is required.
The traffic type setting (Data or Data + Voice) is only relevant for wired clients. The
correspondent settings for wireless clients is done at the SSID level.
Step 5
To be able to select the network segments of each Wireless SSID. Go to Provision menu and
select WLC-POD #, click Actions – Provision again.
If you cannot see the wireless SSIDs, check in Network Profiles - Wireless that the Fabric
option is selected:
After completing the Wireless SSID Onboarding, push the configuration from the design to
the WLC.
Step 10 In Assign the site click Next, at the Configuration screen under Managed AP Location,
click Next, and then at the Advanced Configuration screen click Next again.
Step 11 At the Summary screen review the configurations, click Deploy, at the slideout panel
keep the default selection Run Now, and then click Apply.
The WLC is assigned to the site again and the provisioning starts. Use the Refresh button
until Provision Status shows Success before proceeding.
Step 12 Once the provision has been successful, you will see in the WLC the SSIDs which
we activate Admin Status ON are Enabled.
Step 15 Choose and connect to Guest Wireless SSID Guest_Open_Pod# of your respective
Pod.
Step 18 Validate that the Fusion Router has assigned the IP to the network
Guest_Open_Pod#.
Step 19 You can go to your WLC and check connected client details on Monitor – Client
Summary - Current Clients
Step 21 Test the connection with the other wireless Enterprise and Guest networks of your
respective Pod.
Once SD-Access has been segmented into Virtual Networks, security policies can be defined
to segment traffic inside of the VNs (microsegmentation). DNA Center will allow the
administrator to explicitly deny or explicitly allow traffic between Groups (SGTs) within
Virtual Networks. This policy is created in DNAC, pushed to ISE, and then finally pushed down
to the switches to enforce the policy.
The following steps will show how SD-Access (Secure Fabric) will be provisioned to establish
security policies with just a few clicks within DNA Center. The security policies created in this
section are referred to as SGACL (Security Group ACLs) in ISE. They are also referred to as
Layer-3 Policies as they enforce traffic based on Layer-3 information. The following tasks will
be executed in the following order:
802.1x configuration
Step 1 Choose Design > Network Settings > Network. In GLOBAL a list of default servers
appears.
Step 2 Create the user with the established access credentials who will have access to the
9300 switches (dnac / NXos12345, enable password: 1234QWer, email
admin#@gmail.com).
Step 3 At this point we can give Provision to the Border and Edge Switch so that the AAA
configuration is sent to them.
Switch-10-132-255-68#
line vty 0 4
line vty 5 15
line vty 16 31
Step 5 From the Jumper PC open the Putty pointing to the loopback0 of the Border Switch
via SSH:
Pod1: 10.128.255.65
Pod2: 10.130.255.65
Pod3: 10.132.255.65
aaa new-model
USER ATTRIBUTES
username 0 "dnac"
Message-Authenticato 0 <hidden>
There are three functional groupings for identity management and admin access in Cisco ISE,
with each group containing one or more components:
1.- Identities
– Users—Defined based on user data and assigned role. This component is where you can
configure a network access user identity for accessing resources and services in a Cisco ISE
network.
– Endpoints—Defined based on the MAC address, device policy, and device identity group
to which this endpoint belongs. This component is where you can configure a network-
capable device identity that can connect to and access resources and services in a Cisco ISE
network.
2.- Groups
– User Identity Groups—Defined based on group name, description, members, group type,
and assigned role. This component is where you can configure a user group by the group or
role name that can access resources and services in a Cisco ISE network.
– Policies—Role-based access control (RBAC) policies defined by rule name, groups, and
permissions. This component is where you can configure RBAC policies that allow admin
groups to access resources and services in a Cisco ISE network.
– Administrators—Defined based on admin user data, admin group, and assigned role This
component is where you can create and manage administrators who can access resources
and services in a Cisco ISE network.
– Admin Groups—Defined based on group name, description, members, group type, and
assigned role.This component is where you can create and manage administrator groups
who can access resources and services in a Cisco ISE network.
– Permissions—Defined based on group name and role, description, and menu and data
access permissions. This component is where you can create and manage menu and data
access permissions for admin groups to access resources and services in a Cisco ISE network.
Use this procedure to create a user identity group (and create or delete users within this
local user identity group). To create a user identity group, complete the following steps:
Step 1 From ISE, choose Administration > Identity Management > Groups > User Identity
Groups.
Step 2 In the Identity Groups navigation pane, click User Identity Groups, click Action, and
click Create Top User Identity Group.
The User Identity Groups page appears with two panels: Identity Group and Member Users.
Step 3 Click Add, in the Identity Group panel, enter values in the following fields.
• Name*
• Description
You can have several policy sets based on an area, such as policy sets based on location,
access type and similar parameters. When you install ISE, there is always one policy set
defined, which is the default policy set, and the default policy set contains within it,
predefined and default authentication, authorization and exception policy rules.
Authentication policies are configured within policy sets. Each policy set can contain a single
authentication policy with multiple rules. Priority of the authentication rules for processing
is determined based on the order of those rules as they appear within the Authentication
Policy table of the policy set itself (from the Set view page).
Authorization policies allow access to specific or all network endpoints and are created to
apply to groups of users and devices that share a common set of privileges and can also be
used as templates that you modify to serve the needs of another specific identity group,
using specific conditions or permissions, to create another type of standard policy to meet
the needs of new divisions, or user groups, devices, or network groups.
Authorization policies can contain conditional requirements that combine one or more
identity groups using a compound condition that includes authorization checks that can
return one or more authorization profiles. In addition, conditional requirements can exist
apart from the use of a specific identity group.
Step 10 Create the following Authorization Policy according to the following table:
Step 15 The next screen gives us information about the different parameters that can be
used to build the rule, click on the X
You have two options to deal with this first rule; Use it with the Use option or Save it in the
library. Click Select Use option.
• Closed Authentication: Any traffic prior to authentication is dropped, including DHCP, DNS,
and ARP.
• Easy Connect: Security is added by applying an ACL to the switch port, to allow very limited
network access prior to authentication. After a host has been successfully authenticated,
additional network access is granted.
• No Authentication
Step 2 Click in Host Onboarding and select Port Assigment and Scroll down to select Edge
Switch
If the Port Gi1/0/14 was configured please select, click Clear, Save and Apply
Step 1 In this task from the PC Jumper (RDP 10.10.1 # .10 Win7 / NXos12345) or your PC you
can connect to the Remote Laptop via Windows RDP.
Once connected to the remote Laptop, we will to connect to the Wired Network with 802.1x
authentication using the user credentials student1 / NXos12345 created in the ISE
Step 2 Before connecting to the wired network, you must Activate 802.1X in Windows as a
wired service, to do this, execute services.msc
Step 4 Go to Network Adapters and select the LAN or the network adapter that corresponds
and in properties click on the Authentication tab.
Step 7 Click in Additional Settings and Specify authentication mode like User
authtentication and click in Replace Credentials
Click Ok again
Step 15 Make connectivity tests between Laptop-# and Virtual Machine (Server-DNAC-#) are
not succesfully because there are a Contract with Deny rule even though they are on the
same Campus_VN Virtual network
Step 16 Go to Policy menu select and delete all GBAC policies with Set to Default Policy,
accept Warning and Yes.
Step 17 Make connectivity tests between Laptop-# and Virtual Machine (Server-DNAC-#)
again, are succesfully because there are not a police and they are on the same Campus_VN
Virtual network
Step 2 From the Laptop-DNAC-# PC verify that the ping and SSH to the Server-DNAC-# are
successful
SSH to Server
To allow certain applications, a customer contract is required. This section will show you
the steps to create the new contract and then walk you through applying it to the Students
and Production Servers groups.
Create the first line of the contract that denies SSH, and click on the + symbol to add
Name Source Protocol Contract Name Destination
Restrict_Faculty Students ssh, http Deny_SSH_HTTP_Only Production_Servers
Step 4 Create the second line of the contract that denies HTTP, and click Save
Step 5 Go to GBAC – Policies and build the policy between Students and
Production_Servers
Step 6 Upon completion DNA Center returns you to the Policy Administration page where
you can verify the saved policy now resides in the policy table, select Students and click
Deploy.
Click Deploy to deploy the updated policies to the network devices. When you click Deploy,
Cisco DNA Center requests the Cisco Identity Services Engine (Cisco ISE) to send notifications
about the policy changes to the network devices.
Step 8 Double click the Security Group ACL name to display the edit window screen where
the specific permits and denies are displayed.
Step 10 Modify the Access Contract (SGACL) and deny ICMP traffic, Save and Deploy
Select in Application the Advanced option where you can select ICMP protocol
Use this procedure to get a global view of the health of your lab, which includes network
devices and clients, and to determine if there are potential issues that must be addressed.
Step 1 Configure SNMP Configuration from the Cisco DNA Center home page, Setting –
System Settings.
Use this procedure to get a global view of your network and to determine if there are
potential issues that must be addressed.
The network health score exists only in the context of a location. If the location of a device
is not available, it is not counted in the network health score.
Trend
Step 3 Scroll down to Network Devices and select BORDER-POD# and check status.
Physical Neighbor Topology, displays a topology view of a specific device and shows how
that device is connected to neighboring devices.
Path Trace, display a network topology between a specified source device and a destination
device. The topology includes the path's direction and the devices along the path, including
their IP addresses. The display also shows the protocol of the devices along the path
(Switched, STP, ECMP, Routed, Trace Route) or other source type.
Event Viewer
The Client Health window appears with dashlets, as described in the following table.
• Wired or Wireless Client Health Summary Score—The Wired or Wireless Client Summary
Health Score is the percentage of clients that onboarded successfully and have good
connectivity.
• Client Count—Count of Active, Inactive, and New client devices.
New clients are clients that attempted to onboard after the 5-minute health score calculation
window started. The health score for these clients will be included in the next 5-minute
calculation window.
• Client Health Summary Charts—Provides two types of charts:
• Latest—Displayed by default. This snapshot-view chart provides the distribution of clients
that passed or failed to onboard within the last 5 minutes. Then, from the number of clients
that onboarded successfully (passed), the chart provides the percentage of clients that have
good or fair connectivity.
Step 2 Click on any client (p.e. 172.16.85.5) to open a slide-in pane with additional details.
Onboarding, Show the topology of how a client got on the network, including information
about the following services: AAA and DHCP.
When you initiate a path trace, the Cisco DNA Center controller reviews and collects network
topology and routing data from the discovered devices. It then uses this data to calculate a
path between the two hosts or Layer 3 interfaces, and displays the path in a path trace
topology. The topology includes the path direction and the devices along the path, including
their IP addresses. The display also shows the protocol of the devices along the path
(Switched, STP, ECMP, Routed, Trace Route) or other source type
Step 3 From Device 360 window, scroll down to Path Trace category
Step 6 The path trace topology appears. The IP addresses, protocol, and the time stamp
indicating when the path trace was last updated display above the topology.
Hover your cursor over a device to display CPU and memory utilization.
This allows network administrators to save time and avoid mistakes caused by manual
configuration. We also saw how we can seamlessly roll out policy across the network
within seconds and in accordance to Cisco CVD best practices.
Network administrators do not have to deal with the differences in command line interface
(CLI) across platforms. In some cases, however, network administrators need to deploy
customized configuration to network devices. For this purpose, Cisco DNA Center provides
a template programmer.
Step 1 We will start with creating a configuration template for an access switch. We will use
the template for basic configuration. We will also do basic testing of the template-editor
capability to support variables.
From the Cisco DNA Center dashboard, scroll down to the “Tools” section. Select “Template
Editor”.
Step 3 Select “Create Template” within the “C9K-Templates-POD#” project and Add
Template:
For “Device Type” start typing “9300”. Cisco DNA Center will populate the devices that
match with the input. select “Cisco Catalyst 9300 Series Switches” from the drop-down
menu.
Back to Add New Template and for “Software Type” select “IOS-XE”.
Click on “Add”:
Step 6 The CLI commands for the template programmer are provided in the file “Template-
Commands-POD.txt” located in the Jumper PC Desktop DNAC# Folder:
hostname $hostname
vlan $vlanNumber
interface $interfaceName
description $description
Step 8 After saving the template, you need to version the template. You must version the
template every time you make changes to the template.
To do that, from the Actions drop-down list, select Commit. You can enter a commit note
when the Commit window appears. If you Commit without saving the template, you will be
prompted to save the changes. Go to the “Actions” menu and “Commit”:
We can design and create the profile one and reuse across multiples sites in the network.
This approach provides: simplified network deployment, configuration consistency and
integrated IT process flows.
In Wireless lab, we used wireless profiles for wireless configuration. In this exercise, we will
follow a similar process.
Before provisioning the template, ensure that the templates are associated with a network
profile and the profile is assigned to a site. During provisioning, when the devices are
assigned to the specific sites, the templates associated with the site through the network
profile appears in the advanced configuration.
Step 10 From the main Cisco DNA Center Dashboard, go to the “Design” menu and select
“Network Profiles”. Create a Switching Profile
Template: C9K-Branch-Template
• Profile Name
• Type
• Sites
• Action
Step 14 In Assign Site select with check list to add sites to the selected profile and Save
We will be using “Run Commands” for these “show commands”. In order to do this, we need
to go to the “Inventory” tool and click on the equipment.
Click on Action – Others – Run Commands
Step 3 We will follow the same workflow we used for standard network provisioning:
Click Next
Click Next
Step 4 Once you receive the message that the configuration has been successful, go back
to the browser tab where you ran “ Run Command”
Run the commands again and check the results:
Before we start, we need to know what is an API, API is the acronym for Application
Programming Interface, which is a software intermediary that allows two applications
to talk to each other.
An example of an API could be when you use an application on your mobile phone, the
application connects to the Internet and sends data to a server. The server then retrieves
that data, interprets it, performs the necessary actions and sends it back to your phone.
The application then interprets that data and presents you with the information you
wanted in a readable way.
Representing Data
Is the way how computers share and display the information between them, One
computer has to put the data in a format that the other will understand.
The most common formats found in modern APIs are JSON (JavaScript Object Notation)
and XML (Extensible Markup Language) and Yaml (Ain't Markup Language).
Let’s see some examples displaying the same information in these three formats. We
will talk about a pizza order. The pizza will have original crust, and three toppings (We
will use a list) cheese, pepperoni and garlic, and the status of the order.
JSON is a very simple format that has two pieces: keys and values. Keys represent an
attribute about the object being described and the values are the parts to the right.
These are the actual details of the order. Also, important to know that in JSON, a value
that starts and ends with square brackets ([]) is a list of values like we see in the toppings.
Key / Value
{
"crust": "original",
"toppings": ["cheese", "pepperoni", "garlic"],
"status": "cooking"
}
crust: original
toppings:
- cheese
- pepperoni
- garlic
status: cooking
Postman is a great tool when trying to analyze RESTful APIs made by others. Postman is
an API (application programming interface) development tool that helps to build, test,
and modify APIs.
It has the ability to make various types of HTTP requests (POST, GET, PUT, PATCH,
Delete).
The main Major of network automation is automating the configuring and managing
devices through automation tools, testing, deploying the network devices within a short
time, and operating smoothly.
Network automation comes to automate tasks and reduce the time and cost, Etc.., and the
important goal is to reduce human error and lower operating expenses.
Objectives
When you have completed this lab, you will be able to:
In this task you will launch the Postman-RESTful Client from your student PC;
then login to Cisco DNA Center.
Step 2 Click on Collections – Cisco DNA Center APIs and select Authentication
As we know Cisco DNA Center accepts REST requests from authenticated users only
X= Your POD
Step 4 Click Authorization and put Username admin and Password NXos12345 of DNA
Center.
After configuring the authentication method, we have to perform a POST API call with click
Send
In the response there is our token, that we will use in the future calls.
Step 6 To configure authorization with token, we have to add a header with following
values:
Key – X-Auth-Token
Value – Here you have to paste the generated token from the previous call response
From now on, we can perform an API calls to the Cisco DNA Center.
Note: Remember to paste the Token without the quotes and without spaces.
We will take a look at the network devices, that are present in the DNA Center. To fetch all
network devices, we have to perform a GET request.
https://10.10.1X.200/dna/intent/api/v1/network-device
Step 1 Go to Collection – Cisco DNA Center APIs Network Devices select Network Devices
and click the fisrt GET:
GET https://{{dnac}}:{{port}}/api/v1/network-device/1/14
Step 3 Before clicking Send, do not forget in the Headers tab to paste the Token generated
previously without the quotes and without spaces.
"response": [
"description": "Cisco IOS Software [Everest], Catalyst L3 Switch Software (CAT9K_IOSXE), Version 16.6.5, RELEASE SOFTWARE (fc3)
Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2018 by Cisco Systems, Inc. Compiled Mon 10-Dec-18 12:52 by
mcpre",
"memorySize": "NA",
"serialNumber": "FCW2239L0XV",
"deviceSupportLevel": "Supported",
"softwareType": "IOS-XE",
"softwareVersion": "16.6.5",
"lastUpdateTime": 1613552407668,
"roleSource": "MANUAL",
"errorCode": null,
"errorDescription": null,
"interfaceCount": "0",
"lineCardCount": "0",
"lineCardId": "",
"locationName": null,
"hostname": "BORDER-POD1.dnac1.local",
"managementIpAddress": "10.129.255.253",
"platformId": "C9300-24T",
"reachabilityFailureReason": "",
"reachabilityStatus": "Reachable",
"snmpContact": "",
"snmpLocation": "",
"tagCount": "0",
"tunnelUdpPort": null,
"uptimeSeconds": 1122533,
"waasDeviceMode": null,
"apManagerInterfaceIp": "",
"associatedWlcIp": "",
"collectionStatus": "Managed",
"macAddress": "34:f8:e7:5c:8f:00",
"location": null,
"instanceUuid": "1012f00f-ec4b-43a9-a6d9-b8131c0fe878",
"instanceTenantId": "5ec67218e6902500cbb974df",
},
"memorySize": "NA",
"family": "Routers",
"serialNumber": "FCZ1833C28R",
"deviceSupportLevel": "Unsupported",
"softwareType": "IOS",
"softwareVersion": "15.2(4)M6a",
"lastUpdateTime": 1613560805975,
"roleSource": "MANUAL",
"errorCode": null,
"errorDescription": null,
"interfaceCount": "0",
"lineCardCount": "0",
"lineCardId": "",
"locationName": null,
"hostname": "FUSION-1.dnac1.local",
"managementIpAddress": "10.129.255.254",
"platformId": "CISCO2901/K9",
"reachabilityFailureReason": "",
"reachabilityStatus": "Reachable",
"snmpContact": "",
"snmpLocation": "",
"tagCount": "0",
"tunnelUdpPort": null,
"uptimeSeconds": 1405675,
"waasDeviceMode": null,
"apManagerInterfaceIp": "",
"associatedWlcIp": "",
"macAddress": "1c:6a:7a:16:1b:d0",
"location": null,
"role": "CORE",
"instanceUuid": "ddee799a-30a1-4ff2-8175-cbe334daf671",
"instanceTenantId": "5ec67218e6902500cbb974df",
"id": "ddee799a-30a1-4ff2-8175-cbe334daf671"
},
"description": null,
"memorySize": "NA",
"serialNumber": "FCW2247N6A3",
"deviceSupportLevel": "Supported",
"softwareType": null,
"softwareVersion": "8.5.131.0",
"lastUpdateTime": 1613566168904,
"roleSource": "AUTO",
"errorCode": "null",
"errorDescription": null,
"interfaceCount": "0",
"lineCardCount": "0",
"lineCardId": "",
"locationName": null,
"hostname": "OshoAP",
"managementIpAddress": "172.16.63.6",
"platformId": "AIR-AP3802I-E-K9",
"reachabilityStatus": "Reachable",
"snmpContact": "",
"snmpLocation": "Global/Barcelona/Montserrat/Ambar/Piso2",
"tagCount": "0",
"tunnelUdpPort": "16666",
"uptimeSeconds": 526902,
"waasDeviceMode": null,
"apManagerInterfaceIp": "10.10.11.115",
"associatedWlcIp": "10.10.11.115",
"bootDateTime": null,
"collectionStatus": "Managed",
"collectionInterval": "NA",
"inventoryStatusDetail": "NA",
"macAddress": "70:b3:17:b1:dc:a0",
"location": null,
"role": "ACCESS",
"instanceUuid": "2feba8f8-307b-4307-83d4-7d4d082fee33",
"instanceTenantId": "5ec67218e6902500cbb974df",
"id": "2feba8f8-307b-4307-83d4-7d4d082fee33"
},
"description": "Cisco IOS Software [Gibraltar], Catalyst L3 Switch Software (CAT9K_IOSXE), Version 16.12.3a, RELEASE SOFTWARE
(fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2020 by Cisco Systems, Inc. Compiled Tue 28-Apr-20
09:37 by mcpre",
"memorySize": "NA",
"serialNumber": "FCW2239S0GQ",
"deviceSupportLevel": "Supported",
"softwareType": "IOS-XE",
"lastUpdateTime": 1613560061774,
"roleSource": "AUTO",
"errorCode": null,
"errorDescription": null,
"interfaceCount": "0",
"lineCardCount": "0",
"lineCardId": "",
"locationName": null,
"hostname": "Switch-10-128-255-68.dnac1.local",
"managementIpAddress": "10.128.255.68",
"platformId": "C9300-24T",
"reachabilityFailureReason": "",
"reachabilityStatus": "Reachable",
"snmpContact": "",
"snmpLocation": "",
"tagCount": "0",
"tunnelUdpPort": null,
"uptimeSeconds": 1050379,
"waasDeviceMode": null,
"apManagerInterfaceIp": "",
"associatedWlcIp": "",
"collectionStatus": "Managed",
"macAddress": "34:f8:e7:8e:6f:80",
"location": null,
"instanceUuid": "4221d0d1-cde2-4523-b0cf-633854298ce6",
"instanceTenantId": "SYS0",
"id": "4221d0d1-cde2-4523-b0cf-633854298ce6"
},
"memorySize": "3735322624",
"serialNumber": "FCW2247M0M5",
"deviceSupportLevel": "Supported",
"softwareVersion": "8.5.131.0",
"lastUpdateTime": 1613566168904,
"roleSource": "AUTO",
"errorCode": null,
"errorDescription": null,
"interfaceCount": "0",
"lineCardCount": "0",
"lineCardId": "",
"locationName": null,
"hostname": "WLC-POD1",
"managementIpAddress": "10.10.11.115",
"platformId": "AIR-CT3504-K9",
"reachabilityFailureReason": "",
"reachabilityStatus": "Reachable",
"snmpContact": "",
"snmpLocation": "",
"tagCount": "0",
"tunnelUdpPort": "16666",
"waasDeviceMode": null,
"apManagerInterfaceIp": "",
"associatedWlcIp": "",
"collectionStatus": "Managed",
"macAddress": "cc:70:ed:14:e8:00",
"location": null,
"role": "ACCESS",
"instanceUuid": "747b2257-79ff-47ec-ac13-5a7e45348224",
"instanceTenantId": "5ec67218e6902500cbb974df",
"id": "747b2257-79ff-47ec-ac13-5a7e45348224"
],
"version": "1.0"
GET https://10.10.1X.200/dna/intent/api/v1/network-device/count
"response": 5,
"version": "1.0"
Step 6 Instead of gathering all devices, we can fetch data about only one device, to do so
we have to use the device id (BORDER Switch POD1).
Don't forget to look up the device ID of the Border Switch of your corresponding POD.
GET: https://10.10.1X.200/dna/intent/api/v1/network-device/1012f00f-ec4b-43a9-a6d9-
b8131c0fe878
https://10.10.1X.200/dna/intent/api/v1/network-device/1012f00f-ec4b-43a9-a6d9-b8131c0fe878/vlan
Step 8 We can also gather information of all devices about all interfaces.
https://10.10.1X.200/dna/intent/api/v1/interface
"response": [
"pid": "CISCO2901/K9",
"status": "up",
"mediaType": null,
"speed": "1000000",
"duplex": "FullDuplex",
"interfaceType": "Physical",
"ipv4Address": "10.129.255.254",
"ipv4Mask": "255.255.255.252",
"isisSupport": "false",
"mappedPhysicalInterfaceId": null,
"mappedPhysicalInterfaceName": null,
"ospfSupport": "false",
"ifIndex": "3",
"adminStatus": "UP",
"deviceId": "ddee799a-30a1-4ff2-8175-cbe334daf671",
"portName": "GigabitEthernet0/1",
"vlanId": "0",
"macAddress": "1c:6a:7a:16:1b:d0",
"portMode": "routed",
"serialNo": "FCZ1833C28R",
"voiceVlan": null,
"className": "EthrntPrtclEndpntExtndd",
"instanceUuid": "777ce3af-cd3a-430f-bd52-ab77863defea",
"instanceTenantId": "5ec67218e6902500cbb974df",
"id": "777ce3af-cd3a-430f-bd52-ab77863defea"
Step 9 To get information about only one interface BORDER switch, we have to specify the
interface name attribute in the header. Postman will automatically append this attribute to
the request URI.
https://10.10.1X.200/dna/intent/api/v1/interface/network-device/1012f00f-ec4b-43a9-a6d9-
b8131c0fe878/interface-name?name=GigabitEthernet1/0/1
Note: If this message appears about token expired, request it again with a POST
https://10.10.1X.200/dna/intent/api/v1/network-health
"version" : "1.0",
"response" : [ {
"time" : "2021-02-17T14:55:00.000+0000",
"healthScore" : 100,
"totalCount" : 5,
"goodCount" : 5,
"unmonCount" : 0,
"fairCount" : 0,
"badCount" : 0,
"entity" : null,
"timeinMillis" : 1613573700000
} ],
"measuredBy" : "global",
"latestMeasuredByEntity" : null,
"latestHealthScore" : 100,
"monitoredDevices" : 5,
"monitoredUnHealthyDevices" : 0,
"unMonitoredDevices" : 0,
"healthDistirubution" : [ {
"category" : "Core",
"totalCount" : 1,
"healthScore" : 100,
"goodPercentage" : 100,
"badPercentage" : 0,
"fairPercentage" : 0,
"unmonPercentage" : 0,
"goodCount" : 1,
"badCount" : 0,
"fairCount" : 0,
"unmonCount" : 0
}, {
"category" : "Access",
"totalCount" : 1,
"healthScore" : 100,
"goodPercentage" : 100,
"badPercentage" : 0,
"fairPercentage" : 0,
"unmonPercentage" : 0,
"goodCount" : 1,
"badCount" : 0,
"fairCount" : 0,
"unmonCount" : 0
}, {
"category" : "Router",
"totalCount" : 1,
"goodPercentage" : 100,
"badPercentage" : 0,
"fairPercentage" : 0,
"unmonPercentage" : 0,
"goodCount" : 1,
"badCount" : 0,
"fairCount" : 0,
"unmonCount" : 0
}, {
"category" : "WLC",
"totalCount" : 1,
"healthScore" : 100,
"goodPercentage" : 100,
"badPercentage" : 0,
"fairPercentage" : 0,
"unmonPercentage" : 0,
"goodCount" : 1,
"badCount" : 0,
"fairCount" : 0,
"unmonCount" : 0
}, {
"category" : "AP",
"totalCount" : 1,
"healthScore" : 100,
"goodPercentage" : 100,
"badPercentage" : 0,
"fairPercentage" : 0,
"unmonPercentage" : 0,
"goodCount" : 1,
"fairCount" : 0,
"unmonCount" : 0
}]
Let's use the Python requests library to create a function that when called upon, will return
and display the list of devices managed by the DNA Center.
The first part of the function will import the required libraries.
Step 2 Get the code of network-device. Copy this URI and paste into Postman with “GET”
method
In the “Headers” tab set a “X-Auth-Token” as a key and paste a token from the previous
task into a “VALUE” and then click “Send”
Now you can change request (POST, GET, PUT, PATCH, Delete) as you need and start your
Journey
import requests
import json
url = https://10.10.11.200/dna/intent/api/v1/network-device
payload={}
headers = {
'x-auth-token':
'eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiI1ZWM2NzIxOGU2OTAyNTAwY2JiOTc0ZTIiLCJhdXRoU291cmNlIjoiaW5
0ZXJuYWwiLCJ0ZW5hbnROYW1lIjoiVE5UMCIsInJvbGVzIjpbIjVlYzY3MjE4ZTY5MDI1MDBjYmI5NzRlMSJdLCJ0ZW5hbnRJZCI6
IjVlYzY3MjE4ZTY5MDI1MDBjYmI5NzRkZiIsImV4cCI6MTYxMzU3NTg2NywiaWF0IjoxNjEzNTcyMjY3LCJqdGkiOiIzMTJkOWE1
Yi00MzczLTQ4MGQtOWQ5MC00NDhhMDg1OTlhNjgiLCJ1c2VybmFtZSI6ImFkbWluIn0.QTszpfiKekQVXGX_hDXwl1YHSK8cA
y8y-MeJdBQK2rgP5oN8OyvecGW5GVZvudBUCE46ThpHcfaxi8vUXBkR73_OrYMI1DulnZ5Jlkmzr19nN7H-
print(response.text)
If you use Notepad remember select Format and Click Word Wrap
Step 5 Save in the path c:\Program Files\Python38 with the name of GetDevice.py
Use Shift + Right click to open the cmd then execute the script.
Step 7 Run the script and if it gives the Token expired error
Step 8 Request the Token with a Post from Postman, copy and paste it back to the Script
and run it again
raw_data = json.loads(response.text)
devices = raw_data["response"]
print("Hostname: {}".format(device["hostname"]))