Cisco Software-Defined Access (SD-Access)
Cisco Software-Defined Access (SD-Access)
Cisco Software-Defined Access (SD-Access) is a solution within Cisco Digital Network Architecture (Cisco DNA). It is a newer method of network access control in an enterprise network that is built on intent-based networking technology that solves the implementation and administration of the traditional network.
SD-Access provides automated end-to-end segmentation to separate user, device and application traffic without redesigning the network. Cisco SD-Access automates user access policy so organizations can make sure the right policies are established for any user
SD-Access provides a transformational shift in building, managing, and securing the entire network, making it faster and easier to operate and improving efficiency.
It is an all-in-one product that provides another vital layer of security and privacy protection.
the DNA Center controller,
- the Network
- the Cisco Identity Services Engine, and
- the DNA Advantage License.
- SD-Access uses VXLAN data encapsulation instead of LISP data encapsulation. It uses VXLAN encapsulation because it is capable of encapsulating the original Ethernet header, and this allows SD-Access to support Layer 2 and Layer 3 overlays.
- vxlan use overlay and underlay network
- It's the next generation of policy enforcement
- Security Group Access Control List SGACL
- Cisco's Software-Defined Access (SD-Access) provides automated end-to-end segmentation to separate user, device and application traffic without redesigning the network. Cisco SD-Access automates user access policy so organizations can make sure the right policies are established for any user
- Policies are based on identities rather than IP address
it provides an additional layer of analysis, controls over access policies, network segmentation, and endpoint monitoring.
The four major components related to SD Access include
All these components work together to create a software-defined layer of access.
The original VXLAN specification was enhanced for SD-Access to support Cisco TrustSec Scalable Group Tags (SGTs). This was accomplished by adding new fields to the first 4 bytes of the VXLAN header in order to transport up to 64,000 SGTs. The new VXLAN format is called VXLAN Group Policy Option (GPO),
SD-Access vs SD-WAN
- SD-Access as name suggested Software defined Access for changing the architecture of the LAN networks
- SD-WAN as software defined WAN which can automate and may be next generation networks over the MPLS/VPLS.
Cisco DNA center
Cisco DNA Center is a powerful network controller and management dashboard for secure access to networks and applications. It lets you take charge of your network, optimize your Cisco investment, and lower your IT spending.
Cisco Campus Fabric
Campus Fabric provides the basic infrastructure for building virtual networks based on policy-based segmentation constructs. Fabric Overlay provides services such as host mobility and enhanced security, which are additional to normal switching and routing capabilities.
- They are the virtual overlay network
- Ideally to use with Cisco DNA center
- NETCONF/YANG management
- Overcome limitations found on traditional networks
Campus Fabric Overlay provisioning consists of three main components:
Control plane node:
SD-Access Control plane node provides functions of LISP Map server & MAP resolver. Control plane nodes register all the EID that are connected to fabric Edge node. Control plane node and border node function can also be configured on same fabric node.
Edge Node:
Fabric Edge node are the node where Endpoints, AP are connected to SD-Access fabric.
Intermediate Node:
These node works on Layer 3 and provides interconnection between edge node and border nodes. These nodes routes IP traffic inside fabric and on these nodes there are no VXLAN encapsulation and Decapsulation. Only requirement is to maintain MTU requirement to accommodate large-size VXLAN encapsulated packets.
Border Node:
These node acts as a gateway between SD-Access fabric site and External network. These border nodes can be used as internal border ( acts as a gateway for specific subnets such as shared services , Datacenter network , ) or External Border ( acts as exit point from fabric to rest of enterprise). These two roles can be combined to single router named as anywhere border.
No comments: