BRKCRS 2502
BRKCRS 2502
BRKCRS 2502
Deployment of Software
Defined Access (SDA)
BRKCRS-2502
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Your Presenters today
Nidhi Imran
Pandey Bashir
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Assumptions
This session assumes you have received DNA Center & SD-Access Training
For a list of current capabilities, restrictions, limitations & caveats refer to:
• DNAC Release Notes
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Icons Used Throughout the BRKCRS-2502
For your
reference
For Your Reference – These items will usually NOT be covered in
detail during the session
Content enlarging – when something is not visible enough, we
highlight and enlarge this area.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Agenda
• Introduction
• Sample Customer Requirements
• General Design Considerations
• Best Practices for Wired and Wireless
• Segmentation and Policy Best Practices
• Migration Considerations
• Security Best Practice
• Designing Customer Network
• Demo (if time permits)
• Conclusion
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Are New to SD-Access ?
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
TUE WED THU FRI
IBN
Connecting the Fabric Appreciation 18:30
to External Networks
Cisco SD-Access
Technology
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Rethink networking, think intent-based
1. Network execution: High
security, high availability, normal
priority
Business intent: Deploy IoT
sensors
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Assured
SD-Access Always-On Secure
Experiences
Network Services
Meet your
Customers
Cisco IT
www.cisco.com/c/en/us/solutions/enterprise-networks/network-architecture-customer-success-stories.html
Customer Requirement - Healthcare Vertical
Customer will be onboarding two new clinical facilities and is striving towards a unified architecture to minimize operational
overhead and to drive simplicity. Security is top of mind for the CIO.
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Customer Requirement - Manufacturing Vertical
A manufacturing customer has 15 facilities in a Metro Area Network, all interconnected via dark fiber. They all connect back
to Corporate HQ to access billing servers.
• Seamless Mobility – wherever possible (Wired > Wired, Wired > Wireless) within a facility.
Top of Mind
• Existing baseline architecture has VLAN based segmentation in place today
• Port-Security for limiting mac-address.
• MPLS circuit to connect other branches/sites. Internet breakout at every site.
• OSPF for Campus Routing.
• Existing ISE and AD architecture
• Fabric wireless
• Seamless mobility
• Same subnet for static endpoints
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
The Challenge…
“I want to design and deploy a SD-Access network.”
B B Outside Automated
C
Network Fabric
Single fabric for Wired and
Wireless with full automation
Insights and
SD-Access
Telemetry
Extension User Mobility
Analytics and insights into
Policy follows User User and Application experience
IoT Network Employee Network © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
SD-Access Architecture
Fabric Roles & Terminology
Campus
Fabric Edge
Nodes Fabric
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
SD-Access
What exactly is a Fabric?
A Fabric is an Overlay
An Overlay network is a logical topology used to virtually connect devices,
built over an arbitrary physical Underlay topology.
An Overlay network often uses alternate forwarding attributes to provide
additional services, not provided by the Underlay.
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
SD-Access Fabric
Campus Fabric - Key Components
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Cisco SD-Access
Fabric Roles & Terminology
Network Automation – Simple GUI
Automation and APIs for intent-based Automation
Identity of wired and wireless fabric devices
Cisco ISE Cisco DNA Center
Services
Network Assurance – Data Collectors
analyze Endpoint to Application flows
Assurance and monitor fabric network status
Identity Services – NAC & ID Services
(e.g. ISE) for dynamic Endpoint to Group
Fabric Border IP Fabric Wireless mapping and Policy definition
Nodes Controllers
B B Control-Plane Nodes – Map System that
manages Endpoint to Device relationships
Control-Plane
Intermediate Fabric Border Nodes – A fabric device
C Nodes
Nodes (Underlay) (e.g. Core) that connects External L3
network(s) to the SD-Access fabric
1. Control-Plane based
B B
on LISP
C
2. Data-Plane based on
VXLAN
3. Policy-Plane based on
CTS
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
SD-Access Fabric
LISP Control Plane
192.168.1.11/32 192.168.1.13/32
External Border node acts as PXTR (LISP
Database Mapping Entry
Proxy Tunnel Router) and provides default 172.16.101.11/16 -> 192.168.1.11
gateway when no mapping exists. Database Mapping Entry Employee Contractor
172.16.101.12/16 -> 192.168.1.13 SGT SGT
172.16.101.11/16 172.16.101.12/16
Corporate VN
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
SD-Access Fabric
VXLAN Data Plane
B B
VXLAN header contains VNID (VXLAN Network C
Identifier) field which allows up to 16 million VNI
VXLAN
Corporate VN
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Group-Based Policy
Ingress Classification & Egress Enforcement
Encapsulation Decapsulation
VXLAN VXLAN
VN ID SGT ID
VN ID SGT ID
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
SD-Access Fabric
Cisco TrustSec Policy Plane
IoT VN Corporate VN
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
SD-Access Fabric
How VNs work in SD-Access
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Fabric Roles
B C B C • Border, Control Plane, Edge are
1. B C fabric roles. One device can
2. perform more than one function.
E
C B C B
1. Co-located B/CP
3. 2. FIAB
3. Embedded WLC
E E
X X
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
SD-Access Support
For more details: cs.co/sda-compatibility-matrix
NEW
ASR-1000-X
NEW
Aironet Aironet
Catalyst 3850 & 3650 ENCS 5400 Wave 1 APs* Wave 2 APs Cisco IE 4K/5K
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Designing your SD-Access enabled Network
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
SD-Access Deployment Lifecycle
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
SD-Access General Design
Considerations
Drivers for Change
SDA Top Design Considerations
SD-Access
Campus
Wireless
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Design Questions - Requirements
Translating Business Intent into Technical Requirements
K
Key Questions
Focus on Business Intent & Global Scope
A B
Connect Questions Comply Questions
Focus on Topology & Features Focus on Access & App Policy
(Per Site + Transit) (Per Site + Transit)
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Design Questions: Key Points For your
reference
• Redundancy Considerations?
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Design Questions: Connect Topics For your
reference
Connectivity Services
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Design Questions: Connect Topics For your
reference
Wired Considerations
How many Network Tiers? Which nodes will be Edge?
• What type(s) of Core/Border/CP node? • How many Edge nodes?
• What type(s) of Access/Edge node? • Any Edge @ Distribution?
• Are there any Distribution/Intermediate? Will there be Extended Nodes?
Which nodes will be Border? • How many Extended nodes?
• What type of Edge connection?
• What type of hand-off? L2/L3?
• What is the outside Protocol(s)? What is the Underlay?
• Redundant Borders? • What is the IP Addressing?
• Collocated or Distributed? • Automated Underlay?
• Manual Underlay? What Protocol?
Which nodes will be Control Plane?
• Switch/Router/CSR?
• Collocated or Distributed?
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Design Questions: Connect Topics
For your
reference
Wireless Considerations
What type of Wireless? Which types of APs?
• Fabric Enabled Wireless? • How many Wireless APs?
• Overlay Wireless (OTT)? • What type of Edge connection?
• Mixed Mode (both)?
• Cisco or 3rd Party? What about Guest Wireless?
• Dedicated Guest VN?
Which types of WLC?
• Dedicated Guest CP/Border?
• How many Wireless Clients?
• Where is the WLC connected?
• Direct to Border? DC?
• Redundancy considerations?
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Design Questions: Connect Topics For your
reference
Transit Considerations
What type of Transit? Is VRF hand-off required?
• SDA Fabric Overlay? • All VRFs? Selective?
• SD-WAN (Viptela)? • 1:1? 1:N? M:N?
• DMVPN (IWAN)? • Redundancy considerations?
• Traditional IP/BGP?
Is Policy hand-off required?
What is the WAN/Edge node? • All SGTs? Selective?
• Inline SGT Tags? SXP?
• Cisco or 3rd Party?
• Direct Internet Access?
• Redundancy considerations?
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Design Questions - Policy Topics
B0 - Policy Services
NOTE: This is NOT an exhaustive list of questions. Add more of your own!
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Design Questions - Policy Topics
B1 - Identity Considerations
NOTE: This is NOT an exhaustive list of questions. Add more of your own!
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Design Questions - Policy Topics
Segmentation Considerations
NOTE: This is NOT an exhaustive list of questions. Add more of your own!
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Sample Network with Multiple Sites
SDA Design is driven by Customer requirements
Use Cases
WAN/Metro
BRKCRS-2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Scale Considerations for Fabric Nodes
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Network Infrastructure – Underlay
SD-Access underlay options
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Automated Underlay- LAN Automation
CREATE CONFIGURE CONFIGURE
Network and device credentials Routing
SITE
1 2 3 4 5
Core CONFIGURE DISCOVER
Underlay pool Seed Device
ASSIGN TO
RUN AUTOMATION SITE
6
Sync and
provision
Peer
8 7
CLEAR CONFIGURATION
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Automated Underlay- LAN Automation
CREATE CONFIGURE CONFIGURE
Network and device credentials Routing
SITE
1 2 3 4 5
Core CONFIGURE DISCOVER
Underlay pool Seed Device
ASSIGN TO
RUN AUTOMATION SITE
6
Sync and
provision
Peer
8 7
CLEAR CONFIGURATION
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Overall Solution Scale is Driven by Cisco DNAC For your
reference
DNA Center
Scale Numbers
* = Higher numbers with newer appliance
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Border, Control
and Edge
< 2K
FIAB -- Fabric In A Box Max number of Endpoints
Fabric Nodes 1
B/
• Reduces cost to deploy SDA for very small
B/
CP CP
sites DC ISP
Internet
• FE + FB + CP on same C9K DNAC
E E
Sample Topology 1 NCP + NDP
ISE
Medium Design
in 1.2.10 (16.10.1e for C9300) 1 PAN + PXG
+ PSN
Services
1 DHCP + DNS IP
C + IPAM
B
C
B
E E E E
Large Design CP B
Site
FE W
BRKCRS-2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Border, Control
and Edge
< 2K
Stacks of FIAB Max number of Endpoints
Fabric Nodes 1
ISP
CP
CP
DC
Internet
E E DNAC
1 NCP + NDP
Benefits Cluster
ISE
Medium Design 1 PAN + PXG
Services
C
• Still reduced cost to deploy SDA for very small 1 DHCP + DNS IP
B + IPAM
C
B
sites
E E E E • FE + FB + CP on same C9K
• Supports eWLC/ 9800 & Embedded-Wireless
Large Design in 1.2.10 (16.10.1e for C9300) CP B
Site
FE W
BRKCRS-2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
● = Scale Numbers are currently being tested
Border, Control Fabric Edge
Fabric Nodes 2
(Collocated)
2
(Collocated) ● < 25
Overview Virtual Networks
●
CP B
< 64 < 64 < 64
Maximum number of VN’s
• Multiple wiring closets or even single.
●
FE W
IP Pools
• Border and CP are collocated in a single box < 64 < 64 < 64
Very Small • Redundancy for Border or CP
• Limited Survivability
Access Points 200 200 ● 200
B/ CP • Total endpoints < 10K (recommendation, but B, CP FE
DNAC and platform scale can drive this Note: Platforms numbers can be higher but consider these solution
E E number) numbers for design
Small Design
B/ B/
Benefits Sample Topology DC
CP CP
• Small site design DNAC
1 NCP + NDP ISP
Intern
• Tends to be Building or Office with < 10,000 endpoints and <
Cluster
E E ISE et
1 PAN + PXG
100 IP Pools/Groups + PSN
Services IP
Medium Design • 1-2 Collocated CP + 1 DHCP + DNS
+ IPAM
C
External Border (Single Exit)
B
B
C • Tends to be local WLC connected to Border (e.g. Stack) + FEW
B CP
• Looking at <1000 dynamic authentications and <250 group
W
E E E E
based policies.
• FB + CP + eWLC (9300)with distributed Fabric Edges Site
Large Design
• Supports eWLC/ 9800 & Embedded-Wireless in 1.2.10
(16.10.1e for C9300)
BRKCRS-2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Strategy for Cisco SD-Access in a small site
Design for a small site
Border + CP
FE W + Fabric Edge
Very Small
B/ CP
E E
WAN Transit
Small Design
SD-Access and IP Transit
B/ B/
CP CP
E E
Enterprise Campus
Medium Design CP B CP B
C
B
C
Site
B
E E E E
BRKCRS-2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
● = Scale Numbers are currently being tested
Border, Control Fabric Edge
Overview 4
Fabric Nodes 4
(4 CP, 2 B)) (4 CP, 2 B) ● <250
Medium Site Virtual Networks
●
CP B
• Multiple wiring closets or even single. < 64 < 64 < 64
Maximum number of VN’s
• Dedicated CP’s for higher survivability (Site, building, floor)
FE W
• 2 x collocated Border & CP (in a single box)
• Full Survivability for CP
IP Pools < 64 < 64 ● < 64
Very Small
•
• Limited Redundancy for Border
Dedicated Edge (no stacking)
Access Points 200 200 ● 200
B/
CP • Recommended total endpoints < 10K (recommendation, but DNAC B, CP FE
and platform scale can drive this number). Note: Platforms numbers can be higher but consider these solution
E E
numbers for design
Small Design
Sample Topology ISP
B/ B/ DC Intern
Benefits
et
CP CP
Cisco DNAC
3 NCP + NDP
Cluster
IP
E E
• Next level up to a small design. ISE
•
2 PAN + PXG
Max Control Plane nodes = 6 (Wired Only); 4 with Wireless (2 2 PSN
B
C
• Most likely a 3 Tier design, recommendation is to use 9400 & 9500 as
B
C
intermediate nodes. Site
• Can choose a Co-located or a Distributed/Dedicated CP +
E E E E
Border(Single Exit) design.
• Tends to be WLC + FEW via Services Block or a local Data Center
Large Design
• Looking at < 25,000 dynamic authentications and < 1000 group based
policies
BRKCRS-2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
● = Scale Numbers are currently being tested
Border, Control Fabric Edge
• Max Control Plane nodes = 6 (Wired Only); 4 with Wireless (2 < 64 < 64 < 64
Maximum number of VN’s
FE W
Enterprise and 2 Guest CP’s).
• Max Border nodes = 4 IP Pools < 64 < 64 ● < 64
Very Small • Dedicated CP’s for higher survivability (Site, building, floor)
• Dedicated Borders for site exits Access Points 200 200 ● 200
B/
• Full Survivability for CP
CP • Full Redundancy for Border B, CP FE
E
• Dedicated Edge (no stacking) Note: Platforms numbers can be higher but consider these solution
E
• Recommended total endpoints < 25K (recommendation, but numbers for design
DNAC and platform scale can drive this number).
Small Design
DC WAN ISP
B/
Cisco DNAC
B/ Internet
CP CP ISE Inter Exte
DD nal rnal
E E
Benefits
• Dedicated borders can provide multiple exits to different DC’s or
Medium Design destinations.
• Tends to be Many Buildings with < 25,000 endpoints and < 500 B B B B
C
B IP Pools/Groups
C
B
• Most likely a 3 Tier design, recommendation is to use 9500 as Site
E E E E
intermediate nodes. CP CP
BRKCRS-2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Cisco SD-Access Network Requirements
Latency Requirements (RTT)
Control Access
DNAC ISE (PSN) Edge Border WLC Point
10msec 300msec
* longer execution time may be experienced for events with latency higher than 100 msec.
100 msec RTT
20 msec RTT
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Cisco DNA Center Design- Where to Locate it
Internet Internet
DC
Metro
1 or 3 appliance HA Cluster
- Odd number to achieve quorum
of distributed system
- Scale does not change
Seen as 1 logical Cisco DNAC instance
- Virtual (Cluster) IP
Cisco DNAC apps on Maglev cluster 2 nodes active/sharing + 1 redundant
- Some services run multiple copies
spread across nodes (e.g. databases)
Virtual IP
- Other services run single copy and
migrate from failed to redundant node
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Cisco Identity Services Engine design
1:1 redundancy
Applies to both physical and virtual
deployment
Compatible with load balancers
S S
Large Transit
Medium M
(v)Small
L
S
S
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Scaling Strategy across Multiple Sites
Why single site vs multi site ?
Advantages:
Smaller or isolated Failure Domains
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Why Multiple sites
Survivability or WAN separated networks
Hospital Site
WLC
Use Case Management
• I need high survivability for my ER department
CP WLC Edge
Fabric
Border
Fabric B
Controller
Hospital IT
Environment SD-Access Edge Edge
Border
Fabric Intermediate
Nodes (Underlay) Fabric
Edge
ER
Edge Edge
BRKCRS-2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Why Multiple sites
Survivability or WAN separated networks
Hospital Site
WLC
Use Case Management
• I need high survivability for my ER department
CP WLC Edge
Fabric
Border
Fabric B
Controller
Hospital IT
Environment SD-Access Edge Edge
Fabric Intermediate
Nodes (Underlay) Fabric
Edge
CP
ER Site
Edge Edge
B
WLC
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Multiple Sites
Wireless Controller Scale
Transit B
B
B B WAN/Metro
B
C C C C
Latency 20 ms
Each site has a WLC associated with its Control Plane WLC
This will help scale the number of end points in the network
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Sample Network with Multiple Sites
SDA Design is driven by Customer requirements
Transit B
B
B B WAN/Metro
B
C C C C C
Cloud Cloud
Data Center Data Center
LTE Metro
Head Head
MPLS INTERNET Quarters Metro Quarters
Metro
Remote Campus 1
Branch 1
Remote Remote Campus 3
Branch 3 Campus 2
Branch 2
Less than <1G circuits from Policy Based Routing DNAC provides Automation and Single Smaller and Isolated fault domains
Provider(s) WAN Accelerators View of entire system
Higher latencies because sites are in Traffic engineering VNs and SGTs gets pushed to all sites Resiliency and Scalability
different regions (many miles apart) Mobile Backhaul LTE (consistent policy)
Local breakout at each Site for Direct
Internet Access (DIA)
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
IP Transit
Design for a multi site with IP Transit Remote Branch 1
Remote Branch N
Site BN
Overview B E C
Site B1 Site B2
• Tends to be many remote branch offices connected
• Customers already using existing WAN
or have adopted SD-WAN
• Higher latencies because sites are in different regions
(many miles apart)
Site HQ
HQ
Campus
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Cisco SD-Access for Distributed Campus IP Based WAN Transit
Management and Policy
Cisco DNA-Center
SGTs in SXP
C C
BGP BGP
LISP MP-BGP / Other LISP CONTROL-PLANE
VRF-lite VRF-lite
1
VXLAN SGT (16 bits) 802.1Q 802.1Q VXLAN SGT (16 bits)
MPLS
DATA-PLANE
Header VNID (24 bits) VLAN ID (12 bits) Labels VNID (24 bits) VLAN ID (12 bits) Header VNID (24 bits)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
SDA Transit
Design for a multi site with SDA Transit
Remote Building 1 Remote Building 2 Remote Building N
Overview
• Customers have multiple sites connect Site Site Site
via “Dark Fiber” links or DWDM links B1 B2 BN
Site HQ
CP CP
HQ Campus
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Cisco SD-Access Distributed Site Control Plane for Global Scale
Multiple SD-Access Fabric Sites
Use Case
• Each site only maintains state for in-site end-points.
• Off site traffic follows default to transit.
• Survivability, each site is a fully autonomous resiliency domain
• Each Site has its own unique subnets
West site Prefixes Only East + West East site Prefixes Only
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Native SD-Access Transit with Multi-Site Design
DNA-Center
Cisco ISE
MANAGEMENT
&
POLICY
C
C
C
1 1 LISP CONTROL-PLANE
LISP LISP
12 VXLAN SGT (16 bits) VXLAN SGT (16 bits) VXLAN SGT (16 bits)
Header VNID (24 bits) Header VNID (24 bits) Header VNID (24 bits) DATA-PLANE
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Device Compatibility For your
reference
https://www.cisco.com/c/en/us/solutions/enterprise-networks/software-defined-access/compatibility-matrix.html
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
SD-Access Wired Design
Considerations
Fusion Configuration
Connecting Fabric to Traditional Infrastructure
Fusion
Fusion
Fusion
VN_Campus
VN_Guest
INFRA_VN
VN_Campus
VN_Campus
VN_Guest
VN_IoT
INFRA_VN
VN_Guest
INFRA_VN
VN_IoT
VN_IoT
Border
Border-1 Border-2
Border Border
• If Border / Fusion network device is Routing platform, L3 sub-interfaces will be used to extend Virtual Networks
• If Border / Fusion network device is Switching platform, VLANs & Trunk will be used to extend Virtual Networks
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
L2 Intersite Handoff- 1.3.3
172.16.8.0/24
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
SD-Access Extension Platform Support
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Policy Extended Node – 1.3.3
• Policy Extended Node will have
Cisco ISE 802.1x/MAB Authentication enabled to
C communicate with ISE to download the
VLAN and Scalable Group Tag attributes for
B B
B end points.
B
Host 1
Vlan 100
SGT 100
Supported Platform:
IE3400, IE3400H
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Per Site Scale Factors to Consider in Fabric.
• Nidhi Pandey
• Technical Marketing Engineer at Cisco
Systems.
• ~10 Years with Cisco Systems
• Focus on Enterprise & Security
• Ask me about : Indian History, Good Reads,
Bangalore and Bollywood
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
SD-Access Wireless Design
Considerations
SD-Access Wireless Architecture
DNAC
Automation
ISE / AD DNAC simplifies the Fabric deployment,
Policy Including the wireless integration component
Abstraction and
Configuration
CAPWAP Automation
Cntrl plane Centralized Wireless Control Plane
LISP WLC still provides client session management
Cntrl plane AP Mgmt, Mobility, RRM, etc.
VXLAN Same operational advantages of CUWN
Data plane WLC
B B Fabric enabled WLC:
WLC is part of LISP control plane
LISP control plane Management
C WLC integrates with LISP control plane
WLC updates the CP for wireless clients
Mobility is integrated in Fabric thanks to LISP CP
SD-Access
Fabric Optimized Distributed Data Plane
Fabric overlay with Anycast GW + Stretched subnet
VLAN extension with no complications
Fabric enabled AP: All roaming is Layer 2
AP encapsulates Fabric
SSID traffic in VXLAN
VXLAN VXLAN from the AP
(Data Plane)
Carrying hierarchical policy segmentation starting
from the edge of the network
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
CAPWAP
control Access Points
non AP is directly connected to FE (or to an extended node switch)
Fabric
WLC AP is part of Fabric overlay
AP belongs to the INFRA_VN which is mapped to the global routing table (new
FB in DNAC 1.1)
INFRA_VN
AP joins the WLC in Local mode
Underlay
WLC
VxLAN WLC is connected outside Fabric (optionally directly to Border)
Fabric
WLC needs to reside in global routing table – to talk to CP!
Overlay
No need for inter-VRF leaking for AP to join the WLC
WLC can only belong to one FD. WLC talks to one CP (two for HA)
FE
CAPWAP
control Design Notes:
Access point 1) Fabric AP is in local mode, need < 20ms latency between AP & WLC
2) If WLC is used also for non-Fabric (mixed mode), considered MAC and ARP
table scale of the directly-connected Border device
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
What are my Options for Wireless with SDA ?
Mixed Mode
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
Design Consideration
Common for Greenfield & Brownfield
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Cisco SD-Access Wireless Adoption
• Fabric Enabled Wireless
Cisco DNAC
ISE / AD
Fabric
WLC
B C B C
Full Cisco SD-Access Wireless value
Cisco DNA Center with Automation & Assurance
SD-Access
Virtual Networks for Segmentation (ex Employee, IoT, Guest)
Fabric
ISE for SGT Access Control within VRF (ex. Contractor, BYOD, Employees)
VXLAN Subnet extension across Campus with distributed data plane
(Data)
Optimized path for Guest and no Anchor WLC
Fabric building And more…
Fabric APs
SSID SSID
CORP Guest
CAPWAP Control
VXLAN
ISE / AD
B C B C
Full Cisco SD-Access Wireless value with eWLC
W W
Cisco DNA Center with Automation & Assurance
SD-Access
Virtual Networks for Segmentation (ex Employee, IoT, Guest)
Fabric
ISE for SGT Access Control within VRF (ex. Contractor, BYOD, Employees)
VXLAN Subnet extension across Campus with distributed data plane
(Data)
Optimized path for Guest and no Anchor WLC
Fabric building And more…
Fabric APs
SSID SSID
CORP Guest
CAPWAP Control
VXLAN
ISE / AD
Fabric building
Non Fabric
SSID APs SSID
CORP Guest
CAPWAP Control and Data
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Cisco SD-Access Wireless Adoption
• Mixed Mode
Cisco DNAC
ISE / AD
SD-Access
Fabric
Fabric building
CAPWAP Control
and Data
CAPWAP Control
VxLAN
Fabric SSID
+
BYOD Contractor Employee
CUWN SSID
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Guest Access Deployment
Internet
Guest as VN
Internet
Dedicated GB/GCP GB GCP
B
• A dedicated Border and Control
• Guest traffic using the same plane for Guest VN
Border /Control plane as like any
other VN • Deploy as co-located or distributed
nodes.
• Work flow automated from DNAC
• Manual work flows required
• Simplified design • Identical to traditional Guest Anchor
solution.
• External handoff via VRF-Lite
• Ideal for stringent compliance
requirements
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Option1 : Guest as VN leveraging C Guest
Common CP/B User
SDA Fabric B User traffic
User VN Intranet
Guest VN
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Guest VN Border Handoff
Extend Guest VN
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
Option 2: Guest as VN with
Dedicated B/CP C
E B
SDA Fabric DMZ
GB GCP
WLC Internet
B
SDA Fabric
DMZ Internet
CAPWAP
10.10.10.40 CAPWAP/EoIP
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
For your
Fabric in a Box Scale and DNAC Scale reference
DNAC 1.3 Release
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
For your
Fabric Wireless Scale Fabric4 Fabric5
reference
C9800 WLC
B C Fabric2 Fabric3
C B C B
Fabric1
C B C B
E E
E E
C9300/9400/9500 C9300L
C9300/9400/9500 C9300L
C9300L (with
C9300L as C9300/9400/9500 C9300L (with C9300/9400/9500
C9300/9400/ embedded
edge C9200 as edge (with embedded embedded (with embedded
9500 as edge wireless) as
wireless) FiAB wireless) FiAB wireless) as edge
edge
Access
200 50 25 100 50 200 50
Points
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Wireless Controller Scale
For your
reference
Number of end
Platform Number of AP’s SDA Design
points
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Segmentation and Policy Best
Practices
Segmentation Overview
Employees
ISE
Marketing
IT
Finance
Contractors
Services
C
A
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
New Policy View (post 1.3.1.0)
# of policies referencing
Contract name the contract
C
B
Recommendation-
• Combination of VN and SGTs to
limit the SGACLs
SDA • Considerations to be given for
VN and SGT constructs
E E E
• Start small
5 6 7 3 9 8 2 4
VN 1 VN 2 VN 1
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Shared SGTs across VNs
Use Case:
• Scale for SGTs and VNs cross the supported limit.
• Access requirements across VNs
• Default access between VNs is deny.
C
B Recommendation- same SGTs in
different VNs
5 6 7 5 9 8 7 4
VN 1 VN 2 VN 1
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Multi-Site Policy Considerations
Need for Multisite deployment
Same SGTs can be shared across sites
Inline tagging supported by default in SDA transit
Make use of SXP domains
B B
IP/SDA
C C
B B
SDA SDA
E E E E E E
5 6 7 5 9 8 7 4 5 6 7 5 9 8 7 4
VN 1 VN 2 VN 1 VN 1 VN 2 VN 1
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
Enforcement Scale: IP/Group Mappings
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
Policy Table Size
SGACLs 30K(XL)
1500 5K 18K 18K 128K 64K
(Security ACEs) 12K(non XL)
* N7700 does NOT reuse TCAM entries – permissions in multiple contracts use multiple TCAM entries
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
North/South Policy Enforcement (Border Nodes)
IT system
(SGT15)
C
• Static Classifications for destinations B
5 6 7 5 9 8 7 4
Employee
VN 1 VNAll2rights reserved. Cisco Public
(SGT 5) © 2020 Cisco and/or its affiliates. VN 1
Firewall as Fusion
SXP or pxGrid shares IP/SGT mappings
SG-FIREWALL
• Comprehensive inter-VN policy, stateful
inspection, AVC
• Source SGT to Destination SGT policy B B
• Rich reporting in FTD C
• TrustSec policies not downloaded from
ISE to firewall
SDA
E E E
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
Border Scale Parameters For your
reference
Catalyst ASR1k/
Catalyst Catalyst Catalyst Catalyst Catalyst Catalyst Catalyst Nexus
Scale 3850 ISR4k CSR1KV
9300 9300L 9400 9500 9500 H 9600 6800 N7700
(XS)
Virtual Networks 64 256 256 256 256 256 1k 500 500 4k n.a
Group Tag
Table 4k 8k 8k 8K 8K 16K 32K 30K 16K 62K n.a
(SGT/DGT)
30K(XL)
SGACLs
1500 5K 5K 18K 18K 13K IPv4 27K 12K (LE) 1k 64K n.a
(Security ACEs)
IPv4 Host
SUP1XL= 1M (XL) 1M(8 GB)
Entries 16K 16K 16K 80K 150k 150k 32k 100k
80K 512K (L) 4M(16 GB)
(Host /32)
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
Edge Scale Parameters For your
reference
Fabric Catalyst Catalyst Catalyst Catalyst Catalyst Catalyst Catalyst 4K Catalyst Catalyst
Constructs 3650 3850 9200L 9200 9300 9300L (Sup8E) 9400 9500
Local End
2K 4K 2k 4k 4K 4K 4K 4K 4K
Points/Hosts
SGT/DGT Table
4K 4K 2k 2k 8K 8K 2K 8K 8K
SGACLs
(Security ACEs)
1350 1350 1k 1k 5K 5K 1350 18K 18K
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
Migration Best Practices
Migration Approaches: Parallel vs Incremental
IMPLEMENTATION RESOURCES
Best for Branch (small) deployments Best for Campus (any size)
Requires enough cable runs to create a new parallel Requires a couple of cables from new access
network and distribution switches
Power and outlets for a parallel network Incremental power and outlet requirement
Legacy hardware in existing network Legacy hardware in existing network
Upgrade most of the wired network Upgrade some of the wired network
Clean slate (leave behind any complexity in the old Must carry forward the constraints of the old
design) design in the underlay
Test users in a complete new network Test of functionality is partial
Easy Rollback of migrated users Easy Rollback of migrated users
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
Integrating DNAC with existing ISE
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 162
Incremental Migration – High Level concept
Virtual Network Existing Network
(new IP scope) (existing IP scope)
Route between IP
scopes
C B
Existing IP
Network
(underlay) Border/Control Plane
Existing Campus and
Edge Nodes Node External Network
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
Using New Subnets for Migration
• Immediately realize the advantages of bigger subnets, but lesser subnets that are
optimized for SD-Access
• Design for the present and the future
• Add DHCP scope and size
• Update existing firewall rules for that one big subnet
• Not a big issue for endpoints with IP stacks that work well with DHCP
Before After
10.10.1.0/24 10.10.4.0/24 10.10.7.0/24
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
Prerequisites
VN
C VRF/
B Zone
IP Network
Edge Node Control Plane + External Network
Border Node
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
After the Migration
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
Routed Access Design Considerations
B
• Shutdown existing SVI
B Layer 2
Border
• Provision existing subnet from DNA- SDA Fabric
Layer 2
• Verify connectivity Border
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
Multicast with RP outside the fabric – 1.3.3
External RP-1
External RP-2
• New multicast workflow support RP internal or external to
the fabric
• Configuration as part of the ASM workflow
non Fabric
B,RP • Maximum 2 RPs supported.
B,RP
SD-Access Fabric
E E E
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
What is the Best WLC/AP Migration model for You
Greenfield or Brownfield
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
SD-Access Wireless Migration
Migration for an existing CUWN deployment
CAPWAP Control and Data
DHCP ISE
Non Fabric
Cisco Prime
Building 1 Cisco DNA Center
Building 2
Services Block
CAPWAP B
SD Fabric
1 Add Cisco DNA Center and ISE (if not present already)
2 First, Migrate wired network to SD-Access Fabric
3 Wireless is over the top of Fabric
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
SD-Access Wireless Migration
Migration for an Existing CUWN Deployment
DHCP ISE
Non Fabric
Cisco Prime
Building 1 Cisco DNA Center
CAPWAP Control
No seamless Fabric
roaming WLC
VXLAN
Building 2 VXLAN
(Data) Services Block
CAPWAP Cntrl B
SD Fabric
4 Discover existing WLC to Cisco DNA Center – Learn configuration (e.g. SSIDs) and populate Cisco DNA Center
5 Assign a separate WLC for SD-Access and provision it to the site (re-use the configuration inherited from old WLC)
6 on CUWN WLC, configure the APs in the area to join the new Fabric WLC
7 APs in the area will join Fabric WLC. From Cisco DNA Center provision APs to the Fabric site
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
Migration Scenario 1
Traditional to Pure Fabric Enabled Wireless (FEW)
AD/DNS/DHCP
Internet MPLS DC
ISE DNAC
GRT
Fabric
Campus Core
enabled WLC
B B
C C
S-T-S
MPLS_CUS COMMON
VPN_CUS VOICE PRINTER
H.POOLS H.POOLS H.POOLS H.POOLS
C C
C C C C 1 2
1 n 1 n
Internet
H.POOLS NON-PROD
IT CORP,NON- Untag
C C C CORP
1 2 n C C C C C
1 2 3 4 5
Wired/Wireless Users
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 174
Scenario One (All SSIDs are FEW) For your
reference
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 175
Migration Scenario 2 Shared controller for SDA and CUWN
Shared WLC for FEW & Non-FEW • Shared WLC can manage Fabric and non-Fabric
APs but needs upgrade to 8.5
• New code = more risk for existing non-Fabric
ISE
buildings
Cisco Prime
Cisco DNA-C Management:
• DNAC 1.2 can manage non-Fabric WLC in
brownfield scenarios
Guest Anchor
• But not all wireless settings are available
VXLAN VXLAN
Non-
Fabric No roaming Fabric
APs between APs
Fabric and
Internal non-Fabric Internal
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 176
Scenario Two (FEW & Non-FEW) For your
reference
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 177
Migration Scenario Three
Onboarding Traditional Site using Cisco DNA-C
ISE
DMZ
Cisco Prime
Cisco DNA-C
Guest Anchor
EoIP
Non-FEW Site
WLC
CAPWAP
Traditional Campus
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 178
Scenario Three: Non-FEW & Local Mode AP For your
reference
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
Migration Example
Requirement :
Customer would want to utilize existing network infrastructure while moving specific ODCs to
SDA. User count is 5000 users. Fabric enabled wireless for the ODC in SDA.
Plan :
1. Use a pair of Border+Control plane node (Catalyst 9500)
2. 3 tier architecture
3. DNAC appliance - DN2-HW-APL
4. ISE – 4 node hybrid deployment (3655)
5. Manual underlay
6. Add 2 WLC to SDA ( platform)
7. Campus core switches to be used for Fusion
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 180
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 181
Security Best Practices
Firewall Integration for Inter-VN Policy
Requirement for Inter-VN policy enforcement
C B
SDA
Mappings can be Src SGT Dest SGT Action
shared with SXP Peers E E E
SecOps Cameras Permit
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
The “system” for ETA
ASA
ASA NGFWv
WSA
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 186
Groups from SDA Used in ACI
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 188
ACI Groups Used in SDA (Border or Fusion)
ISE Retrieves:
EPG Name: PCI EPG PCI EPG
Endpoint= 10.1.100.52 Endpoint = 10.1.100.52
SRC:10.1.10.220
DST: 10.1.100.52
SGT (Optional) ACI Border ACI Border PCI
Auditor Leaf (N9K)
Leaf (N9K) 10.1.100.52
10.1.10.220
Endpoint Groups available in SGT-based Policies
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 190
How Did Our Customers Deploy
Requirement:
Cat 9K Cat 9K
Guest
Static Static
Doctors/Nurse
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 192
Label Name Guest VN
Manufacturing HV
SE
PL
HVAC
Security
Plant Operation
EM,AP,PT
Enterprise VN
DC
EM Employee
HV,SE
SU Supplier
Building VN
AP Industrial Application
Internet OP Operators OP,BA,PL
BA Base Control Factory VN
PR Process
PT Printer Default VN
GB+GCP
Requirement:
C
C B B GB+GCP • 15 facilities
• 250 users per facility
Factory • Existing Ise deployment
Office • Seemless mobility and policy
SDA propagation
Transit • Cross domain policy
• Optimize guest traffic
Design:
• DNAC XL for multisite
B C • Latency consideration
B • Border -9500, CP -9300
GB+GCP 9500
C E • Smaller sites have FiAB (9500)
office2
• WLC- 9800 per site
Warehouse • Separate border and control plane for
Mobility requirement
• GB and GCP for optimizing Guest traffic
• Firewall connecting the sites for interVN
traffic
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Enterprise
Fabric Requirements
1 Existing
Subnet (3000
130 Buildings (3 floors each average) Fusion
Hosts)
L2 Overlays
Integration with ACI Corp
Internet
Multi-Site with SD-Access Transit IntB B
B
L2 WAN
5 Virtual Networks
DNA Center Cluster C T
IntB B
B
L2 WLC 5520 DNAC Cluster
Common VLAN Name Across Sites Catalyst 9500-24Q
Subnet SVI (Standard Scale
Appliances)
25,000 Clients (Inc v4/v6 .. V6 with 3 C T ACI Data
Center 2
ACI Data
Center 1
addresses per device) Catalyst 9500-24Q
2ms RTT
WLC 5520
Targeted Code Releases
Fabric Edge
Catalyst *
3850 Catalyst 9300 Catalyst 9200
DNAC 1.3.1
IOS XE 16.9.3s Fusion
1ce:c01d:bee2:15:a5:900d:a5:11fe Extended
AP 3802
Node
AP 3802
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 194
Take aways
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 195
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 196
Continue your education
Demos in the
Walk-In Labs
Cisco Showcase
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 197
Please fill out the survey
BRKCRS2502 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 198
Thank you