Introduction |
|
xvii | |
|
Chapter 1 Today's Networks and the Drivers for Change |
|
|
1 | (20) |
|
|
1 | (3) |
|
Common Business and IT Trends |
|
|
4 | (1) |
|
|
5 | (1) |
|
High-Level Design Considerations |
|
|
6 | (4) |
|
Cisco Digital Network Architecture |
|
|
10 | (2) |
|
Past Solutions to Today's Problems |
|
|
12 | (4) |
|
Spanning-Tree and Layer 2-Based Networks |
|
|
13 | (3) |
|
Introduction to Multidomain |
|
|
16 | (4) |
|
Cloud Trends and Adoption |
|
|
18 | (2) |
|
|
20 | (1) |
|
Chapter 2 Introduction to Cisco Software-Defined Access |
|
|
21 | (38) |
|
Challenges with Today's Networks |
|
|
22 | (1) |
|
Software-Defined Networking |
|
|
22 | (1) |
|
Cisco Software-Defined Access |
|
|
23 | (7) |
|
Cisco Campus Fabric Architecture |
|
|
24 | (1) |
|
Campus Fabric Fundamentals |
|
|
25 | (2) |
|
|
27 | (3) |
|
|
30 | (2) |
|
Why Network Access Control? |
|
|
31 | (1) |
|
Introduction to Cisco Identity Services Engine |
|
|
32 | (18) |
|
Overview of Cisco Identity Services Engine |
|
|
32 | (2) |
|
|
34 | (1) |
|
|
34 | (3) |
|
|
37 | (1) |
|
|
38 | (2) |
|
|
40 | (5) |
|
|
45 | (1) |
|
|
46 | (2) |
|
|
48 | (2) |
|
Cisco ISE Design Considerations |
|
|
50 | (4) |
|
|
50 | (1) |
|
Cisco ISE Deployment Options |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
Dedicated Distributed Deployment |
|
|
52 | (2) |
|
Segmentation with Cisco TrustSec |
|
|
54 | (4) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
58 | (1) |
|
Chapter 3 Introduction to Cisco DNA Center |
|
|
59 | (22) |
|
Network Planning and Deployment Trends |
|
|
59 | (1) |
|
History of Automation Tools |
|
|
60 | (2) |
|
Cisco DNA Center Overview |
|
|
62 | (2) |
|
Design and Visualization of the Network |
|
|
64 | (8) |
|
|
64 | (5) |
|
|
69 | (1) |
|
|
70 | (2) |
|
Network Discovery and Inventory |
|
|
72 | (5) |
|
|
72 | (2) |
|
|
74 | (3) |
|
Device Configuration and Provisioning |
|
|
77 | (2) |
|
|
79 | (2) |
|
Chapter 4 Cisco Software-Defined Access Fundamentals |
|
|
81 | (30) |
|
|
81 | (1) |
|
Cisco Software-Defined Access Underlay |
|
|
82 | (7) |
|
|
83 | (1) |
|
Automated Underlay: LAN Automation |
|
|
84 | (5) |
|
Wireless LAN Controllers and Access Points in Cisco Software-Defined Access |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (2) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (11) |
|
|
95 | (1) |
|
|
96 | (2) |
|
|
98 | (1) |
|
Border and Control Plane Collocation |
|
|
99 | (1) |
|
|
100 | (3) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (5) |
|
|
105 | (1) |
|
|
106 | (2) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
References in This Chapter |
|
|
110 | (1) |
|
Chapter 5 Cisco Identity Services Engine with Cisco DNA Center |
|
|
111 | (56) |
|
Policy Management in Cisco DNA Center with Cisco ISE |
|
|
112 | (10) |
|
Integration of Cisco DNA Center and ISE |
|
|
113 | (1) |
|
Certificates in Cisco DNA Center |
|
|
113 | (2) |
|
Certificates on Cisco Identity Services Engine |
|
|
115 | (1) |
|
Cisco ISE and Cisco DNA Center Integration Process |
|
|
116 | (6) |
|
Group-Based Access Control |
|
|
122 | (4) |
|
Segmentation with Third-Party RADIUS Server |
|
|
126 | (2) |
|
Secure Host Onboarding in Enterprise Networks |
|
|
128 | (2) |
|
Endpoint Host Modes in 802.1X |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (6) |
|
|
131 | (1) |
|
Phase I Monitor Mode (Visibility Mode) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (2) |
|
Host Onboarding with Cisco DNA Center |
|
|
136 | (8) |
|
No Authentication Template |
|
|
137 | (1) |
|
Open Authentication Template |
|
|
138 | (2) |
|
|
140 | (1) |
|
|
141 | (3) |
|
Security in Cisco Software-Defined Access Network |
|
|
144 | (2) |
|
Macro-Segmentation in Cisco SD-Access |
|
|
144 | (1) |
|
Micro-Segmentation in Cisco SD-Access |
|
|
145 | (1) |
|
Policy Set Overview in Cisco ISE |
|
|
146 | (2) |
|
Segmentation Policy Construction in Cisco SD-Access |
|
|
148 | (16) |
|
Corporate Network Access Use Case |
|
|
149 | (10) |
|
|
159 | (5) |
|
Segmentation Outside the Fabric |
|
|
164 | (1) |
|
|
164 | (1) |
|
References in This Chapter |
|
|
165 | (2) |
|
Chapter 6 Cisco Software-Defined Access Operation and Troubleshooting |
|
|
167 | (28) |
|
Cisco SD-Access Under the Covers |
|
|
167 | (5) |
|
|
167 | (1) |
|
|
168 | (3) |
|
|
171 | (1) |
|
|
172 | (1) |
|
Host Operation and Packet Flow in Cisco SD-Access |
|
|
172 | (9) |
|
|
172 | (3) |
|
Wired Host Onboarding and Registration |
|
|
175 | (1) |
|
|
176 | (1) |
|
Intra-Subnet Traffic in the Fabric |
|
|
176 | (3) |
|
Inter-Subnet Traffic in the Fabric |
|
|
179 | (1) |
|
Traffic to Destinations Outside of the Fabric |
|
|
180 | (1) |
|
|
180 | (1) |
|
Initial Onboarding and Registration |
|
|
180 | (1) |
|
Cisco SD-Access Troubleshooting |
|
|
181 | (7) |
|
|
182 | (4) |
|
|
186 | (2) |
|
Authentication/Policy Troubleshooting |
|
|
188 | (5) |
|
|
188 | (2) |
|
|
190 | (1) |
|
|
191 | (2) |
|
|
193 | (1) |
|
References in This Chapter |
|
|
193 | (2) |
|
Chapter 7 Advanced Cisco Software-Defined Access Topics |
|
|
195 | (60) |
|
Cisco Software-Defined Access Extension to IoT |
|
|
196 | (12) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (2) |
|
Configuration of Extended Nodes |
|
|
200 | (3) |
|
Onboarding the Extended Node |
|
|
203 | (2) |
|
Packet Walk of Extended Cisco SD-Access Use Cases |
|
|
205 | (1) |
|
Use Case: Hosts in Fabric Communicating with Hosts Connected Outside the Fabric |
|
|
205 | (1) |
|
Use Case: Traffic from a Client Connected to a Policy Extended Node |
|
|
206 | (1) |
|
Use Case: Traffic to a Client Connected to a Policy Extended Node |
|
|
207 | (1) |
|
Use Case: Traffic Flow Within a Policy Extended Node |
|
|
207 | (1) |
|
Multicast in Cisco SD-Access |
|
|
208 | (2) |
|
|
209 | (1) |
|
IP Multicast Delivery Modes |
|
|
210 | (1) |
|
Multicast Flows in Cisco SD-Access |
|
|
210 | (8) |
|
Scenario 1 Multicast in PIM ASM with Head-End Replication (Fabric RP) |
|
|
211 | (2) |
|
Scenario 2 Multicast in PIM SSM with Head-End Replication |
|
|
213 | (1) |
|
Scenario 3 Cisco SD-Access Fabric Native Multicast |
|
|
214 | (2) |
|
Cisco SD-Access Multicast Configuration in Cisco DNA Center |
|
|
216 | (2) |
|
Layer 2 Flooding in Cisco SD-Access |
|
|
218 | (3) |
|
Layer 2 Flooding Operation |
|
|
219 | (2) |
|
Layer 2 Border in Cisco SD-Access |
|
|
221 | (7) |
|
|
224 | (1) |
|
Layer 2 Intersite Design and Traffic Flow |
|
|
224 | (3) |
|
Fabric in a Box in Cisco SD-Access |
|
|
227 | (1) |
|
Cisco SD-Access for Distributed Campus Deployments |
|
|
228 | (12) |
|
|
229 | (1) |
|
|
229 | (1) |
|
Fabric Multisite or Multidomain with IP Transit |
|
|
230 | (2) |
|
|
232 | (5) |
|
|
237 | (1) |
|
Policy Deployment Models in Cisco SD-Access Distributed Deployment |
|
|
238 | (2) |
|
Cisco SD-Access Design Considerations |
|
|
240 | (12) |
|
|
240 | (1) |
|
Cisco SD-Access Design Approach |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
Single-Site Design Versus Multisite Design |
|
|
244 | (1) |
|
Cisco SD-Access Component Considerations |
|
|
245 | (1) |
|
|
246 | (1) |
|
Underlay Network Design Considerations |
|
|
246 | (1) |
|
|
247 | (1) |
|
Overlay Fabric Design Considerations |
|
|
247 | (1) |
|
Fabric Control Plane Node Design Considerations |
|
|
248 | (1) |
|
Fabric Border Node Design Considerations |
|
|
248 | (1) |
|
Infrastructure Services Design Considerations |
|
|
249 | (1) |
|
Fabric Wireless Integration Design Considerations |
|
|
249 | (1) |
|
Wireless Over-the-Top Centralized Wireless Option Design Considerations |
|
|
250 | (1) |
|
Mixed SD-Access Wireless and Centralized Wireless Option Design Considerations |
|
|
250 | (1) |
|
Wireless Guest Deployment Considerations |
|
|
250 | (1) |
|
Security Policy Design Considerations |
|
|
251 | (1) |
|
Cisco SD-Access Policy Extension to Cisco ACI |
|
|
252 | (2) |
|
|
254 | (1) |
|
References in This Chapter |
|
|
254 | (1) |
|
Chapter 8 Advanced Cisco DNA Center |
|
|
255 | (30) |
|
Cisco DNA Center Architecture and Connectivity |
|
|
256 | (3) |
|
|
256 | (1) |
|
|
256 | (2) |
|
High Availability and Clustering with Cisco DNA Center |
|
|
258 | (1) |
|
Software Image Management |
|
|
259 | (7) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
263 | (3) |
|
Cisco DNA Center Templates |
|
|
266 | (6) |
|
|
267 | (2) |
|
Template Assignment and Network Profiles |
|
|
269 | (1) |
|
|
270 | (2) |
|
|
272 | (8) |
|
|
273 | (2) |
|
|
275 | (1) |
|
|
276 | (4) |
|
|
280 | (4) |
|
|
280 | (1) |
|
|
281 | (2) |
|
|
283 | (1) |
|
|
284 | (1) |
|
References in This Chapter |
|
|
284 | (1) |
|
Chapter 9 Cisco DNA Assurance |
|
|
285 | (22) |
|
|
285 | (2) |
|
Challenges of Traditional Implementations |
|
|
285 | (1) |
|
|
286 | (1) |
|
Cisco DNA Assurance Architecture |
|
|
287 | (13) |
|
Cisco DNA Assurance Data Collection Points |
|
|
289 | (1) |
|
|
290 | (2) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (2) |
|
Cisco SD-Access Fabric Network Health |
|
|
296 | (1) |
|
|
297 | (2) |
|
Application Health Dashboard |
|
|
299 | (1) |
|
Cisco DNA Assurance Tools |
|
|
300 | (6) |
|
|
300 | (1) |
|
|
301 | (2) |
|
|
303 | (1) |
|
|
303 | (1) |
|
Cisco AI Network Analytics |
|
|
304 | (2) |
|
|
306 | (1) |
|
References in This Chapter |
|
|
306 | (1) |
Glossary |
|
307 | (6) |
Index |
|
313 | |