Introduction |
|
xix | |
|
Chapter 1 Introduction To Cisco Software-Defined Wide Area Networking (Sd-Wan) |
|
|
1 | (24) |
|
|
1 | (3) |
|
Common Business and IT Trends |
|
|
4 | (1) |
|
|
5 | (2) |
|
High-Level Design Considerations |
|
|
7 | (2) |
|
Introduction to Cisco Software-Defined WAN (SD-WAN) |
|
|
9 | (4) |
|
|
10 | (2) |
|
|
12 | (1) |
|
Use Cases Demanding Changes in the WAN |
|
|
13 | (4) |
|
Bandwidth Aggregation and Application Load-Balancing |
|
|
13 | (1) |
|
Protecting Critical Applications with SLAs |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
Fully Managed Network Solution |
|
|
16 | (1) |
|
Building an ROI to Identify Cost Savings |
|
|
17 | (1) |
|
Introduction to Multidomain |
|
|
18 | (3) |
|
Cloud Trends and Adoption |
|
|
19 | (2) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
22 | (3) |
|
Chapter 2 Cisco Sd-Wan Components |
|
|
25 | (18) |
|
|
27 | (5) |
|
|
32 | (2) |
|
|
34 | (2) |
|
|
36 | (2) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (2) |
|
|
42 | (1) |
|
Chapter 3 Control Plane And Data Plane Operations |
|
|
43 | (48) |
|
|
44 | (21) |
|
Overlay Management Protocol |
|
|
47 | (1) |
|
|
48 | (4) |
|
|
52 | (2) |
|
|
54 | (2) |
|
|
56 | (2) |
|
OMP Route Redistribution and Loop Prevention |
|
|
58 | (7) |
|
|
65 | (23) |
|
|
66 | (4) |
|
|
70 | (3) |
|
Network Address Translation |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
Address Restricted Cone NAT |
|
|
76 | (1) |
|
|
77 | (4) |
|
|
81 | (2) |
|
|
83 | (3) |
|
Data Plane Encryption with Pairwise |
|
|
86 | (2) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
Chapter 4 Onboarding And Provisioning |
|
|
91 | (18) |
|
|
93 | (4) |
|
Developing and Deploying Templates |
|
|
97 | (4) |
|
|
101 | (4) |
|
Manual Bootstrapping of a WAN Edge |
|
|
102 | (1) |
|
Automatic Provisioning with PNP or ZTP |
|
|
103 | (2) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (2) |
|
Chapter 5 Introduction To Cisco Sd-Wan Policies |
|
|
109 | (24) |
|
Purpose of Cisco SD-WAN Policies |
|
|
109 | (1) |
|
Types of Cisco SD-WAN Policies |
|
|
110 | (5) |
|
|
110 | (1) |
|
Centralized Policies That Affect the Control Plane |
|
|
111 | (1) |
|
Centralized Policies That Affect the Data Plane |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (2) |
|
Cisco SD-WAN Policy Construction |
|
|
115 | (7) |
|
|
118 | (1) |
|
|
119 | (3) |
|
Cisco SD-WAN Policy Administration, Activation, and Enforcement |
|
|
122 | (5) |
|
Building a Centralized Policy |
|
|
122 | (3) |
|
Activating a Centralized Policy |
|
|
125 | (2) |
|
Packet Forwarding Order of Operations |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (4) |
|
Chapter 6 Centralized Control Policies |
|
|
133 | (94) |
|
Centralized Control Policy Overview |
|
|
134 | (2) |
|
Use Case 1 Isolating Remote Branches from Each Other |
|
|
136 | (13) |
|
|
149 | (1) |
|
Use Case 2 Enabling Branch-to-Branch Communication Through Data Centers |
|
|
149 | (20) |
|
Enabling Branch-to-Branch Communication with Summarization |
|
|
150 | (2) |
|
Enabling Branch-to-Branch Communication with TLOC Lists |
|
|
152 | (16) |
|
|
168 | (1) |
|
Use Case 3 Traffic Engineering at Sites with Multiple Routers |
|
|
169 | (11) |
|
Setting TLOC Preference with Centralized Policy |
|
|
171 | (6) |
|
Setting TLOC Preference with Device Templates |
|
|
177 | (2) |
|
|
179 | (1) |
|
Use Case 4 Preferring Regional Data Centers for Internet Access |
|
|
180 | (8) |
|
|
188 | (1) |
|
Use Case 5 Regional Mesh Networks |
|
|
188 | (7) |
|
|
195 | (1) |
|
Use Case 6 Enforcing Security Perimeters with Service Insertion |
|
|
195 | (7) |
|
|
202 | (1) |
|
Use Case 7 Isolating Guest Users from the Corporate WAN |
|
|
202 | (4) |
|
|
206 | (1) |
|
Use Case 8 Creating Different Network Topologies per Segment |
|
|
206 | (5) |
|
|
210 | (1) |
|
Use Case 9 Creating Extranets and Access to Shared Services |
|
|
211 | (12) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (2) |
|
|
226 | (1) |
|
Chapter 7 Centralized Data Policies |
|
|
227 | (58) |
|
Centralized Data Policy Overview |
|
|
228 | (1) |
|
Centralized Data Policy Use Cases |
|
|
228 | (52) |
|
Use Case 10 Direct Internet Access for Guest Users |
|
|
230 | (12) |
|
|
242 | (1) |
|
Use Case 11 Direct Cloud Access for Trusted Applications |
|
|
243 | (10) |
|
|
253 | (1) |
|
Use Case 12 Application-Based Traffic Engineering |
|
|
253 | (7) |
|
|
260 | (1) |
|
Use Case 13 Protecting Corporate Users with a Cloud-Delivered Firewall |
|
|
261 | (8) |
|
|
269 | (1) |
|
Use Case 14 Protecting Applications from Packet Loss |
|
|
269 | (1) |
|
Forward Error Correction for Audio and Video |
|
|
270 | (4) |
|
Packet Duplication for Credit Card Transactions |
|
|
274 | (6) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (2) |
|
|
284 | (1) |
|
Chapter 8 Application-Aware Routing Policies |
|
|
285 | (34) |
|
The Business Imperative for Application-Aware Routing |
|
|
286 | (1) |
|
The Mechanics of an App-Route Policy |
|
|
286 | (1) |
|
Constructing an App-Route Policy |
|
|
287 | (7) |
|
Monitoring Tunnel Performance |
|
|
294 | (10) |
|
|
295 | (1) |
|
|
295 | (2) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (2) |
|
|
300 | (4) |
|
Mapping Traffic Flows to a Transport Tunnel |
|
|
304 | (11) |
|
Packet Forwarding with Application-Aware Routing Policies |
|
|
304 | (1) |
|
Traditional Lookup in the Routing Table |
|
|
305 | (1) |
|
|
306 | (9) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (3) |
|
Chapter 9 Localized Policies |
|
|
319 | (30) |
|
Introduction to Localized Policies |
|
|
319 | (1) |
|
Localized Control Policies |
|
|
320 | (14) |
|
|
334 | (4) |
|
Quality of Service Policies |
|
|
338 | (8) |
|
Step 1 Assign Traffic to Forwarding Classes |
|
|
339 | (2) |
|
Step 2 Map Forwarding Classes to Hardware Queues |
|
|
341 | (1) |
|
Step 3 Configure the Scheduling Parameters for Each Queue |
|
|
341 | (1) |
|
Step 4 Map All of the Schedulers Together into a Single QoS Map |
|
|
342 | (1) |
|
Step 5 Configure the Interface with the QoS Map |
|
|
343 | (3) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
347 | (2) |
|
Chapter 10 Cisco Sd-Wan Security |
|
|
349 | (44) |
|
Cisco SD-WAN Security: Why and What |
|
|
349 | (3) |
|
Application-Aware Enterprise Firewall |
|
|
352 | (8) |
|
Intrusion Detection and Prevention |
|
|
360 | (7) |
|
|
367 | (5) |
|
Advanced Malware Protection and Threat Grid |
|
|
372 | (5) |
|
|
377 | (4) |
|
|
381 | (3) |
|
Manage Authentication and Authorization |
|
|
384 | (5) |
|
Local Authentication with Role-Based Access Control (RBAC) |
|
|
384 | (3) |
|
Remote Authentication with Role-Based Access Control (RBAC) |
|
|
387 | (2) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (4) |
|
Chapter 11 Cisco Sd-Wan Cloud Onramp |
|
|
393 | (66) |
|
Cisco SD-WAN Cloud onRamp |
|
|
393 | (1) |
|
|
394 | (18) |
|
|
412 | (17) |
|
Cloud onRamp for Colocation |
|
|
429 | (26) |
|
|
432 | (1) |
|
|
432 | (2) |
|
Service Chaining for a Single Service Node |
|
|
434 | (2) |
|
Service Chaining for Multiple Service Nodes |
|
|
436 | (1) |
|
Service Chaining and the Public Cloud |
|
|
436 | (2) |
|
Infrastructure as a Service |
|
|
438 | (1) |
|
|
438 | (2) |
|
Redundancy and High Availability |
|
|
440 | (1) |
|
Service Chain Design Best Practices |
|
|
440 | (2) |
|
Configuration and Management |
|
|
442 | (1) |
|
|
442 | (7) |
|
|
449 | (1) |
|
|
449 | (5) |
|
|
454 | (1) |
|
|
455 | (1) |
|
|
456 | (1) |
|
|
456 | (1) |
|
|
456 | (3) |
|
Chapter 12 Cisco Sd-Wan Design And Migration |
|
|
459 | (34) |
|
Cisco SD-WAN Design Methodology |
|
|
459 | (1) |
|
Cisco SD-WAN Migration Preparation |
|
|
460 | (2) |
|
Cisco SD-WAN Data Center Design |
|
|
462 | (7) |
|
Transport-Side Connectivity |
|
|
463 | (2) |
|
|
465 | (1) |
|
Service-Side Connectivity |
|
|
466 | (3) |
|
Cisco SD-WAN Branch Design |
|
|
469 | (11) |
|
Complete CE Replacement--Single Cisco SD-WAN Edge |
|
|
470 | (1) |
|
Complete CE Replacement--Dual Cisco SD-WAN Edge |
|
|
471 | (4) |
|
Integration with Existing CE Router |
|
|
475 | (1) |
|
Integration with a Branch Firewall |
|
|
476 | (2) |
|
Integration with Voice Services |
|
|
478 | (2) |
|
Cisco SD-WAN Overlay and Underlay Integration |
|
|
480 | (10) |
|
|
480 | (1) |
|
Overlay with Underlay Backup |
|
|
481 | (4) |
|
Full Overlay and Underlay Integration |
|
|
485 | (5) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (3) |
|
Chapter 13 Provisioning Cisco Sd-Wan Controllers In A Private Cloud |
|
|
493 | (34) |
|
SD-WAN Controller Functionality Recap |
|
|
493 | (3) |
|
|
496 | (5) |
|
vManage Controller Deployment |
|
|
501 | (12) |
|
Step 1 Deploy vManage Virtual Appliance on VMware ESXi or KVM |
|
|
503 | (3) |
|
Step 2 Bootstrap and Configure vManage Controller |
|
|
506 | (1) |
|
Step 3/4 Set Organization Name and vBond Address in vManage; Install Root CA Certificate |
|
|
506 | (5) |
|
Step 5 Generate, Sign, and Install Certificate onto vManage Controller |
|
|
511 | (2) |
|
vBond Controller Deployment |
|
|
513 | (5) |
|
Step 1/2/3 Deploy vBond Virtual Machine on VMware ESXi; Bootstrap and Configure vBond Controller; Manually Install Root CA Certificate onvBond |
|
|
514 | (2) |
|
Step 4/5 Add vBond Controller to vManage; Generate, Sign, and Install Certificate onto vBond Controller |
|
|
516 | (2) |
|
vSmart Controller Deployment |
|
|
518 | (5) |
|
Step 1/2/3 Deploy vSmart Virtual Machine from Downloaded OVA; Bootstrap and Configure vSmart Controller; Manually Install Root CA Certificate on vSmart |
|
|
519 | (1) |
|
Step 4/5 Add vSmart Controller to vManage; Generate, Sign, and Install Certificate onto vSmart Controller |
|
|
520 | (3) |
|
|
523 | (1) |
|
|
524 | (1) |
|
|
524 | (1) |
|
|
524 | (2) |
|
|
526 | (1) |
Appendix A Answers to Chapter Review Questions |
|
527 | (12) |
Appendix B Example 7-17 |
|
539 | (14) |
Glossary of Key Terms |
|
553 | (4) |
Index |
|
557 | |