SDAccess_Architecture_Overview_v1.00_Partner
SDAccess_Architecture_Overview_v1.00_Partner
An Introduction
SD-Access Technical Marketing, Enterprise Networking
August 2024
Agenda
• SD-Access Constructs
• SD-Access Control Plane
• SD-Access Data Plane
• SD-Access Policy Plane
• Multiple Fabrics
Resources
Network Infrastructure ✕✓✕✓✓✓
Devices
✓✓✕✓✕✕
✕✓✓✕✕✕
Switching Routers Wireless
Identity-Based
Policy and Segmentation
Policy definition decoupled
from VLAN and IP address
AI-Driven
Insights and Telemetry
Analytics and visibility into
Mobility
User and Application experience
IoT Network
Policy follows User
© 2024 Cisco and/or its affiliates. All rights reserved.
6
Cisco Partner Confidential
SD-Access Implements Intent for Campus Networks
Headquarters
Best practice configurations curated and validated for each intent, aka workflow, is configured
on to hundreds of devices in one-go, achieving intent-driven automation at scale.
© 2024 Cisco and/or its affiliates. All rights reserved.
Catalyst Center
and ISE Integration
Trust
Configure
Context
ISE
• Catalyst Center and ISE integration facilitates automated configuration and segmentation at scale.
• This helps achieve consistent and centralized policy definitions for wired and wireless endpoints.
• Move away from traditional ACLs to IP-agnostic group-based approach of policy creation.
End user insights Network health and status Application Visibility & Performance
WAN
Onboarding, Connectivity, IPv4/v6, Site Health, System Health, Topology, Application Usage/Throughput, Business Relevant
Device Type, MAC, VLAN, Trust Score etc. Issues and Suggested Actions. Application Health, Integrations, Trends.
Device-by-Device onboarding and configuration either Turnkey solution to onboard multiple switches with
manually or through Catalyst Center Plug-and-Play. image management and best-practices configuration.
© 2024 Cisco and/or its affiliates. All rights reserved.
Border Nodes
Connects external L3 and L2 networks to the Cisco SD-
Access fabric.
Edge Nodes
Connects wired endpoints to the Cisco SD-Access fabric
and optionally enforces micro-segmentation policy.
© 2024 Cisco and/or its affiliates. All rights reserved.
Border Nodes
Connects external L3 and L2 networks to the Cisco SD-
Access fabric.
Edge Nodes
Connects wired endpoints and Fabric APs to the Cisco SD-
Access fabric and optionally enforces micro-segmentation
policy.
Fabric Wireless Controller
Fabric WLC is integrated into the SD-Access Control Plane
(LISP) communication.
Extended Nodes
A switch operating at Layer 2 that extends fabric
connectivity and optionally enforces micro-
segmentation policy.
Intermediate Nodes
Moves data between fabric nodes. Can be one or
many hops. Part of the underlay.
Border Node, Control Plane Node, Fabric Edge Node, and Embedded Wireless
Controller.
External Network
Border Nodes connect external L3 and L2 networks to the Cisco SD-Access fabric. As a
result, performs VXLAN encapsulation and decapsulation.
There are 4 types of Border Nodes.
© 2024 Cisco and/or its affiliates. All rights reserved.
26
Cisco Partner Confidential
Cisco SD-Access Fabric
External Border Node
Internet/
Rest of the network
• The most common configuration.
Data Center
• Exports all fabric subnets to outside the 40.1.1.2 Shared Services
Fabric Site as eBGP summary routes.
Internet
Data Center
Shared Services
• Exports all fabric subnets to outside the
Fabric Site as eBGP summary routes.
Gateway outside
• Acts as Layer 2 handoff for pure Layer 2 Overlays the fabric
or Layer 2 + Layer 3 Overlays. 10.10.10.1/24 vlan 20
Layer
ya
erl
vlan 100
Ov
2+L
Overla
• Dual homing requires link aggregation; STP it not
r2
ye
ayer 3
tunneled within the SD-Access Fabric. Sam
La
y
20.20.20.30/32
CC:DD:EE/48
• Ideally should be separate device from the Layer
3 Border Node. vlan 20 vlan 10
John Kate
10.10.10.20/32 20.20.20.20/32
© 2024 Cisco and/or its affiliates. All rights reserved.
AA:BB:CC/48 BB:CC:DD/48
Authorizing endpoints (e.g. 802.1X, MAB, 1.2.3.4/32 à EN1 AA:BB:CCà EN1 1.2.3.4 à AA:BB:CC
IP - 1.2.3.4/32
MAC – AA:BB:CC
© 2024 Cisco and/or its affiliates. All rights reserved.
MAC – AA:BB:CC
• Fabric WLC accessible though a Fabric Border Node Ctrl: CAPWAP
MAC - AA:BB:CC
© 2024 Cisco and/or its affiliates. All rights reserved. IP - 1.2.3.4/32
Cisco Partner Confidential
SD-Access Constructs
• Layer 2 Virtual Networks use LISP Instance IDs Layer 2 VN: IOT
(VLAN and L2 LISP IID)
Layer 3 VN: CAMPUS
(VRF and L3 LISP IID)
Layer 3 VN: GUEST
(VRF and L3 LISP IID)
and VLANs to maintain separate switching
Layer 2 VN Layer 2 VN Layer 2 VN
topologies. (VLAN and L2 (VLAN and L2 (VLAN and L2
LISP IID) LISP IID) LISP IID)
• Endpoint IDs (MAC addresses) are switched within vlan 10
vlan 20 vlan 30
vlan 40
an L2VN.
• Edge Nodes, Border Nodes and Fabric APs add vlan 10 VN: CAMPUS VN: CAMPUS VN: GUEST
vlan 40
vlan 20 vlan 30
a VNID (the LISP IID) to the fabric encapsulation.
• A “Peer Device” may leak external routes into SD-Access Layer 3 Virtual Networks.
• Alternatively, maintain VRF segmentation outside of the SD-Access Fabric with a VRF-aware external
routing domain.
• Peer Device is outside the fabric. Can be any platform (Router, Layer 3 switch, Firewall, etc.) with
appropriate capabilities.
Maintain VRF segmentation outside of SD-Access
VRF GUEST
AF VRF GUEST
SVI A
External Routing
VRF Campus AF VRF CAMPUS Domain
VN VN SVI B
• Use an Extranet Policy to allow communication between one Provider Virtual Network and one or more
Subscriber Virtual Networks.
• Extranet Policy is available from SD-Access 2.3.5.3. Requires LISP Pub/Sub Control Plane.
Gateway Outside
the Fabric
• By default, an L2VN is deployed with each Anycast
Gateway and Layer 2 Flooding is disabled. Layer 2
VLAN
Flooding can be enabled, if necessary, to service
niche applications.
© 2024 Cisco and/or its affiliates. All rights reserved. MAC 1.1.1 MAC 2.2.2
BRKENS-2810 Cisco Partner Confidential
Layer 2 Handoff
• Layer 2 Virtual Networks handoff through a user-defined VLAN.
• Layer 2 Virtual Networks may implement Broadcast, unknown-unicast and multicast flooding. Be
mindful of loop prevention.
Re
gi
st
er
EI
Ds
L3 VN CAMPUS
• Host Pools assigned to endpoints dynamically by
AAA or statically per port. R
Pool
(/3 egiste .64
Pool
2, / r
128 EIDs .128
or / to C
48 P
• Edge Nodes and Fabric WLCs register endpoint IDs MA
C)
(/32, /128 or MAC) with the Control Plane,
enabling IP mobility; any IP address anywhere.
USER A
Host Pools assigned to IP: 10.10.10.66/26
endpoints dynamically MAC: AA.BB.CC
GW GW GW
1.1.0.1/16 1.1.0.1/16
USER A USER B
1.1.1.66/16 1.1.2.66/16
MAC: 2.2.2 MAC:3.3.3
© 2024 Cisco and/or its affiliates. All rights reserved.
• Edge Nodes and Fabric APs add an SGT to the Layer 2 VN: IOT Layer 3 VN: CAMPUS
fabric encapsulation. SGT
9 SGT
SGT 4 SGT
• SGTs are used to implement IP-address- 8 5
independent traffic policies. SGT
10
User: John
IP: 4.4.4.4/32
VN: Campus
RLOC:3.3.3.3
can change, but who you
are in the network remains RLOC:1.1.1.1 RLOC:2.2.2.2
the same.
User: John
IP: 4.4.4.4/32
VN: Campus User: John
SGT: 25 IP: 4.4.4.4/32
VN: Campus
SGT: 25
(IETF Standards Track RFC9300-RFC9305 and Informational RFC9299)
© 2024 Cisco and/or its affiliates. All rights reserved.
• The border nodes subscription is also known as LISP Instance-ID (IID) Table Subscription.
• The LISP device expresses interest in receiving updates for all registrations for given IID table.
• More specifically, the IID Table Subscriptions are per instance-ID and per address family (AF) within that instance-ID.
• The Fabric edge node subscription is known as policy-based subscription(the availability of a default
border)
Publishers
51
Cisco Partner Confidential
LISP in Cisco SD-Access
IP Network
ORIGINAL
ETHERNET IP PAYLOAD
PACKET
PACKET IN
ETHERNET IP UDP LISP IP PAYLOAD
LISP
Supports L2
& L3 Overlay
PACKET IN
ETHERNET IP UDP VXLAN ETHERNET IP PAYLOAD
VXLAN
VXLAN-GPO Header
Src VTEP MAC Address
Dest. MAC 48
Checksum
Source IP 32
Src RLOC IP Address
Outer IP Header Dest. IP 32
Source Port 16 Dst RLOC IP Address
Segment ID 16
8 Bytes
Original Payload VN ID 24
Allows 16M
Reserved 8 possible VRFs
VRF + SGT
VN Campus
VN Campus
VN IOT
VN IOT
ISE
Cisco Catalyst Center
CLASSIFIER: PORT ACTION: DENY
SD-Access Transit
ASN1 ASN2
• SD-Access LISP/VXLAN between Fabric Sites.
IP
Fabric1 Fabric2
• Preserves Layer 3 Virtual Networks and SGT.
• Fabric as a transit between external routing domains.
FabricN