SDN, SD-WAN, & SD-Access Simplified... Seriously!

Kevin Wallace Training, LLC
8 Jun 202221:38

Summary

TLDRIn this informative video, Kevin delves into the realm of software-defined technologies, explaining the concepts of SDN, SD-WAN, and SD-Access. He clarifies how traditional networking devices operate and how SDN centralizes control planes with SDN controllers, enabling intent-based networking. The video explores Cisco's specific solutions like ACI and DNA Center, and how SD-WAN simplifies WAN management with an overlay network. Kevin also introduces SD-Access as an advanced policy enforcement mechanism that replaces traditional ACLs with identity-based access, enhancing security and mobility in networks.

Takeaways

  • 🌐 Software-Defined Networking (SDN) centralizes control planes in a controller, allowing for centralized management and intent-based networking.
  • 🔄 Traditional networking devices have three planes of operation: data, control, and management, while SDN shifts to a centralized control plane with APIs for device communication.
  • 📡 SDN uses southbound interfaces (SBIs) like OpenFlow or Cisco's OpFlex for communication between the controller and network devices.
  • 📚 Intent-based networking allows administrators to express their networking intent through applications, which communicate with the controller via northbound interfaces (NBIs).
  • 🔍 Cisco's Application Policy Infrastructure Controller (APIC) is used for data center SDN solutions, while Cisco DNA Center is used for enterprise networks.
  • 🌐 Software-Defined Wide Area Networks (SD-WAN) provide an overlay network on top of the physical infrastructure, simplifying the management of WAN connections.
  • đŸ› ïž SD-WAN allows for direct internet access from remote sites without the need for backhauling to a central location, improving efficiency.
  • 🔄 Cisco's SD-WAN solution is based on the Viptela technology they acquired, incorporating components like vManage, vBond, and vSmart for management and control.
  • 🔒 SD-WAN supports various WAN technologies and dynamically forms IPSec tunnels for secure traffic forwarding between edge routers.
  • 📝 Software-Defined Access (SD-Access) moves beyond traditional ACLs to policy enforcement based on user identity, facilitated by Cisco's Identity Services Engine (ISE).
  • 🔑 SD-Access enables the creation of security group ACLs that grant access based on user identity, allowing consistent access regardless of device location within the network.

Q & A

  • What is meant by the term 'software-defined' in the context of networking?

    -'Software-defined' refers to the concept of using software-based controllers or APIs to manage and control hardware devices, such as routers and switches. This approach allows for more flexible, efficient, and scalable network management.

  • What are the three planes of operation in traditional networking devices?

    -The three planes of operation are the data plane, the control plane, and the management plane. The data plane handles the forwarding of packets, the control plane runs algorithms for routing and switching, and the management plane is used for device configuration and management.

  • How does Software-Defined Networking (SDN) change the traditional networking model?

    -SDN centralizes the control plane by using an SDN controller, which runs the control plane algorithms and manages device configurations through APIs. This contrasts with the traditional distributed control plane model where each device has its own control plane.

  • What is a southbound interface (SBI) in SDN?

    -A southbound interface (SBI) is an API used for communication from the SDN controller to the network devices it manages. Examples include OpenFlow and Cisco's proprietary OpFlex.

  • What is intent-based networking in the context of SDN?

    -Intent-based networking allows administrators to specify high-level business goals or 'intents' (such as performance or security requirements) rather than configuring individual devices. The SDN controller translates these intents into device-specific configurations.

  • What is Cisco's SDN controller for data centers called?

    -Cisco's SDN controller for data centers is called the Cisco APIC (Application Policy Infrastructure Controller), which is part of Cisco's ACI (Application Centric Infrastructure).

  • What are some features of Cisco DNA Center?

    -Cisco DNA Center can design network topologies, pre-provision devices, handle day-to-day configurations, monitor network performance, and provide proactive troubleshooting with recommendations based on Cisco TAC knowledge.

  • What is Software-Defined WAN (SD-WAN) and what benefits does it offer?

    -SD-WAN is a technology that uses software-based controllers to manage WAN connections. Benefits include improved cloud application performance, reduced need for backhauling traffic, and the ability to use a variety of WAN technologies with centralized control.

  • How does Cisco implement SD-WAN?

    -Cisco's SD-WAN solution is based on technology from their acquisition of Viptela. It includes components such as vManage for management, vBond for orchestration, and vSmart for control, with edge routers forming secure tunnels for data transport.

  • What is Software-Defined Access (SD-Access) and how does it enhance traditional access control?

    -SD-Access uses identity-based security group ACLs instead of traditional IP-based ACLs. This allows for consistent access policies regardless of device location. It relies on Cisco ISE (Identity Services Engine) for defining identities and policies.

Outlines

00:00

📚 Introduction to Software-Defined Technologies

Kevin welcomes viewers and introduces the concept of software-defined technologies, including networking, WAN, and access. He explains the traditional networking devices' planes of operation: data, control, and management. He highlights the shift from distributed to centralized control planes using an SDN controller and APIs, specifically southbound interfaces like OpenFlow and OpFlex.

05:00

🏱 Cisco's SDN Solutions for Data Centers and Enterprises

Kevin differentiates between Cisco's SDN solutions for data centers and enterprise networks. In data centers, Cisco uses the Application Policy Infrastructure Controller (APIC) as part of the Application Centric Infrastructure (ACI). For enterprise networks, Cisco DNA Center enables intent-based networking, offering features like network design, troubleshooting, and proactive monitoring, leveraging Cisco's TAC knowledge base.

10:02

🌐 Introduction to Software-Defined WAN (SD-WAN)

Kevin transitions to discussing SD-WAN, explaining traditional WAN's limitations and the benefits of SD-WAN in optimizing cloud application performance. He describes the virtual topology of SD-WAN, enabling secure, quality connections across various physical WAN technologies, and mentions Cisco's SD-WAN solution based on Viptela technology.

15:03

🧠 SD-WAN Components and Control Layers

Kevin elaborates on Cisco's SD-WAN solution's components: vManage, vBond, and vSmart, detailing their roles in management, orchestration, policy enforcement, and control. He draws a parallel to the Borg collective from Star Trek, emphasizing the centralized control plane. The data plane consists of edge routers, which can be physical or virtual, handling traffic forwarding.

20:03

🔍 Exploring Cisco's vManage Interface

Kevin provides a live look at Cisco's vManage interface available through Cisco's dCloud service, showcasing its tools and monitoring options. He concludes the segment by explaining SD-Access as an evolution of traditional access control lists, introducing security group ACLs based on user identities managed by Cisco Identity Services Engine (ISE).

🔧 Layers and Components of Cisco SD-Access

Kevin breaks down Cisco SD-Access into layers: physical infrastructure, virtualized network, controller (including DNA Center and ISE), and management. He emphasizes the virtual fabric overlay network and how policies are enforced through these layers. He wraps up by inviting viewers to explore free course modules on various topics.

Mindmap

Keywords

💡Software-Defined Networking (SDN)

Software-Defined Networking (SDN) is a network architecture approach that enables the network to be intelligently and centrally controlled using software applications. This shifts the control plane from individual networking devices to a centralized SDN controller. In the video, SDN is explained as a way to centralize the control planes of traditional networking devices like routers and switches.

💡Control Plane

The control plane is a part of a network device that carries signaling traffic and is responsible for network routing. It makes decisions about where traffic is sent. In traditional networks, each device has its own control plane. The video describes how SDN centralizes this control plane into an SDN controller, which manages the network's decision-making processes.

💡Southbound Interface (SBI)

A Southbound Interface (SBI) is an API used by the SDN controller to communicate with network devices. It sends configuration and management instructions to the devices. The video uses the metaphor of a compass, with south being down, to explain how SBIs operate between the controller and the network devices.

💡Northbound Interface (NBI)

A Northbound Interface (NBI) is an API that allows applications to interact with the SDN controller. It is used to express network intent and retrieve network status. The video explains that NBIs enable administrators to manage the network through applications that communicate with the controller using REST APIs.

💡Cisco DNA Center

Cisco DNA Center is a network management and command center for Cisco's enterprise network architecture. It supports functions such as design, configuration, monitoring, and troubleshooting. In the video, it is described as a tool for intent-based networking that can automate and manage network operations.

💡Intent-Based Networking

Intent-Based Networking is a type of networking where the administrator defines the desired outcomes or 'intent' of the network, and the network automatically configures and manages itself to achieve those outcomes. The video mentions that with SDN, administrators can express their intent, like prioritizing video traffic, through applications that communicate with the SDN controller.

💡Cisco SD-WAN

Cisco SD-WAN is a software-defined approach to managing wide area networks (WAN). It centralizes the control plane and provides virtualized network services. The video explains how SD-WAN uses an overlay network to create secure, high-performance connections between multiple sites using various underlying physical WAN technologies.

💡Viptela

Viptela is a company acquired by Cisco that provides technology for their SD-WAN solutions. The video explains how Viptela's technology is integrated into Cisco's SD-WAN offerings, including components like vManage, vBond, and vSmart for management, orchestration, and control.

💡Overlay Network

An overlay network is a virtual network built on top of an existing physical network. It abstracts the physical connections and provides a virtual topology for easier management and configuration. The video describes how SD-WAN uses overlay networks to create virtual tunnels between sites, independent of the underlying physical infrastructure.

💡Application Policy Infrastructure Controller (APIC)

The Application Policy Infrastructure Controller (APIC) is a key component of Cisco's Application Centric Infrastructure (ACI) for data centers. It manages the policies and configuration of the data center network. In the video, APIC is mentioned as the SDN controller for Cisco's data center solutions, similar to how Cisco DNA Center is used for enterprise networks.

Highlights

Introduction to software-defined technologies like SDN, SD-WAN, and SD-Access and their roles in modern networking.

Explanation of the traditional networking model with distributed control planes in devices such as routers and switches.

Introduction to Software-Defined Networking (SDN) and the shift from distributed control planes to centralized control planes using an SDN controller.

Description of southbound interfaces (SBIs) and northbound interfaces (NBIs) in SDN, including examples like OpenFlow and REST APIs.

Overview of Cisco's specific SDN solutions like Cisco APIC for data centers and Cisco DNA Center for enterprise networks.

Discussion of intent-based networking and how SDN controllers enable administrators to manage network policies more efficiently.

Introduction to Software-Defined WAN (SD-WAN) and its advantages over traditional WANs, such as direct internet access and improved performance for cloud-based applications.

Explanation of underlay and overlay networks in SD-WAN and the concept of virtual topologies on top of physical infrastructure.

Details about Cisco's SD-WAN solution using Viptela technology, including the roles of vManage, vBond, and vSmart components.

Description of zero-touch provisioning in Cisco's SD-WAN, allowing pre-configuration of devices before deployment.

Example of an SD-WAN implementation with secure IPsec tunnels and centralized control for provisioning and configuration.

Overview of SD-Access as a next-generation policy enforcement solution, using identity-based access control instead of traditional ACLs.

Explanation of Cisco Identity Services Engine (ISE) and its role in defining user identities for SD-Access policies.

Comparison of traditional ACLs with security group ACLs in SD-Access, highlighting the benefits of identity-based access control.

Components of Cisco's SD-Access solution, including physical infrastructure, virtual overlay networks, and controller layer with Cisco DNA Center.

Transcripts

play00:04

hey welcome back to the channel

play00:06

everybody this is kevin and in this

play00:07

week's video we want to talk about this

play00:09

term that you may have heard software

play00:11

defined

play00:12

we have a software-defined networking

play00:15

software-defined wan software-defined

play00:17

access what's up with all these

play00:19

software-defined technologies what do

play00:21

they do for us and what pieces and parts

play00:23

make up a cisco solution that's what

play00:26

we're going to talk about in this week's

play00:27

video and as always if you enjoy this

play00:29

content please do me a huge favor and

play00:31

click the like button down below and

play00:33

subscribe so you don't miss any of our

play00:35

weekly content now let's begin our

play00:37

software-defined journey by taking a

play00:38

look first at software defined at

play00:40

networking or sdn and i want us to

play00:43

consider some traditional networking

play00:44

devices like routers and switches they

play00:47

have three different planes of operation

play00:49

they have the data plane which is

play00:51

concerned with getting a frame or a

play00:53

packet in one interface and out of the

play00:55

egress interface as quickly as possible

play00:58

the control plane that's where our

play01:00

algorithms run for example a router is

play01:02

going to run ospf at this plane the

play01:04

switch might run a spanning tree

play01:06

protocol of this plane

play01:08

these are the planes that populate the

play01:10

tables that will be used to forward data

play01:12

by the data plane and when we as

play01:14

administrators go to configure a router

play01:16

or switch we're interfacing with the

play01:19

management plane perhaps we secure shell

play01:22

into a switch to do some configuration

play01:24

we're coming in on the management plane

play01:27

now let's take a look at software

play01:28

defined networking and see how this can

play01:30

radically shift our perspective of how

play01:32

we manage our devices day-to-day the

play01:35

model that we just described is known as

play01:37

a distributed control plane meaning

play01:40

that the control planes of these devices

play01:42

are distributed in the devices in other

play01:44

words each device has its own control

play01:46

plane

play01:47

however with an sdn controller or a

play01:50

software-defined networking controller

play01:52

what we can do in some cases is take

play01:55

those control planes on those individual

play01:57

devices and have them run inside of the

play02:00

sdn controller so that appliance is in

play02:03

charge of running all of those

play02:05

algorithms and the configuration and any

play02:07

update information is going to be pushed

play02:09

down from the sdn controller down to

play02:11

those devices and that communication is

play02:14

using something called an api that's an

play02:16

application programming interface and we

play02:19

typically say that the api going from

play02:22

the controller down to the device is a

play02:25

southbound interface consider a compass

play02:28

south is usually down

play02:30

and when we draw out an sdn network we

play02:32

typically draw the devices being managed

play02:35

below the sdn controller so we're going

play02:39

down to those devices and these apis are

play02:42

therefore called southbound interfaces

play02:44

or sbi for short

play02:46

and now that we've got our control

play02:48

planes centralized in that sdn

play02:50

controller we've now migrated from a

play02:53

distributed control plane to a

play02:55

centralized control plane now when i say

play02:57

we have an api running between the

play02:59

controller and the device what's an

play03:02

example of that well there's an industry

play03:04

standard called openflow cisco has their

play03:07

own proprietary version called opflex

play03:09

but those are a couple of examples of

play03:11

southbound interfaces and the advantage

play03:13

that we as administrators get from this

play03:16

is we can do what is called intent based

play03:19

networking we can express our intent

play03:22

such as i want to treat video traffic

play03:25

this way and i want to treat voice

play03:26

traffic this way and i want to give this

play03:28

application this level of security and

play03:30

this level of quality of service

play03:32

and the way we express our intent is not

play03:35

by going to each device and entering

play03:37

correct commands on each device we

play03:39

express our intent through an

play03:40

application and this application is

play03:42

going to talk to the controller using an

play03:45

nbi a northbound interface because the

play03:48

applications we draw that above the sdn

play03:51

controller or north of the controller

play03:53

so these are going to be called nbis

play03:55

northbound interfaces

play03:57

and here we're not talking about op flex

play03:59

or open flow we're using something

play04:01

called rest apis and rest stands for

play04:05

representational state transfer what

play04:07

does that mean exactly it means we're

play04:09

using http verbs like you would use when

play04:13

interacting with a web page to send

play04:16

information to the controller our intent

play04:18

and to retrieve information from the

play04:20

controller so we can see for example the

play04:22

status of a router and this information

play04:24

being sent using these http verbs needs

play04:27

to be formatted in a certain way and one

play04:29

of the popular formats is json json that

play04:33

stands for javascript object notation

play04:36

and this is a fairly generic look at how

play04:38

sdn works but let's talk cisco specific

play04:41

solutions sometimes a cisco sdn

play04:43

controller is not going to use a

play04:45

centralized control plane it very well

play04:47

may leave the control planes in the

play04:49

devices it just kind of depends on how

play04:51

things are set up so it's not always

play04:53

going to be a centralized control plane

play04:55

but when we say sdn controller what are

play04:58

we talking about in the cisco world well

play05:00

it varies are we talking about the data

play05:02

center or are we talking about the

play05:04

enterprise network in the data center

play05:06

i'd like you to know that the sdn

play05:08

controller of choice is the cisco apic

play05:11

that's the application policy

play05:13

infrastructure controller that's part of

play05:15

cisco's aci or application centric

play05:18

infrastructure that they have for data

play05:20

centers but in the enterprise instead of

play05:23

using a cisco apic which is going to be

play05:25

talking typically to nexus devices we're

play05:28

going to use cisco dna center where dna

play05:30

stands for digital network architecture

play05:32

this allows us to do that intent based

play05:35

networking that i was talking about and

play05:36

is a few examples of what cisco dna

play05:38

center can do we can use it to design

play05:41

our network we can draw topologies we

play05:43

can pre-configure our devices such that

play05:46

they can be plugged in and they'll

play05:49

automatically download their

play05:50

configuration in other words we can

play05:52

pre-provision them we can do our

play05:54

day-to-day configuration using cisco dna

play05:56

center it's great for troubleshooting

play05:59

and monitoring what's going on and when

play06:01

we talk about troubleshooting this is

play06:02

not just a typical help interface the

play06:05

troubleshooting is going to be proactive

play06:07

it's going to watch for things and it's

play06:09

going to tell you about things that it

play06:10

noticed and it's going to give you

play06:11

recommended remediation steps and this

play06:14

troubleshooting intelligence comes from

play06:16

cisco tech engineers who have seen these

play06:18

issues as part of their job

play06:20

so this is like a knowledge base of

play06:22

cisco tack built into cisco dna center

play06:25

and you also hear that cisco dna center

play06:28

gives you platform support what we mean

play06:30

by platform support is we can write

play06:32

applications to talk to cisco dna center

play06:36

now cisco dna center it has a beautiful

play06:38

gui interface we can go in and use and

play06:40

we can do a lot from that interface but

play06:43

we don't have to do everything or

play06:44

anything from that interface we can do

play06:46

everything programmatically we can write

play06:48

applications maybe using python maybe

play06:51

modify somebody else's application for

play06:53

our environment and we can run that

play06:56

application and it's going to send

play06:57

instructions to the apis known to cisco

play07:00

dna center to do any of these functions

play07:03

and that's an overview of sdn

play07:05

software-defined networking our next

play07:08

technology is software-defined wan or

play07:10

software-defined wide area networks but

play07:12

before we jump into that sd-wan

play07:14

discussion i want to tell you about a

play07:16

way to taste test for free

play07:19

some of our courses here's a challenge

play07:21

that many students have they're not sure

play07:23

which track they want to go down is it

play07:25

security is it enterprise one of my

play07:28

favorites is collaboration well here you

play07:30

can taste test some of these different

play07:32

topics specifically you can check out

play07:34

the first module in any of these courses

play07:37

you might want to start at ccna or if

play07:38

you've already got your ccna you can

play07:40

taste test the core content for

play07:43

enterprise security collaboration

play07:46

if you've already completed your core

play07:48

training in security or enterprise you

play07:50

can take the next step take a narci for

play07:52

enterprise or sncf for security or if

play07:56

you don't want to stay cisco specific

play07:57

you may want to check out our newest

play07:59

course which is professional ethical

play08:01

hacking that gets you ready for version

play08:04

11 of the certified ethical hacker exam

play08:07

which by the way is currently listed as

play08:09

the fifth most in-demand certification

play08:11

to have above any cisco certification

play08:14

because of the incredible demand for

play08:16

cyber security professionals or you may

play08:18

want to check out the new version of

play08:20

comptia's network plus certification if

play08:22

you're just getting into networking but

play08:24

again you can sign up to go through the

play08:25

first module in any or all of these

play08:28

courses for free

play08:29

just go to kw train dot com slash course

play08:32

hyphen samples again that's kwtrain.com

play08:36

course hyphen samples and taste test any

play08:39

or all of these training courses now

play08:41

let's take a look at sd-wan which stands

play08:44

for software-defined wide area network

play08:46

and to understand the benefits of sd-wan

play08:48

let's first consider a traditional win

play08:51

in a traditional land we had our remote

play08:54

sites that connected to our central site

play08:56

maybe there was a data center at that

play08:58

central side and we could use a variety

play09:00

of wan technologies to do that here is a

play09:02

couple of examples we have mpls or metro

play09:05

ethernet and because we were going over

play09:07

a single circuit from one site to

play09:09

another site we had very predictable

play09:11

performance we could configure security

play09:14

on those endpoint routers a disadvantage

play09:17

though is if we wanted to go out to the

play09:19

internet we might be forced to go

play09:21

through that hq location or perhaps we

play09:23

had to do backhauling maybe we had to go

play09:25

to the data center to have a security

play09:27

check done and then we could come back

play09:30

to our remote site and then go out over

play09:32

our internet connection that's not

play09:34

terribly efficient with software-defined

play09:36

wide area networking we make the

play09:38

observation that a lot of applications

play09:40

are migrating to the cloud we've got

play09:42

amazon's cloud aws amazon web services

play09:46

microsoft azure we've got google cloud

play09:48

microsoft office is available in the

play09:50

cloud dropbox and on and on and on and

play09:53

the thing is these applications that are

play09:55

cloud-based they can give us security

play09:58

and quality service and a predictable

play10:00

performance experience we don't need to

play10:02

do any backhauling back to the

play10:03

headquarters if we have a remote site

play10:06

and it wants to go out to the internet

play10:07

it can go straight out to the internet

play10:10

and the thing i want you to understand

play10:11

here is that we might have a variety of

play10:14

technologies that are interconnecting

play10:15

all of our sites here i've got just

play10:17

three sites but things could get much

play10:19

more complicated in larger enterprises

play10:22

for example consider this topology with

play10:25

a few different locations and you see

play10:27

how these devices are physically

play10:29

interconnected this is what we call the

play10:31

underlay network or we might refer to

play10:33

this as the physical infrastructure this

play10:35

is how our devices are physically

play10:37

interconnected but with sd-wan we can

play10:40

define our topology in other words we

play10:42

can define our wide area network

play10:44

connections perhaps i want a connection

play10:46

from the upper left office to the lower

play10:48

right office and a connection from the

play10:50

lower left office to that upper right

play10:52

data center and i'm not sure what the

play10:54

performance is going to be because i'm

play10:56

not sure which path i'm going to take

play10:57

well what we can do with sd-wan

play10:59

is put a virtual topology on top of that

play11:03

physical topology this is called our

play11:05

sd-wan overlay network this is our

play11:07

virtual infrastructure where logically

play11:10

from the perspective of these routers it

play11:12

looks like they have a connection from

play11:14

their site to the next top which is the

play11:16

other site now in reality they may be

play11:18

going through multiple other routers in

play11:20

between but it doesn't look like that to

play11:22

them because what's happening here is we

play11:24

have virtual secured tunnels that are

play11:27

set up through the wan and we're not

play11:29

going from router to router and

play11:30

configuring things individually that's

play11:32

one of the big advantages those control

play11:34

plane functions we were talking about

play11:36

they no longer have to reside in the

play11:38

routers they can be done inside of our

play11:39

sd-wane controller and we can have a

play11:42

wide variety of physical wan connections

play11:44

everything from cellular to metro

play11:47

ethernet or cable modem or mpls and the

play11:49

list goes on and on and as long as we

play11:51

educate our sd-wan controller about

play11:53

those technologies it will take care of

play11:55

it it will send out appropriate

play11:56

configuration commands to our routers it

play11:59

knows what's available on those routers

play12:01

and it's going to give us that security

play12:03

and quality of service and predictable

play12:05

performance that we had with those

play12:07

traditional point-to-point win

play12:08

connections and again let's talk cisco

play12:11

specific solutions cisco acquired a

play12:14

company called viptela back in 2017.

play12:17

it's this viptela technology that cisco

play12:19

is using for their sd-wan solution and

play12:22

we can break down the functions and uh

play12:24

components in cisco's sd-wan solution

play12:27

into a few different layers of operation

play12:28

let's consider those layers we've got

play12:30

the data plane the control plane and the

play12:32

management and orchestration planes

play12:34

they're so similar we'll just group them

play12:36

together let's talk about some of the

play12:37

pieces and parts that live at these

play12:39

different planes of operation

play12:41

first is vmanage up at the management

play12:43

and orchestration plane this is our

play12:45

interface to do the configuration in

play12:48

fact i'll take you out live to a vmanage

play12:50

interface in a few moments and you'll

play12:52

see what it looks like and i'll give you

play12:53

a link where you can go explore on your

play12:55

own another sd-wan component living at

play12:58

this layer is v-bond and the job of

play13:01

v-bond is to understand how the network

play13:04

is physically constructed and to figure

play13:06

out how all of these different

play13:08

interconnected components can work

play13:10

together and vbond also lets us do

play13:12

something called zero touch provisioning

play13:14

in other words we can completely

play13:16

provision or pre-configure a device

play13:18

before it ever arrives at one of our

play13:20

sites let's say a new router is shipped

play13:23

to one of our remote sites somebody

play13:25

plugs it in and it's going to phone home

play13:28

basically it's going to go up to a cisco

play13:30

site provide its serial number be given

play13:32

a certificate and it's going to be told

play13:34

the ip address for vmanage and a control

play13:37

plane device we'll talk about in a

play13:38

moment called v smart in fact let's go

play13:40

ahead and talk about that device v smart

play13:42

down at the control plane v smart as we

play13:45

see here does a policy enforcement so

play13:47

after we create a policy v-smart is in

play13:50

charge of enforcing that policy and

play13:53

sending those policies out to other

play13:55

sd-wan devices and route information

play13:58

from remote sites that's received using

play14:00

a protocol called omp the overlay

play14:03

management protocol because we're

play14:04

dealing with an overlay network and here

play14:06

we are doing that centralized control

play14:08

plane that we talked about earlier and

play14:10

if you're a star trek fan you might

play14:11

relate this to the borg where they have

play14:14

one mind the collective they call it

play14:17

that's kind of what's going on here the

play14:19

control plane is a lot like the borg

play14:21

collective it is the mind if you will

play14:23

for all of the different components

play14:25

making up our sd-wan and finally down at

play14:27

the data plane we have the edge routers

play14:30

themselves and these are responsible for

play14:32

doing the forwarding of our traffic and

play14:33

these edge routers they could be

play14:35

physical routers or they could be

play14:36

virtual routers and now that we've seen

play14:38

these pieces in parts let's take a look

play14:40

at how this might be implemented in the

play14:42

real world here we see a sample topology

play14:44

with a main campus location we've got a

play14:46

couple of branch locations we've got a

play14:47

physical data center we've got a cloud

play14:49

data center and they're all connected

play14:51

using a variety of wan technologies but

play14:53

remember sd-wan is an overlay technology

play14:56

so the underlying physical

play14:58

infrastructure that is transparent to

play15:00

the traffic flowing over our overlay

play15:02

network and at each of these locations

play15:04

we have a cisco v-edge router and these

play15:08

routers are going to securely talk to

play15:10

one another over dynamically formed

play15:13

ipsec tunnels and this is going to make

play15:15

up our data plane that we talked about a

play15:17

moment ago and also remember the control

play15:19

elements that we discussed where we had

play15:22

cisco's vmanage v-bond v-smart we would

play15:26

form a connection between each of these

play15:28

control elements and each of these edge

play15:31

routers we're going to use those control

play15:33

elements for the provisioning and

play15:35

configuration of those edge devices and

play15:38

also i mentioned that these routers

play15:39

could be physical or they could be

play15:41

virtual well cisco's v edge routers are

play15:44

physical routers and they're running

play15:46

viptela's operating system we could also

play15:48

use some models of isr or integrated

play15:50

services routers or asrs aggregation

play15:54

service routers and the software or the

play15:56

virtual routers include cisco's cloud

play15:59

services router the csr 1000v or a v

play16:02

edge cloud router again running

play16:04

viptela's operating system and that's a

play16:06

look at how cisco provides an sd-wan

play16:09

solution based on their viptela

play16:10

acquisition but i promise to go out and

play16:12

show you v-manage let's take a look at

play16:14

that now here we're sitting at a

play16:16

v-manage interface and cisco makes this

play16:18

available to us for free to go explore

play16:21

it's part of their d cloud service now

play16:23

this is read only we're not going to be

play16:24

able to go in and reconfigure anything

play16:26

but if you just want to go in and

play16:28

explore you can go to cisco.com

play16:31

go slash sd-wan demos then you'll select

play16:34

live demo and you'll be given

play16:35

instructions as to how to log into this

play16:37

v-managed console looks like we've got a

play16:39

couple of v-smart devices we've got

play16:41

eight wan edge routers got a couple of

play16:44

v-bond devices we've got one instance of

play16:47

vmanage which we're on now and we can go

play16:49

in and check out some of the different

play16:50

tools monitoring options that we have

play16:52

available and that's an overview of

play16:54

cisco's sd-wan solution next up let's

play16:57

consider sd access

play17:00

and we could at this high level loosely

play17:02

consider sd access

play17:04

as an advancement or a replacement for

play17:07

traditional access control lists let's

play17:09

take a look at some of its features

play17:11

cisco tells us that sd access is the

play17:14

next generation in policy enforcement

play17:16

instead of having individual access

play17:18

control lists that say this ip address

play17:21

can go to this other ip address using

play17:23

this tcp port number here we're going to

play17:25

use security group acls so here rather

play17:29

than identifying someone based on the ip

play17:32

address they're using at the moment it's

play17:34

based on their identity and their

play17:36

identity is going to be defined on a

play17:38

device called cisco ice the identity

play17:41

services engine and like our other

play17:43

software-defined technologies we're

play17:45

going to be virtualizing the physical

play17:47

network in fact we can have multiple

play17:49

virtual networks all using the same

play17:51

physical network and we can give

play17:53

different virtual networks different

play17:54

policies even though they're sharing the

play17:56

same physical network that would be much

play17:58

more of a challenge to do with

play17:59

traditional acls in fact let's consider

play18:02

a basic example of using a traditional

play18:05

acl where we are manually configuring

play18:07

access control for example let's say

play18:08

that we have an access control list that

play18:10

says we want to permit pc1 which has an

play18:13

ip address of 192.168.1.100

play18:17

we want to permit that ip address to go

play18:19

to the server which has an ip address of

play18:23

192.0.2.3 we want it to go to that

play18:25

server using a tcp port 443 the secure

play18:29

http port and with that acl in place on

play18:32

router r1 that traffic is going to be

play18:34

allowed no problem but what if that user

play18:37

takes their pc or maybe it's a laptop

play18:39

they take it somewhere else in the

play18:41

building or in the enterprise they're

play18:42

suddenly connected to a different subnet

play18:44

and they've got a different ip address

play18:46

here the ip address is 203.0.113.125.

play18:51

there's no acl that says that's going to

play18:53

be permitted and they're going to be

play18:55

denied access to the server when that

play18:57

user should have access to the server

play18:59

can you see with today's more mobile

play19:01

workforce it's going to be harder and

play19:04

harder to limit or grant access to

play19:07

resources based on acls instead

play19:10

enter sd access with a software defined

play19:13

access we're going to have security

play19:16

groups and let's pretend we have a

play19:17

security group called it and it has a

play19:20

couple of members kevin and charles and

play19:22

the identity of each member that's going

play19:24

to be defined on a device called cisco

play19:27

ice the identity services engine and

play19:29

here instead of having a regular acl

play19:31

that says permit this ip address to go

play19:33

to the https port on the server here we

play19:36

have a security group acl which says

play19:39

permit the it security group to go to

play19:42

that server on that port so here i've

play19:44

logged into pc1 with my identity of

play19:47

kevin and that's a member of the it

play19:50

group and that is permitted to get to

play19:52

the server and if i move my device to

play19:54

another location i'm still kevin i can

play19:56

still connect with my identity so

play19:59

regardless of where i am in the network

play20:01

i still have permission to get to the

play20:02

server now let's take a look at some of

play20:04

the pieces and parts making up a cisco

play20:07

sd access solution and again we'll break

play20:09

this into different layers beginning

play20:11

down at the bottom the physical layer

play20:13

and the physical layer is made up of our

play20:15

actual infrastructure devices here we

play20:17

might have things like routers and

play20:18

switches wireless line controllers up at

play20:21

the network layer we have both the

play20:23

physical underlay network and the

play20:25

virtualized network that lies on top of

play20:27

the underlay network the sd access

play20:29

overlay network this is sometimes

play20:31

referred to as our virtual fabric if we

play20:34

move up to the controller layer we see

play20:36

cisco dna center which is going to be

play20:38

sending instructions using those

play20:40

southbound apis out to our devices

play20:42

that's going to live at the controller

play20:44

layer as well as cisco ice that's

play20:47

granting permission for different

play20:49

identities

play20:50

and our interface to manage all this is

play20:52

going to be done through the gui of

play20:55

cisco dna center that's up at the

play20:57

management layer and after going through

play20:58

this video i hope you have a better

play21:00

sense for what these sd technologies are

play21:02

all about sdn sd-wan sd access and as we

play21:06

wrap up i just want to remind you again

play21:08

about the opportunity you have to taste

play21:11

test any of these courses specifically

play21:14

you can go through the first module of

play21:16

any of these courses for free and see if

play21:18

it's for you all you have to do is go to

play21:20

kwtrain.com

play21:22

course hyphen samples thanks for joining

play21:24

me and we'll see you next time

play21:27

[Music]

play21:37

you

Rate This
★
★
★
★
★

5.0 / 5 (0 votes)

Étiquettes Connexes
Software-DefinedNetworkingSDNCiscoSD-WANAPIsIntent-BasedNetwork ManagementCloud MigrationSecurity ProtocolsAutomation
Besoin d'un résumé en anglais ?