Foreword |
|
xxxiv | |
Introduction |
|
xxxvi | |
|
Part I Introduction to Cisco DNA |
|
|
|
Chapter 1 Why Transform Your Business Digitally? |
|
|
1 | (18) |
|
Opportunities and Threats |
|
|
1 | (2) |
|
Digitally Transforming Industries |
|
|
3 | (4) |
|
|
3 | (1) |
|
Digital Media and Entertainment |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
Digital Transportation Services |
|
|
5 | (2) |
|
Digitally Transforming Businesses |
|
|
7 | (9) |
|
Transforming the Customer Experience |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (2) |
|
|
11 | (1) |
|
Transforming the Employee Experience |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
Transforming Business Operations |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Driving Digital Transformation with the Internet of Things |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
Chapter 2 The Business Value of Cisco DNA |
|
|
19 | (12) |
|
Business Requirements of the Network Architecture |
|
|
19 | (4) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
Business Value of Cisco Digital Network Architecture |
|
|
24 | (4) |
|
Reducing Costs Through Automation, Virtualization, and Programmable Hardware |
|
|
25 | (1) |
|
Mitigating Risks with Integrated Security and Compliance |
|
|
26 | (1) |
|
Revealing Actionable Insights Through Analytics |
|
|
26 | (1) |
|
Accelerating Business Agility Through Open APIs |
|
|
26 | (2) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (2) |
|
Chapter 3 Designing for Humans |
|
|
31 | (24) |
|
Technology Versus User-Experience |
|
|
31 | (2) |
|
Design Thinking Philosophy and Principles |
|
|
33 | (1) |
|
Cisco Design Thinking Framework |
|
|
34 | (6) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
Problem to Be Solved Statement |
|
|
38 | (1) |
|
|
39 | (1) |
|
The Cisco Design Thinking Journey for Cisco DNA |
|
|
40 | (13) |
|
Cisco DNA Discovery Phase |
|
|
41 | (1) |
|
|
42 | (2) |
|
|
44 | (1) |
|
|
45 | (3) |
|
|
48 | (1) |
|
Cisco DNA Definition Phase |
|
|
49 | (4) |
|
Cisco DNA Exploration Phase |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
Chapter 4 Introducing the Cisco Digital Network Architecture |
|
|
55 | (32) |
|
Requirements for Cisco DNA |
|
|
56 | (4) |
|
Requirements to Reduce Complexity and Costs |
|
|
57 | (1) |
|
Requirement to Increase Operational Flexibility |
|
|
58 | (1) |
|
|
58 | (1) |
|
Intelligent Feedback Mechanism |
|
|
59 | (1) |
|
Application, User, and Device Awareness |
|
|
59 | (1) |
|
Security and Compliance Requirements |
|
|
59 | (1) |
|
Cloud-Enablement Requirement |
|
|
60 | (1) |
|
|
60 | (6) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
Overview of the Cisco DNA Components |
|
|
66 | (18) |
|
|
66 | (1) |
|
Cisco DNA Infrastructure Domains |
|
|
67 | (2) |
|
Extending the Concept of Network Fabrics in Cisco DNA |
|
|
69 | (1) |
|
|
70 | (2) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
73 | (2) |
|
|
75 | (2) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
The Role of the Cloud in Cisco DNA |
|
|
80 | (1) |
|
|
81 | (1) |
|
Cloud for Automation and Management |
|
|
82 | (1) |
|
|
82 | (1) |
|
Connecting the Building Blocks: APIs |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
Chapter 5 The Cisco Digital Network Architecture Blueprint |
|
|
87 | (36) |
|
|
88 | (5) |
|
Cisco DNA Services---Transport |
|
|
90 | (1) |
|
Cisco DNA Services---Policy |
|
|
91 | (1) |
|
Relationship Between Cisco DNA Policies and Business Intent |
|
|
92 | (1) |
|
|
93 | (6) |
|
|
94 | (2) |
|
Supporting Network Functions |
|
|
96 | (2) |
|
|
98 | (1) |
|
Automating Cisco DNA---Controllers |
|
|
99 | (8) |
|
Automating Transport and Network Functions Infrastructure |
|
|
99 | (1) |
|
Maintaining a View of the Infrastructure Functions and Connected Endpoints |
|
|
100 | (1) |
|
Instantiating and Maintaining Cisco DNA Services |
|
|
100 | (2) |
|
Relationships in Cisco DNA: Revisiting Domains, Scopes, and Fabrics |
|
|
102 | (3) |
|
|
105 | (2) |
|
Service Definition and Orchestration |
|
|
107 | (5) |
|
Relationship Between the Controllers and the Service Definition and Orchestration Component |
|
|
110 | (2) |
|
|
112 | (3) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
On-Premises and Off-Premises Agnosticism---Revisiting the Cloud |
|
|
115 | (5) |
|
Application Hosting in the Cloud and the Evolution of the DMZ |
|
|
116 | (2) |
|
Leveraging the Cloud for Cisco DNA Controllers and Analytics |
|
|
118 | (2) |
|
|
120 | (3) |
|
Part II Cisco DNA Programmable Infrastructure |
|
|
|
Chapter 6 Introduction to Cisco DNA Infrastructure |
|
|
123 | (12) |
|
Picturing the Modern Network |
|
|
124 | (1) |
|
Exploring Cisco DNA Infrastructure |
|
|
125 | (1) |
|
The Evolving Network, and Why It Matters |
|
|
126 | (4) |
|
Requirements: The Need for Change |
|
|
126 | (1) |
|
Requirements: The Need for Speed (of Change) |
|
|
127 | (1) |
|
Requirements: The Need for Simplicity |
|
|
128 | (1) |
|
Requirements: The Need for Continuity |
|
|
129 | (1) |
|
Cisco DNA Infrastructure Solutions |
|
|
130 | (3) |
|
|
130 | (1) |
|
|
131 | (1) |
|
New and Evolving Protocols |
|
|
132 | (1) |
|
The Emergence of Virtualization |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
Chapter 7 Hardware Innovations |
|
|
135 | (54) |
|
The Importance of Hardware in a Software-Defined World |
|
|
135 | (1) |
|
|
136 | (12) |
|
Delving Deeper: How Chips Are Designed and Built |
|
|
136 | (7) |
|
Drivers of Chip Design and Density |
|
|
143 | (2) |
|
When Good Chips Go Bad: What Can Go Wrong in Chip Design |
|
|
145 | (1) |
|
When Good Chips Need to Get Better: Designing the Next Generation |
|
|
146 | (1) |
|
Now We Speak the Same Language! |
|
|
147 | (1) |
|
What's Happening in the World of Networks |
|
|
148 | (1) |
|
How Traditional Network ASICs Process Packets |
|
|
149 | (1) |
|
Traffic Handling with CPUs and FPGAs |
|
|
150 | (2) |
|
Introducing Flexible Silicon |
|
|
152 | (2) |
|
Flexible Switching Silicon: UADP |
|
|
154 | (19) |
|
UADP Use Cases---Current, and Future |
|
|
163 | (2) |
|
Introducing the Future: UADP 2.0 and 3.0 |
|
|
165 | (6) |
|
So What's Common Across All of These Variants of UADP? |
|
|
171 | (1) |
|
|
172 | (1) |
|
Flexible Routing Silicon: QFP |
|
|
173 | (8) |
|
|
174 | (2) |
|
|
176 | (4) |
|
|
180 | (1) |
|
UADP and QFP---Summing Up |
|
|
181 | (1) |
|
Wireless: Providing Innovation for Mobility |
|
|
182 | (4) |
|
Flexible Radio Assignment |
|
|
183 | (2) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (2) |
|
Chapter 8 Software Innovations |
|
|
189 | (36) |
|
The Importance and Evolution of Networking Software |
|
|
189 | (1) |
|
Cisco IOS: Origins and Evolution |
|
|
190 | (6) |
|
Evolution of the Cisco IOS Data Plane |
|
|
191 | (3) |
|
Evolution of the Cisco IOS Control Plane |
|
|
194 | (1) |
|
Evolution of the Cisco IOS Management Plane |
|
|
195 | (1) |
|
Evolution of Cisco Networking Software |
|
|
196 | (2) |
|
The Evolution of Cisco IOS to IOS XE |
|
|
198 | (1) |
|
Cisco IOS XE in a Nutshell |
|
|
199 | (2) |
|
Cisco IOS XE: Delving Deeper |
|
|
201 | (6) |
|
|
202 | (1) |
|
|
203 | (2) |
|
Container Framework and Application Hosting |
|
|
205 | (2) |
|
Cisco IOS XE: Bringing It All Together |
|
|
207 | (5) |
|
Cisco IOS XE: Simplification with a Single Release Train |
|
|
209 | (1) |
|
Cisco IOS XE: Software Maintenance Upgrades |
|
|
209 | (1) |
|
The Issue with Software Upgrades |
|
|
210 | (1) |
|
Types of SMUs---Cold, and Hot |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
Cisco IOS XE: Platform Support |
|
|
212 | (1) |
|
|
213 | (1) |
|
Protecting Platforms and Networks: Trustworthy Systems |
|
|
214 | (8) |
|
Trustworthy Systems: An Overview |
|
|
215 | (1) |
|
Possible Attacks: IOS Modifications |
|
|
215 | (1) |
|
Attack Mitigation with Trustworthy Systems |
|
|
216 | (1) |
|
Defense: Image Validation and Signing |
|
|
217 | (1) |
|
Defense: Runtime Defenses |
|
|
217 | (1) |
|
|
218 | (1) |
|
Understanding Boot Sequence Attacks |
|
|
218 | (1) |
|
Protecting Device Integrity from the Ground Up with Secure Boot |
|
|
219 | (1) |
|
Ensuring Device Identity with the Secure Unique Device Identifier |
|
|
220 | (1) |
|
Cisco Secure Boot and Trust Anchor Module: Validating the Integrity of Software, Followed by Hardware |
|
|
221 | (1) |
|
The Move to Intuitive Networking |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (2) |
|
Chapter 9 Protocol Innovations |
|
|
225 | (42) |
|
Networking Protocols: Starting at the Bottom with Ethernet |
|
|
226 | (9) |
|
Power Protocols: Power over Ethernet, to 60 Watts and Beyond! |
|
|
227 | (3) |
|
The Future of Power over Ethernet |
|
|
230 | (1) |
|
Multiple-Speed Protocols over Copper: Multigigabit Ethernet, Squeezing More Life Out of Existing Cabling Infrastructures |
|
|
230 | (4) |
|
25G Ethernet---The New Kid on the Block |
|
|
234 | (1) |
|
Ethernet Evolving: This Is Not Your Father's Ethernet! |
|
|
235 | (1) |
|
|
235 | (7) |
|
Networking Protocols: Moving Up the Stack to Layer 2 |
|
|
235 | (2) |
|
Networking Protocols: Moving Up the Stack to Layer 3 |
|
|
237 | (1) |
|
First-Hop Reachability Protocols: HSRP and VRRP |
|
|
237 | (1) |
|
|
238 | (2) |
|
|
240 | (1) |
|
|
241 | (1) |
|
Networking Protocols Today: Summary |
|
|
242 | (1) |
|
Networking Protocols for the New Era of Networking |
|
|
242 | (22) |
|
VXLAN: A Next-Generation Encapsulation Technology |
|
|
243 | (4) |
|
|
247 | (1) |
|
|
248 | (1) |
|
Scalable Group Tag Support |
|
|
248 | (1) |
|
|
248 | (1) |
|
IS-IS: The Evolution of Underlay Routing |
|
|
249 | (1) |
|
LISP: The Evolution of Overlay Host Reachability |
|
|
249 | (3) |
|
The Need for Host Mobility |
|
|
252 | (1) |
|
|
252 | (1) |
|
LISP to Address the Host Mobility and Scale Needs of the Next-Generation Network |
|
|
253 | (2) |
|
Examination of LISP Roaming Operation |
|
|
255 | (2) |
|
Summing Up: LISP As a Next-Generation Overlay Control Plane |
|
|
257 | (1) |
|
Scalable Group Tags: The Evolution of Grouping and Policy |
|
|
257 | (4) |
|
Scalable Group Tags for Group-Based Policies |
|
|
261 | (2) |
|
SGT Transport End-to-End Across the Network |
|
|
263 | (1) |
|
Bringing It All Together: What Next-Generation Protocols Within the Network Allow Us To Build |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (2) |
|
Chapter 10 Cisco DNA Infrastructure---Virtualization |
|
|
267 | (40) |
|
Benefits of Network Function Virtualization |
|
|
268 | (4) |
|
|
268 | (2) |
|
|
270 | (1) |
|
Architectural Benefits of NFV |
|
|
271 | (1) |
|
Use Cases for Network Function Virtualization |
|
|
272 | (6) |
|
Control Plane Virtualization |
|
|
272 | (2) |
|
|
274 | (1) |
|
Virtualization to Connect Applications in VPCs |
|
|
275 | (1) |
|
Virtualization of Multicloud Exchanges |
|
|
276 | (2) |
|
Overview of an NFV System Architecture |
|
|
278 | (11) |
|
Hypervisor Scheduling and NUMA |
|
|
281 | (2) |
|
Input/Output Technologies for Virtualization |
|
|
283 | (6) |
|
Challenges and Deployment Considerations of Network Function Virtualization |
|
|
289 | (7) |
|
|
289 | (1) |
|
Oversubscribing the Physical Hardware Resources |
|
|
290 | (1) |
|
Optimizing Server Configurations |
|
|
290 | (1) |
|
Selecting the Right I/O Technique |
|
|
291 | (1) |
|
VNF Footprint Considerations |
|
|
292 | (1) |
|
Multi-tenancy and Multi-function VNFs |
|
|
293 | (3) |
|
|
296 | (9) |
|
Network Segmentation Architecture |
|
|
297 | (1) |
|
|
298 | (1) |
|
Network Path Virtualization |
|
|
298 | (1) |
|
|
299 | (1) |
|
Policy-based Path Segmentation |
|
|
299 | (3) |
|
Control Plane-based Segmentation |
|
|
302 | (1) |
|
Multihop Path Isolation Techniques |
|
|
302 | (1) |
|
Single-Hop Path Isolation Techniques |
|
|
303 | (2) |
|
|
305 | (2) |
|
Chapter 11 Cisco DNA Cloud |
|
|
307 | (18) |
|
Introduction to the Cloud |
|
|
308 | (7) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
313 | (2) |
|
|
315 | (8) |
|
Cisco DNA Cloud for Applications |
|
|
316 | (2) |
|
Cisco DNA Cloud for Automation |
|
|
318 | (1) |
|
Cisco DNA Cloud for Analytics |
|
|
319 | (4) |
|
|
323 | (1) |
|
|
323 | (2) |
|
Part III Cisco DNA Automation |
|
|
|
Chapter 12 Introduction to Cisco DNA Automation |
|
|
325 | (12) |
|
|
325 | (5) |
|
Reduce Total Cost of Ownership |
|
|
326 | (1) |
|
|
326 | (2) |
|
|
328 | (1) |
|
Scale Your Infrastructure, Not Your IT Department |
|
|
328 | (1) |
|
|
329 | (1) |
|
Simplify Like Never Before |
|
|
330 | (1) |
|
Enable Applications to Directly Interact with the Network |
|
|
330 | (1) |
|
Is Cisco DNA Automation the Same as SDN? |
|
|
330 | (2) |
|
Centralized Versus Distributed Systems |
|
|
331 | (1) |
|
Imperative Versus Declarative Control |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (3) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
Chapter 13 Device Programmability |
|
|
337 | (24) |
|
|
338 | (2) |
|
|
338 | (2) |
|
|
340 | (1) |
|
|
340 | (4) |
|
|
341 | (3) |
|
|
344 | (8) |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
347 | (3) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
352 | (2) |
|
|
353 | (1) |
|
|
354 | (3) |
|
|
357 | (2) |
|
|
359 | (1) |
|
|
359 | (2) |
|
Chapter 14 Cisco DNA Automation |
|
|
361 | (36) |
|
The Increasing Importance of Automation |
|
|
362 | (2) |
|
Allow the Network to Scale |
|
|
363 | (1) |
|
Reduce Errors in the Network |
|
|
363 | (1) |
|
Time to Perform an Operation |
|
|
363 | (1) |
|
|
364 | (1) |
|
Current Impediments to Automation |
|
|
364 | (3) |
|
Classifying Network Automation Tasks |
|
|
367 | (4) |
|
Infrastructure and Cisco DNA Service Automation |
|
|
368 | (1) |
|
Standard and Nonstandard Automation Tasks |
|
|
369 | (2) |
|
The Role of Controllers in Cisco DNA Automation |
|
|
371 | (6) |
|
Leveraging Abstractions in Cisco DNA to Deliver Intent-Based Networking |
|
|
372 | (3) |
|
Domain Controllers Versus Control Plane Protocols |
|
|
375 | (2) |
|
Automating Your Network with Cisco DNA Center |
|
|
377 | (18) |
|
|
377 | (3) |
|
Device Discovery, Inventory, and Topology |
|
|
380 | (2) |
|
Day 0 Operations---Standardizing on Network Designs |
|
|
382 | (2) |
|
Standardizing Settings for Supporting Network Functions |
|
|
384 | (1) |
|
Automating Device Credentials |
|
|
384 | (1) |
|
Reserving and Managing IP Address Pools |
|
|
385 | (1) |
|
Standardizing Service Provider QoS Profiles |
|
|
386 | (1) |
|
Characterizing Wireless LAN Profiles |
|
|
387 | (1) |
|
Standardizing on Network Designs |
|
|
388 | (2) |
|
Automating the Deployment of Network Elements and Functions |
|
|
390 | (4) |
|
Day N Operations---Automating Lifecycle Operations |
|
|
394 | (1) |
|
|
395 | (1) |
|
|
396 | (1) |
|
Part IV Cisco DNA Analytics |
|
|
|
Chapter 15 Introduction to Cisco DNA Analytics |
|
|
397 | (8) |
|
A Definition of Analytics |
|
|
397 | (1) |
|
|
398 | (2) |
|
Cisco DNA Analytics, Opportunities and Challenges |
|
|
399 | (1) |
|
Brief History of Network Analytics |
|
|
400 | (1) |
|
|
401 | (1) |
|
The Role of Network Analytics in Cisco DNA |
|
|
402 | (2) |
|
|
404 | (1) |
|
Chapter 16 Cisco DNA Analytics Components |
|
|
405 | (18) |
|
|
405 | (2) |
|
Cisco DNA Instrumentation |
|
|
407 | (1) |
|
Distributed Network Analytics |
|
|
408 | (3) |
|
|
411 | (5) |
|
|
412 | (1) |
|
The Cisco DNA Telemetry Architecture |
|
|
413 | (1) |
|
Limitations of Today's Telemetry Protocols |
|
|
413 | (1) |
|
The Evolution of Cisco DNA Telemetry: Model-Driven Telemetry |
|
|
414 | (2) |
|
|
416 | (4) |
|
The Traditional Analytics Approach |
|
|
416 | (2) |
|
The Need for Analytics Engines |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
419 | (1) |
|
Application Development Simplification |
|
|
420 | (1) |
|
The Role of the Cloud for Analytics |
|
|
420 | (2) |
|
|
422 | (1) |
|
|
422 | (1) |
|
Chapter 17 Cisco DNA Analytics Engines |
|
|
423 | (28) |
|
Why a Cisco DNA Analytics Engine? |
|
|
425 | (2) |
|
Cisco DNA Analytics Engines |
|
|
427 | (1) |
|
Cisco Network Data Platform |
|
|
428 | (11) |
|
|
430 | (1) |
|
|
430 | (1) |
|
NDP Architecture Principles |
|
|
430 | (1) |
|
|
431 | (2) |
|
NDP Architecture Components |
|
|
433 | (3) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
437 | (1) |
|
NDP Security and High Availability |
|
|
438 | (1) |
|
Cisco Tetration Analytics |
|
|
439 | (9) |
|
It's All About Quality of Data |
|
|
440 | (2) |
|
Data Center Visibility with Cisco Tetration Analytics |
|
|
442 | (2) |
|
Cisco Tetration Analytics Architecture |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
The Benefits of Cisco Tetration Analytics |
|
|
446 | (2) |
|
|
448 | (1) |
|
|
449 | (2) |
|
Part V Cisco DNA Solutions |
|
|
|
Chapter 18 Cisco DNA Virtualization Solutions: Enterprise Network Functions Virtualization and Secure Agile Exchange |
|
|
451 | (46) |
|
The Cisco Strategy for Virtualization in the Enterprise |
|
|
452 | (1) |
|
Cisco Enterprise Network Functions Virtualization |
|
|
453 | (35) |
|
Details on Virtualization Hardware |
|
|
455 | (4) |
|
NFVIS: An Operating System Optimized for Enterprise Virtualization |
|
|
459 | (4) |
|
Virtualized Network Functions |
|
|
463 | (1) |
|
Cisco Integrated Services Virtual Router |
|
|
463 | (1) |
|
Cisco Adaptive Security Virtual Appliance |
|
|
464 | (1) |
|
Cisco Firepower NGFW Virtual |
|
|
464 | (1) |
|
Cisco Virtual Wide Area Application Services |
|
|
464 | (1) |
|
Cisco Prime Virtual Network Analysis Module |
|
|
465 | (1) |
|
Cisco Virtual Wireless LAN Controller |
|
|
465 | (1) |
|
|
466 | (2) |
|
Service Chaining and Sample Packet Flows |
|
|
468 | (3) |
|
Transparent Versus Routed Service Chains |
|
|
471 | (2) |
|
Orchestration and Management |
|
|
473 | (1) |
|
|
473 | (5) |
|
Cisco DNA Center (Network Level) |
|
|
478 | (7) |
|
Configuring and Monitoring of an NFVIS Host Using Traditional Mechanisms |
|
|
485 | (3) |
|
Virtualizing Connectivity to Untrusted Domains: Secure Agile Exchange |
|
|
488 | (5) |
|
Motivation for the Cisco SAE Solution |
|
|
489 | (3) |
|
Cisco SAE Building Blocks |
|
|
492 | (1) |
|
Running Virtualized Applications and VNFs Inside IOS XE |
|
|
493 | (3) |
|
|
496 | (1) |
|
|
496 | (1) |
|
Chapter 19 Cisco DNA Software-Defined Access |
|
|
497 | (72) |
|
The Challenges of Enterprise Networks Today |
|
|
497 | (2) |
|
Software-Defined Access: A High-Level Overview |
|
|
499 | (1) |
|
SD-Access: A Fabric for the Enterprise |
|
|
500 | (42) |
|
|
500 | (1) |
|
|
501 | (4) |
|
Capabilities Offered by SD-Access |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
506 | (2) |
|
|
508 | (4) |
|
SD-Access High-Level Architecture and Attributes |
|
|
512 | (1) |
|
SD-Access Building Blocks |
|
|
513 | (1) |
|
Cisco DNA Center in SD-Access |
|
|
514 | (1) |
|
SD-Access Fabric Capabilities |
|
|
515 | (1) |
|
|
515 | (1) |
|
|
516 | (1) |
|
|
517 | (1) |
|
|
518 | (2) |
|
SD-Access Control Plane Nodes, a Closer Look |
|
|
520 | (3) |
|
SD-Access Fabric Border Nodes, a Closer Look |
|
|
523 | (4) |
|
SD-Access Fabric Edge Nodes |
|
|
527 | (4) |
|
|
531 | (1) |
|
SD-Access Wireless Integration |
|
|
532 | (10) |
|
|
542 | (23) |
|
SD-Access Case Study, Summing Up |
|
|
565 | (1) |
|
|
565 | (2) |
|
|
567 | (2) |
|
Chapter 20 Cisco DNA Application Policy |
|
|
569 | (62) |
|
Managing Applications in Cisco DNA Center |
|
|
570 | (15) |
|
|
570 | (4) |
|
|
574 | (2) |
|
|
576 | (1) |
|
|
576 | (6) |
|
|
582 | (1) |
|
|
582 | (1) |
|
|
583 | (1) |
|
|
584 | (1) |
|
What Happens "Under the Hood"? |
|
|
585 | (1) |
|
Translating Business Intent into Application Policy |
|
|
586 | (3) |
|
Cisco DNA Infrastructure Software Requirements for Application Policy |
|
|
589 | (12) |
|
|
589 | (3) |
|
|
592 | (2) |
|
|
594 | (2) |
|
"Holy Grail" Classification and Marking Policy |
|
|
596 | (3) |
|
|
599 | (2) |
|
Cisco DNA Infrastructure Platform-Specific Requirements for Application Policy |
|
|
601 | (27) |
|
Routing Platform Requirements |
|
|
602 | (1) |
|
Application Classification and Marking Policies |
|
|
602 | (1) |
|
Queuing and Dropping Policies |
|
|
603 | (2) |
|
Sub-Line Rate Hierarchical QoS Policies |
|
|
605 | (1) |
|
Enterprise-to-Service Provider Mapping |
|
|
606 | (3) |
|
|
609 | (3) |
|
|
612 | (1) |
|
Switching Platform Requirements |
|
|
613 | (1) |
|
Application Classification and Marking Policies |
|
|
613 | (1) |
|
Hardware Queuing Policies |
|
|
614 | (4) |
|
|
618 | (3) |
|
Wireless Platform Requirements |
|
|
621 | (1) |
|
Application Classification and Marking Policies |
|
|
621 | (1) |
|
|
622 | (2) |
|
|
624 | (2) |
|
Internal System QoS (Wireless Access Points) |
|
|
626 | (2) |
|
|
628 | (1) |
|
|
629 | (2) |
|
Chapter 21 Cisco DNA Analytics and Assurance |
|
|
631 | (80) |
|
Introduction to Cisco DNA Assurance |
|
|
631 | (8) |
|
|
633 | (5) |
|
|
638 | (1) |
|
The Architectural Requirements of a Self-Healing Network |
|
|
639 | (8) |
|
|
640 | (1) |
|
Distributed On-Device Analytics |
|
|
641 | (1) |
|
|
642 | (1) |
|
|
643 | (1) |
|
|
643 | (1) |
|
|
644 | (1) |
|
Guided Troubleshooting and Remediation |
|
|
645 | (1) |
|
Automated Troubleshooting and Remediation |
|
|
645 | (2) |
|
Cisco DNA Center Analytics and Assurance |
|
|
647 | (63) |
|
|
647 | (2) |
|
NDP Contextual Correlation and Time Machine |
|
|
649 | (1) |
|
NDP Complex Event Processing |
|
|
650 | (1) |
|
|
650 | (1) |
|
|
650 | (2) |
|
|
652 | (1) |
|
|
653 | (1) |
|
|
653 | (2) |
|
|
655 | (8) |
|
|
663 | (8) |
|
|
671 | (17) |
|
|
688 | (7) |
|
|
695 | (2) |
|
|
697 | (7) |
|
|
704 | (6) |
|
|
710 | (1) |
|
|
710 | (1) |
|
Chapter 22 Cisco DNA Encrypted Traffic Analytics |
|
|
711 | (10) |
|
Encrypted Malware Detection: Defining the Problem |
|
|
712 | (2) |
|
Encrypted Malware Detection: Defining the Solution |
|
|
714 | (2) |
|
ETA: Use of IDP for Encrypted Malware Detection |
|
|
714 | (1) |
|
ETA: Use of SPLT for Encrypted Malware Detection |
|
|
715 | (1) |
|
Encrypted Malware Detection: The Solution in Action |
|
|
716 | (3) |
|
Encrypted Malware Detection: Putting It All Together |
|
|
719 | (1) |
|
|
720 | (1) |
|
Part VI Cisco DNA Evolution |
|
|
|
Chapter 23 Cisco DNA Evolution |
|
|
721 | (4) |
Index |
|
725 | |